QUIZ - PowerPoint PPT Presentation

1 / 46
About This Presentation
Title:

QUIZ

Description:

Investigators located a mapquest map on Mr. Kartalis' computer with an address ... The mapquest map located with the address in El Paso, Texas ended up being for a ... – PowerPoint PPT presentation

Number of Views:150
Avg rating:3.0/5.0
Slides: 47
Provided by: wich
Category:
Tags: quiz | map | quest

less

Transcript and Presenter's Notes

Title: QUIZ


1
(No Transcript)
2
Internet Safety
Exploited and Missing Child Unit Internet Crimes
Against Children Task Force 130 S.
Market Wichita, Kansas (316) 337-6552 www.sedgwick
county.org/EMCU
Wichita Police Department Crime Prevention
Unit 455 N. Main Wichita, Ks. (316) 268-4101
3
QUIZ
  • BRB
  • POS
  • LOL
  • BBL
  • LMAO
  • SOMY
  • A/S/L

4
(No Transcript)
5
Internet Crimes Against Children Task Force
  • The Internet Crimes Against Children Task Force
    Program helps state and local law enforcement
    agencies develop and effective response to cyber
    enticement and child pornography cases. This
    help encompasses forensic and investigative
    components, training and technical assistance,
    victim services, and community education.

6
Internet Crimes Against Children Task Force
  • Currently 46 Task Forces
  • Include both state and local agencies
  • Provide Regional Assistance
  • Forensics
  • Investigative Assistance
  • Training/Technical Assistance

7
Kansas I.C.A.C.
  • Encompasses
  • Forensic and investigative components
  • Training and technical assistance
  • Victim services
  • Community education

8
CYBERTIPLINE
  • www.cybertipline.com or 1-800-THE-LOST
  • Launched in March of 1998 and offers a means of
    reporting child sexual exploitation (child
    pornography), online enticement, child
    prostitution, child sex tourism, unsolicited
    sexual material sent to a child. It is staffed 24
    hours a day, 7 days a week.
  • PROTECT ACT 2003- New Federal Law that makes it a
    crime to knowingly use a misleading domain name
    on the Internet with the intent to deceive a
    minor into viewing harmful material. Punish by
    up to 4 years and/or fine.

9
CYBERTIPLINE
  • Any incident reported goes through a three step
    process
  • CyberTipline operators review and prioritize each
    lead
  • NCMECs (National Center for Missing and
    Exploited Children) Exploited Child Unit analyzes
    tips and does additional research
  • Information gathered becomes available to the
    FBI, Bureau of Immigration and Customs
    Enforcement and the U.S. Postal Inspection
    Service via secure web connection. It is also
    passed onto the appropriate state and local
    authorities and the ISP when appropriate.

10
Child Predators new tool kit
  • Technology DIGITAL CAMERAS
  • Cell Phones
  • Instant Messaging (AOL/MSN/YAHOO)
  • Web Cams
  • PDAs
  • Wireless Internet
  • School
  • Libraries

11
Internet Crimes Against Children Task Force
  • Online Victimization (A report on the Nations
    Youth)
  • Released June 2000
  • Nearly 10 million youth, 10 through 17 on line
    regularly in 1999
  • This survey was of a nationally representative
    sample of 1,501 youth who use the Internet
    Regularly
  • Available from www.missingkids.org

12
Kids and the Internet
Who Surfs Alone?
The majority of US children over the age of 12
are allowed to surf the Web unsupervised,
according to a recent survey by Greenfield
Online. The study found that only 5 percent of
parents with children over the age of 16 attempt
to monitor their online activities, with just 20
percent of parents using software to control the
type of material their children can access
online. Greenfield estimates that 55 percent
of children aged 11 and over use the Net for
school work, while 20 percent of parents with
children in this age group say that they are more
interested in the Net than in TV.
15
50
12-15 years old
15 years old
75
0
10
20
30
40
50
60
70
80
13
How can I chat Safely?
  • Know the 4 Rs-
  • Recognize techniques used by online predators to
    deceive you
  • Refuse - requests for personal information

14
How can I chat Safely?
  • Know the 4 Rs-
  • Respond assertively if you are ever in an
    uncomfortable situation while online. Exit the
    program, log off or ignore. Tell a trusted
    adult.
  • Report - to a trusted adult, any suspicious or
    dangerous contact that makes you feel
    uncomfortable. CYBERTIPLINE.COM!

15
Video Clip Cyber Predators
16
CASE Eltoro1001
  • Athen began chatting with units 13 year old
    decoy on March 21, 2002.
  • Chat room in prior to contact Dad4Daughters
    Teen chat room using Yahoo
  • Athen gave phone number for decoy to call and was
    very persistent that she stay a virgin until he
    met her.

