Impersonation & Cyber Crime: The Growing Problem

April 2, 2018 | Views: 2172

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

There is a discerning situation in relation to cheating by impersonation, as moreover impersonation is with-hold with identity theft, cyber stalking, cyber bullying and cyber harassment, a bewilderment situation arises for the legal law framers that how to give uniformity to these crimes, or whether to conclude them as single. As with rising of these crimes, various cases have been led to derive legislation defines different overviews, which provides ambiguity to overlook it. After seen the various cases and implanting legislation over it, in one of the article named as “The Harm of Malicious Impersonation: We’re Gonna Need A Bigger Boat”, San Francisco lawyer Erica Johnstone explains, “Almost all cyber-harassment goes unpunished, with devastating consequences to the victims, including loss of reputation, shame, mortification, hurt feelings, pain, suffering, inconvenience, loss of business and education opportunities, and emotional distress.” In this article only Dr. Keely Kolmes cautions about the potential harms of online impersonation, “This is a form of harassment and the emotional distress may lead to anxiety, depression, sleep disturbances or other disruptions to a person’s well-being. It could significantly impair a person’s daily functioning in school, work, or relationships. It can also affect someone’s social support system if others don’t recognize that the individual is being impersonated.”

Cyber Impersonation is becoming more and more synonymous. Digital identity theft, also known as digital impersonation, has been a growing problem in the Internet era. The incident of Identity Theft is soaring out of control. Most Cyber criminals only want to make money. It is easier to take money from a lot of people by using identity theft vehicles such as Phishing sites and get away with it.¹ It can cost individuals thousands of dollars to recover from the damage that can be caused when their identities are stolen. However, money is not only the reason for identity theft; intent to harm, bully or harass someone being anonymous could be another motive of impersonation. While dealing with Impersonation the question arises, is impersonation can be referred to bullying or harassing, the answer to this is yes. Impersonation is when someone creates a fake profile in your students’ name in order to harass, intimidate, threaten or defraud another person. Thus, there are a number of ways impersonation can be used to bully somebody. As if we take an example, it shows relevancy of “cyber bullying by personation,” where a student impersonates another by creating fake social networking profiles, pointing to a story in The Star-Ledger, where an online bully created a Facebook profile for Newark, N.J., teen Nafeesa Onque. The impersonator operated the page for more than three years; many of Onque’s friends thought the page was run by her. The bully posted sexually explicit photos and tirades online, destroying Onque’s reputation.²

 A question arises, how a cybercrook can steal identify or impersonate one to disguise others. The answer to it is very usual, and it is stalking the pray and gain its personal information. In cyber space, such an act is referred as cyber stalking. Thus, we can say cyber stalking is the initiative key tool of the cyber impersonation and other offences relating it. So, the central idea is that, there is synonymy between cheating by impersonation, cyber stalking, identity theft, and cyber bullying and cyber harassment, and clearly one need to decide that all these should be counted as one, or singular crimes.

References:

1. “The Challenge Of Countering Identity Theft: Recent …” Insert Name of Site in Italics. N.p., n.d. Web. 02 Apr. 2018 <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.103.6835&rep=rep1&a>.

2. “Cyber Bullying Growing More Malicious, Experts Say | High …” Insert Name of Site in Italics. N.p., n.d. Web. 02 Apr. 2018 <https://www.usnews.com/education/blogs/high-school-notes/2011/06/03/cyber-bullyi>.

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel