SlideShare una empresa de Scribd logo
1 de 33
Joshua S. Moulin
JoshMoulin.com
Instructor Background
 Former Police Lieutenant / FBI Cyber Crime Task
Force Commander
 Former Forensic Lab Director of Accredited
Laboratory
 Internationally certified in Cyber Security,
Digital Forensics, and Incident Response
 Currently a contractor working in National
Security for the US Federal Government as the
Digital Forensic/Incident Response Team Lead
of a Cyber Security Office
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 2
Oregon Ranks 3rd Highest in the Nation
Registered Sex Offenders Per Capita
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 3
Crimes Committed with Technology
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 4
Identity Theft
Domestic Violence
Homicide/Suicide
Internet Fraud/Forgery
E-mail Threats
Bomb Threats
Stalking & Harassment
Missing Persons
Child Exploitation & Abuse
Gambling
Prostitution
Extortion
Narcotics
Software Piracy
Intrusions/Hacking/Trade Secrets
Cyberstalking
 Each year, 3.4
million Americans
are the victims of
stalking
 65% of these stalking
cases are initiated
online!
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 5
Stalking Statistics
 3 in 4 victims are stalked by someone they know
 30% of victims are stalked by a current or former
partner
 10% are stalked by a stranger
 11% of victims have been stalked for 5 or more
years
 46% of victims experience at least one unwanted
contact per week
 10% of victims report being monitored with GPS,
8% with video/cameras/listening devices
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 6
Cyberstalking v. Offline Stalking -
Similarities
 The majority of cyber stalking suspects had an
intimate relationship with the victim
 Most victims are women and most suspects are
men
 Suspects are generally motivated by their desire
to control the victim
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 7
Cyberstalking v. Offline Stalking -
Differences
 Cyber stalking suspects can be located
anywhere they have Internet access, they aren’t
restricted to being near the victim
 Electronic communications make it easier for a
cyber stalker to encourage a third party to
threaten or harass the victim
 Cyber stalkers feel they are hidden by the
perceived anonymity of the Internet and often
are more brazen then traditional stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 8
Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 9
Oregon Statistics
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 10
2010 Domestic Violence Counts
Technologies that Facilitate Stalking
 Caller ID &
Voice changer
 Record calls
 Buy calling
cards with
cash
 Difficult to
locate
evidence
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 11
Call Spoofing
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 12
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 13
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 14
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 15
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 16
Technologies that Facilitate Stalking
 Allows users to record
messages using AOL
Instant Messenger
(AIM)
 Is anonymous
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 17
Technologies that Facilitate Stalking
 Instant Messaging (IM) and
chat programs are commonly
ways to encounter cyber
stalkers
 Viruses and other malware are
prevalent
 Some malware will infect a
computer and allow suspects
to track movements of the
victim online
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 18
Technologies that Facilitate Stalking
 Malware (Viruses, Trojan
Horses, etc.) are available
to allow remote access to
a computer
 Several software
applications are designed
to record user activity and
send reports to a third
party
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 19
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 20
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 21
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 22
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 23
GPS Tracking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 24
Social Networking in Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 25
Social Networking in
Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 26
Social Networking in Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 27
Technology Tracking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 28
Geotagging
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 29
Tips to avoid becoming a victim of
Cyberstalking
 Don’t respond to flaming
(provocation online)
 Choose a genderless screen
name
 Don’t flirt online – unless
you are prepared for the
consequences
 Save offending messages
and report them to your
service provider
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 30
Tips to avoid becoming a victim of
Cyberstalking
 If a threat is made in a chat room or message
board notify the moderator immediately
 Don’t confront the stalker/harasser
 Get out of a situation online that has become
hostile
 Google yourself occasionally to see what
information is being posted about yourself
(personal information)
 Don’t accept files or open attachments from
other users
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 31
Tips to avoid becoming a victim of
Cyberstalking
 Use strong passwords on all devices and don’t
allow others to use your electronic devices
 Be aware of social networking websites
“checking you in” to locations and geotagging
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 32
Contact Information
Joshua S. Moulin – GCFA,CFCE,CAWFE,DFCP,ACE,CEECS
Cyber Security and Digital Forensics
http://JoshMoulin.com
Email: Josh@JoshMoulin.com
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 33

Más contenido relacionado

Destacado

Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Wiki Presentation Cyber Safety
Wiki Presentation Cyber SafetyWiki Presentation Cyber Safety
Wiki Presentation Cyber SafetyJulie
 
Cyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networksCyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networksMarketingatBahrain
 
Sept 19 bullying awareness slide show
Sept 19 bullying awareness slide showSept 19 bullying awareness slide show
Sept 19 bullying awareness slide showjackson_carrie
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
Learning Unit 7: Stalking and D.V.-CRJ 461
Learning Unit 7: Stalking and D.V.-CRJ 461Learning Unit 7: Stalking and D.V.-CRJ 461
Learning Unit 7: Stalking and D.V.-CRJ 461Bonnie Black
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 
Stalking 101 power point
Stalking 101 power pointStalking 101 power point
Stalking 101 power pointHi-Line's Help
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Misrepresentation and fraud
Misrepresentation and fraudMisrepresentation and fraud
Misrepresentation and fraudnishna sathyan
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Law of defamation
Law of defamationLaw of defamation
Law of defamationJimi Kayode
 
