Sunday, September 29, 2019
A study of the catfishing scheme of hile according to special agent steve kim Essay
A 29-year-old man from Michigan intended to kill a woman and her boyfriend from San Diego who got unwittingly involved in the manââ¬â¢s virtual love affair. The man, by the name of Hile, had gotten himself involved in a ââ¬Å"catfishing schemeâ⬠. A ââ¬Å"catfishing schemeâ⬠is ââ¬Å"when a person uses social media to pretend to be someone their not, typically to engage in misleading online romancesâ⬠. Hile was involved in an Internet-only relationship for two years. He exchanged explicit photos and romantic communications with someone who he believed was a woman. When Hile learned that the ââ¬Å"womenâ⬠he thought he was in a relationship was a man living in South Africa he ââ¬Å"became enraged and vowed to find the man who deceived him and the women when images played a role in the deceptionâ⬠. According to Special Agent Steve Kim in the San Diego Division, ââ¬Å"The woman, in this case, was a victim twiceâ⬠. Kim explains ââ¬Å"when the woman was 18 years old, she took revealing pictures of herself for personal use, never intending for them to be seen publicly. Those photos were later stolen from her online account, which she was aware of, but she had no idea what was being done with themâ⬠. Hileââ¬â¢s primary target for the revenge was the man from South Africa who actually dumped him. According to Special Agent Steve Kim South Africa was too far away and using a process she described as ââ¬Å"circular logicâ⬠he went after the women instead. Even though the women had nothing to do with this internet-only relationship scam with the man from South Africa and Hile, he still believed she had some kind of responsibility just because she was used in the pictures. Hile was determined to learn the womanââ¬â¢s identity he cyberstalked her, conducted extensive online searches, and used hacking tools. Special Agent Steve Kim said ââ¬Å"Eventually, he was able to hack into her e-mail account,â⬠à Hile got a hole of very detailed personal information on the women. He found not only information about the women but her live-in boyfriend and also their extended family and friends. After finding out her Address, telephone numbers and even information such as her favorite restaurant he purchased a bus ticket from Michigan to San Diego to kill the women. ââ¬Å"Fortunately, Hileââ¬â¢s family sensed that he was planning something and alerted authorities, which eventually led to Hileââ¬â¢s detention in San Diego, about a mile from the womanââ¬â¢s residence.â⬠When hill was arrested he not only had all of the information he collected about the women but also had duct tape, zip ties, and a to-do list which included things such as obtai ning a knife and chloroform. Special Agent Steve Kim said, ââ¬Å"Had he gotten there, we are convinced he would have hurt or killed the victimsâ⬠. ââ¬Å"Hile was found guilty by a San Diego jury in August 2013.â⬠This case influences my ethics because I feel that what this man did was wrong. Hile had no reason to attack the girl in the pictures, she was unknowingly involved with the internet-only romantic affair Hile was having. If Hile chooses to get involved in an internet-only romantic affair with someone he should have known the risks of doing so. I also feel that from a standpoint of him being arrested 5 years is not enough time in prison. ââ¬Å"The maximum allowed by law for interstate stalking is five years in federal prison,â⬠I think this man should have been charged with intent to kill. I know each state has its own cyber laws but is their not a law covering this type of situation? I could only find information on laws with intent to kill that involved a type of battery or assault paired with it. I could not find any laws specifically relating to someone who was cyber-stalking someone with an intent to kill them. I think this man should have had a different sentence due to the circumstances of this crime. My own computer security of ethics would be as follows. I would not use any knowledge I have learned to break into any computer systems. I would not use computer systems in any way that may harm people. I would not snoop around in another personââ¬â¢s files. I would not use someoneââ¬â¢s computer or computer resources without authorization. I would also never release malicious software on to others computer systems. I think that having a code of ethics when using computers can be as simple as being considerate and respect for your fellow computer users. à References The FBI (Federal Bureau of Investigation) (2013, December 23).à Cyber Stalker ââ¬â Cautionary Tale of Online Romance and Revenge. Retrievedà Marchà 2, 2014, from http://www.fbi.gov/news/stories/2013/december/cautionary-tale-of-online-romance-and-revenge/cautionary-tale-of-online-romance-and-revenge Wikipedia The Free Encyclopedia (2014, February 26).à Ten Commandments of Computer Ethics ââ¬â Wikipedia, the free encyclopedia. Retrievedà Marchà 3, 2014, from http://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.