Think Computers Can’t Hurt You?

Download Report

Transcript Think Computers Can’t Hurt You?

CYBERCRIME:
Fighting Electronic Crime
on the Internet
Introduction
The Internet is a Tool
– Common uses:
The Web (WWW)
Instant Messenger (IM)
File Sharing (P2P, Email)
Streaming Media (Audio, Video)
Communications (Email, Voice over IP – Internet Phone)
Ecommerce (Shopping, Banking, Investing)
Computers are Tools
– assist us in our work, calendars, finances, research, communications
– Providing recreation and entertainment
Computers Are Used to Commit Cyber Crimes
– Data can be stolen, altered, hidden or warped
– Communication can be hidden, altered or recorded
– Preventing, detecting, and prosecuting computer crime is one of the
most significant challenges to Law Enforcement in modern day
Impact of High-Technology
on Your Safety



Greater & more enduring than drugs
 greater influence on the uninvolved
National & International
 economy
 government
 law enforcement
Collaboration
 working together, individuals, & families have the
power to protect themselves
Computers Add New Dimensions
to Traditional Crimes


Homicide and other violent crimes (sexual assault)
Illegal Material


Drugs, Alcohol




Child pornography
Narcotics offenses
Data Theft
Fraud, counterfeiting
Dangerous Content



Bomb Making
Drug Making
Booby-Traps
Computers have do not understand jurisdictional boundaries.
Internet users are often anonymous and in cyberspace, anyone can
transfer massive amounts of information almost instantaneously
Why is Cyberspace Dangerous?
VIRTUAL ANONYMITY FOR CRIMINALS & DEVIANTS
– Easy to create e-mail accounts with bogus information
– E-mail services ask for little information
– Other services require nothing more than an e-mail address
– Rarely do services validate input
– Availability of “Anonymizing Services”
LACK OF PHYSICAL EVIDENCE
– No doors to knock down, no windows to break, no
fingerprints to leave behind
– Criminal is faceless and often in another geographic area
The Increasing Cost of
Computer Crime
Bank Robbery - $2,500 +
Bank Fraud - $25,000 +
Computer Crime - $500,000 +
Theft of Technology - $1,900,000 +
ID Theft y - $2,500,000 +
Fraud

Auction frauds

Get-rich-quick schemes

Senior citizen scams

Phishing

Phony Prizes

Cheap Stuff

Hardware (Mp3 Players, Cameras, DVDs)

Software (Windows, MS-Office, Anti-Virus)
Theft





Personally Identifying Information
 Birthday, SSN, Banking data
Credit card numbers
Identity Theft
Computer Equipment
Usernames & Passwords
Narcotics and Gambling
Narcotics distribution
 Unmatched convenience



Virtual casinos


compulsive & underage gamblers
gone with a keystroke
Day trading
Fatal Online Encounters
Online Harassment & Cyberstalking
"It's actually obsene [sic]
what you can find out
about people on the
Internet."– Liam Youens
Crimes Against Children




Child pornography
Exposure of Children to harmful content
 Pornography
 Graphic Violence
 Hateful Content
Children lured into degrading situations
 Chat Sessions
 Chat rooms
 Online Blogs
 Social Networks
Children keep silent for many reasons
 To protect family
 Out of fear
 Feelings of shame
 To rebel against authority
 For chance and thrill
Homicide

Violent criminals use computers
to acquire critical information about
the victim(s)
 as a tool for communication
 as a storage device for evidence
about motive and methods

The Many Faces of
Computer Crime in the News
Computer Evidence Used In the Courts
Terrorism - Zacarias Moussaoui, 20th hijacker on 9/11
 Homicides - Scott Peterson, Dennis Rader (BTK Killer)
 Child Pornography - Michael Jackson
 Espionage - Aldrich Ames
 Insider Trading - Martha Stewart Case
 Financial Fraud - ENRON

What Can You Do to Help?


Exert your influence
 Law enforcement
 Legislators & elected officials
 Your family & friends
Practice & preach collaboration
Take Action to
Protect Yourself & Your Family

Stay informed - technology changes

Learn about computer-dependent crimes
Network intrusions
 Denial of service attacks
 Hacking
 E-mail bombs
 Viruses & Trojan horses
 Identity Theft


Learn how not to become a victim…
Take Action to
Protect Yourself & Your Family





Move home computers into family room or area
Familiarize yourself with the Internet
Utilize site/content blocking software or parental controls
Establish family rules and guidelines for safe Internet use
Discuss Internet crime and safety issues with your
children - do it often
Never allow children to meet Internet friends
Take Action to
Protect Yourself & Your Family

Don’t give out personal or family information
 when signing up for groups
 anywhere else online

Encourage Internet safety discussions in
community schools, PTOs, PTAs, etc.

Randomly check your child’s email and Internet
web histories

Keep a written record of all logins, screen names
and their passwords

Invite your children to talk to you when they find
something objectionable
Take Action to
Protect Yourself & Your Family




Urge legislators and officials to address the issues
 send e-mail, snail mail, telephone
Support the efforts of your local law enforcement
agencies
Report electronic crimes to your local law
enforcement authorities
If your child is the victim of an online predator…
 it is not their fault
 be patient
 be compassionate
 contact authorities swiftly, time is critical
Warning Signs Your Child
May Be in Trouble Online…
! Excessive use of the Internet, especially late at night
! Gifts, money or packages they can’t or won’t explain
! Computer or monitor is suddenly switched off, laptop lid shut, or
other attempts to block the screen
! Strange long distance charges, phone calls from strangers, or lots
of wrong numbers and hang-ups
! Your child is using an on-line account belonging to someone else
! Your child begins deleting emails and internet history after use
! Buddies or email addresses that your child won’t or can't easily
identify who they all are in real life
Thank You for Your
Time and Interest