SlideShare a Scribd company logo
1 of 31
Cyber Crime
We’ll examine:
• Definition of Cyber Crime
• Computer Crimes
• Sexual Predator
• Cyber Stalking
• Computer Theft
Definition of Cyber Crime
• “Any illegal act involving a computer, its
systems, or its applications”
• Must be intentional – not accidental
• Types or categories of cyber Crime- 3 T’s
– Tool of the crime – traditional crime w/ a
computer
– Target of the crime – Hacking
– Tangential to the crime – drug records
Computer Crimes
• Computer Theft
• Computer Trespass
• Computer Invasion of Privacy
• Computer Forgery
• Computer Password Disclosure
Computer Crimes
All computer crimes are felonies:
• Computer Theft (15 years)
• Computer Trespass (15 years)
• Computer Invasion of Privacy (15 years)
• Computer Forgery (15 years)
• Computer Password Disclosure (1 year)
Computer Crimes
• Any person who uses a computer or computer
network with knowledge that such use is without
authority and with the intention of:
• (1) Taking or appropriating any property of
another, whether or not with the intention of
depriving the owner of possession;
• (2) Obtaining property by any deceitful means or
artful practice;
Computer Crimes (condt.)
• (3) Converting property to such person's use
in violation of an agreement or other known
legal obligation to make a specified
application or disposition of such property
• Shall be guilty of the crime of computer
theft.
Computer Trespass
• Any person who uses a computer or
computer network with knowledge that
such use is without authority and with the
intention of:
• (1) Deleting or in any way removing, either
temporarily or permanently, any computer
program or data from a computer or
computer network;
Computer Trespass
(condt.)
• (2) Obstructing, interrupting, or in any way
interfering with the use of a computer
program or data; or
• (3) Altering, damaging, or in any way
causing the malfunction of a computer,
computer network, or computer program,
regardless of how long the alteration,
damage, or malfunction persists
Computer Trespass
(condt.)
• ... shall be guilty of Computer Trespass.
Computer Invasion of Privacy
• Any person who uses a computer or computer
network with the intention of examining any
employment, medical, salary, credit, or any other
financial or personal data relating to any other
person with knowledge that such examination is
without authority shall be guilty of the crime of
computer invasion of privacy.
Computer Forgery
• Any person who creates, alters, or deletes
any data contained in any computer or
computer network, who, if such person had
created, altered, or deleted a tangible
document or instrument would have
committed forgery , shall be guilty of the
crime of computer forgery.
Computer Forgery
• The absence of a tangible writing directly
created or altered by the offender shall not
be a defense to the crime of computer
forgery if a creation, alteration, or deletion
of data was involved in lieu of a tangible
document or instrument.
Computer Password Disclosure
• Any person who discloses a number, code,
password, or other means of access to a computer
or computer network knowing that such disclosure
is without authority and which results in damages
(including the fair market value of any services
used and victim expenditure) to the owner of the
computer or computer network in excess of
$500.00 shall be guilty of the crime of computer
password disclosure.
More Computer Crimes
• Remaining computer crimes are “crime
specific,” such as
• Sexual Offenses, Stalking Offenses and
Theft Offenses
Federal Laws on Cyber Crime
• Computer Fraud and Abuse Act of 1986
– Three goals
• Confidentiality of data communications
• Integrity of data communications
• Availability of data communications
– CFAA is a general purpose cyber crime law
Intercepting Communications
• It shall be unlawful for any person
intentionally and secretly to intercept by the
use of any device, instrument, or apparatus
the contents of a message sent by telephone,
