When investigating a cyberstalking incident, some of the recommended investigative protocols include:
a. The stalker must be made aware that the behavior is unwelcome
b. Reporting the cyberstalker to their Internet service provider
c. Saving copies of all threatening emails, messages, website text, etc., for possible law enforcement prosecution
d. Report the incident to local law enforcement
e. All of the above
E
You might also like to view...
In hostage situations, bait money is often used to lure bank robbers out of the building
a. True b. False Indicate whether the statement is true or false
Boot camp effectiveness is difficult to evaluate with certainty because there hasn't been much evaluation research conducted to assess boot camp programs
Indicate whether the statement is true or false
In bonded labor, workers may inherit their debt
a. True b. False
Drug enforcement falls under the goal of _______ patrol
Fill in the blank(s) with correct word