Title: Cyberbullying
1Cyberbullying Computer Crimes
Chatham-Kent Police Service Crime Prevention and
Community Safety
2What is Cyberbullying?
- the use of information and communication
technologies to bully, embarrass, threaten or
harass another - Millions of online users can access and witness
such bullying situations
3Communication Technologies
- Blogging - on-line diary, MySpace.com
- Cell Phones - camera phone with text messaging
- Discussion Boards, News Groups and Guest Books -
often used to make fun of others, people can add
to it www.rateteacher.com - E-mail - not real time, forwarding hurtful
e-mails - Instant Messaging IMs - MSN, YAHOO, ICQ-Real
time chat, web cam, photos - Interactive Games - bullying can occur while
playing on-line games-moderator can assist in
terminating the bullying - Profiles - personal information, pretend to be
someone else - Websites can be used to target victim
4The Bully Has Come Into The Home
- There is no escape.
- Home is no longer a place to feel safe or free
from the hurtful words.
5Why Cyberspace?Common Myths
- It is a virtual place to hide
- No witnesses
- No scene of the crime
6Four Types of On-Line Bullies
- The Vengeful Angel
- The Power-Hungry
- The Mean Girls
- The Inadvertent Cyberbully or Because I Can
7The Vengeful Angel
- The victim of bullying retaliates
- Dont see themselves as a bully
- Righting wrongs or protecting themselves or
others from the Bad Guy - Protecting a friend
8Power Hungry
- Like the schoolyard bullies
- Need an audience
- Want to exert their power
- Often brag about their actions
9Computer Savvy
- Often the victim of typical offline bullying
- May be physically smaller
- The ones picked on for not being popular enough
- Greater technical skills
10Mean Girls
- Done/planned in a group
- Entertainment
- Bullying other females
- Grows when fed by group admiration, cliques or by
the silence of others
11Inadvertent Cyberbully
- Because I can
- Dont believe they are cyberbullies
- Pretending to be tough online
- Dont think before clicking send
12How it Happens
- Flaming - online fights with angry words
- Harassment - repeatedly sending offensive, rude,
and insulting messages - Cyberstalking - repeatedly sending messages that
include threats of harm or are highly
intimidating. - Denigration -Dissing someone online.
- Impersonation - breaking into someones account,
posing as that person. - Outing and Trickery - Sharing someones secrets.
Tricking someone into revealing secrets - Exclusion - Intentionally excluding someone from
an online group, like a buddy list
13Bystanders
- Forward hurtful e-mail
- Visit a cyberbullys vote for the fat girl site
- Allow cyberbullies to take cell phone photos or
video of personal moments of others
14Tips For The Bullied
- Block senders e-mail
- Change e-mail or cell phone number
- Dont reply to messages from cyberbullies
- Dont erase or delete messages
- Tell an adult
- Inform your ISP (Internet Service Provider)
- Call police if messages are threatening
15Bully BewareYou Can Be Found
- Internet service provider you can be held
accountable and lose your privileges - A footprint is left on your hard drive with any
messages sent
16Statistics
- In 1995 there was one hate related website.
- In 2004 there were 4700 hate related websites.
- In Canada,14 of teens say theyve been
threatened while using instant messaging. - 16 admitted to having sent hateful messages
themselves. - 75 of victims dont call police.
- 25 of victims suffer in silence and never tell
anyone.
17Misconceptions
- Tell all - its okay to tell personal secrets on
the internet? - I have the right to free speech?
- What happens on-line is just a game. It is not
real, so no one can get hurt? - What happens online should stay online?
18The Law - Cyberbullying
- Criminal Harassment cc 264
- Utter Threats cc 264.1
- Assault cc 265
- Defamatory Libel cc 298(1)
- Extortion by Threats cc 346(1)
- Personation with Intent cc 403
19Criminal Harassmentcc 264
- No person shall, without lawful
- authority and knowing that another person
- is harassed or recklessly as to whether the
- other person is harassed engage in
- conduct referred to in subsection (2) that
- causes that other person reasonably, in all
- the circumstances, to fear for their safety
- or the safety of anyone known to them.
