SlideShare a Scribd company logo
1 of 31
Cyber Crime
We’ll examine:
• Definition of Cyber Crime
• Computer Crimes
• Sexual Predator
• Cyber Stalking
• Computer Theft
Definition of Cyber Crime
• “Any illegal act involving a computer, its
systems, or its applications”
• Must be intentional – not accidental
• Types or categories of cyber Crime- 3 T’s
– Tool of the crime – traditional crime w/ a
computer
– Target of the crime – Hacking
– Tangential to the crime – drug records
Computer Crimes
• Computer Theft
• Computer Trespass
• Computer Invasion of Privacy
• Computer Forgery
• Computer Password Disclosure
Computer Crimes
All computer crimes are felonies:
• Computer Theft (15 years)
• Computer Trespass (15 years)
• Computer Invasion of Privacy (15 years)
• Computer Forgery (15 years)
• Computer Password Disclosure (1 year)
Computer Crimes
• Any person who uses a computer or computer
network with knowledge that such use is without
authority and with the intention of:
• (1) Taking or appropriating any property of
another, whether or not with the intention of
depriving the owner of possession;
• (2) Obtaining property by any deceitful means or
artful practice;
Computer Crimes (condt.)
• (3) Converting property to such person's use
in violation of an agreement or other known
legal obligation to make a specified
application or disposition of such property
• Shall be guilty of the crime of computer
theft.
Computer Trespass
• Any person who uses a computer or
computer network with knowledge that
such use is without authority and with the
intention of:
• (1) Deleting or in any way removing, either
temporarily or permanently, any computer
program or data from a computer or
computer network;
Computer Trespass
(condt.)
• (2) Obstructing, interrupting, or in any way
interfering with the use of a computer
program or data; or
• (3) Altering, damaging, or in any way
causing the malfunction of a computer,
computer network, or computer program,
regardless of how long the alteration,
damage, or malfunction persists
Computer Trespass
(condt.)
• ... shall be guilty of Computer Trespass.
Computer Invasion of Privacy
• Any person who uses a computer or computer
network with the intention of examining any
employment, medical, salary, credit, or any other
financial or personal data relating to any other
person with knowledge that such examination is
without authority shall be guilty of the crime of
computer invasion of privacy.
Computer Forgery
• Any person who creates, alters, or deletes
any data contained in any computer or
computer network, who, if such person had
created, altered, or deleted a tangible
document or instrument would have
committed forgery , shall be guilty of the
crime of computer forgery.
Computer Forgery
• The absence of a tangible writing directly
created or altered by the offender shall not
be a defense to the crime of computer
forgery if a creation, alteration, or deletion
of data was involved in lieu of a tangible
document or instrument.
Computer Password Disclosure
• Any person who discloses a number, code,
password, or other means of access to a computer
or computer network knowing that such disclosure
is without authority and which results in damages
(including the fair market value of any services
used and victim expenditure) to the owner of the
computer or computer network in excess of
$500.00 shall be guilty of the crime of computer
password disclosure.
More Computer Crimes
• Remaining computer crimes are “crime
specific,” such as
• Sexual Offenses, Stalking Offenses and
Theft Offenses
Federal Laws on Cyber Crime
• Computer Fraud and Abuse Act of 1986
– Three goals
• Confidentiality of data communications
• Integrity of data communications
• Availability of data communications
– CFAA is a general purpose cyber crime law
Intercepting Communications
• It shall be unlawful for any person
intentionally and secretly to intercept by the
use of any device, instrument, or apparatus
the contents of a message sent by telephone,
