1 / 34

Cyber Safety 2013 Detective Frank Griffitts Scottsdale Police Department Computer Crimes Unit

Cyber Safety 2013 Detective Frank Griffitts Scottsdale Police Department Computer Crimes Unit. OVERVIEW:. FRAUD CYBER BULLYING OFFENSIVE CONTENT SEXUAL PREDATION. TYPES OF FRAUD:. MALWARE IDENTITY THEFT CREDIT CARD FRAUD AUCTION FRAUD OVERPAY FRAUD

whitney
Download Presentation

Cyber Safety 2013 Detective Frank Griffitts Scottsdale Police Department Computer Crimes Unit

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Safety 2013 Detective Frank Griffitts Scottsdale Police Department Computer Crimes Unit

  2. OVERVIEW: FRAUD CYBER BULLYING OFFENSIVE CONTENT SEXUAL PREDATION

  3. TYPES OF FRAUD: MALWARE IDENTITY THEFT CREDIT CARD FRAUD AUCTION FRAUD OVERPAY FRAUD WORK FROM HOME FRAUD

  4. MALWARE: VIRUS WORM TROJAN HORSE SPYWARE ADWARE

  5. P-H-I-S-H-I-N-G = CREDIT CARD FRAUD

  6. AUCTION OVER-PAY WORK-FROM-HOME

  7. CYBER BULLYING VERBAL PHYSICAL RELATIONAL CYBER INTENTION FREQUENCY UNFAIR ADVANTAGE

  8. CYBER BULLYING HARASSMENT (ARS 13-2921): A person commits harassment if, with intent to harass or with knowledge that the person is harassing another person, the person...contacts, communicates or causes a communication with another person by verbal, electronic, mechanical, telegraphic, telephonic or written means in a manner that harasses...[or] repeatedly commits an act or acts that harass another person...

  9. CYBER BULLYING THREATS (ARS 13-1202): A person commits threatening or intimidating if the person threatens or intimidates by word or conduct … to cause physical injury to another person or serious damage to the property of another...

  10. COMPUTER TAMPERING (ARS 13-2316): A person who acts without authority or who exceeds authorization of use commits computer tampering by … accessing, altering, damaging or destroying any computer...[or] knowingly altering, damaging, deleting or destroying computer programs or data...[or] recklessly using a computer...in a scheme or a course of conduct that...seriously alarms, torments, threatens or terrorizes the person... CYBER BULLYING

  11. POSSIBLE CONSEQUENCES SCHOOL DISCIPLINE: LEGAL ACTION: CIVIL LAWSUITS CRIMINAL INVESTIGATION JUVENILE CRIMINAL RECORD PROBATION COMMUNITY SERVICE LEGAL FEES ADULT CRIMINAL TRIAL SCHOOL INVESTIGATION COMMUNITY SERVICE SUSPENSION EXPULSION

  12. OFFENSIVE CONTENT SEXUAL ORIENTED BUSINESS SITES POLITICAL EXTREMISTS RELIGIOUS EXTREMISTS RACIAL EXTREMISTS DRUG AND GANG CULTURE

  13. SOCIAL NETWORK SITES

  14. PRIVACY SETTINGS

  15. SEXUAL PREDATION SEXTING CHILD PORNOGRAPHY LURING STALKING EXPLOITATION

  16. SEXTING It is unlawful for any person, with knowledge of the character of the item involved, to intentionally or knowingly transmit or send to a minor by means of electronic mail, personal messaging or any other direct internet communication an item that is harmful to minors when the person knows or believes at the time of the transmission that a minor in this state will receive the item.

  17. CHATS AND WEBCAMS

  18. YOUR DIGITAL REPUTATION

  19. LURING

  20. STALKING

  21. LIVE GAMING SYSTEMS

  22. SEXUAL EXPLOITATION

  23. RIGHT TO PRIVACY THE FOURTH AMMENDMENT: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

  24. PARENTAL CONTROLS?

  25. FAMILY CONTRACT Your family values are personal. The following is only an example of one family’s values and how they are used to encourage appropriate behavior… FAITH HOPE CHARITY LOVE VIRTUE KNOWLEDGE PATIENCE HUMILITY DILIGENCE OBEDIENCE

More Related