telegraph, letter, or by any other means of
private communication;
Intercepting Communications
• But, what if the police seize a computer and
discover a conversation where a crime is
discussed. That conversation, if by
telephone or telegraph, would have been
protected. Not the case with a computer.
Courts have ruled that you should know that
a computer makes a printed record, so it’s
okay for police to use it
Computer Assisted Sexual
Exploitation
• However, Legislature has
recently enacted a
misdemeanor statute that
makes the use of a computer
in the communication itself
illegal. It is directly on
point, but is it binding
Computer Assisted Sexual
Exploitation
• It shall be unlawful for any person
intentionally or willfully to utilize a
computer on-line service, Internet service,
or local bulletin board service to seduce,
solicit, lure, or entice, or attempt to
seduce, solicit, lure, or entice a child or
another person believed by such person to
be a child,
Computer Assisted Sexual
Exploitation
• (d) (1) .. to commit any illegal act ... relating to
the offense of sodomy or aggravated sodomy; ...
relating to the offense of child molestation or
aggravated child molestation; ... relating to the
offense of enticing a child for indecent purposes;
... relating to the offense of public indecency; or
to engage in any conduct that by its nature is an
unlawful sexual offense against a child.
Computer Assisted Sexual
Exploitation
• (d) (2) Any person who violates above
paragraph of this subsection shall be
guilty of a misdemeanor of a high and
aggravated nature.
Anonymity Opportunity
• Today, a sexual pervert can “hang around”
in teenage chat rooms and find suitable
victims with little risk of detection. Kids
are naturally curious anyway, but teenagers
are looking for someone who listens to
them, a need which chat rooms seem to fill.
Anonymity Opportunity
• After awhile, the “friendship” will develop
to the point that the predator can talk about
sex. Again, teenagers are naturally curious,
so this is not seen as dangerous to the
teenager.
Anonymity Opportunity
• Once the predator has established a trusting
relationship, he/she will seek to make a
physical encounter. Usually, this encounter
will be solely about sex for the predator.
There is too much danger in these
encounters to make “friendly” contacts.
Anonymity Opportunity
• The child usually seeks to get out of the
situation once she/he realizes that this
“friend” is not what was portrayed on the
Internet. However, in many instances, it is
too late to back out or stop the assault. If
the child will tell about it, capture is not
difficult as the “paper trail” is fairly easy to
follow
Cyber Stalking
What is stalking?
• (a) A person commits the offense of stalking
when he or she follows, places under surveillance,
or contacts another person at or about a place or
places without the consent of the other person for
the purpose of harassing and intimidating the other
person.
Protecting Children
(& networks)
• Keep Computer In Public Access Room
• Install Child Safe Software (Net Nanny,
Cyber Patrol, etc.)
• Know How To Track “History”
• Watch Your Child At The Computer,
Regardless of Age
• Use a FIREWALL – #1 network protection
Final points
– Number one fraud on the internet?
• Auctions!! E bay users, pay with a credit card!
– Most common computer attack?
• Viruses- “malicious logic” vs. worms
• Worms are self-replicating, death by expansion, filling hard
drive or bandwidth
– Denial of Service Attacks- it’s cyber crime
• Floods the server with data, prevents access
– Carnivore – FBI tool for internet wiretaps
• Makes a copy of email for law enforcement
– Money laundering – transfer of money from illegal
operations to legal ones - $1M weighs 30- 50 lbs!
In Closing
• Cyber Crime Is Still Crime
• Computers Offer Widespread Havoc
• Computers Have Detection Issues,
Good and Bad
• Forensic Computer Specialists Are
Vital To Crime Fighting Efforts
Thank a lot for your precious
time!
Please feel free to ask any Question….