telegraph, letter, or by any other means of
private communication;
Intercepting Communications
• But, what if the police seize a computer and
discover a conversation where a crime is
discussed. That conversation, if by
telephone or telegraph, would have been
protected. Not the case with a computer.
Courts have ruled that you should know that
a computer makes a printed record, so it’s
okay for police to use it
Computer Assisted Sexual
Exploitation
• However, Legislature has
recently enacted a
misdemeanor statute that
makes the use of a computer
in the communication itself
illegal. It is directly on
point, but is it binding
Computer Assisted Sexual
Exploitation
• It shall be unlawful for any person
intentionally or willfully to utilize a
computer on-line service, Internet service,
or local bulletin board service to seduce,
solicit, lure, or entice, or attempt to
seduce, solicit, lure, or entice a child or
another person believed by such person to
be a child,
Computer Assisted Sexual
Exploitation
• (d) (1) .. to commit any illegal act ... relating to
the offense of sodomy or aggravated sodomy; ...
relating to the offense of child molestation or
aggravated child molestation; ... relating to the
offense of enticing a child for indecent purposes;
... relating to the offense of public indecency; or
to engage in any conduct that by its nature is an
unlawful sexual offense against a child.
Computer Assisted Sexual
Exploitation
• (d) (2) Any person who violates above
paragraph of this subsection shall be
guilty of a misdemeanor of a high and
aggravated nature.
Anonymity Opportunity
• Today, a sexual pervert can “hang around”
in teenage chat rooms and find suitable
victims with little risk of detection. Kids
are naturally curious anyway, but teenagers
are looking for someone who listens to
them, a need which chat rooms seem to fill.
Anonymity Opportunity
• After awhile, the “friendship” will develop
to the point that the predator can talk about
sex. Again, teenagers are naturally curious,
so this is not seen as dangerous to the
teenager.
Anonymity Opportunity
• Once the predator has established a trusting
relationship, he/she will seek to make a
physical encounter. Usually, this encounter
will be solely about sex for the predator.
There is too much danger in these
encounters to make “friendly” contacts.
Anonymity Opportunity
• The child usually seeks to get out of the
situation once she/he realizes that this
“friend” is not what was portrayed on the
Internet. However, in many instances, it is
too late to back out or stop the assault. If
the child will tell about it, capture is not
difficult as the “paper trail” is fairly easy to
follow
Cyber Stalking
What is stalking?
• (a) A person commits the offense of stalking
when he or she follows, places under surveillance,
or contacts another person at or about a place or
places without the consent of the other person for
the purpose of harassing and intimidating the other
person.
Protecting Children
(& networks)
• Keep Computer In Public Access Room
• Install Child Safe Software (Net Nanny,
Cyber Patrol, etc.)
• Know How To Track “History”
• Watch Your Child At The Computer,
Regardless of Age
• Use a FIREWALL – #1 network protection
Final points
– Number one fraud on the internet?
• Auctions!! E bay users, pay with a credit card!
– Most common computer attack?
• Viruses- “malicious logic” vs. worms
• Worms are self-replicating, death by expansion, filling hard
drive or bandwidth
– Denial of Service Attacks- it’s cyber crime
• Floods the server with data, prevents access
– Carnivore – FBI tool for internet wiretaps
• Makes a copy of email for law enforcement
– Money laundering – transfer of money from illegal
operations to legal ones - $1M weighs 30- 50 lbs!
In Closing
• Cyber Crime Is Still Crime
• Computers Offer Widespread Havoc
• Computers Have Detection Issues,
Good and Bad
• Forensic Computer Specialists Are
Vital To Crime Fighting Efforts
Thank a lot for your precious
time!
Please feel free to ask any Question….

