Preview

The Cyber Manhunt

Better Essays
Open Document
Open Document
887 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Cyber Manhunt
The Cyber Manhunt
Cyber Manhunt, also known as Human Flesh Search or Internet Mass Hunting is primarily a Chinese Internet phenomenon of massive searching in which numerous Internet users participate to filter the search results and assists users in clarifying their search request. It literally means to uncover the true identity of a particular person with the connected efforts of all netizens. Because of the convenient and efficient nature of information sharing on the cyberspace, the Human Flesh Search is often used to acquire information usually difficult or impossible to find by other conventional means (such as library or Google). Such information, once available, can be rapidly distributed to hundreds of websites, making it an extremely powerful mass media. The purposes of human flesh search vary from providing technical/professional question&answer support to revealing private/classified information about specific individuals or organizations. Because personal knowledge or unofficial (sometimes illegal) access are frequently depended upon to acquire these information, the reliability and accuracy of such searches often vary. Netizens usually use Internet media such as blogs and forums to identify and expose information of individuals to public. It is based on massive human collaboration. The name refers both to the use of knowledge contributed by human beings through social networking, as well as the fact that the searches are usually dedicated to finding the identity of a human being who has committed some sort of offense or social breach online.

The origin of the term is disputed. One such theory is that the word was inspired by "Chicago typewriter" in the novel Ghost Blows Out the Light, which started a trend of describing manual inputting as "Human Flesh typewriter". A more accepted theory is that the term was coined by netizens on MOP, a popular Chinese BBS.

The first recognized Human Flesh Search dated back to March 2006, when netizens on Tianya

You May Also Find These Documents Helpful

  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Tolson, Mike. “Why tracking predators online can hinge on ‘luck.’ ” Chron. Houston Chronicle, 2009. Web. 22 August 2010.…

    • 1379 Words
    • 6 Pages
    Good Essays
  • Good Essays

    It is brought to the forefront and discussed as the dangers and bad possibilities that exist within the scope of internet interactions: predators that can more readily scope prey, the ease of cyberstalking, the disposable romance of “hookup culture” that’s only magnified by certain types of dating sites. These antagonistics points are then brought to a head with another rhetorical question for the reader. “Isn’t this simply technology letting human beings make the same stupid mistakes that they’ve made for centuries?” This question takes these arguments and shifts the blame off of his subject, and back onto human nature. The writer uses this question to to highlight the technology and processes therein as a tool rather than a catalyst.…

    • 957 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Within the World Wide Web, social network is becoming the favorite target for cybercriminals. This…

    • 526 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In, People of the State of California (Plaintiff) v. George Samuel Bronk (Defendant), the defendant used various software, tools, and methods to commit the felonies for which he was charged. He initially used a computer with access to the Internet to take over the email accounts of individuals who he located using the popular social media website, Facebook. Mr. Bronk located his victims by searching random Facebook profiles that had personal email addresses available to the public. Once he had the email addresses he tried to access emails accounts, by attempting to reset the passwords for said email accounts, by guessing at the security questions. Once he was able to gain access to the emails accounts, he went back to the Facebook profiles and took over the Facebook profiles as well.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Investigative Programs, Cyber Investigations: Operation "Web Snare". (2005). Federal Bureau of Investigation Website. Retrieved November 12, 2005 from, www.fbi.gov/cyberinvest/websmare.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Computers are a wondrous invention. From their very infancy in World War II, they have enabled man to defeat his fellow man in cryptographic war, they have been used to sequence the human genome and so many previously impossible things. However, we are entering an age where computers and technology have become almost indistinguishable from our everyday lives in a myriad of forms like Facebook ,Snapchat, and Instagram, and we must, as a culture, make a decision on how far we are willing to let technology and those who wield it enter our lives. The Circle by Dave Eggers is a poignant warning of the possible dangers of technology and power gone rampant. The novel concerns an extremely influential internet search corporation known as The Circle whose de facto monopoly on internet searches and online advertising has granted them tremendous wealth and power over governments, companies and public opinion .…

    • 792 Words
    • 4 Pages
    Good Essays
  • Good Essays

    “More than half of all adult internet users have used a search engine to follow others’ footprints” (Pew / Internet, 2007)…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Alias Name

    • 1240 Words
    • 5 Pages

    SEARCHING for information about people in the web is one of the most common activities of internet users. Around 30…

    • 1240 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Holloway, Christopher. "Worldcrunch." Welcome To The Deep Web: The Internet 's Dark And Scary Underbelly. N.p., 17 Nov. 2012. Web. 21 Oct. 2013.…

    • 891 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Computers and telecommunication networks have become a substantial aspect of our society and subsequently our lives. This type of technology can be used to carry out unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. The Internet cuts all racial, social, gender, and religious…

    • 4210 Words
    • 17 Pages
    Better Essays
  • Better Essays

    Cyber Predators

    • 1385 Words
    • 6 Pages

    Imagine being a mother or father who is at home and suddenly the phone rings. It’s the police, they believe your son or daughter has been chatting with an internet predator. He/She went to meet him/her and was kidnapped. The police are tracking the suspect, but have no idea if their children is still alive. In today’s sick and twisted world these occurrences are becoming more and more frequent. Some parents and children don’t realize that with the power of the internet in millions of households, comes great responsibility. These websites have become a playground for cyber stalkers. Cyber predators can find easy prey on today’s internet, but with kids gaining more internet knowledge, computer security devices, and crime task units progress can start being made in stopping this ongoing problem.…

    • 1385 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    "On the Internet, nobody knows you 're a dog" is a famous saying from The New Yorker. It illustrates the anonymity of the Internet. People can express their ideas freely through the Internet. However, it also brings some problems like rumors and network violence. Some experts put forward the idea of the real name-system which causes a heated debate among people. The South Korean government decided to implement the network real-name system in 2005. Instead of reducing the malicious slander, this system brings some bad side effects to the society.…

    • 1218 Words
    • 4 Pages
    Powerful Essays