A 29-year-old man from Michigan intended to kill a woman and her boyfriend from San Diego who got unwittingly involved in the man’s virtual love affair. The man, by the name of Hile, had gotten himself involved in a “catfishing scheme”. A “catfishing scheme” is “when a person uses social media to pretend to be someone their not, typically to engage in misleading online romances”. Hile was involved in an Internet-only relationship for two years. He exchanged explicit photos and romantic communications with someone who he believed was a woman.
When Hile learned that the “women” he thought he was in a relationship was a man living in South Africa he “became enraged and vowed to find the man who deceived him and the women when images played a role in the deception”.
According to Special Agent Steve Kim in the San Diego Division, “The woman, in this case, was a victim twice”. Kim explains “when the woman was 18 years old, she took revealing pictures of herself for personal use, never intending for them to be seen publicly.
Those photos were later stolen from her online account, which she was aware of, but she had no idea what was being done with them”.
Hile’s primary target for the revenge was the man from South Africa who actually dumped him. According to Special Agent Steve Kim South Africa was too far away and using a process she described as “circular logic” he went after the women instead. Even though the women had nothing to do with this internet-only relationship scam with the man from South Africa and Hile, he still believed she had some kind of responsibility just because she was used in the pictures.
Hile was determined to learn the woman’s identity he cyberstalked her, conducted extensive online searches, and used hacking tools. Special Agent Steve Kim said “Eventually, he was able to hack into her e-mail account,” Hile got a hole of very detailed personal information on the women. He found not only information about the women but her live-in boyfriend and also their extended family and friends. After finding out her Address, telephone numbers and even information such as her favorite restaurant he purchased a bus ticket from Michigan to San Diego to kill the women. “Fortunately, Hile’s family sensed that he was planning something and alerted authorities, which eventually led to Hile’s detention in San Diego, about a mile from the woman’s residence.” When hill was arrested he not only had all of the information he collected about the women but also had duct tape, zip ties, and a to-do list which included things such as obtaining a knife and chloroform. Special Agent Steve Kim said, “Had he gotten there, we are convinced he would have hurt or killed the victims”. “Hile was found guilty by a San Diego jury in August 2013.”
This case influences my ethics because I feel that what this man did was wrong. Hile had no reason to attack the girl in the pictures, she was unknowingly involved with the internet-only romantic affair Hile was having. If Hile chooses to get involved in an internet-only romantic affair with someone he should have known the risks of doing so. I also feel that from a standpoint of him being arrested 5 years is not enough time in prison. “The maximum allowed by law for interstate stalking is five years in federal prison,” I think this man should have been charged with intent to kill. I know each state has its own cyber laws but is their not a law covering this type of situation? I could only find information on laws with intent to kill that involved a type of battery or assault paired with it. I could not find any laws specifically relating to someone who was cyber-stalking someone with an intent to kill them. I think this man should have had a different sentence due to the circumstances of this crime.
My own computer security of ethics would be as follows. I would not use any knowledge I have learned to break into any computer systems. I would not use computer systems in any way that may harm people. I would not snoop around in another person’s files. I would not use someone’s computer or computer resources without authorization. I would also never release malicious software on to others computer systems. I think that having a code of ethics when using computers can be as simple as being considerate and respect for your fellow computer users.
References
The FBI (Federal Bureau of Investigation) (2013, December 23). Cyber Stalker – Cautionary Tale of Online Romance and Revenge. Retrieved March 2, 2014, from
Wikipedia The Free Encyclopedia (2014, February 26). Ten Commandments of Computer Ethics – Wikipedia, the free encyclopedia. Retrieved March 3, 2014, from
Remember! This is just a sample.
You can get a custom paper by one of our expert writers.
Get your custom essay
Helping students since 2015
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download