More Related Content

What's hot

Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
 

What's hot (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Ppt
PptPpt
Ppt
 

Viewers also liked

Wireless Bomb Disposal Robot
Wireless Bomb Disposal RobotWireless Bomb Disposal Robot
Wireless Bomb Disposal Robot
Abhishek Gupta
 
Best ppt on Micro air vehicle with flapping wings
Best ppt on Micro air vehicle with flapping wingsBest ppt on Micro air vehicle with flapping wings
Best ppt on Micro air vehicle with flapping wings
Ronak Thakare
 
Wireless bomb disposal robot ppt
Wireless bomb disposal robot pptWireless bomb disposal robot ppt
Wireless bomb disposal robot ppt
Abhishek Gupta
 

Viewers also liked (12)

UNMANNED AERIAL VEHICLES
UNMANNED AERIAL VEHICLESUNMANNED AERIAL VEHICLES
UNMANNED AERIAL VEHICLES
 
Wireless Bomb Disposal Robot
Wireless Bomb Disposal RobotWireless Bomb Disposal Robot
Wireless Bomb Disposal Robot
 
Nano uav
Nano uavNano uav
Nano uav
 
Best ppt on Micro air vehicle with flapping wings
Best ppt on Micro air vehicle with flapping wingsBest ppt on Micro air vehicle with flapping wings
Best ppt on Micro air vehicle with flapping wings
 
unmanned aerial vehicle (UAV)
unmanned aerial vehicle (UAV)unmanned aerial vehicle (UAV)
unmanned aerial vehicle (UAV)
 
Micro air vehicles
Micro air vehiclesMicro air vehicles
Micro air vehicles
 
Unmanned aerial vehicles
Unmanned aerial vehiclesUnmanned aerial vehicles
Unmanned aerial vehicles
 
Wireless bomb disposal robot ppt
Wireless bomb disposal robot pptWireless bomb disposal robot ppt
Wireless bomb disposal robot ppt
 
UAV Presentation
UAV PresentationUAV Presentation
UAV Presentation
 
Drone technology
Drone technologyDrone technology
Drone technology
 
drones-an introduction to design
drones-an introduction to designdrones-an introduction to design
drones-an introduction to design
 
Drone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial VehicleDrone-Unmanned Aerial Vehicle
Drone-Unmanned Aerial Vehicle
 

Similar to Cyber Crime

What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 

Similar to Cyber Crime (20)

Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Laws -Nudrat Mufti
Cyber Laws -Nudrat MuftiCyber Laws -Nudrat Mufti
Cyber Laws -Nudrat Mufti
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Cyber Crime