More Related Content

What's hot

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 

What's hot (20)

Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Phishing
PhishingPhishing
Phishing
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 

Viewers also liked

Wireless Bomb Disposal Robot
Wireless Bomb Disposal RobotWireless Bomb Disposal Robot
Wireless Bomb Disposal Robot
Abhishek Gupta
 
Best ppt on Micro air vehicle with flapping wings
Best ppt on Micro air vehicle with flapping wingsBest ppt on Micro air vehicle with flapping wings
Best ppt on Micro air vehicle with flapping wings
Ronak Thakare
 
Wireless bomb disposal robot ppt
Wireless bomb disposal robot pptWireless bomb disposal robot ppt
Wireless bomb disposal robot ppt
Abhishek Gupta
 

Viewers also liked (12)

UNMANNED AERIAL VEHICLES
UNMANNED AERIAL VEHICLESUNMANNED AERIAL VEHICLES
UNMANNED AERIAL VEHICLES
 
Wireless Bomb Disposal Robot
Wireless Bomb Disposal RobotWireless Bomb Disposal Robot
Wireless Bomb Disposal Robot
 
Nano uav
Nano uavNano uav
Nano uav
 
Best ppt on Micro air vehicle with flapping wings
Best ppt on Micro air vehicle with flapping wingsBest ppt on Micro air vehicle with flapping wings
Best ppt on Micro air vehicle with flapping wings
 
unmanned aerial vehicle (UAV)
unmanned aerial vehicle (UAV)unmanned aerial vehicle (UAV)
unmanned aerial vehicle (UAV)
 
Micro air vehicles
Micro air vehiclesMicro air vehicles
Micro air vehicles
 
Unmanned aerial vehicles
Unmanned aerial vehiclesUnmanned aerial vehicles
Unmanned aerial vehicles
 
Wireless bomb disposal robot ppt
Wireless bomb disposal robot pptWireless bomb disposal robot ppt
Wireless bomb disposal robot ppt
 
UAV Presentation
UAV PresentationUAV Presentation
UAV Presentation
 
Drone technology
Drone technologyDrone technology
Drone technology
 
drones-an introduction to design
drones-an introduction to designdrones-an introduction to design
drones-an introduction to design
 
Drone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial VehicleDrone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial Vehicle
 

Similar to Cyber Crime

What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 

Similar to Cyber Crime (20)

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Laws -Nudrat Mufti
Cyber Laws -Nudrat MuftiCyber Laws -Nudrat Mufti
Cyber Laws -Nudrat Mufti
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 

