1 / 20

Cyber Crime Awareness

Criminal Investigation and Detection Group. Cyber Crime Awareness. EFREN LAGAC FERNANDEZ II, GCTCP Police Chief Inspector Chief, Administrative Branch Chief, MIS/Forensic Sec, Investigation Branch Anti-Transnational Crime Division. Why learn about CYBER CRIME ?. Because –

landis
Download Presentation

Cyber Crime Awareness

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Criminal Investigation and Detection Group Cyber Crime Awareness EFREN LAGAC FERNANDEZ II, GCTCP Police Chief Inspector Chief, Administrative Branch Chief, MIS/Forensic Sec, Investigation Branch Anti-Transnational Crime Division

  2. Why learn about CYBER CRIME ? Because – - Everybody is using COMPUTERS. - From white collar criminals to terrorist organizations And from Teenagers to Adults. - Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers - New generation is growing up with computers. - MOST IMPORTANT – Monetary transactions are moving on to the INTERNET.

  3. WHAT IS COMPUTER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. IN SHORT COMPUTER CRIME is any crime where – Computer is a target. Computer is a tool of crime Computer is incidental to crime

  4. Profile of Cyber Criminal • Disgruntled employees. • Teenagers. • Political Hacktivist. • Professional Hackers. • Business Rival. • Ex-Boy Friend. • Divorced Husband. etc

  5. Victims • Gullible • Desperados and greedy people • Unskilled & Inexperienced • Unlucky people

  6. Computer Crimes are Vulnerable Because of : - Anonymity, Computer’s storage capacity, Weakness in Operation System, Lack of Awareness of user.

  7. Introduction to the Internet • The Internet places a vast amount of information and exciting experiences at your command. With the click of the mouse, the Internet allows you to buy an airline ticket, book a hotel, send flowers to a friend, or purchase your favorite stock. • However, as the legitimate use of the Internet increases throughout our nation and the world, the wrongful use of the Internet to commit crime and victimize people also increases.

  8. Child Pornography • The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. • The internet is very fast becoming a household commodity in all places. Its explosion has made the children a viable victim to the cyber crime. • As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.

  9. Child Pornography • The easy access to the pornographic contents readily and freely available over the internet lower the inhibitions of the children. • Pedophiles lure the children by distributing pornographic material, then they try to meet them for sexor to take their nude photographs including their engagement in sexual positions. Sometimes Pedophiles contact children in the chat rooms posing as teenagers or a child of similar age, then they start becoming friendlier with them and win their confidence.

  10. Child Pornography • Then slowly pedophiles start sexual chat to help children shed their inhibitions about sex and then call them out for personal interaction. • Then starts actual exploitation of the children by offering them some money or falsely promising them good opportunities in life. The pedophiles then sexually exploit the children either by using them as sexual objects or by taking their pornographic pictures in order to sell those over the internet.

  11. Child Exploitation • Children can be sexually exploited, kidnapped, molested and solicited by individuals using online service. One reason is the anonymous nature of the Internet. • Another reason is the large number of people using the Internet. Pedophiles will make contact with victims by having children call collect so the pedophile's telephone number will not show up on their parent's telephone bill.

  12. Child Exploitation • Pedophiles will also purchase a prepaid telephone card and give children a toll free access number enabling children to call from anywhere they choose. Pedophiles will often convince children to send them a photograph. • Pedophiles will offer children money for their photograph and/or pose as professional photographers to obtain nude, graphic or sexually explicit photographs of children.

  13. Child Exploitation • Pedophiles commonly attempt to lower the inhibitions of children through deception in an attempt to lead children into their sexual conversations or acts. There are a number of ways parents can protect their children from becoming victims of pedophiles on the Internet.

  14. Ways of Preventing Child Exploitation in the Internet • The following are some examples: • Choose an online service that offers parental control features; • Purchase blocking software and design your own safety system; • Monitor children that are online and monitor the time they spend online; • Ensure children never reveal identifying information about themselves on the Internet in a public chat room, on an electronicbulletin board or in their E-mail messages;

  15. Ways of Preventing Child Exploitation in the Internet • Ensure children do not give out personal information about themselves such as their age; • Consider using a pseudonym or unlisting your child' s name; • Get to know the services your child uses; • Block out objectionable material through your Internet service provider; • Never allow a child to arrange a face-to-face meeting with another computer user without parental permission;

  16. Ways of Preventing Child Exploitation in the Internet • Ensure children never respond to messages or bulletin board items that are suggestive, obscene, belligerent or threatening • Encourage children to tell you whenever they encounter such messages; • If you or your children receives a message that is harassing, sexual in nature, or threatening, forward a copy of the message to your service provider and ask for their assistance

  17. Ways of Preventing Child Exploitation in the Internet • If you become aware of the transmission, use, or viewing of child pornography while online, report it to the National Center for Missing and Exploited Children; • Teach children that people online may not be who they seem; • Teach children online service providers never ask for passwords and they should never give their password out; • Teach children that everything they read or see on the Internet may not be true;

  18. Ways of Preventing Child Exploitation in the Internet • Teach children to never let anyone pressure them into doing something they feel uncomfortable doing; • Teach children to never enter an area on the Internet that charges for services without asking permission from a responsible adult first; • Some children have access to the Internet at school. Check with the school authorities to ensure your children are properly supervised and monitored by a responsible adult; • Know your children' s friends and their parents.

More Related