17
CASE Eltoro1001
  • Athen said he was a pilot and traveled.
  • Chatted and had phone conversations with Athen
    until April 13, 2002.
  • April 13, 2002 Athen was arrested after
    arriving to meet Alexis to take her back to his
    hotel room and engage in sexual conduct and take
    pictures of this activity.

18
hotalexis88 (032312 PM) thkns eltoro1001
(032316 PM) do you like older men? eltoro1001
(032324 PM) you are very welcome hotalexis88
(032325 PM) i like cute guys eltoro1001
(032338 PM) i am 49 eltoro1001 (032347 PM)
is that too old for you? hotalexis88 (032427
PM) r u cute eltoro1001 (032436 PM) you can
tell me eltoro1001 (032445 PM) i will send you
my pic hotalexis88 (032457 PM) ok eltoro1001
(032542 PM) do you meet in real
life? hotalexis88 (032556 PM) havent
yet eltoro1001 (032611 PM) what is your real
age? hotalexis88 (032614 PM) 13 hotalexis88
(032617 PM) really eltoro1001 (032620 PM)
wow eltoro1001 (032632 PM) are you sexually
active?
19
hotalexis88 (032650 PM) nope havent done
nothin but kissin sorry eltoro1001 (032658 PM)
its ok eltoro1001 (032716 PM) maybe i will be
the one if you like me hotalexis88 (032727 PM)
really? hotalexis88 (032735 PM) i bet i suck
at it eltoro1001 (032745 PM) did you get my
pic? hotalexis88 (032750 PM) yea how old
ru?? eltoro1001 (032754 PM) 49 hotalexis88
(032801 PM) u dont look 49 really?? eltoro1001
(032807 PM) thank you eltoro1001 (032839
PM) would you consider meeting with
me? hotalexis88 (032855 PM) yea if u r as nice
as u seem 2 be eltoro1001 (032910 PM) i am ,
and thank you eltoro1001 (032942 PM) where do
you live? if i may ask? hotalexis88 (033020
PM) im wichita hotalexis88 (033023 PM)
u? eltoro1001 (033029 PM) dallas hotalexis88
(033039 PM) ive never been there eltoro1001
(033102 PM) i have not been to wichita kansas
either hotalexis88 (033116 PM) nothin here
really it sucks eltoro1001 (033131 PM) lol
ok....if you say so hotalexis88 (033143 PM)
trust me i know eltoro1001 (033148 PM)
ok eltoro1001 (033211 PM) but you are there
and that is enough for me to come visit

20
CASE Eltoro1001
  • Picture Athen sent of himself during first chat
    conversation.
  • He drove the vehicle in the picture to Wichita,
    Kansas on April 13, 2002 to meet Alexis.

21
CASE Eltoro1001
  • Car that Athen drove to meet Alexis.

22
CASE Eltoro1001
  • Pictures from inside the suburban.

23
  • Printed off directions from his house to meet
    location.
  • Investigators in Arlington, Texas located a map
    like this on his computer which lead them to a 14
    year old child Athen sexually assaulted 3 days
    prior to our case.

24
  • Eltoro1001 identified as Athanasios Kartalis, 49,
    male from Arlington, Texas.
  • Arlington Texas PD located hundreds of pictures
    of child pornography in Mr. Kartalis apartment.
  • Also located were pictures on a Olympus smart
    media card of a young girl engaged in sexual
    conduct. The pictures appeared to be from a
    hotel room.

25
CASE Eltoro1001
  • Investigators located a mapquest map on Mr.
    Kartalis computer with an address in El Paso,
    Texas during forensic examination.
  • On the computer itself 162 instant message
    conversations with the majority being sexual in
    nature and the Mr. Kartalis interest in
    master/slave.
  • Mr. Kartalis also used American Online which had
    numerous emails saved with similar topics.

26
CASE Eltoro1001
  • The mapquest map located with the address in El
    Paso, Texas ended up being for a 14 year old
    girl, L.J. who Mr. Kartalis had sexually
    assaulted prior to meeting our decoy.
  • The pictures on the media card were of her.
  • Mr. Kartalis was found guilty in Kansas for One
    count Attempted Rape in Arlington, Texas for
    Promotion of Child Pornography and in El Paso,
    Texas for the child sexual abuse
  • He will served over 40 years in Texas.