-
20Utter Threats cc 264.1
- Every one commits an offence who, in any
- manner, knowingly utters, conveys or causes
- any person to receive a threat
- a) to cause death or bodily harm to any person
- b) to burn, destroy or damage real or personal
property or - c) to kill, poison or injure an animal or bird
that is the property of any person. -
21Assault cc 265
- A person commits an assault when
- a) without the consent of another person, he
applies force intentionally to that other person,
directly or indirectly - b) he attempts or threatens, by an act or a
gesture, to apply force to another person, if he
has, or causes that other person to believe upon
reasonable grounds that he has, present ability
to effect his purpose or - c) while openly wearing or carrying a weapon or
an imitation thereof, he accosts or impedes or
begs.
22Defamatory Libel cc 298(1) (2)
- Matter published without lawful justification or
excuse, that is likely to injure the reputation
of any person by exposing him to hatred, contempt
or ridicule, or that is designed to insult the
person of or concerning whom it is published. - May be expressed directly or by insinuation or
irony - (a) in words legibly marked upon any substance,
or - (b) by any object signifying a defamatory libel
otherwise than by words.
23Extortion by Threats cc 346.1
- Every one commits extortion who,
- without reasonable justification or excuse
- and with intent to obtain anything, by
- threats, accusations, menaces or violence
- induces or attempts to induce any person,
- whether or not he is the person threatened,
- accused or menaced or to whom violence
- is shown, to do anything or cause anything
- to be done.
24Criminal Harassmentcc 264(2)
- The conduct mentioned in subsection 1 consists
of - (a) repeatedly following from place to place
another person or anyone known to them - (b) repeatedly communicating with, either
directly or indirectly, the other person or
anyone known to them - (c) besetting or watching the dwelling-house, or
place where the other person, or anyone known to
them, resides, works, carries on business or
happens to be - (d) engaging in threatening conduct directed at
the other person or any member of their family.
25Personation With Intent cc 403
- Every one who fraudulently personates any person,
living or dead, - (a) with intent to gain advantage for himself or
another person, - (b) with intent to obtain any property or an
interest in any property, or - (c) with intent to cause disadvantage to the
person whom he personates or another person.
26What Can Parents Do?
- Security Software - Predator Guard - scans all
messages and notices when that text could be
threatening to user - E-mail Tracker Pro - allows you to track Internet
E-mail back to sender - Parental Controls - offers chat filtering
protection for both instant messaging and chat
rooms
27What Can Parents Do?
- Make it your business.
- Keep computer in a high traffic area of the home.
- Check their online activities periodically and
tell them you will be doing this. - Search for your childs name online - check their
profiles, postings, blogs, webpages, etc. - Watch out for secretive behavior online.
- Be a good listener. Stay calm and give your
child time to tell you how they fee. - Make it clear that its not your childs fault.
28Resources
- www.cyberwise.ca
- www.cyberbullying.ca
- www.cybertip.ca
- www.transl8it.com
- www.safekids.com - on-line safety quiz
- www.stopcyberbullying.com
- www.wiredkids.org - on-line quiz
- www.bullying.org
- www.netbullies.com
29Definition of Identity Theft
- Refers to all types of crimes in which someone
wrongfully obtains and uses another persons
personal data in some way that involves fraud or
deception, typically for economic gain.
30How Does Identity Theft Occur ?
- Consumers often become victims without knowing
that the identity thieves have acquired their
personal data. - Charging dinner at a restaurant on a credit card.
- Using debit cards to purchase gasoline, rent a
car, or rent a movie. - Mail theft.
- Conducting internet business.
31Skimming
- Identity thieves also skim or swipe customer
credit cards at restaurants or gas stations,
using an electronic device. The skimmer records
the personal information data from the magnetic
strip on the back of the card. This information
is then transferred to another location, where it
is re-encoded onto fraudulently made credit cards.
32Magnetic Strip Readers90 - 120
33Phishing
- E-mails linking users to spoofed websites.
- Consumers enter personal data on web sites that
appear to belong to legitimate firms. - No real connection to any businesses.
- Data is used in various fraud schemes.
- Some direct you to a real site, but add a fake
pop-up window.
