440 likes | 721 Views
Hawaii Internet & Technology Crimes Task Force What Type of Crimes Does the HITeC Unit Work? The Unit is divided into two sections – Internet Crimes Against Children, and Technology Crimes Against Persons What are “Internet Crimes Against Children”? Using a computer to:
E N D
What Type of Crimes Does the HITeC Unit Work? The Unit is divided into two sections – • Internet Crimes Against Children, and • Technology Crimes Against Persons
What are “Internet Crimes Against Children”? Using a computer to: Create or Possess Child Pornography [unlawful in every state to possess even one image] Solicit our Children to Engage in Sexual Activities [prior to any actual physical contact]
The Exploding Use of the Internet: • 25 million kids online now • 75 million by the end of 2005 will have Internet Access
Continuing Advances in Computer Technology Create Headaches • Actual Images: Live (webcam) & Recorded (digital photos; streaming video) • Morphed Images: Electronic manipulation of real human images (e.g. minor’s head on adult body) • Virtual Images: Electronic creation of digital images using NO real humans (e.g. animated Disney characters; creation of virtual minor) Types of Child Pornography
Cybersex Locations on the Internet 1.4 Billion Registered Domains 12% or 168 Million Are Pornographic Sites Source: Google.com • Commercial and Private Websites • Newsgroups • Post messages to others’ like a bulletin board • 70,000 newsgroups on the Internet • Chat Rooms • Luncheon Presentation • Personal E-mail
Cybersex & Distribution on the Internet Newsgroups, Chatrooms, & File Sharing
Typical Child Victims: Most are emotionally vulnerable Most Do NOT report victimization, especially boys Most are often females who feel “in love” (strong emotional bond) with offender
Internet Crimes Against Children here in Hawaii
These stories and more on our website at: www.hicac.com
Part II Technology Crimes Against People
Identity Theft • An individual whom obtains personal identifying information of another person without authorization and uses that information for an unlawful purpose.
Identity Theft In 2001, there were approximately 500,000 ID theft victims.
Identity Theft • Credit Account Fraud • Check Fraud • Automotive Purchases • Mortgage Fraud
Types of Credit Fraud • Lost/stolen • Fraudulent Application • Account takeover • Fraudulent use of account numbers • Counterfeit • Internal/Merchant
Check Fraud • Washed/altered • Scanned/altered • Mail ordered checks • Computer made counterfeit checks
What are the tools of the trade! • Computer • Color Printer • Motel Room Keys • Versa Check Program • MIPS Paper
Social Engineering Techniques used by suspects to obtain information from an individual or organization
802.11b Standard • 2.4 Ghz Transmit Frequency • 11 megabits per second • Wireless Ethernet Standard • Range – hundreds of feet, depending on environmental factors.
Wireless Access Point (WAP) * Ethernet Data Receiver/Transmitter * Cost - approximately $75 - $150 * Convenient, because there are no wires. * Range – hundreds of feet, depending on environ- mental factors.
Required Equipment Wireless 802.11b card - $50 - $100 (any office supply store)
Practical Hacker Applications Eavesdropping E-mail Intercepts User Name/Password Business Transactions
Personal Information Defined • Individual's first name or first initial and last name in combination with any one or more of the following data elements: • Social security number • Driver's license number or California Identification Card number. • Account number, credit or debit card number, in combination with any required security code.
Breach of Security Defined • Unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the agency.
What Can You Do? The average identity theft victim spends about 175 hours over a two year period to straighten out their financial records.
Identity Theft • Minimize the Information • Control the Information • Shred the Information
Identity Theft • Equifax WWW.equifax.com • Experian WWW.experian.com • Trans Union WWW.transunion.com
Computer Resources • Computer Firewalls • Anti-Virus Programs • Spyware Blocking Programs
GIVE US YOUR FEEDBACK • E-mail us at: ATG_ICAC@hawaii.gov
For More InformationContact Hawaii Internet & Technology Crimes Unit (808) 587-4114