210 likes | 418 Views
CYBERCRIME: Fighting Electronic Crime on the Internet. Introduction. The Internet is a Tool Common uses: The Web (WWW) Instant Messenger (IM) File Sharing (P2P, Email) Streaming Media (Audio, Video) Communications (Email, Voice over IP – Internet Phone)
E N D
Introduction • The Internet is a Tool • Common uses: • The Web (WWW) • Instant Messenger (IM) • File Sharing (P2P, Email) • Streaming Media (Audio, Video) • Communications (Email, Voice over IP – Internet Phone) • Ecommerce (Shopping, Banking, Investing) • Computers are Tools • assist us in our work, calendars, finances, research, communications • Providing recreation and entertainment • Computers Are Used to Commit Cyber Crimes • Data can be stolen, altered, hidden or warped • Communication can be hidden, altered or recorded • Preventing, detecting, and prosecuting computer crime is one of the most significant challenges to Law Enforcement in modern day
Impact of High-Technologyon Your Safety • Greater & more enduring than drugs • greater influence on the uninvolved • National & International • economy • government • law enforcement • Collaboration • working together, individuals, & families have the power to protect themselves
Computers Add New Dimensionsto Traditional Crimes • Homicide and other violent crimes (sexual assault) • Illegal Material • Child pornography • Drugs, Alcohol • Narcotics offenses • Data Theft • Fraud, counterfeiting • Dangerous Content • Bomb Making • Drug Making • Booby-Traps Computers have do not understand jurisdictional boundaries. Internet users are often anonymous and in cyberspace, anyone can transfer massive amounts of information almost instantaneously
Why is Cyberspace Dangerous? • VIRTUAL ANONYMITY FOR CRIMINALS & DEVIANTS • Easy to create e-mail accounts with bogus information • E-mail services ask for little information • Other services require nothing more than an e-mail address • Rarely do services validate input • Availability of “Anonymizing Services” • LACK OF PHYSICAL EVIDENCE • No doors to knock down, no windows to break, no fingerprints to leave behind • Criminal is faceless and often in another geographic area
The Increasing Cost ofComputer Crime Bank Robbery - $2,500 + Bank Fraud - $25,000 + Computer Crime - $500,000 + Theft of Technology - $1,900,000 + ID Theft y - $2,500,000 +
Fraud • Auction frauds • Get-rich-quick schemes • Senior citizen scams • Phishing • Phony Prizes • Cheap Stuff • Hardware (Mp3 Players, Cameras, DVDs) • Software (Windows, MS-Office, Anti-Virus)
Theft • Personally Identifying Information • Birthday, SSN, Banking data • Credit card numbers • Identity Theft • Computer Equipment • Usernames & Passwords
Narcotics and Gambling • Narcotics distribution • Unmatched convenience • compulsive & underage gamblers • Virtual casinos • gone with a keystroke • Day trading
Online Harassment & Cyberstalking "It's actually obsene [sic] what you can find out about people on the Internet."– Liam Youens
Crimes Against Children • Child pornography • Exposure of Children to harmful content • Pornography • Graphic Violence • Hateful Content • Children lured into degrading situations • Chat Sessions • Chat rooms • Online Blogs • Social Networks • Children keep silent for many reasons • To protect family • Out of fear • Feelings of shame • To rebel against authority • For chance and thrill
Homicide • Violent criminals use computers • to acquire critical information about the victim(s) • as a tool for communication • as a storage device for evidence about motive and methods
The Many Faces ofComputer Crime in the News Computer Evidence Used In the Courts • Terrorism - Zacarias Moussaoui, 20th hijacker on 9/11 • Homicides - Scott Peterson, Dennis Rader (BTK Killer) • Child Pornography - Michael Jackson • Espionage - Aldrich Ames • Insider Trading - Martha Stewart Case • Financial Fraud - ENRON
What Can You Do to Help? • Exert your influence • Law enforcement • Legislators & elected officials • Your family & friends • Practice & preach collaboration
Take Action to Protect Yourself & Your Family • Stay informed - technology changes • Learn about computer-dependent crimes • Network intrusions • Denial of service attacks • Hacking • E-mail bombs • Viruses & Trojan horses • Identity Theft • Learn how not to become a victim…
Take Action toProtect Yourself & Your Family • Move home computers into family room or area • Familiarize yourself with the Internet • Utilize site/content blocking software or parental controls • Establish family rules and guidelines for safe Internet use • Discuss Internet crime and safety issues with your children - do it often Never allow children to meet Internet friends
Take Action to Protect Yourself & Your Family • Don’t give out personal or family information • when signing up for groups • anywhere else online • Encourage Internet safety discussions in community schools, PTOs, PTAs, etc. • Randomly check your child’s email and Internet web histories • Keep a written record of all logins, screen names and their passwords • Invite your children to talk to you when they find something objectionable
Take Action to Protect Yourself & Your Family • Urge legislators and officials to address the issues • send e-mail, snail mail, telephone • Support the efforts of your local law enforcement agencies • Report electronic crimes to your local law enforcement authorities • If your child is the victim of an online predator… • it is not their fault • be patient • be compassionate • contact authorities swiftly, time is critical
Warning Signs Your ChildMay Be in Trouble Online… • Excessive use of the Internet, especially late at night • Gifts, money or packages they can’t or won’t explain • Computer or monitor is suddenly switched off, laptop lid shut, or other attempts to block the screen • Strange long distance charges, phone calls from strangers, or lots of wrong numbers and hang-ups • Your child is using an on-line account belonging to someone else • Your child begins deleting emails and internet history after use • Buddies or email addresses that your child won’t or can't easily identify who they all are in real life