...

Cyber Crimes 1

by user

on
Category: Documents
31

views

Report

Comments

Transcript

Cyber Crimes 1
Cyber Crimes
1
2
3
4
5
Phillip Bryan Stewart
txwantsome
Investigator Curtis Sadler
Arrested 07-31-2003
Kendall County
Traveled to meet what he thought was a 13year-old boy.
Charged with criminal solicitation of a minor
Also has a federal indictment for one count
of Coercion and Enticement.
Stewart was a married (now divorced) father
of three children. His two boys were 10 and
12. His daughter was 8.
Stewart was also a Little League baseball
coach and coached basketball to minors in
Junction.\
Convicted and sentenced to 5 years in
prison and must register as a sex offender.
6
Gregory Battson
battsongr8
Investigator Katherine
Smith
Arrested 03-25-2004
Walker County
Arrested for Criminal
Attempt - Sexual
Assault of a Child
Married with children
7
Patrick Craig
Investigator Steve May
Arrested 04-20-2004
Walker County
Arrested for Criminal
Attempt - Aggravated Sexual
Assault of a Minor.
College student, is single and
resides with his mother.
Plead guilty to Attempted
Sexual Performance of a
Child.
Convicted and sentenced to
10 years probation, 180 days
in county jail, $2,000 fine and
must register as a sex
offender for 20 years.
8
Johnathan Keith Kana
Investigator Cody Smirl
Hays County (Buda, Tx)
Arrested 6/29/05
Kana attempted to meet what he
believed was a 13 year old female.
Subject will be charged with Criminal
Attempt - Aggravated Sexual Assault
of a Child, Criminal Attempt - Sexual
Performance of a Child and Criminal
Solicitation of a Minor.
Kana resides in Lexington, Texas and
is engaged to be married and has no
children.
Kana graduated in 2004 from
Soutwestern University in
Georgetown, Texas. Kana was
attending Garrett-Evangelical
Theological Seminary in pursuit of
Master of Divinity and Master of Arts in
Music Ministry.
9
National Statistics
 There are 563,000 sex offenders in the U.S.

The National Center for Missing and Exploited Children.
 On average, there is one child molester per
square mile in the United States.
 The average, child molester victimizes
between 50 and 150 children before he is
ever arrested.
 The most common age at which sexual
abuse begins is three. Age eight for girls.

Becker de, Gavin & Salter, Anna C. Ph.D.(2004). Predators:Who they are,
How they Operate, and How we can protect ourselves and our children.
10
Objectives
 The attendees will be able to recognize risks
online.
 The attendees will be able to define a Blog and
recognize dangers of blogging.
 The attendees will take a look at the
characteristics of an “ideal” victim and the
characteristics of an Online predeator.
 The attendees will be able to recite Online
Safety Tips.
11
RISKS ONLINE
RISKS FOR KIDS AND TEENS
ONLINE
Exposure to Inappropriate Material
13
National Numbers
 4.2 million pornographic web sites
 100,000 Web sites offering child porn
 68 million daily search engine requests for
porn
 1.5 billion monthly porn downloads
 $2.5 billion Internet porn industry annual
revenue.
Top Ten Reviews: “Internet Filter Review”
14
Porn on the Internet
More than 30 percent of
spam,commercial e-mail, contains
pornographic material.
Spam Recycling Center, COMTEX Newswire, 11/2/99.
15
Youth on the Internet
According to NetValue, 27.5% of the
younger population in the US (age
17 and younger) visited an adult
website in Septemnber 2000.