Stalking
StalkingStalking
Stalkingcitinfo
 

Destacado (20)

Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Wiki Presentation Cyber Safety
Wiki Presentation Cyber SafetyWiki Presentation Cyber Safety
Wiki Presentation Cyber Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networksCyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networks
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Sept 19 bullying awareness slide show
Sept 19 bullying awareness slide showSept 19 bullying awareness slide show
Sept 19 bullying awareness slide show
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Learning Unit 7: Stalking and D.V.-CRJ 461
Learning Unit 7: Stalking and D.V.-CRJ 461Learning Unit 7: Stalking and D.V.-CRJ 461
Learning Unit 7: Stalking and D.V.-CRJ 461
 
Online Defamation
Online DefamationOnline Defamation
Online Defamation
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Stalking 101 power point
Stalking 101 power pointStalking 101 power point
Stalking 101 power point
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Misrepresentation and fraud
Misrepresentation and fraudMisrepresentation and fraud
Misrepresentation and fraud
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Law of defamation
Law of defamationLaw of defamation
Law of defamation
 
Defamation
DefamationDefamation
Defamation
 
Stalking
StalkingStalking
Stalking
 

Similar a Josh Moulin: Cyberstalking Presentation

Josh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin: Internet Scams and Identity Theft PreventionJosh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin: Internet Scams and Identity Theft PreventionJosh Moulin, MSISA,CISSP
 
Technology & The Law
Technology & The LawTechnology & The Law
Technology & The Law34734
 
Social Media in the Philippines.pptx
Social Media in the Philippines.pptxSocial Media in the Philippines.pptx
Social Media in the Philippines.pptxChristianneVentura
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Ollie Bray
 
Cyber Security as a Service
Cyber Security as a ServiceCyber Security as a Service
Cyber Security as a ServiceUS-Ignite
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpa21raym
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-webOmbodi Gábor
 
The Hidden Exposures of Technology
The Hidden Exposures of TechnologyThe Hidden Exposures of Technology
The Hidden Exposures of Technologysmithad612
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.pptHODCSEKncet
 
E safety-course_2010
E safety-course_2010E safety-course_2010
E safety-course_2010kevinbrace
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)Fabio Pietrosanti
 

Similar a Josh Moulin: Cyberstalking Presentation (17)

Josh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin: Internet Scams and Identity Theft PreventionJosh Moulin: Internet Scams and Identity Theft Prevention
Josh Moulin: Internet Scams and Identity Theft Prevention
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Technology & The Law
Technology & The LawTechnology & The Law
Technology & The Law
 
Crime And Prevention Trends 2006
Crime And Prevention Trends 2006Crime And Prevention Trends 2006
Crime And Prevention Trends 2006
 
Social Media in the Philippines.pptx
Social Media in the Philippines.pptxSocial Media in the Philippines.pptx
Social Media in the Philippines.pptx
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Cyber Security as a Service
Cyber Security as a ServiceCyber Security as a Service
Cyber Security as a Service
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-web
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 
The Hidden Exposures of Technology
The Hidden Exposures of TechnologyThe Hidden Exposures of Technology
The Hidden Exposures of Technology
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
 
E safety-course_2010
E safety-course_2010E safety-course_2010
E safety-course_2010
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 

Más de Josh Moulin, MSISA,CISSP

Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Josh Moulin, MSISA,CISSP
 
Information Security Basics for Businesses and Individuals
Information Security Basics for Businesses and IndividualsInformation Security Basics for Businesses and Individuals
Information Security Basics for Businesses and IndividualsJosh Moulin, MSISA,CISSP
 
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a BudgetJosh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a BudgetJosh Moulin, MSISA,CISSP
 
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin:  Finding deleted URLs in Mozilla Firefox places.sqliteJosh Moulin:  Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqliteJosh Moulin, MSISA,CISSP
 
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin, MSISA,CISSP
 
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...Josh Moulin, MSISA,CISSP
 
Josh Moulin: Basic Fire Investigation for Law Enforcement
Josh Moulin: Basic Fire Investigation for Law EnforcementJosh Moulin: Basic Fire Investigation for Law Enforcement
Josh Moulin: Basic Fire Investigation for Law EnforcementJosh Moulin, MSISA,CISSP
 

Más de Josh Moulin, MSISA,CISSP (7)

Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
Disheveled Digital Forensics: The Impact of Inconsistent Standards, Certifica...
 
Information Security Basics for Businesses and Individuals
Information Security Basics for Businesses and IndividualsInformation Security Basics for Businesses and Individuals
Information Security Basics for Businesses and Individuals
 
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a BudgetJosh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
 
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin:  Finding deleted URLs in Mozilla Firefox places.sqliteJosh Moulin:  Finding deleted URLs in Mozilla Firefox places.sqlite
Josh Moulin: Finding deleted URLs in Mozilla Firefox places.sqlite
 
Josh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigationsJosh Moulin: What every prosecutor should know about peer to-peer investigations
Josh Moulin: What every prosecutor should know about peer to-peer investigations
 
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
Josh Moulin: Law Enforcement Multi-Disciplinary Team Approach to Technology F...
 
