1 Cyber Crimes. 2 3 4 5 6 Phillip Bryan Stewart txwantsome Investigator Curtis Sadler Arrested 07-31-2003 Kendall County Traveled to meet what he.

Slides:



Advertisements
Similar presentations
Legal or Not? You’d better know. Make it your business to know!
Advertisements

IM APL Staff Training Presented by Marissa M. Priddis.
E-safety EXPOSURE TO INAPPROPRIATE MATERIAL HARASSMENT AND BULLYING PERSONAL INFORMATION AND PRIVACY PHYSICAL DANGER UNWANTED ADVERTISING FINANCIAL RISKS.
Internet Safety for Students
Chapter 4: Preventing Violence and Abuse $100 $200 $300 $400 $100$100$100 $200 $300 $400 Cycle of Violence Sex AbuseChild AbuseAggression FINAL ROUND.
Sexting and Cyber-bullying Legal Issues Deputy Phyllis Applin Livingston County Sheriff’s Office.
INTERNET SAFETY and Social Networking
A Guide to Internet Safety High School
Internet Safety Cyber Bullying. Berks County District Attorney Mark C. Baldwin said, “They have found a way to enter your home, enter your child’s bedroom.
Role Play Should English be the first language for the Bongou people?
© Vera Castleman Electronic Communication Grade 10.
1 Cyber Crimes Phillip Bryan Stewart txwantsome Investigator Curtis Sadler Arrested Kendall County Traveled to meet what he.
How to keep your kids safe online
Jerry Sandusky. Background Born and raised in Washington, Pa Father, Arthur, founded many youth service programs Attended Washington High School Good.
INTERNET SAFETY BROUGHT TO YOU BY: SALEM COUNTY 2000 PARTNERS.
1 Netsmartz Lakeway Police Department. 2 Cyber Crimes Unit.
By: Melissa Leyva & Connie Villarreal
RISKS TO CHILDREN IN THE DIGITAL AGE.  In one study, 1 in 5 children received a sexual solicitation; 1 in 33 received an aggressive sexual solicitation.
 Grades 5-8 – 56 out of 66 – 85%  Grades 9-12 – 79 out of 85 – 93%  Grades 5-12 – 135 out of 151 – 89%  100% of the Juniors and Seniors use a social.
Internet Safety Mrs Bhayat How Much Do You Know?.
Smart and Safe in Cyberspace Social Networking 101 National Crime Prevention Council 2006.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
Safety On The Internet  Usage time  Locations that may be accessed  Parental controls  What information may be shared with others Online rules should.
A Parent’s Guide to Child Safety on the Internet Officer Bryan Walker Chapel Hill Police Department Technical Services Unit Officer Bryan Walker Chapel.
SEX OFFENDERS AND VICTIMIZATION IN OUR COMMUNITY Awareness, Support and Prevention San Diego County Sex Offender Management Council
What can you do to help protect your child?. The environment created by communication technologies such as the Internet, mobile phones and other devices.
1 Internet Safety By: Nicole Sutton, Kenny Messinger, and Emily Whitman.
1 Is it illegal or unsuitable? SID 2013 quiz for parents and carers © e-Safer Suffolk 2013.
What is text messaging? Popular ideas about text messaging The mobile phone does not require the user to write in non-standard forms, but the 160-character.
Communications 1.04b.  Interactive Communications ◦ Chat rooms ◦ ◦ FTP ◦ Newsgroups and Message Boards ◦ Instant Messaging ◦ Mailing List  Web.
Sexting Criminal Teen Trend
Sexting Definition: The act of sending, receiving or forwarding sexually explicit messages or photos electronically, primarily between cell phones, but.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Acronyms English at Work Many people use acronyms when chatting online or sending text messages. With a partner, try to think of three more.
Social Media How can we manage social network for children?
Internet Safety: Teaching Your Kids to Surf… Is Proud to Offer.
JOURNAL What is the best way to prevent the transmission of HIV and STI’s?
Internet Safety Kristi Enriquez. 34% of youth Internet users saw sexual material that they did not want to see According to a study conducted by the National.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
By: Daniella Berezin, Dylan Ahadov, Noah Tapiero Child Predators.
A PARENT’S GUIDE TO CYBER BULLYING BY: SHIRLEY JONES.
DC 4350 HOWARTH. To work with others to safeguard the most vulnerable children and young people who are being sexually exploited or at risk of being so.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Jennifer, Palvi, and Naomi.
Paul Sanfrancesco Director of Technology Owen J Roberts SD.
Sexting Presentation Written by: Brandon Falls Jefferson County District Attorney Brian Huff Jefferson County Circuit Court Judge Family Court.
Ariel Castro “Cleveland Kidnapper”
QUESTION… Is the internet bad?. GOODBad News/Finances Homework Research Shopping Games Education Sports Travel Entertainment Genealogy Pornography.
 Technology 2010  Sexting  Pornography  Cyberbullying  Survival skills Parent Information Night Internet/Media Safety.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
Juvenile Crime.  Juvenile: a person under the age of 18  Some states have it as 16, but regardless there are special laws that deal with juveniles who.
Netiquette. APK Mrs. Batichon went to a restaurant with her children and they were NOT acting like they had good manners. Embarrassing for Mrs. Batichon.
Tips for Parents 1 Vidalia City Schools Parent Academy I Internet Safety The Internet: IS IT ALWAYS A SAFE PLACE TO VISIT? Internet Safety.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
Find the following words in the text crash survive care share sorrow adventure deserted realize feeling hunt.
NO! NO! You can not get the questions until the end of the Power Point!
UNIT 7: Telephone Conversations Discuss mobile phone use Practice leaving messages.
A Guide to Internet Safety High School
Innovative Training Works, Inc.
Keller Police Department Keller ISD Technology
What are abbreviations?
SEXTING This PowerPoint is aimed at year 6 children. While some parents may have already bought their children mobile phones or passed on their old ones.
Intervention and Prevention
SAFEKIDS A Guide to Internet Safety High School
STELLAR: Strategies for English Language Learning and Reading
Bell Work NETWORK SOCIAL
Commonly used abbreviations from SMS chat and online chat
Law Enforcement Responses to Online Child Sexual Exploitation Crimes: The National Juvenile Online Victimization Study, 2000 & 2006 Crimes against Children.
Commonly used abbreviations from SMS chat and online chat
Presentation transcript:

1 Cyber Crimes

2

3

4

5

6 Phillip Bryan Stewart txwantsome Investigator Curtis Sadler Arrested Kendall County Traveled to meet what he thought was a 13- year-old boy. Charged with criminal solicitation of a minor Also has a federal indictment for one count of Coercion and Enticement. Stewart was a married (now divorced) father of three children. His two boys were 10 and 12. His daughter was 8. Stewart was also a Little League baseball coach and coached basketball to minors in Junction.\ Convicted and sentenced to 5 years in prison and must register as a sex offender.

7 Gregory Battson battsongr8 Investigator Katherine Smith Arrested Walker County Arrested for Criminal Attempt ‑ Sexual Assault of a Child Married with children

8 Patrick Craig Investigator Steve May Arrested Walker County Arrested for Criminal Attempt ‑ Aggravated Sexual Assault of a Minor. College student, is single and resides with his mother. Plead guilty to Attempted Sexual Performance of a Child. Convicted and sentenced to 10 years probation, 180 days in county jail, $2,000 fine and must register as a sex offender for 20 years.

9 Johnathan Keith Kana Investigator Cody Smirl Hays County (Buda, Tx) Arrested 6/29/05 Kana attempted to meet what he believed was a 13 year old female. Subject will be charged with Criminal Attempt - Aggravated Sexual Assault of a Child, Criminal Attempt - Sexual Performance of a Child and Criminal Solicitation of a Minor. Kana resides in Lexington, Texas and is engaged to be married and has no children. Kana graduated in 2004 from Soutwestern University in Georgetown, Texas. Kana was attending Garrett-Evangelical Theological Seminary in pursuit of Master of Divinity and Master of Arts in Music Ministry.