eStatnews, January 9, 2001.
16
70 percent of traffic on porn sites
occurs between 9 a.m. and 5 p.m.
The Industry Standard, The National Catholic Register, 4/19/2000.
17
RISKS FOR KIDS AND TEENS
ONLINE
Sexual Solicitations
18
NCMEC Survey – Youth on the
Internet (Ages 10 – 17)
 1 in 33 received an aggressive sexual solicitation such
as arranging for a meeting, called on telephone, sent
them letters, etc.
 1 in 4 received unwanted exposure to pictures of nude
people having sex in the last year.
 1in 17 was threatened or harassed.
 Approximately 1 in 5 received a sexual solicitation or
approach.
NCMEC (2000)
19
Where did this Sexual
Solicitation take place?
 Computer Locations
– 70% at home
– 22% at someone
else’s home
– 4% at school
– 3% at library
 Internet
– 65% in chatrooms
– 24% in Instant
Message
20
RISKS FOR KIDS AND TEENS
ONLINE
Harassment and Bullying
21
A blog (short for Web Log) is a
Website of your own where you
enter information ordered by date.
An online diary or online journal
that is shared with others online.
22
Blogging Stats
 Myspace.com membership since January 2004
is at 84 million.
 270,000 new accounts created daily.
 MySpace.com is ranked No. 4 on the entire U.S.
internet in terms of page hits in October.
 College students make up most of the 9.5 million
members on Facebook.com
 Xanga’s membership has expanded to 45
million.
– Wikipedia.org
23
Dangers of Blogging
 If your real identity is tied to the blog anyone can
find you.
 Children and teens tend to put personal
information on blogs, such as pictures, name,
date of birth and location.
 If personal information is not used, there can be
slips which will lead to personal information.
 Blogs can be password protected or they can be
public. (Double edge sword)
24
Dangers of Blogging
 Once something is posted it is there, there is no
taking it back.
 Many can be misunderstood by a certain
comment.
 This is where bullying, harassment and a
misunderstanding can lead to violence.
 We can not over look threats made online.
Zitz, Marcy (2005) Family Internet: About Kid’s Blogs and
Online Journals and Online Diaries
25
Recent Headlines : October 07,
2005
Missing Virginia
Student Taylor Behl’s
Body Identified…
Suspect held on 16
Counts Child
Pornography
Box of Bones and
Machete recovered
from suspect’s home
26
Blog Sites
 Select an Age Appropriate Blog Site- make sure
other people your age are using this site.
 Read the Privacy Statement-read to make to see
what will happen to information you post.
 Look for Support-#’s and emails in case
problems arise.
 Cost?-any cost involved with creating and
maintaining your blog
27
Member of a Blog
 Hide your account details
 Blog Topic
 Password Protect your Blog
 E-mail
 Use of Avatars and Photos
 Hide your Profile from public view
 Hide your blog from search engines-most blogs
describe how to do this.
28
Blog Sites
 Facebook
 Xanga
 Myspace
 Espinthebottle
 Tagged
 Blogspot
 Cpixel
 Hi5
 Yahoo!360
29
www.MYSpace.com
30
www.Xanga.com
31
www.espinthebottle.com
32
CHARATERISTICS OF AN
ONLINE VICTIM
34
CHILDREN—
THE “IDEAL” VICTIM
 Naturally curious
 Easily led by adults
 Need for attention and affection
 Need to defy parents
35
REPORTING THE CRIME
 25% of the youth who encountered a
sexual solicitation or approach told a
parent.
 Less than 10% of sexual solicitations were
reported to authorities such as a lawenforcement agency, an Internet Service
Provider, or a hotline.
36
CHARATERISTICS OF AN
ONLINE PREDATOR
INTERNET SEX CRIMES
AGAINST MINORS
 OFFENDERS
– 99% were male
– 86% older than 25
– 97% acted alone
 Arrests
– 39% Internet Crimes
Against Identified
Children
– 25% Internet
Solicitations to
Undercover Law
Enforcement
– 36% Internet Child
Pornography
38
Texas Statistics
 Beginning December 2002-May 2006; State of
Texas as arrested 66 child pornographers and
have convicted 44.
 Cyber Crimes Unit has also arrested 83 online
predators for traveling to meet what they
believed to be a minor and have convicted over
50.
 Fugitive Unit has arrested 333 absconders since
2003. Child Sex Offender/Parole Violators: 282
and Operation Missing Predator: 51
39
40
ONLINE SAFETY TIPS
INTERNET SAFETY TIPS
1. Establish rules for Internet use




What sites can your child visit
Who can they talk to?
How long will they be online
Where can they use a computer?
KEEP HOUSE RULES POSTED NEAR THE
COMPUTER!
42
INTERNET SAFETY TIPS
2. Keep the computer in a common
room and no webcams.
(not a child’s bedroom)
43
Safety Tips
 Webcams:
– “Hacker Uses Webcam To Spy On Family”
Click2Houston.com (2004).
15 yr old female surfing Internet
Typing message to girlfriend and her message
turns sexually explicit
Hacker opened her disc drive
Controlling not only computer but webcam
The hacker even listened to conversations thru the
microphone attached to the webcam
44
Safety Tips
 The worms and Trojan horse programs are
the viruses used
 Available to anyone on the Internet
 Disguised as popular movies, songs or
videos
 Student fined for spying on women
with webcam.(2005) Malaga, Spain
45
Safety Tips
3. No Camera Phones
46
Safety Tips
 Camera Phones
–Still pictures
–Video
–E-mail
47
Safety Tips
4. Beaware of Video Games and Computer
Games.
48
Safety Tips
 Video Games
Xbox System
 Chatting
 Webcams
 Xbox Live
 Computer Games
 Chatting
49
INTERNET SAFETY TIPS
5. Discuss the importance of telling you
or a trusted adult if something ever
makes your child or teen feel scared,
uncomfortable, or confused while
online.
50
INTERNET SAFETY TIPS
6. Communicate