Josh Moulin: Basic Fire Investigation for Law Enforcement
Josh Moulin: Basic Fire Investigation for Law EnforcementJosh Moulin: Basic Fire Investigation for Law Enforcement
Josh Moulin: Basic Fire Investigation for Law Enforcement
 

Último

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Último (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

Josh Moulin: Cyberstalking Presentation

  • 2. Instructor Background  Former Police Lieutenant / FBI Cyber Crime Task Force Commander  Former Forensic Lab Director of Accredited Laboratory  Internationally certified in Cyber Security, Digital Forensics, and Incident Response  Currently a contractor working in National Security for the US Federal Government as the Digital Forensic/Incident Response Team Lead of a Cyber Security Office © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 2
  • 3. Oregon Ranks 3rd Highest in the Nation Registered Sex Offenders Per Capita © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 3
  • 4. Crimes Committed with Technology © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 4 Identity Theft Domestic Violence Homicide/Suicide Internet Fraud/Forgery E-mail Threats Bomb Threats Stalking & Harassment Missing Persons Child Exploitation & Abuse Gambling Prostitution Extortion Narcotics Software Piracy Intrusions/Hacking/Trade Secrets
  • 5. Cyberstalking  Each year, 3.4 million Americans are the victims of stalking  65% of these stalking cases are initiated online! © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 5
  • 6. Stalking Statistics  3 in 4 victims are stalked by someone they know  30% of victims are stalked by a current or former partner  10% are stalked by a stranger  11% of victims have been stalked for 5 or more years  46% of victims experience at least one unwanted contact per week  10% of victims report being monitored with GPS, 8% with video/cameras/listening devices © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 6
  • 7. Cyberstalking v. Offline Stalking - Similarities  The majority of cyber stalking suspects had an intimate relationship with the victim  Most victims are women and most suspects are men  Suspects are generally motivated by their desire to control the victim © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 7
  • 8. Cyberstalking v. Offline Stalking - Differences  Cyber stalking suspects can be located anywhere they have Internet access, they aren’t restricted to being near the victim  Electronic communications make it easier for a cyber stalker to encourage a third party to threaten or harass the victim  Cyber stalkers feel they are hidden by the perceived anonymity of the Internet and often are more brazen then traditional stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 8
  • 9. Cyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 9
  • 10. Oregon Statistics © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 10 2010 Domestic Violence Counts
  • 11. Technologies that Facilitate Stalking  Caller ID & Voice changer  Record calls  Buy calling cards with cash  Difficult to locate evidence © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 11
  • 12. Call Spoofing © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 12
  • 13. Mobile Phone Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 13
  • 14. Mobile Phone Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 14
  • 15. Mobile Phone Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 15
  • 16. Mobile Phone Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 16
  • 17. Technologies that Facilitate Stalking  Allows users to record messages using AOL Instant Messenger (AIM)  Is anonymous © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 17
  • 18. Technologies that Facilitate Stalking  Instant Messaging (IM) and chat programs are commonly ways to encounter cyber stalkers  Viruses and other malware are prevalent  Some malware will infect a computer and allow suspects to track movements of the victim online © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 18
  • 19. Technologies that Facilitate Stalking  Malware (Viruses, Trojan Horses, etc.) are available to allow remote access to a computer  Several software applications are designed to record user activity and send reports to a third party © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 19
  • 20. Technologies that Facilitate Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 20
  • 21. Technologies that Facilitate Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 21
  • 22. Technologies that Facilitate Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 22
  • 23. Technologies that Facilitate Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 23
  • 24. GPS Tracking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 24
  • 25. Social Networking in Cyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 25
  • 26. Social Networking in Cyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 26
  • 27. Social Networking in Cyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 27
  • 28. Technology Tracking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 28
  • 29. Geotagging © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 29
  • 30. Tips to avoid becoming a victim of Cyberstalking  Don’t respond to flaming (provocation online)  Choose a genderless screen name  Don’t flirt online – unless you are prepared for the consequences  Save offending messages and report them to your service provider © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 30
  • 31. Tips to avoid becoming a victim of Cyberstalking  If a threat is made in a chat room or message board notify the moderator immediately  Don’t confront the stalker/harasser  Get out of a situation online that has become hostile  Google yourself occasionally to see what information is being posted about yourself (personal information)  Don’t accept files or open attachments from other users © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 31
  • 32. Tips to avoid becoming a victim of Cyberstalking  Use strong passwords on all devices and don’t allow others to use your electronic devices  Be aware of social networking websites “checking you in” to locations and geotagging © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 32
  • 33. Contact Information Joshua S. Moulin – GCFA,CFCE,CAWFE,DFCP,ACE,CEECS Cyber Security and Digital Forensics http://JoshMoulin.com Email: Josh@JoshMoulin.com © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 33