Sunday, September 29, 2019

A study of the catfishing scheme of hile according to special agent steve kim Essay

A 29-year-old man from Michigan intended to kill a woman and her boyfriend from San Diego who got unwittingly involved in the man’s virtual love affair. The man, by the name of Hile, had gotten himself involved in a â€Å"catfishing scheme†. A â€Å"catfishing scheme† is â€Å"when a person uses social media to pretend to be someone their not, typically to engage in misleading online romances†. Hile was involved in an Internet-only relationship for two years. He exchanged explicit photos and romantic communications with someone who he believed was a woman. When Hile learned that the â€Å"women† he thought he was in a relationship was a man living in South Africa he â€Å"became enraged and vowed to find the man who deceived him and the women when images played a role in the deception†. According to Special Agent Steve Kim in the San Diego Division, â€Å"The woman, in this case, was a victim twice†. Kim explains â€Å"when the woman was 18 years old, she took revealing pictures of herself for personal use, never intending for them to be seen publicly. Those photos were later stolen from her online account, which she was aware of, but she had no idea what was being done with them†. Hile’s primary target for the revenge was the man from South Africa who actually dumped him. According to Special Agent Steve Kim South Africa was too far away and using a process she described as â€Å"circular logic† he went after the women instead. Even though the women had nothing to do with this internet-only relationship scam with the man from South Africa and Hile, he still believed she had some kind of responsibility just because she was used in the pictures. Hile was determined to learn the woman’s identity he cyberstalked her, conducted extensive online searches, and used hacking tools. Special Agent Steve Kim said â€Å"Eventually, he was able to hack into her e-mail account,†Ã‚  Hile got a hole of very detailed personal information on the women. He found not only information about the women but her live-in boyfriend and also their extended family and friends. After finding out her Address, telephone numbers and even information such as her favorite restaurant he purchased a bus ticket from Michigan to San Diego to kill the women. â€Å"Fortunately, Hile’s family sensed that he was planning something and alerted authorities, which eventually led to Hile’s detention in San Diego, about a mile from the woman’s residence.† When hill was arrested he not only had all of the information he collected about the women but also had duct tape, zip ties, and a to-do list which included things such as obtai ning a knife and chloroform. Special Agent Steve Kim said, â€Å"Had he gotten there, we are convinced he would have hurt or killed the victims†. â€Å"Hile was found guilty by a San Diego jury in August 2013.† This case influences my ethics because I feel that what this man did was wrong. Hile had no reason to attack the girl in the pictures, she was unknowingly involved with the internet-only romantic affair Hile was having. If Hile chooses to get involved in an internet-only romantic affair with someone he should have known the risks of doing so. I also feel that from a standpoint of him being arrested 5 years is not enough time in prison. â€Å"The maximum allowed by law for interstate stalking is five years in federal prison,† I think this man should have been charged with intent to kill. I know each state has its own cyber laws but is their not a law covering this type of situation? I could only find information on laws with intent to kill that involved a type of battery or assault paired with it. I could not find any laws specifically relating to someone who was cyber-stalking someone with an intent to kill them. I think this man should have had a different sentence due to the circumstances of this crime. My own computer security of ethics would be as follows. I would not use any knowledge I have learned to break into any computer systems. I would not use computer systems in any way that may harm people. I would not snoop around in another person’s files. I would not use someone’s computer or computer resources without authorization. I would also never release malicious software on to others computer systems. I think that having a code of ethics when using computers can be as simple as being considerate and respect for your fellow computer users.    References The FBI (Federal Bureau of Investigation) (2013, December 23).  Cyber Stalker – Cautionary Tale of Online Romance and Revenge. Retrieved  March  2, 2014, from http://www.fbi.gov/news/stories/2013/december/cautionary-tale-of-online-romance-and-revenge/cautionary-tale-of-online-romance-and-revenge Wikipedia The Free Encyclopedia (2014, February 26).  Ten Commandments of Computer Ethics – Wikipedia, the free encyclopedia. Retrieved  March  3, 2014, from http://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.