Professional Documents
Culture Documents
“Vengeance will be mine...,” educational backgrounds; fa- control access to specific infor-
declared a defiant message on vorite books, movies, and mu- mation (and members actually
MySpace.com. “I should have sic; and relationship status. exercise those options), every-
killed you all when I had a gun Others sites promote business, thing posted on a profile may
and some drugs.” This violent activism, networking, counsel- be visible
monologue, one of several ing, socializing, or many types
to all site visitors. Most sites
postings on the writer’s site, of recreational interests. Sites
require members to agree to
threatened his ex-wife, who such as MySpace, Facebook,
terms of proper conduct, but
had fled the state to escape his Friendster, and Xanga have at-
enforcement of such terms is
abuse. In postings on other tracted millions of members,
sporadic and often depends on
sites, he demanded photos of particularly among teenagers
members to report violations. 2
the Virginia Tech massacre, the children, or income. Although mails, chats, instant messages,
shooter, Seung-Hui Cho, alleg- most of these questions are keystrokes, passwords, and
edly used Facebook to locate optional, users may automati- Web sites visited.
and stalk female classmates. cally answer them because
In July 2007, authorities in Lor- Legal Recourse
they are using the site to meet
ager, Louisiana, arrested a 17- other people. On many sites, Stalkers who use social net-
year old for stalking and cyber- all these answers go “public,” working sites as part of a pat-
stalking another teenage boy. remaining open to anyone who tern of stalking may be subject
The alleged stalker’s MySpace uses the site. Stalkers may to criminal charges. For exam-
page featured a video of the use such information to gain ple, someone who repeatedly
accused pistol-whipping an- access to site members. follows and tracks a victim in
other boy posing as the victim. her car, as well as posts a lewd
Many social networking sites
In 2006, a University of Kansas photo of the victim on a social
(e.g., Stalkerati) also have
student received death threats networking site, can be
search tools that can simulta-
from someone who found her charged with the crime of
neously pull personal informa-
class schedule on-line. He stalking. Also in many states,
tion about the same person
posted photos from the victim’s cyberstalking statutes enable
from a number of different
MySpace account on his own prosecutors to charge those
sites, including MySpace,
site, along with insults about who use technology to stalk
Friendster, Flickr and Google.
her appearance and her major. and harass their victims. Other
A recently shut-down site
Also last year, National Public states have general stalking
called fbstalker.com tracked
Radio’s Veronica Miller discov- laws that define ‘pattern of
changes in the profiles of users’
ered “Becky,” a MySpace conduct’ broadly enough to
friends while saving copies of
“cyber twin” who had copied a cover the use of technology to
each page to compare to sub-
stalk. Most of these laws are
photo of Miller from Facebook sequently updated files.5 Other
and published it—along with relatively new, however, and
sites, such as Profilesnoop and
photos of Miller’s family—on few cases involving social net-
Link View, allow visitors to
the imposter’s site. Although working sites have yet been
trace a user’s Internet Protocol
Miller’s impersonator did not prosecuted. offensive or de-
(IP) address (and even physical
threaten or stalk her (and famatory material regarding
location on Google Maps) with
MySpace promptly removed the victim from the site.
many social networking sites,
“Becky’s” site), the incident including Facebook.8
shows the potential of such
Stalkers can also use social New Laws
sites for stalking or harass-
networking sites to introduce
ment. Lawmakers are starting to pro-
spyware into the computers of
pose measures to govern the
their victims. Spyware infec-
use of social networking sites.
tion rates are increasing, an
Features to Watch In April 2007, for example, the
anti-spyware company spokes-
Several social networking site California legislature introduced
man told Business Week, in
features may increase users’ a bill to prevent individuals
part because “people are creat-
vulnerability to stalkers and from using social networking
ing multiple profiles, and the
other predators. For example, sites to incite harassment or
links on their sites will take you
new MySpace members are abuse against an individual.
to sites that will download ad-
Harassment would include
asked to supply a name or ware and spyware.”9 Stalkers
nickname and information posting digital images or mes-
can exploit this vulnerability on
about their marital status, sex- sages on Web sites to cause
their victims’ profile pages.
ual orientation, hometown, fear, harassment, or harm to
Once downloaded, spyware can
school, religion, education, in- an individual.10
help stalkers gather informa-
terests (e.g., music, movies, tion about all their victims’
television, books, and heroes), computer activity, including e-
Page 3 www.ncvc.org/src The Source