10 NCMEC Survey – Youth on the Internet (Ages 10 – 17)  1 in 33 received an aggressive sexual solicitation such as arranging for a meeting, called on telephone, sent them letters, etc.  1 in 4 received unwanted exposure to pictures of nude people having sex in the last year.  1in 17 was threatened or harassed.  Approximately 1 in 5 received a sexual solicitation or approach.  NCMEC (2000)

11 Where did this Sexual Solicitation take place?  Computer Locations –70% at home –22% at someone else’s home –4% at school –3% at library  Internet –65% in chatrooms –24% in Instant Message

12 Blog Sites  Facebook  Xanga  Myspace  Espinthebottle  Tagged  Blogspot  Cpixel  Hi5  Yahoo!360

13 CHILDREN— THE “IDEAL” VICTIM  Naturally curious  Easily led by adults  Need for attention and affection  Need to defy parents

14 REPORTING THE CRIME  25% of the youth who encountered a sexual solicitation or approach told a parent.  Less than 10% of sexual solicitations were reported to authorities such as a law- enforcement agency, an Internet Service Provider, or a hotline.

15

16 Safety Tips  Webcams: –“Hacker Uses Webcam To Spy On Family” Click2Houston.com (2004). 15 yr old female surfing Internet Typing message to girlfriend and her message turns sexually explicit Hacker opened her disc drive Controlling not only computer but webcam The hacker even listened to conversations thru the microphone attached to the webcam

17 “Chatroom Lingo”  (((((((((name)))))))) - Giving so-and-so person a hug  AKA - Also Known As  ASAP - As Soon As Possible  B4 - Before  bbl - Be Back Later  bfn - Bye For Now  brb - Be Right Back  *EG* - an evil grin  FAQ - Frequently Asked Questions  FYI - For Your Information  *G* - a grin  G2G - Got To Go  GB - Goodbye  *GBG* - a great big grin  *GBS* - a great big smile  GG - Good Game  gl - Good Luck  imho - In My Humble Opinion  imo - In My Opinion  imnsho - In My Not So Humble Opinion  kotc - Kiss On The Cheek  kotl - Kiss On The Lips  l8r - Later  lmao - Laughing My Ass/Arse Off  lol - Laugh Out Loud  msg - Message  MYOB - Mind Your Own Business  pls - Please  rofl - Rolling On the Floor Laughing  roflmao - Rolling On Floor, Laughing My Ass Off  *S* - a smile  ttyl - Talk To You Later  ttys - Talk To You Soon  ty - Thank You  w/ - With  *W* - a wink  wb - Welcome Back  *weg* - Wicked Evil Grin  wtf - What The F**k  yw - Your Welcome  9- Adult has entered room  99- Adult has left room

18 Leetspeak Numbers are often used as letters. The term "leet" could be written as "1337," with "1" replacing the letter L, "3" posing as a backwards letter E, and "7" resembling the letter T. Others include "8" replacing the letter B, "9" used as a G, "0" (zero) in lieu of O, and so on. Non-alphabet characters can be used to replace the letters they resemble. For example, "5" or even "$" can replace the letter S. Applying this style, the word "leetspeek" can be written as "133t5p33k" or even "!337$p34k," with "4" replacing the letter A. Letters can be substituted for other letters that may sound alike. Using "Z" for a final letter S, and "X" for words ending in the letters C or K is common. For example, leetspeekers might refer to their computer "5x1llz" (skills). Rules of grammar are rarely obeyed. Some leetspeekers will capitalize every letter except for vowels (LiKe THiS) and otherwise reject conventional English style and grammar, or drop vowels from words (such as converting very to "vry"). Mistakes are often left uncorrected. Common typing misspellings (typos) such as "teh" instead of the are left uncorrected or sometimes adopted to replace the correct spelling. Non-alphanumeric characters may be combined to form letters. For example, using slashes to create "/\/\" can substitute for the letter M, and two pipes combined with a hyphen to form "|-|" is often used in place of the letter H. Thus, the word ham could be written as "|-|4/\/\."

QUESTIONS? Sgt. Paul Aleman Cyber Crimes Unit (512)