Title: CYBERCRIME: Fighting Electronic Crime on the Internet
1CYBERCRIMEFighting Electronic Crimeon the
Internet
2Introduction
- The Internet is a Tool
- Common uses
- The Web (WWW)
- Instant Messenger (IM)
- File Sharing (P2P, Email)
- Streaming Media (Audio, Video)
- Communications (Email, Voice over IP Internet
Phone) - Ecommerce (Shopping, Banking, Investing)
- Computers are Tools
- assist us in our work, calendars, finances,
research, communications - Providing recreation and entertainment
- Computers Are Used to Commit Cyber Crimes
- Data can be stolen, altered, hidden or warped
- Communication can be hidden, altered or recorded
- Preventing, detecting, and prosecuting computer
crime is one of the most significant challenges
to Law Enforcement in modern day
3 Impact of High-Technologyon Your Safety
- Greater more enduring than drugs
- greater influence on the uninvolved
- National International
- economy
- government
- law enforcement
- Collaboration
- working together, individuals, families have
the power to protect themselves
4Computers Add New Dimensionsto Traditional Crimes
- Homicide and other violent crimes (sexual
assault) - Illegal Material
- Child pornography
- Drugs, Alcohol
- Narcotics offenses
- Data Theft
- Fraud, counterfeiting
- Dangerous Content
- Bomb Making
- Drug Making
- Booby-Traps
Computers have do not understand jurisdictional
boundaries. Internet users are often anonymous
and in cyberspace, anyone can transfer massive
amounts of information almost instantaneously
5Why is Cyberspace Dangerous?
- VIRTUAL ANONYMITY FOR CRIMINALS DEVIANTS
- Easy to create e-mail accounts with bogus
information - E-mail services ask for little information
- Other services require nothing more than an
e-mail address - Rarely do services validate input
- Availability of Anonymizing Services
- LACK OF PHYSICAL EVIDENCE
- No doors to knock down, no windows to break, no
fingerprints to leave behind - Criminal is faceless and often in another
geographic area
6The Increasing Cost ofComputer Crime
- Bank Robbery - 2,500
- Bank Fraud - 25,000
- Computer Crime - 500,000
- Theft of Technology - 1,900,000
- ID Theft y - 2,500,000
7Fraud
- Auction frauds
- Get-rich-quick schemes
- Senior citizen scams
- Phishing
- Phony Prizes
- Cheap Stuff
- Hardware (Mp3 Players, Cameras, DVDs)
- Software (Windows, MS-Office, Anti-Virus)
8Theft
- Personally Identifying Information
- Birthday, SSN, Banking data
- Credit card numbers
- Identity Theft
- Computer Equipment
- Usernames Passwords
9Narcotics and Gambling
- Narcotics distribution
- Unmatched convenience
- compulsive underage gamblers
- Virtual casinos
- gone with a keystroke
- Day trading
10Fatal Online Encounters
11Online Harassment Cyberstalking
"It's actually obsene sic what you can find out
about people on the Internet." Liam Youens
12Crimes Against Children
- Child pornography
- Exposure of Children to harmful content
- Pornography
- Graphic Violence
- Hateful Content
- Children lured into degrading situations
- Chat Sessions
- Chat rooms
- Online Blogs
- Social Networks
- Children keep silent for many reasons
- To protect family
- Out of fear
- Feelings of shame
- To rebel against authority
- For chance and thrill
13Homicide
- Violent criminals use computers
- to acquire critical information about the
victim(s) - as a tool for communication
- as a storage device for evidence about motive and
methods
14The Many Faces ofComputer Crime in the News
- Computer Evidence Used In the Courts
- Terrorism - Zacarias Moussaoui, 20th hijacker on
9/11 - Homicides - Scott Peterson, Dennis Rader (BTK
Killer) - Child Pornography - Michael Jackson
- Espionage - Aldrich Ames
- Insider Trading - Martha Stewart Case
- Financial Fraud - ENRON
15What Can You Do to Help?
- Exert your influence
- Law enforcement
- Legislators elected officials
- Your family friends
- Practice preach collaboration
16Take Action to Protect Yourself Your Family
- Stay informed - technology changes
- Learn about computer-dependent crimes
- Network intrusions
- Denial of service attacks
- Hacking
- E-mail bombs
- Viruses Trojan horses
- Identity Theft
- Learn how not to become a victim
17Take Action toProtect Yourself Your Family
- Move home computers into family room or area
- Familiarize yourself with the Internet
- Utilize site/content blocking software or
parental controls - Establish family rules and guidelines for safe
Internet use - Discuss Internet crime and safety issues with
your children - do it often
Never allow children to meet Internet friends
18Take Action to Protect Yourself Your Family
- Dont give out personal or family information
- when signing up for groups
- anywhere else online
- Encourage Internet safety discussions in
community schools, PTOs, PTAs, etc. - Randomly check your childs email and Internet
web histories - Keep a written record of all logins, screen names
and their passwords - Invite your children to talk to you when they
find something objectionable
19Take Action to Protect Yourself Your Family
- Urge legislators and officials to address the
issues - send e-mail, snail mail, telephone
- Support the efforts of your local law enforcement
agencies - Report electronic crimes to your local law
enforcement authorities - If your child is the victim of an online
predator - it is not their fault
- be patient
- be compassionate
- contact authorities swiftly, time is critical
20Warning Signs Your ChildMay Be in Trouble Online
- Excessive use of the Internet, especially late at
night - Gifts, money or packages they cant or wont
explain - Computer or monitor is suddenly switched off,
laptop lid shut, or other attempts to block the
screen - Strange long distance charges, phone calls from
strangers, or lots of wrong numbers and hang-ups - Your child is using an on-line account belonging
to someone else - Your child begins deleting emails and internet
history after use - Buddies or email addresses that your child wont
or can't easily identify who they all are in real
life
21Thank You for Your Time and Interest