CYBERCRIME: Fighting Electronic Crime on the Internet - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

CYBERCRIME: Fighting Electronic Crime on the Internet

Description:

Senior citizen scams. Phishing. Phony Prizes. Cheap Stuff. Hardware (Mp3 ... Buddies or email addresses that your child won't or can't easily identify who ... – PowerPoint PPT presentation

Number of Views:321
Avg rating:3.0/5.0
Slides: 22
Provided by: forwar9
Category:

less

Transcript and Presenter's Notes

Title: CYBERCRIME: Fighting Electronic Crime on the Internet


1
CYBERCRIMEFighting Electronic Crimeon the
Internet
2
Introduction
  • The Internet is a Tool
  • Common uses
  • The Web (WWW)
  • Instant Messenger (IM)
  • File Sharing (P2P, Email)
  • Streaming Media (Audio, Video)
  • Communications (Email, Voice over IP Internet
    Phone)
  • Ecommerce (Shopping, Banking, Investing)
  • Computers are Tools
  • assist us in our work, calendars, finances,
    research, communications
  • Providing recreation and entertainment
  • Computers Are Used to Commit Cyber Crimes
  • Data can be stolen, altered, hidden or warped
  • Communication can be hidden, altered or recorded
  • Preventing, detecting, and prosecuting computer
    crime is one of the most significant challenges
    to Law Enforcement in modern day

3
Impact of High-Technologyon Your Safety
  • Greater more enduring than drugs
  • greater influence on the uninvolved
  • National International
  • economy
  • government
  • law enforcement
  • Collaboration
  • working together, individuals, families have
    the power to protect themselves

4
Computers Add New Dimensionsto Traditional Crimes
  • Homicide and other violent crimes (sexual
    assault)
  • Illegal Material
  • Child pornography
  • Drugs, Alcohol
  • Narcotics offenses
  • Data Theft
  • Fraud, counterfeiting
  • Dangerous Content
  • Bomb Making
  • Drug Making
  • Booby-Traps

Computers have do not understand jurisdictional
boundaries. Internet users are often anonymous
and in cyberspace, anyone can transfer massive
amounts of information almost instantaneously
5
Why is Cyberspace Dangerous?
  • VIRTUAL ANONYMITY FOR CRIMINALS DEVIANTS
  • Easy to create e-mail accounts with bogus
    information
  • E-mail services ask for little information
  • Other services require nothing more than an
    e-mail address
  • Rarely do services validate input
  • Availability of Anonymizing Services
  • LACK OF PHYSICAL EVIDENCE
  • No doors to knock down, no windows to break, no
    fingerprints to leave behind
  • Criminal is faceless and often in another
    geographic area

6
The Increasing Cost ofComputer Crime
  • Bank Robbery - 2,500
  • Bank Fraud - 25,000
  • Computer Crime - 500,000
  • Theft of Technology - 1,900,000
  • ID Theft y - 2,500,000

7
Fraud
  • Auction frauds
  • Get-rich-quick schemes
  • Senior citizen scams
  • Phishing
  • Phony Prizes
  • Cheap Stuff
  • Hardware (Mp3 Players, Cameras, DVDs)
  • Software (Windows, MS-Office, Anti-Virus)

8
Theft
  • Personally Identifying Information
  • Birthday, SSN, Banking data
  • Credit card numbers
  • Identity Theft
  • Computer Equipment
  • Usernames Passwords

9
Narcotics and Gambling
  • Narcotics distribution
  • Unmatched convenience
  • compulsive underage gamblers
  • Virtual casinos
  • gone with a keystroke
  • Day trading

10
Fatal Online Encounters
11
Online Harassment Cyberstalking
"It's actually obsene sic what you can find out
about people on the Internet." Liam Youens
12
Crimes Against Children
  • Child pornography
  • Exposure of Children to harmful content
  • Pornography
  • Graphic Violence
  • Hateful Content
  • Children lured into degrading situations
  • Chat Sessions
  • Chat rooms
  • Online Blogs
  • Social Networks
  • Children keep silent for many reasons
  • To protect family
  • Out of fear
  • Feelings of shame
  • To rebel against authority
  • For chance and thrill

13
Homicide
  • Violent criminals use computers
  • to acquire critical information about the
    victim(s)
  • as a tool for communication
  • as a storage device for evidence about motive and
    methods

14
The Many Faces ofComputer Crime in the News
  • Computer Evidence Used In the Courts
  • Terrorism - Zacarias Moussaoui, 20th hijacker on
    9/11
  • Homicides - Scott Peterson, Dennis Rader (BTK
    Killer)
  • Child Pornography - Michael Jackson
  • Espionage - Aldrich Ames
  • Insider Trading - Martha Stewart Case
  • Financial Fraud - ENRON

15
What Can You Do to Help?
  • Exert your influence
  • Law enforcement
  • Legislators elected officials
  • Your family friends
  • Practice preach collaboration

16
Take Action to Protect Yourself Your Family
  • Stay informed - technology changes
  • Learn about computer-dependent crimes
  • Network intrusions
  • Denial of service attacks
  • Hacking
  • E-mail bombs
  • Viruses Trojan horses
  • Identity Theft
  • Learn how not to become a victim

17
Take Action toProtect Yourself Your Family
  • Move home computers into family room or area
  • Familiarize yourself with the Internet
  • Utilize site/content blocking software or
    parental controls
  • Establish family rules and guidelines for safe
    Internet use
  • Discuss Internet crime and safety issues with
    your children - do it often

Never allow children to meet Internet friends
18
Take Action to Protect Yourself Your Family
  • Dont give out personal or family information
  • when signing up for groups
  • anywhere else online
  • Encourage Internet safety discussions in
    community schools, PTOs, PTAs, etc.
  • Randomly check your childs email and Internet
    web histories
  • Keep a written record of all logins, screen names
    and their passwords
  • Invite your children to talk to you when they
    find something objectionable

19
Take Action to Protect Yourself Your Family
  • Urge legislators and officials to address the
    issues
  • send e-mail, snail mail, telephone
  • Support the efforts of your local law enforcement
    agencies
  • Report electronic crimes to your local law
    enforcement authorities
  • If your child is the victim of an online
    predator
  • it is not their fault
  • be patient
  • be compassionate
  • contact authorities swiftly, time is critical

20
Warning Signs Your ChildMay Be in Trouble Online
  • Excessive use of the Internet, especially late at
    night
  • Gifts, money or packages they cant or wont
    explain
  • Computer or monitor is suddenly switched off,
    laptop lid shut, or other attempts to block the
    screen
  • Strange long distance charges, phone calls from
    strangers, or lots of wrong numbers and hang-ups
  • Your child is using an on-line account belonging
    to someone else
  • Your child begins deleting emails and internet
    history after use
  • Buddies or email addresses that your child wont
    or can't easily identify who they all are in real
    life

21
Thank You for Your Time and Interest
Write a Comment
User Comments (0)
About PowerShow.com