27
Risks for Children on the internet
  • Exposure to inappropriate material
  • May be exposed to materials that are sexual,
    hateful, violent or activities that are dangerous
    or illegal
  • They could actively look for it or it could come
    inadvertently via chat areas, e-mail or instant
    messaging

28
Risks for Children on the Internet
  • Physical Molestation
  • Many molesters are on-line and actively looking
    for a child. The child could put out information
    that would give the molester the childs
    location, arrange an encounter or the molester
    could use information that is provided to find
    them.
  • Make sure the child knows that whatever is put on
    the internet is able to be seen by ALL people on
    the internet. Dont put information that would
    provide clues about where you live, work or go to
    school.

29
REMEMBER
  • PEOPLE ONLINE ARE NOT ALWAYS WHO THEY PRETEND TO
    BE!!!!!

30
Risks for Children on the Internet
  • Harassment or Bullying
  • Potential to encounter messages that are
    belligerent, demeaning, or harassing. The
    internet is a good place to do this because it is
    harder to find the offender
  • Viruses and Hackers
  • Possibility of the child downloading a file that
    contains a virus or the possibility of a hacker
    getting into the computer via remote access which
    could jeopardize the privacy or safety of the
    family

31
Risks for Children on the Internet
  • Legal and Financial
  • Be sure that you or your child do not give out
    any personal financial information. If you do use
    a credit card online be sure the site is a
    secured site that encrypts the information.
  • Also make sure you use good judgment and avoid
    being inconsiderate, mean or rude online. These
    activities could violate a persons rights.

32
Guidelines for Parents
  • Talk with your child about what they can and
    cannot do online
  • Be open with the child and encourage them to come
    to you if they encounter a problem or something
    that makes them feel uncomfortable online
  • Learn everything you can about the internet
  • Check out blocking, filtering and ratings
    applications

33
Identity Theft Video
34
Preventing Identity Theft
  • Always protect your personal information.
  • Never send personal information to e-mail
    requests
  • Verify any transactions
  • Catch Identity theft early by checking your
    credit report yearly

35
Preventing Identity Theft
  • Ensure Anti-virus software is installed and up to
    date
  • Regularly update computer programs with
    manufacturers security patches
  • Install a personal firewall
  • CHANGE PASSWORDS REGULARLY
  • Log out of website after your business is
    complete
  • Disconnect your computer from internet when not
    in use

36
Cyber Security Video
37
Virus Nightmares
  • Named a virus because of the similarities with
    biological viruses
  • Effects can very enormously
  • Spreads and infects many computers rapidly
  • Slammer Worm
  • Snuck through unprotected port
  • Spread by searching random internet addresses
  • Within 10 minutes 90 of all unprotected
    computers in the world were infected
  • No damage was caused by this virus

38
SpyWare AdWare Nightmares
  • Installed discreetly on your computer and
    literally watch your every move reporting it back
    to a third party.
  • The third party then sells this to advertising
    companies and other interested parties so you
    start receiving ads, pop-ups and Spam that is
    targeted to your preferences.

39
SpyWare AdWare Nightmares
  • Many users are unaware they have SpyWare because
    of the lack of notification on the info-gathering
    function of the software.
  • Very important to read and understand the End
    User License Agreement.

40
SpyWare AdWare Nightmares
Tips to prevent compromise
  • Read the fine print before installing any
    software. Especially adware that is supported by
    channeling ads to your computer.
  • Install and configure a personal firewall on your
    computer to identify and block unauthorized
    outbound connections as well as unauthorized
    inbound connections

41
SpyWare AdWare Nightmares
Tips to prevent compromise
  • Always run an anti-virus program that updates
    itself automatically to counter new threats.
  • Scan your system regularly with a tool like
    PestPatrol, Spyremover or SpyWareNuker which
    identifies and removes not only spyware and
    adware but thousands of other pests.

42
Points to Remember
  • Talk to your child and monitor activities on
    internet
  • Set up parental controls on computer to limit
    what they can be exposed to on internet
  • Watch for signs that something is going on such
    as unexplained absences from home or school,
    long periods of activity on internet, minimizing
    the screen when you walk into room
  • Familiarize yourself with the internet and look
    up the abbreviations for internet chat

43
Points To Remember
  • Be guarded about information that you give on the
    internet
  • Be aware of possible e-mail/internet scams asking
    for your personal information
  • Be sure you know and trust the company you
    conduct business with on the internet
  • Use all available security measures to prevent
    and stop spyware and adware or unauthorized
    connections to your computer through the internet

44
Questions
45
Contact Information
  • Wichita Police Department
  • Crime Prevention Unit
  • 455 N. Main 4th Floor
  • Wichita, Ks. 67202
  • (316) 268-4101

46
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com