Recently uploaded

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Cyber Crime

  • 2. We’ll examine: • Definition of Cyber Crime • Computer Crimes • Sexual Predator • Cyber Stalking • Computer Theft
  • 3. Definition of Cyber Crime • “Any illegal act involving a computer, its systems, or its applications” • Must be intentional – not accidental • Types or categories of cyber Crime- 3 T’s – Tool of the crime – traditional crime w/ a computer – Target of the crime – Hacking – Tangential to the crime – drug records
  • 4. Computer Crimes • Computer Theft • Computer Trespass • Computer Invasion of Privacy • Computer Forgery • Computer Password Disclosure
  • 5. Computer Crimes All computer crimes are felonies: • Computer Theft (15 years) • Computer Trespass (15 years) • Computer Invasion of Privacy (15 years) • Computer Forgery (15 years) • Computer Password Disclosure (1 year)
  • 6. Computer Crimes • Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of: • (1) Taking or appropriating any property of another, whether or not with the intention of depriving the owner of possession; • (2) Obtaining property by any deceitful means or artful practice;
  • 7. Computer Crimes (condt.) • (3) Converting property to such person's use in violation of an agreement or other known legal obligation to make a specified application or disposition of such property • Shall be guilty of the crime of computer theft.
  • 8. Computer Trespass • Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of: • (1) Deleting or in any way removing, either temporarily or permanently, any computer program or data from a computer or computer network;
  • 9. Computer Trespass (condt.) • (2) Obstructing, interrupting, or in any way interfering with the use of a computer program or data; or • (3) Altering, damaging, or in any way causing the malfunction of a computer, computer network, or computer program, regardless of how long the alteration, damage, or malfunction persists
  • 10. Computer Trespass (condt.) • ... shall be guilty of Computer Trespass.
  • 11. Computer Invasion of Privacy • Any person who uses a computer or computer network with the intention of examining any employment, medical, salary, credit, or any other financial or personal data relating to any other person with knowledge that such examination is without authority shall be guilty of the crime of computer invasion of privacy.
  • 12. Computer Forgery • Any person who creates, alters, or deletes any data contained in any computer or computer network, who, if such person had created, altered, or deleted a tangible document or instrument would have committed forgery , shall be guilty of the crime of computer forgery.
  • 13. Computer Forgery • The absence of a tangible writing directly created or altered by the offender shall not be a defense to the crime of computer forgery if a creation, alteration, or deletion of data was involved in lieu of a tangible document or instrument.
  • 14. Computer Password Disclosure • Any person who discloses a number, code, password, or other means of access to a computer or computer network knowing that such disclosure is without authority and which results in damages (including the fair market value of any services used and victim expenditure) to the owner of the computer or computer network in excess of $500.00 shall be guilty of the crime of computer password disclosure.
  • 15. More Computer Crimes • Remaining computer crimes are “crime specific,” such as • Sexual Offenses, Stalking Offenses and Theft Offenses
  • 16. Federal Laws on Cyber Crime • Computer Fraud and Abuse Act of 1986 – Three goals • Confidentiality of data communications • Integrity of data communications • Availability of data communications – CFAA is a general purpose cyber crime law
  • 17. Intercepting Communications • It shall be unlawful for any person intentionally and secretly to intercept by the use of any device, instrument, or apparatus the contents of a message sent by telephone, telegraph, letter, or by any other means of private communication;
  • 18. Intercepting Communications • But, what if the police seize a computer and discover a conversation where a crime is discussed. That conversation, if by telephone or telegraph, would have been protected. Not the case with a computer. Courts have ruled that you should know that a computer makes a printed record, so it’s okay for police to use it
  • 19. Computer Assisted Sexual Exploitation • However, Legislature has recently enacted a misdemeanor statute that makes the use of a computer in the communication itself illegal. It is directly on point, but is it binding
  • 20. Computer Assisted Sexual Exploitation • It shall be unlawful for any person intentionally or willfully to utilize a computer on-line service, Internet service, or local bulletin board service to seduce, solicit, lure, or entice, or attempt to seduce, solicit, lure, or entice a child or another person believed by such person to be a child,
  • 21. Computer Assisted Sexual Exploitation • (d) (1) .. to commit any illegal act ... relating to the offense of sodomy or aggravated sodomy; ... relating to the offense of child molestation or aggravated child molestation; ... relating to the offense of enticing a child for indecent purposes; ... relating to the offense of public indecency; or to engage in any conduct that by its nature is an unlawful sexual offense against a child.
  • 22. Computer Assisted Sexual Exploitation • (d) (2) Any person who violates above paragraph of this subsection shall be guilty of a misdemeanor of a high and aggravated nature.
  • 23. Anonymity Opportunity • Today, a sexual pervert can “hang around” in teenage chat rooms and find suitable victims with little risk of detection. Kids are naturally curious anyway, but teenagers are looking for someone who listens to them, a need which chat rooms seem to fill.
  • 24. Anonymity Opportunity • After awhile, the “friendship” will develop to the point that the predator can talk about sex. Again, teenagers are naturally curious, so this is not seen as dangerous to the teenager.
  • 25. Anonymity Opportunity • Once the predator has established a trusting relationship, he/she will seek to make a physical encounter. Usually, this encounter will be solely about sex for the predator. There is too much danger in these encounters to make “friendly” contacts.
  • 26. Anonymity Opportunity • The child usually seeks to get out of the situation once she/he realizes that this “friend” is not what was portrayed on the Internet. However, in many instances, it is too late to back out or stop the assault. If the child will tell about it, capture is not difficult as the “paper trail” is fairly easy to follow
  • 27. Cyber Stalking What is stalking? • (a) A person commits the offense of stalking when he or she follows, places under surveillance, or contacts another person at or about a place or places without the consent of the other person for the purpose of harassing and intimidating the other person.
  • 28. Protecting Children (& networks) • Keep Computer In Public Access Room • Install Child Safe Software (Net Nanny, Cyber Patrol, etc.) • Know How To Track “History” • Watch Your Child At The Computer, Regardless of Age • Use a FIREWALL – #1 network protection
  • 29. Final points – Number one fraud on the internet? • Auctions!! E bay users, pay with a credit card! – Most common computer attack? • Viruses- “malicious logic” vs. worms • Worms are self-replicating, death by expansion, filling hard drive or bandwidth – Denial of Service Attacks- it’s cyber crime • Floods the server with data, prevents access – Carnivore – FBI tool for internet wiretaps • Makes a copy of email for law enforcement – Money laundering – transfer of money from illegal operations to legal ones - $1M weighs 30- 50 lbs!
  • 30. In Closing • Cyber Crime Is Still Crime • Computers Offer Widespread Havoc • Computers Have Detection Issues, Good and Bad • Forensic Computer Specialists Are Vital To Crime Fighting Efforts
  • 31. Thank a lot for your precious time! Please feel free to ask any Question….