Cybercrime fighting electronic crime on the internet
1 / 21

CYBERCRIME: Fighting Electronic Crime on the Internet - PowerPoint PPT Presentation

  • Uploaded on
  • Presentation posted in: General

CYBERCRIME: Fighting Electronic Crime on the Internet. Introduction. The Internet is a Tool Common uses: The Web (WWW) Instant Messenger (IM) File Sharing (P2P, Email) Streaming Media (Audio, Video) Communications (Email, Voice over IP – Internet Phone)

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

Download Presentation

CYBERCRIME: Fighting Electronic Crime on the Internet

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript

CYBERCRIME:Fighting Electronic Crimeon the Internet


  • The Internet is a Tool

    • Common uses:

      • The Web (WWW)

      • Instant Messenger (IM)

      • File Sharing (P2P, Email)

      • Streaming Media (Audio, Video)

      • Communications (Email, Voice over IP – Internet Phone)

      • Ecommerce (Shopping, Banking, Investing)

  • Computers are Tools

    • assist us in our work, calendars, finances, research, communications

    • Providing recreation and entertainment

  • Computers Are Used to Commit Cyber Crimes

    • Data can be stolen, altered, hidden or warped

    • Communication can be hidden, altered or recorded

    • Preventing, detecting, and prosecuting computer crime is one of the most significant challenges to Law Enforcement in modern day

Impact of High-Technologyon Your Safety

  • Greater & more enduring than drugs

    • greater influence on the uninvolved

  • National & International

    • economy

    • government

    • law enforcement

  • Collaboration

    • working together, individuals, & families have the power to protect themselves

Computers Add New Dimensionsto Traditional Crimes

  • Homicide and other violent crimes (sexual assault)

  • Illegal Material

    • Child pornography

  • Drugs, Alcohol

    • Narcotics offenses

  • Data Theft

  • Fraud, counterfeiting

  • Dangerous Content

    • Bomb Making

    • Drug Making

    • Booby-Traps

Computers have do not understand jurisdictional boundaries. Internet users are often anonymous and in cyberspace, anyone can transfer massive amounts of information almost instantaneously

Why is Cyberspace Dangerous?


    • Easy to create e-mail accounts with bogus information

    • E-mail services ask for little information

    • Other services require nothing more than an e-mail address

    • Rarely do services validate input

    • Availability of “Anonymizing Services”


    • No doors to knock down, no windows to break, no fingerprints to leave behind

    • Criminal is faceless and often in another geographic area

The Increasing Cost ofComputer Crime

Bank Robbery - $2,500 +

Bank Fraud - $25,000 +

Computer Crime - $500,000 +

Theft of Technology - $1,900,000 +

ID Theft y - $2,500,000 +


  • Auction frauds

  • Get-rich-quick schemes

  • Senior citizen scams

  • Phishing

  • Phony Prizes

  • Cheap Stuff

    • Hardware (Mp3 Players, Cameras, DVDs)

    • Software (Windows, MS-Office, Anti-Virus)


  • Personally Identifying Information

    • Birthday, SSN, Banking data

  • Credit card numbers

  • Identity Theft

  • Computer Equipment

  • Usernames & Passwords

Narcotics and Gambling

  • Narcotics distribution

  • Unmatched convenience

    • compulsive & underage gamblers

  • Virtual casinos

    • gone with a keystroke

  • Day trading

Fatal Online Encounters

Online Harassment & Cyberstalking

"It's actually obsene [sic] what you can find out about people on the Internet."– Liam Youens

Crimes Against Children

  • Child pornography

  • Exposure of Children to harmful content

    • Pornography

    • Graphic Violence

    • Hateful Content

  • Children lured into degrading situations

    • Chat Sessions

    • Chat rooms

    • Online Blogs

    • Social Networks

  • Children keep silent for many reasons

    • To protect family

    • Out of fear

    • Feelings of shame

    • To rebel against authority

    • For chance and thrill


  • Violent criminals use computers

    • to acquire critical information about the victim(s)

    • as a tool for communication

    • as a storage device for evidence about motive and methods

The Many Faces ofComputer Crime in the News

Computer Evidence Used In the Courts

  • Terrorism - Zacarias Moussaoui, 20th hijacker on 9/11

  • Homicides - Scott Peterson, Dennis Rader (BTK Killer)

  • Child Pornography - Michael Jackson

  • Espionage - Aldrich Ames

  • Insider Trading - Martha Stewart Case

  • Financial Fraud - ENRON

What Can You Do to Help?

  • Exert your influence

    • Law enforcement

    • Legislators & elected officials

    • Your family & friends

  • Practice & preach collaboration

Take Action to Protect Yourself & Your Family

  • Stay informed - technology changes

    • Learn about computer-dependent crimes

      • Network intrusions

      • Denial of service attacks

      • Hacking

      • E-mail bombs

      • Viruses & Trojan horses

      • Identity Theft

    • Learn how not to become a victim…

Take Action toProtect Yourself & Your Family

  • Move home computers into family room or area

  • Familiarize yourself with the Internet

  • Utilize site/content blocking software or parental controls

  • Establish family rules and guidelines for safe Internet use

  • Discuss Internet crime and safety issues with your children - do it often

Never allow children to meet Internet friends

Take Action to Protect Yourself & Your Family

  • Don’t give out personal or family information

    • when signing up for groups

    • anywhere else online

  • Encourage Internet safety discussions in community schools, PTOs, PTAs, etc.

  • Randomly check your child’s email and Internet web histories

  • Keep a written record of all logins, screen names and their passwords

  • Invite your children to talk to you when they find something objectionable

Take Action to Protect Yourself & Your Family

  • Urge legislators and officials to address the issues

    • send e-mail, snail mail, telephone

  • Support the efforts of your local law enforcement agencies

  • Report electronic crimes to your local law enforcement authorities

  • If your child is the victim of an online predator…

    • it is not their fault

    • be patient

    • be compassionate

    • contact authorities swiftly, time is critical

Warning Signs Your ChildMay Be in Trouble Online…

  • Excessive use of the Internet, especially late at night

  • Gifts, money or packages they can’t or won’t explain

  • Computer or monitor is suddenly switched off, laptop lid shut, or other attempts to block the screen

  • Strange long distance charges, phone calls from strangers, or lots of wrong numbers and hang-ups

  • Your child is using an on-line account belonging to someone else

  • Your child begins deleting emails and internet history after use

  • Buddies or email addresses that your child won’t or can't easily identify who they all are in real life

Thank You for Your Time and Interest

  • Login