1 / 44

Hawaii Internet & Technology Crimes Task Force

Hawaii Internet & Technology Crimes Task Force What Type of Crimes Does the HITeC Unit Work? The Unit is divided into two sections – Internet Crimes Against Children, and Technology Crimes Against Persons What are “Internet Crimes Against Children”? Using a computer to:

paul2
Download Presentation

Hawaii Internet & Technology Crimes Task Force

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hawaii Internet & Technology CrimesTask Force

  2. What Type of Crimes Does the HITeC Unit Work? The Unit is divided into two sections – • Internet Crimes Against Children, and • Technology Crimes Against Persons

  3. What are “Internet Crimes Against Children”? Using a computer to: Create or Possess Child Pornography [unlawful in every state to possess even one image] Solicit our Children to Engage in Sexual Activities [prior to any actual physical contact]

  4. The Exploding Use of the Internet: • 25 million kids online now • 75 million by the end of 2005 will have Internet Access

  5. Continuing Advances in Computer Technology Create Headaches • Actual Images: Live (webcam) & Recorded (digital photos; streaming video) • Morphed Images: Electronic manipulation of real human images (e.g. minor’s head on adult body) • Virtual Images: Electronic creation of digital images using NO real humans (e.g. animated Disney characters; creation of virtual minor) Types of Child Pornography

  6. Cybersex Locations on the Internet 1.4 Billion Registered Domains 12% or 168 Million Are Pornographic Sites Source: Google.com • Commercial and Private Websites • Newsgroups • Post messages to others’ like a bulletin board • 70,000 newsgroups on the Internet • Chat Rooms • Luncheon Presentation • Personal E-mail

  7. Cybersex & Distribution on the Internet Newsgroups, Chatrooms, & File Sharing

  8. Typical Child Victims: Most are emotionally vulnerable Most Do NOT report victimization, especially boys Most are often females who feel “in love” (strong emotional bond) with offender

  9. Internet Crimes Against Children here in Hawaii

  10. These stories and more on our website at: www.hicac.com

  11. THE ANONIMITY OF THE WEB

  12. Part II Technology Crimes Against People

  13. What is Identity Theft?

  14. Identity Theft • An individual whom obtains personal identifying information of another person without authorization and uses that information for an unlawful purpose.

  15. Identity Theft In 2001, there were approximately 500,000 ID theft victims.

  16. Identity Theft • Credit Account Fraud • Check Fraud • Automotive Purchases • Mortgage Fraud

  17. Types of Credit Fraud • Lost/stolen • Fraudulent Application • Account takeover • Fraudulent use of account numbers • Counterfeit • Internal/Merchant

  18. Check Fraud • Washed/altered • Scanned/altered • Mail ordered checks • Computer made counterfeit checks

  19. What are the tools of the trade! • Computer • Color Printer • Motel Room Keys • Versa Check Program • MIPS Paper

  20. Tools of the trade!

  21. Tools of the trade!

  22. What Type of Information Does the ID Thief Look For?

  23. Where Does The ID Thief Find Their Information?

  24. Social Engineering Techniques used by suspects to obtain information from an individual or organization

  25. WIRELESS ETHERNET WI-FI (802.11B)

  26. 802.11b Standard • 2.4 Ghz Transmit Frequency • 11 megabits per second • Wireless Ethernet Standard • Range – hundreds of feet, depending on environmental factors.

  27. Wireless Access Point (WAP) * Ethernet Data Receiver/Transmitter * Cost - approximately $75 - $150 * Convenient, because there are no wires. * Range – hundreds of feet, depending on environ- mental factors.

  28. Required Equipment Wireless 802.11b card - $50 - $100 (any office supply store)

  29. Practical Hacker Applications Eavesdropping E-mail Intercepts User Name/Password Business Transactions

  30. Wireless Protected Access (WPA)

  31. Personal Information Defined • Individual's first name or first initial and last name in combination with any one or more of the following data elements: • Social security number • Driver's license number or California Identification Card number. • Account number, credit or debit card number, in combination with any required security code.

  32. Breach of Security Defined • Unauthorized  acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the agency. 

  33. What Can You Do? The average identity theft victim spends about 175 hours over a two year period to straighten out their financial records.

  34. Identity Theft • Minimize the Information • Control the Information • Shred the Information

  35. If it happens to you, what do you do?

  36. Identity Theft • Equifax WWW.equifax.com • Experian WWW.experian.com • Trans Union WWW.transunion.com

  37. Computer Resources • Computer Firewalls • Anti-Virus Programs • Spyware Blocking Programs

  38. QUESTIONS ??!!

  39. GIVE US YOUR FEEDBACK • E-mail us at: ATG_ICAC@hawaii.gov

  40. For More InformationContact Hawaii Internet & Technology Crimes Unit (808) 587-4114

More Related