34(No Transcript)
35(No Transcript)
36CIBC Fraud Scam
- An e-mail letter that was sent out as a fraud
attempt disguised as an official CIBC e-mail. - This e-mail letter was in no way connected to
CIBC. - It is important to note that CIBC is no more
prone to such scams than any other institution.
37Dear CIBC Customer
Dear CIBC Customer, As a customer of CIBC,
the security of your personal and account
information is extremely important to us. By
practicing good security habits, you can help us
to ensure that your private information is
protected.Our new security system will help you
to avoid frequently fraud transactions and to
keep your investments in safety. Due to
technical update we recommend you to update your
banking information of your account to update
your account information we are asking you to
provide CIBC all the information requested in the
form, otherwise we will not be able to verify
your identity and your CIBC Account's Access will
be denied, you might update your records
following the next link below www.cibconline.cibc
.com/bvtrx01/script-root-tran/authentication/Updat
eOnline We appreciate your business. Its truly
our pleasure to serve you. Sincerely Canadian
Imperial Bank of Commerce.
38CIBC Scam De-Brief
- First and Foremost - No bank will ever send you
an e-mail asking for any type of personal
information. - What gave it away?
- The original link was
- www.cibconline.cibc.com/bvtrx01/script-root-tran/a
uthentication/updateinformation - When you click the hyper-link you are sent to
this web address - www.nufclearingcentre.co.uk/survey/.c/index.html
- If you have a Debit Card - Think about how you
originally selected your pin - was it this
transparent?
39Ministry of Transportation Alert
- An advisory was posted by the Ministry of
Transportation alerting Ontario Drivers about an
attempted internet scam aimed at their personal
information. - Most organizations will alert their customers as
soon as they are aware of an internet scam. - Personal information obtained from one scam can
be used for another.
40 Public AdvisoryBeware Internet E-mail
Fraud The Ministry of Transportation has
recently learned that a fraudulent e-mail is
being sent to members of the public. It contains
a link to a web page which looks similar to the
Ministry of Transportation website. It states
that the ministry is updating its licence
database system and requests that the recipient
confirm driver license information such as name,
address and driver's license number. Do not
comply with this fraudulent request. This email
was not sent by the Ministry of
Transportation. We are investigating this
situation. The police have been notified. Do not,
under any circumstances, respond to this e-mail.
If you receive further e-mails from the same
source, or anyone you know receives a similar
e-mail, please notify the Licensing
Administration Office at lao_at_mto.gov.on.ca and
attach the suspect e-mail to your
correspondence. To safeguard your security we
recommend prudence when communicating personal
information in e-mail or online. The Internet is
not always a secure communications vehicle. The
Government of Ontario is committed to privacy
protection. The safety and integrity of personal
information are top priorities. Ontario's
e-government services are built on secure
technologies and processes to ensure privacy.
We do not tolerate any misuse of your personal
information Ministry of Transportation of
Ontario
41Vishing Joins Phishing As Security Threat
- July 11, 2006 - Just as Internet surfers have
gotten wise to the fine art of phishing, along
comes a new scam utilizing a new technology. - Vishing uses Voice Over Internet Protocol
(VoIP) uses phones instead of a misdirected Web
link to steal user information. - The thieves use a war dial over a VoIP system to
blanket call an area. A recorded message tells
the person receiving the call that their credit
card has been breached and to call the following
(regional) phone number immediately. - When the user calls the number, another message
is played statingthis is account verification
please enter your 16 digit account. - The VoIP phone can recognize and capture
telephone key strokes. - Protection against this Fraud- if you are
concerned about a debit or credit card number
being breached call the CUSTOMER SERVICE NUMBER
ON THE BACK OF YOUR CARD
42Theft From Company or Government Databases
- Significant appeal of large databases.
- Theft of computer hard drives and bribing
employees to obtain personal data. - Hacking into databases.
43Trojan Horses
Malicious security breaking program disguised as
something benign Example downloading a music or
movie file erased disks, credit card numbers
and passwords sent to strangers, computers
hijacked
44Key Logging
- Achieved by installing software, clicking on a
link, or opening an attachment. - Software is secretly installed on your computer.
- All typing is recorded (online banking).
- Thieves retrieve information.