Prepare yourself beforehand

Talk and be open with your kids and teens

Keep your cool. Be cool. Encourage them
to confide in you.
51
INTERNET SAFETY TIPS
7. Be informed
 Learn everything you can about the
Internet
 Ask your kids to show you places they go
 Learn chatroom lingo by going to
www.cybertipline.com for a list of
acronyms like POS=Parent Over Shoulder
52
“Chatroom Lingo”





















(((((((((name)))))))) - Giving so-and-so
person a hug
AKA - Also Known As
ASAP - As Soon As Possible
B4 - Before
bbl - Be Back Later
bfn - Bye For Now
brb - Be Right Back
*EG* - an evil grin
FAQ - Frequently Asked Questions
FYI - For Your Information
*G* - a grin
G2G - Got To Go
GB - Goodbye
*GBG* - a great big grin
*GBS* - a great big smile
GG - Good Game
gl - Good Luck
imho - In My Humble Opinion
imo - In My Opinion
imnsho - In My Not So Humble Opinion
kotc - Kiss On The Cheek





















kotl - Kiss On The Lips
l8r - Later
lmao - Laughing My Ass/Arse Off
lol - Laugh Out Loud
msg - Message
MYOB - Mind Your Own Business
pls - Please
rofl - Rolling On the Floor Laughing
roflmao - Rolling On Floor, Laughing My
Ass Off
*S* - a smile
ttyl - Talk To You Later
ttys - Talk To You Soon
ty - Thank You
w/ - With
*W* - a wink
wb - Welcome Back
*weg* - Wicked Evil Grin
wtf - What The F**k
yw - Your Welcome
9- Adult has entered room
99- Adult has left room
53
1-131_1_0
/\/\ y /\/4/\/\3 I$ P4[_]1_
71-1i$ i5 !337$p34x
71-1i$
51-10\/\/$
1$/\/331>31>
7r4i/\/i/\/g
54
Leetspeak
• Numbers are often used as letters. The term "leet" could be written as "1337," with "1" replacing
the letter L, "3" posing as a backwards letter E, and "7" resembling the letter T. Others include
"8" replacing the letter B, "9" used as a G, "0" (zero) in lieu of O, and so on.
• Non-alphabet characters can be used to replace the letters they resemble. For example, "5" or
even "$" can replace the letter S. Applying this style, the word "leetspeek" can be written as
"133t5p33k" or even "!337$p34k," with "4" replacing the letter A.
• Letters can be substituted for other letters that may sound alike. Using "Z" for a final letter S,
and "X" for words ending in the letters C or K is common. For example, leetspeekers might
refer to their computer "5x1llz" (skills).
• Rules of grammar are rarely obeyed. Some leetspeekers will capitalize every letter except for
vowels (LiKe THiS) and otherwise reject conventional English style and grammar, or drop
vowels from words (such as converting very to "vry").
• Mistakes are often left uncorrected. Common typing misspellings (typos) such as "teh" instead
of the are left uncorrected or sometimes adopted to replace the correct spelling.
• Non-alphanumeric characters may be combined to form letters. For example, using slashes to
create "/\/\" can substitute for the letter M, and two pipes combined with a hyphen to form "|-|"
is often used in place of the letter H. Thus, the word ham could be written as "|-|4/\/\."
55
INTERNET SAFETY TIPS
8. Consider safeguarding options
 Check out blocking, filtering and rating
applications
 Learn about filtering and monitoring software
and when to use them.
www.internetfilterreview.com
 Education is a key part of prevention.
56
Safety Tips
 Pay attention to probabilities
 No matter if high or low probabilities
 Avoid high risk situations
No opportunity No Abuse!
57
Resources
 Presentation Information provided by
NetSmartz and The National Center for
Missing and Exploited Children. (2002)
58
59
QUESTIONS?
Sgt. Paul Aleman
Cyber Crimes Unit
(512) 936-7954
[email protected]
Fly UP