CYBERCRIME: Fighting Electronic Crime on the Internet
The Internet is a Tool –Common uses: The Web (WWW) Instant Messenger (IM) File Sharing (P2P, ) Streaming Media (Audio, Video) Communications ( , Voice over IP – Internet Phone) Ecommerce (Shopping, Banking, Investing) Computers are Tools –assist us in our work, calendars, finances, research, communications –Providing recreation and entertainment Computers Are Used to Commit Cyber Crimes –Data can be stolen, altered, hidden or warped –Communication can be hidden, altered or recorded –Preventing, detecting, and prosecuting computer crime is one of the most significant challenges to Law Enforcement in modern dayIntroduction
Impact of High-Technology on Your Safety Greater & more enduring than drugs greater influence on the uninvolved National & International economy government law enforcement Collaboration working together, individuals, & families have the power to protect themselves
Computers Add New Dimensions to Traditional Crimes Homicide and other violent crimes (sexual assault) Illegal Material Child pornography Drugs, Alcohol Narcotics offenses Data Theft Fraud, counterfeiting Dangerous Content Bomb Making Drug Making Booby-Traps Computers have do not understand jurisdictional boundaries. Internet users are often anonymous and in cyberspace, anyone can transfer massive amounts of information almost instantaneously
Why is Cyberspace Dangerous? VIRTUAL ANONYMITY FOR CRIMINALS & DEVIANTS –Easy to create accounts with bogus information – services ask for little information –Other services require nothing more than an address –Rarely do services validate input –Availability of “Anonymizing Services” LACK OF PHYSICAL EVIDENCE –No doors to knock down, no windows to break, no fingerprints to leave behind –Criminal is faceless and often in another geographic area
The Increasing Cost of Computer Crime Bank Robbery - $2,500 + Bank Fraud - $25,000 + Computer Crime - $500,000 + Theft of Technology - $1,900,000 + ID Theft y - $2,500,000 +
FraudFraud Auction frauds Get-rich-quick schemes Senior citizen scams Phishing Phony Prizes Cheap Stuff Hardware (Mp3 Players, Cameras, DVDs) Software (Windows, MS-Office, Anti-Virus)
TheftTheft Personally Identifying Information Birthday, SSN, Banking data Credit card numbers Identity Theft Computer Equipment Usernames & Passwords
Narcotics and Gambling Narcotics distribution Unmatched convenience compulsive & underage gamblers Virtual casinos gone with a keystroke Day trading
Fatal Online Encounters
Online Harassment & Cyberstalking "It's actually obsene [sic] what you can find out about people on the Internet."– Liam Youens
Crimes Against Children Child pornography Exposure of Children to harmful content Pornography Graphic Violence Hateful Content Children lured into degrading situations Chat Sessions Chat rooms Online Blogs Social Networks Children keep silent for many reasons To protect family Out of fear Feelings of shame To rebel against authority For chance and thrill
HomicideHomicide Violent criminals use computers to acquire critical information about the victim(s) as a tool for communication as a storage device for evidence about motive and methods
The Many Faces of Computer Crime in the News Computer Evidence Used In the Courts Terrorism - Zacarias Moussaoui, 20th hijacker on 9/11 Homicides - Scott Peterson, Dennis Rader (BTK Killer) Child Pornography - Michael Jackson Espionage - Aldrich Ames Insider Trading - Martha Stewart Case Financial Fraud - ENRON
What Can You Do to Help? Exert your influence Law enforcement Legislators & elected officials Your family & friends Practice & preach collaboration
Take Action to Protect Yourself & Your Family Stay informed - technology changes Learn about computer-dependent crimes Network intrusions Denial of service attacks Hacking bombs Viruses & Trojan horses Identity Theft Learn how not to become a victim …
Move home computers into family room or area Familiarize yourself with the Internet Utilize site/content blocking software or parental controls Establish family rules and guidelines for safe Internet use Discuss Internet crime and safety issues with your children - do it often Take Action to Protect Yourself & Your Family Never allow children to meet Internet friends
Take Action to Protect Yourself & Your Family Don’t give out personal or family information when signing up for groups anywhere else online Encourage Internet safety discussions in community schools, PTOs, PTAs, etc. Randomly check your child’s and Internet web histories Keep a written record of all logins, screen names and their passwords Invite your children to talk to you when they find something objectionable
Take Action to Protect Yourself & Your Family Urge legislators and officials to address the issues send , snail mail, telephone Support the efforts of your local law enforcement agencies Report electronic crimes to your local law enforcement authorities If your child is the victim of an online predator… it is not their fault be patient be compassionate contact authorities swiftly, time is critical
Warning Signs Your Child May Be in Trouble Online… ! Excessive use of the Internet, especially late at night ! Gifts, money or packages they can’t or won’t explain ! Computer or monitor is suddenly switched off, laptop lid shut, or other attempts to block the screen ! Strange long distance charges, phone calls from strangers, or lots of wrong numbers and hang-ups ! Your child is using an on-line account belonging to someone else ! Your child begins deleting s and internet history after use ! Buddies or addresses that your child won’t or can't easily identify who they all are in real life
Thank You for Your Time and Interest