45Internet Business
- Purchasing products on E-bay can be risky, ensure
that the seller has a good reputation. - Work with someone who has experience in making
purchases on line. - Use a pay-pal account or similar banking device
to funnel funds for these purchases. - Make sure that the site is secure, check for the
yellow padlock icon.
46Check Security Before You Type
- In Internet Explorer check the yellow lock icon
in the bottom right corner. - Double click to see the security certificate.
issued to name should match the real site name. - In the address bar look for https// not http//
47Digital Crooks Hone Craft Of Phishing For Suckers
- Fake websites are now being concocted by
phishers. - Even if you clicked on the little security link,
a pop-up containing a certificate would confirm
that you were indeed securely connected to the
financial institution. - Warning do NOT respond to e-mails from financial
institutions - Banks do not send out e-mails to their customers
- Telephone the bank or go in person and check
your accounts. Source Chatham Daily News Page 5,
Sept. 12, 2006
48If You Are A Victim
- Contact your bank or credit card company and keep
a log of dates, person(s) that you spoke with and
exactly what was said. - Report the matter to your local police service.
- Report your identity theft case to watchdog
agencies.
49If You Are a Victim
- Contact the fraud departments of
- Trans Union Canada 1-877-525-3823
www.tuc.ca/TuCop/consumer/personalsolutions.htm - Equifax Canada 1-877-323-2598
- www.equifax.com/EFX_Canada
50If You Are A Victim
- Request that a Fraud Alert be placed on your
files. At this time order copies of your credit
reports. - Contact the fraud dept. of creditors for any
accounts that have been fraudulently opened or
tampered with, ie credit card companies, phone
companies, banks and other lenders. - Contact Phone Busters National Call Centre.
51The Law
- Theft cc 322(1)(a) (d)
- Unauthorized Use of Computer 342.1
- Possession of Device to Obtain Computer Service
cc 342.2(1) - Theft, Forgery, etc., of Credit Card 342(3)
- Fraud cc 380(1)
- Mischief 430(1.1)(c)
52Theft cc 322(1)(a) (d)
- Every one commits theft who fraudulently and
without colour of right takes, or fraudulently
and without colour of right converts to his use
or to the use of another person, anything whether
animate or inanimate, with intent, - (a) to deprive, temporarily or absolutely, the
owner of it or a person who has a special
property or interest in it, of the thing or of
his property or interest in it. - (d) to deal with it in such a manner that it
cannot be restored in the condition in which it
was at the time it was taken or converted.
53Unauthorized Use of Computer cc 342.1(1)
- Every one who, fraudulently and without colour of
right, - (a) obtains, directly or indirectly, any
computer service, - (b) by means of an electro-magnetic, acoustic,
mechanical or other device, intercepts or causes
to be intercepted, directly or indirectly, any
function of a computer system, - (c) uses or causes to be used, directly or
indirectly, a computer system with intent to
commit an offence under paragraph (a) or (b) or
an offence under section 430 in relation to data
or a computer system, or - (d) uses, possesses, traffics in or permits
another person to have access to a computer
password that would enable a person to commit an
offence under paragraph (a), (b) or (c)
54Possession of Device to Obtain Computer Service
cc 342.2(1)
- Every person who, without lawful justification or
excuse, makes, possesses, sells, offers for sale
or distributes any instrument or device or any
component thereof, the design of which renders it
primarily useful for committing an offence under
section 342.1, under circumstances that give rise
to a reasonable inference that the instrument,
device or component has been used or is or was
intended to be used to commit an offence contrary
to that section.
55Theft, Forgery, Etc., of Credit Card cc 342(3)
- Every person who, fraudulently and without colour
of right, possesses, uses, traffics in or permits
another person to use credit card data, whether
or not authentic, that would enable a person to
use a credit card or to obtain the services that
are provided by the issuer of a credit card
holders.
56Fraud cc 380(1)
- Every one who, by deceit, falsehood or other
fraudulent means, whether or not it is a false
pretence within the meaning of this Act, defrauds
the public or any person, whether ascertained or
not, of any property, money or valuable security
is guilty of an offence.
57Mischief cc 430(1.1)(c)
- Everyone commits mischief who willfully
- (a) destroys or alters data
- (b) renders data meaningless, useless, or
ineffective - (c) obstructs, interrupts or interferes with the
lawful use of data
58Questions?