Cybercrime fighting electronic crime on the internet
This presentation is the property of its rightful owner.
Sponsored Links
1 / 21

CYBERCRIME: Fighting Electronic Crime on the Internet PowerPoint PPT Presentation


  • 86 Views
  • Uploaded on
  • Presentation posted in: General

CYBERCRIME: Fighting Electronic Crime on the Internet. Introduction. The Internet is a Tool Common uses: The Web (WWW) Instant Messenger (IM) File Sharing (P2P, Email) Streaming Media (Audio, Video) Communications (Email, Voice over IP – Internet Phone)

Download Presentation

CYBERCRIME: Fighting Electronic Crime on the Internet

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Cybercrime fighting electronic crime on the internet

CYBERCRIME:Fighting Electronic Crimeon the Internet


Introduction

Introduction

  • The Internet is a Tool

    • Common uses:

      • The Web (WWW)

      • Instant Messenger (IM)

      • File Sharing (P2P, Email)

      • Streaming Media (Audio, Video)

      • Communications (Email, Voice over IP – Internet Phone)

      • Ecommerce (Shopping, Banking, Investing)

  • Computers are Tools

    • assist us in our work, calendars, finances, research, communications

    • Providing recreation and entertainment

  • Computers Are Used to Commit Cyber Crimes

    • Data can be stolen, altered, hidden or warped

    • Communication can be hidden, altered or recorded

    • Preventing, detecting, and prosecuting computer crime is one of the most significant challenges to Law Enforcement in modern day


Impact of high technology on your safety

Impact of High-Technologyon Your Safety

  • Greater & more enduring than drugs

    • greater influence on the uninvolved

  • National & International

    • economy

    • government

    • law enforcement

  • Collaboration

    • working together, individuals, & families have the power to protect themselves


Computers add new dimensions to traditional crimes

Computers Add New Dimensionsto Traditional Crimes

  • Homicide and other violent crimes (sexual assault)

  • Illegal Material

    • Child pornography

  • Drugs, Alcohol

    • Narcotics offenses

  • Data Theft

  • Fraud, counterfeiting

  • Dangerous Content

    • Bomb Making

    • Drug Making

    • Booby-Traps

Computers have do not understand jurisdictional boundaries. Internet users are often anonymous and in cyberspace, anyone can transfer massive amounts of information almost instantaneously


Why is cyberspace dangerous

Why is Cyberspace Dangerous?

  • VIRTUAL ANONYMITY FOR CRIMINALS & DEVIANTS

    • Easy to create e-mail accounts with bogus information

    • E-mail services ask for little information

    • Other services require nothing more than an e-mail address

    • Rarely do services validate input

    • Availability of “Anonymizing Services”

  • LACK OF PHYSICAL EVIDENCE

    • No doors to knock down, no windows to break, no fingerprints to leave behind

    • Criminal is faceless and often in another geographic area


The increasing cost of computer crime

The Increasing Cost ofComputer Crime

Bank Robbery - $2,500 +

Bank Fraud - $25,000 +

Computer Crime - $500,000 +

Theft of Technology - $1,900,000 +

ID Theft y - $2,500,000 +


Fraud

Fraud

  • Auction frauds

  • Get-rich-quick schemes

  • Senior citizen scams

  • Phishing

  • Phony Prizes

  • Cheap Stuff

    • Hardware (Mp3 Players, Cameras, DVDs)

    • Software (Windows, MS-Office, Anti-Virus)


Theft

Theft

  • Personally Identifying Information

    • Birthday, SSN, Banking data

  • Credit card numbers

  • Identity Theft

  • Computer Equipment

  • Usernames & Passwords


Narcotics and gambling

Narcotics and Gambling

  • Narcotics distribution

  • Unmatched convenience

    • compulsive & underage gamblers

  • Virtual casinos

    • gone with a keystroke

  • Day trading


Cybercrime fighting electronic crime on the internet 1346986

Fatal Online Encounters


Online harassment cyberstalking

Online Harassment & Cyberstalking

"It's actually obsene [sic] what you can find out about people on the Internet."– Liam Youens


Crimes against children

Crimes Against Children

  • Child pornography

  • Exposure of Children to harmful content

    • Pornography

    • Graphic Violence

    • Hateful Content

  • Children lured into degrading situations

    • Chat Sessions

    • Chat rooms

    • Online Blogs

    • Social Networks

  • Children keep silent for many reasons

    • To protect family

    • Out of fear

    • Feelings of shame

    • To rebel against authority

    • For chance and thrill


Homicide

Homicide

  • Violent criminals use computers

    • to acquire critical information about the victim(s)

    • as a tool for communication

    • as a storage device for evidence about motive and methods


The many faces of computer crime in the news

The Many Faces ofComputer Crime in the News

Computer Evidence Used In the Courts

  • Terrorism - Zacarias Moussaoui, 20th hijacker on 9/11

  • Homicides - Scott Peterson, Dennis Rader (BTK Killer)

  • Child Pornography - Michael Jackson

  • Espionage - Aldrich Ames

  • Insider Trading - Martha Stewart Case

  • Financial Fraud - ENRON


What can you do to help

What Can You Do to Help?

  • Exert your influence

    • Law enforcement

    • Legislators & elected officials

    • Your family & friends

  • Practice & preach collaboration


Take action to protect yourself your family

Take Action to Protect Yourself & Your Family

  • Stay informed - technology changes

    • Learn about computer-dependent crimes

      • Network intrusions

      • Denial of service attacks

      • Hacking

      • E-mail bombs

      • Viruses & Trojan horses

      • Identity Theft

    • Learn how not to become a victim…


Take action to protect yourself your family1

Take Action toProtect Yourself & Your Family

  • Move home computers into family room or area

  • Familiarize yourself with the Internet

  • Utilize site/content blocking software or parental controls

  • Establish family rules and guidelines for safe Internet use

  • Discuss Internet crime and safety issues with your children - do it often

Never allow children to meet Internet friends


Take action to protect yourself your family2

Take Action to Protect Yourself & Your Family

  • Don’t give out personal or family information

    • when signing up for groups

    • anywhere else online

  • Encourage Internet safety discussions in community schools, PTOs, PTAs, etc.

  • Randomly check your child’s email and Internet web histories

  • Keep a written record of all logins, screen names and their passwords

  • Invite your children to talk to you when they find something objectionable


Take action to protect yourself your family3

Take Action to Protect Yourself & Your Family

  • Urge legislators and officials to address the issues

    • send e-mail, snail mail, telephone

  • Support the efforts of your local law enforcement agencies

  • Report electronic crimes to your local law enforcement authorities

  • If your child is the victim of an online predator…

    • it is not their fault

    • be patient

    • be compassionate

    • contact authorities swiftly, time is critical


Warning signs your child may be in trouble online

Warning Signs Your ChildMay Be in Trouble Online…

  • Excessive use of the Internet, especially late at night

  • Gifts, money or packages they can’t or won’t explain

  • Computer or monitor is suddenly switched off, laptop lid shut, or other attempts to block the screen

  • Strange long distance charges, phone calls from strangers, or lots of wrong numbers and hang-ups

  • Your child is using an on-line account belonging to someone else

  • Your child begins deleting emails and internet history after use

  • Buddies or email addresses that your child won’t or can't easily identify who they all are in real life


Thank you for your time and interest

Thank You for Your Time and Interest


  • Login