slide1 l.
Skip this Video
Loading SlideShow in 5 Seconds..
Hawaii Internet & Technology Crimes Task Force PowerPoint Presentation
Download Presentation
Hawaii Internet & Technology Crimes Task Force

Loading in 2 Seconds...

play fullscreen
1 / 44

Hawaii Internet & Technology Crimes Task Force - PowerPoint PPT Presentation

  • Uploaded on

Hawaii Internet & Technology Crimes Task Force What Type of Crimes Does the HITeC Unit Work? The Unit is divided into two sections – Internet Crimes Against Children, and Technology Crimes Against Persons What are “Internet Crimes Against Children”? Using a computer to:

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

Hawaii Internet & Technology Crimes Task Force

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
what type of crimes does the hitec unit work
What Type of Crimes Does the HITeC Unit Work?

The Unit is divided into two sections –

  • Internet Crimes Against Children, and
  • Technology Crimes Against Persons
what are internet crimes against children
What are “Internet Crimes Against Children”?

Using a computer to:

Create or Possess Child Pornography

[unlawful in every state to possess even one image]

Solicit our Children to Engage in Sexual Activities [prior to any actual physical contact]

the exploding use of the internet
The Exploding Use of the Internet:
  • 25 million kids online now
  • 75 million by the end of 2005 will have Internet Access
continuing advances in computer technology create headaches
Continuing Advances in Computer Technology Create Headaches
  • Actual Images: Live (webcam) & Recorded (digital photos; streaming video)
  • Morphed Images: Electronic manipulation of real human images (e.g. minor’s head on adult body)
  • Virtual Images: Electronic creation of digital images using NO real humans (e.g. animated Disney characters; creation of virtual minor)

Types of Child Pornography

cybersex locations on the internet
Cybersex Locations on the Internet

1.4 Billion Registered Domains

12% or 168 Million Are Pornographic Sites


  • Commercial and Private Websites
  • Newsgroups
    • Post messages to others’ like a bulletin board
    • 70,000 newsgroups on the Internet
  • Chat Rooms
    • Luncheon Presentation
  • Personal E-mail
cybersex distribution on the internet
Cybersex & Distribution on the Internet

Newsgroups, Chatrooms, & File Sharing

typical child victims
Typical Child Victims:

Most are emotionally vulnerable

Most Do NOT

report victimization, especially boys

Most are often females who feel “in love” (strong emotional bond) with offender


Internet Crimes

Against Children

here in Hawaii


Part II

Technology Crimes Against People

identity theft
Identity Theft
  • An individual whom obtains personal identifying information of another person without authorization and uses that information for an unlawful purpose.
identity theft16

Identity Theft

In 2001, there were approximately 500,000 ID theft victims.

identity theft17
Identity Theft
  • Credit Account Fraud
  • Check Fraud
  • Automotive Purchases
  • Mortgage Fraud
types of credit fraud
Types of Credit Fraud
  • Lost/stolen
  • Fraudulent Application
  • Account takeover
  • Fraudulent use of account numbers
  • Counterfeit
  • Internal/Merchant
check fraud
Check Fraud
  • Washed/altered
  • Scanned/altered
  • Mail ordered checks
  • Computer made counterfeit checks
what are the tools of the trade
What are the tools of the trade!
  • Computer
  • Color Printer
  • Motel Room Keys
  • Versa Check Program
  • MIPS Paper
social engineering

Social Engineering

Techniques used by suspects to obtain information from an individual or organization

802 11b standard
802.11b Standard
  • 2.4 Ghz Transmit Frequency
  • 11 megabits per second
  • Wireless Ethernet Standard
  • Range – hundreds of feet, depending

on environmental factors.

wireless access point wap
Wireless Access Point (WAP)

* Ethernet Data Receiver/Transmitter

* Cost - approximately $75 - $150

* Convenient, because there are no wires.

* Range – hundreds of feet, depending on environ-

mental factors.

required equipment
Required Equipment

Wireless 802.11b card - $50 - $100 (any office supply store)

practical hacker applications
Practical Hacker Applications


E-mail Intercepts

User Name/Password

Business Transactions

personal information defined
Personal Information Defined
  • Individual's first name or first initial and last name in combination with any one or more of the following data elements:
    • Social security number
    • Driver's license number or California Identification Card number.
    • Account number, credit or debit card number, in combination with any required security code.
breach of security defined
Breach of Security Defined
  • Unauthorized  acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the agency. 
what can you do
What Can You Do?

The average identity theft victim spends about 175 hours over a two year period to straighten out their financial records.

identity theft37
Identity Theft
  • Minimize the Information
  • Control the Information
  • Shred the Information
identity theft39
Identity Theft
  • Equifax
  • Experian
  • Trans Union
computer resources
Computer Resources
  • Computer Firewalls
  • Anti-Virus Programs
  • Spyware Blocking Programs
give us your feedback
  • E-mail us at:

for more information contact

For More InformationContact

Hawaii Internet &

Technology Crimes Unit

(808) 587-4114