  • 2. We’ll examine: • Definition of Cyber Crime • Computer Crimes • Sexual Predator • Cyber Stalking • Computer Theft
  • 3. Definition of Cyber Crime • “Any illegal act involving a computer, its systems, or its applications” • Must be intentional – not accidental • Types or categories of cyber Crime- 3 T’s – Tool of the crime – traditional crime w/ a computer – Target of the crime – Hacking – Tangential to the crime – drug records
  • 4. Computer Crimes • Computer Theft • Computer Trespass • Computer Invasion of Privacy • Computer Forgery • Computer Password Disclosure
  • 5. Computer Crimes All computer crimes are felonies: • Computer Theft (15 years) • Computer Trespass (15 years) • Computer Invasion of Privacy (15 years) • Computer Forgery (15 years) • Computer Password Disclosure (1 year)
  • 6. Computer Crimes • Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of: • (1) Taking or appropriating any property of another, whether or not with the intention of depriving the owner of possession; • (2) Obtaining property by any deceitful means or artful practice;
  • 7. Computer Crimes (condt.) • (3) Converting property to such person's use in violation of an agreement or other known legal obligation to make a specified application or disposition of such property • Shall be guilty of the crime of computer theft.
  • 8. Computer Trespass • Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of: • (1) Deleting or in any way removing, either temporarily or permanently, any computer program or data from a computer or computer network;
  • 9. Computer Trespass (condt.) • (2) Obstructing, interrupting, or in any way interfering with the use of a computer program or data; or • (3) Altering, damaging, or in any way causing the malfunction of a computer, computer network, or computer program, regardless of how long the alteration, damage, or malfunction persists
  • 10. Computer Trespass (condt.) • ... shall be guilty of Computer Trespass.
  • 11. Computer Invasion of Privacy • Any person who uses a computer or computer network with the intention of examining any employment, medical, salary, credit, or any other financial or personal data relating to any other person with knowledge that such examination is without authority shall be guilty of the crime of computer invasion of privacy.
  • 12. Computer Forgery • Any person who creates, alters, or deletes any data contained in any computer or computer network, who, if such person had created, altered, or deleted a tangible document or instrument would have committed forgery , shall be guilty of the crime of computer forgery.
  • 13. Computer Forgery • The absence of a tangible writing directly created or altered by the offender shall not be a defense to the crime of computer forgery if a creation, alteration, or deletion of data was involved in lieu of a tangible document or instrument.
  • 14. Computer Password Disclosure • Any person who discloses a number, code, password, or other means of access to a computer or computer network knowing that such disclosure is without authority and which results in damages (including the fair market value of any services used and victim expenditure) to the owner of the computer or computer network in excess of $500.00 shall be guilty of the crime of computer password disclosure.
  • 15. More Computer Crimes • Remaining computer crimes are “crime specific,” such as • Sexual Offenses, Stalking Offenses and Theft Offenses
  • 16. Federal Laws on Cyber Crime • Computer Fraud and Abuse Act of 1986 – Three goals • Confidentiality of data communications • Integrity of data communications • Availability of data communications – CFAA is a general purpose cyber crime law
  • 17. Intercepting Communications • It shall be unlawful for any person intentionally and secretly to intercept by the use of any device, instrument, or apparatus the contents of a message sent by telephone, telegraph, letter, or by any other means of private communication;
  • 18. Intercepting Communications • But, what if the police seize a computer and discover a conversation where a crime is discussed. That conversation, if by telephone or telegraph, would have been protected. Not the case with a computer. Courts have ruled that you should know that a computer makes a printed record, so it’s okay for police to use it
  • 19. Computer Assisted Sexual Exploitation • However, Legislature has recently enacted a misdemeanor statute that makes the use of a computer in the communication itself illegal. It is directly on point, but is it binding
  • 20. Computer Assisted Sexual Exploitation • It shall be unlawful for any person intentionally or willfully to utilize a computer on-line service, Internet service, or local bulletin board service to seduce, solicit, lure, or entice, or attempt to seduce, solicit, lure, or entice a child or another person believed by such person to be a child,
  • 21. Computer Assisted Sexual Exploitation • (d) (1) .. to commit any illegal act ... relating to the offense of sodomy or aggravated sodomy; ... relating to the offense of child molestation or aggravated child molestation; ... relating to the offense of enticing a child for indecent purposes; ... relating to the offense of public indecency; or to engage in any conduct that by its nature is an unlawful sexual offense against a child.
  • 22. Computer Assisted Sexual Exploitation • (d) (2) Any person who violates above paragraph of this subsection shall be guilty of a misdemeanor of a high and aggravated nature.
  • 23. Anonymity Opportunity • Today, a sexual pervert can “hang around” in teenage chat rooms and find suitable victims with little risk of detection. Kids are naturally curious anyway, but teenagers are looking for someone who listens to them, a need which chat rooms seem to fill.
  • 24. Anonymity Opportunity • After awhile, the “friendship” will develop to the point that the predator can talk about sex. Again, teenagers are naturally curious, so this is not seen as dangerous to the teenager.
  • 25. Anonymity Opportunity • Once the predator has established a trusting relationship, he/she will seek to make a physical encounter. Usually, this encounter will be solely about sex for the predator. There is too much danger in these encounters to make “friendly” contacts.
  • 26. Anonymity Opportunity • The child usually seeks to get out of the situation once she/he realizes that this “friend” is not what was portrayed on the Internet. However, in many instances, it is too late to back out or stop the assault. If the child will tell about it, capture is not difficult as the “paper trail” is fairly easy to follow
  • 27. Cyber Stalking What is stalking? • (a) A person commits the offense of stalking when he or she follows, places under surveillance, or contacts another person at or about a place or places without the consent of the other person for the purpose of harassing and intimidating the other person.
  • 28. Protecting Children (& networks) • Keep Computer In Public Access Room • Install Child Safe Software (Net Nanny, Cyber Patrol, etc.) • Know How To Track “History” • Watch Your Child At The Computer, Regardless of Age • Use a FIREWALL – #1 network protection
  • 29. Final points – Number one fraud on the internet? • Auctions!! E bay users, pay with a credit card! – Most common computer attack? • Viruses- “malicious logic” vs. worms • Worms are self-replicating, death by expansion, filling hard drive or bandwidth – Denial of Service Attacks- it’s cyber crime • Floods the server with data, prevents access – Carnivore – FBI tool for internet wiretaps • Makes a copy of email for law enforcement – Money laundering – transfer of money from illegal operations to legal ones - $1M weighs 30- 50 lbs!
  • 30. In Closing • Cyber Crime Is Still Crime • Computers Offer Widespread Havoc • Computers Have Detection Issues, Good and Bad • Forensic Computer Specialists Are Vital To Crime Fighting Efforts
  • 31. Thank a lot for your precious time! Please feel free to ask any Question….