Computer Crimes - Crime Prevention HQ

advertisement
Internet Safety and
Computer Security
Florida Crime Prevention Training Institute
Crime Prevention Residential Applications
Remember the Good Ol’ Days?
Topics
Scope of the Problem
Growth of the Problem
Top 5 National IC3 Complaints
Contact Method
E-mail 74%
Webpage 29%
Telephone 16%
IM 10.3%
Mail 8%
Fax 3%
Top Ten by Victim
Florida Referred Complaints
Age of Victims (National)
Gender of Victims (National)
Amount Lost by Fraud Type for
FLORIDA
Complaint Type
Median $
Loss per
Complaint
Relationship Fraud
Overpayment Fraud
$ 3060
$ 2526
Spam
Advance Fee Fraud
Identity Theft
Computer Fraud
$ 1507
$ 1316
$ 1000
$ 1000
Amount Lost for FLORIDA
Demographic Type
Median $
Loss
Under 20
20 - 29
30 - 39
40 - 49
50-59
60 and Older
$ 380
$ 685
$ 688
$ 800
$ 700
$ 900
Total Florida Complaints
Types of Computer Crimes
●
●
●
●
●
●
●
●
●
●
●
Cyberstalking
Nigerian Scam Letter
Phishing
Identity Theft
Fraud
Piracy
Spyware
Malware
Spam
Child Pornography
On-line Predators
Internet Hoaxes
Before we talk about Computer Crimes…
Internet Hoaxes
What are they?
● NOT a crime
● So why should Crime prevention Officer
care?
● Prevent embarrassment !
● E-mail messages warning people about:
● A phony virus
● Malicious software program
● Urban myths
Internet Hoaxes
Prevention Resources
● Snopes (www.snopes.com)The online
reference for Internet hoax information.
● Urban Legends at About.com
(www.about.com)
● Symantec – the maker of Norton antivirus (www.symantec.com)
Internet Hoaxes
*77 Cell Phone Notification
Advisory about contacting police by
calling *77 on a cell phone.
809 Area Code Scam
Warning about scammers' sending
pages from the 809 area code.
Wasp Spray
Claim that wasp spray is a preferable
alternative to pepper spray for
protection against assailants.
Now on to the Crimes…
Cyberstalking
Cyberstalking
What is it?
Florida Statute 784.048: "engaging in a
course of conduct to communicate, or to
cause to be communicated, words,
images, or language by or through the
use of electronic mail or electronic
communication, directed at a specific
person, causing substantial emotional
distress to that person and serving no
legitimate purpose.
Cyberstalking
●
●
●
●
●
●
Electronic Mail or Communications
E-mail
Instant Messaging
Chat rooms
Blogs
newsgroups
Forums
Cyberstalking
Electronic Communications:
● Text messaging
● Images
● Camera phones
Cyberstalking
Midemeanor or Felony
(2) Any person who willfully, maliciously, and
repeatedly… cyberstalks another person
commits the offense of stalking, a misdemeanor
of the first degree,
(3) Any person who willfully, maliciously, and
repeatedly… cyberstalks another person, and
makes a credible threat with the intent to place
that person in reasonable fear of death or bodily
injury of the person, or the person's child,
sibling, spouse, parent, or dependent, commits
the offense of aggravated stalking, a felony of
the third degree…
Cyberstalking
Prevention Resources
FDLE Florida Computer Crime Center
www.fdle.state.fl.us/Fc3/cyberstalking.html
Nigerian Scam Letter
Nigerian Scam Letter
What is it?
● Also known as "419" fraud.
● Variation of an advance fee
scheme.
● Offers the "opportunity" to share in
a percentage of millions of dollars.
● Trying to transfer money illegally
out of Nigeria.
Nigerian Scam Letter
Variations
● Other countries
● Beneficiary of a Will
● Bogus Cashiers Checks
● Donation Solicitations
● Fake Web Site
● American Soldier in Afghanistan or
Iraq
Nigerian Scam Letter
Prevention Resources
● Forward letter to U.S. Secret
Service
● Spearheading effort against
these scams
● People that have lost money:
● Call local Secret Service office
● More information at FDLE website:
● http://www.fdle.state.fl.us/Fc3/nig
erian.html
Phishing
Phishing - What is it?
● ‘Spoofed' e-mail appears to come from
● Banks
● Insurance agencies
● Retailers
● Credit card companies
● Return addresses, links, and branding
● E-mails look "official“ causing some
recipients to respond to them.
Phishing
● Designed to trick the recipients into
disclosing personal information
● Account usernames
● Passwords
●Credit card numbers
● Social security numbers
● Home addresses
Phishing Variations
● Smaller financial institutions
●Community banks
● Credit Unions
● Keyloggers replacing password
stealing malicious code URLs
● Spear Phishing
● Includes your name
Vishing
● Latest variations
● Fake emails don't provide URL link
● Phone number to voice mail system
● Asks for account number and
password
● (Don’t forget Caller ID Spoofing)
Phishing Prevention Resources
● Anti-Phishing Working Group
● www.antiphishing.org
● FDLE Florida Computer Crime Center
● www.fdle.state.fl.us/Fc3/phishing.html
● Federal Trade Commission
● www.ftc.gov (free pamphlets)
Identity Theft
Identity Theft
●
●
●
●
What is it?
Impersonation fraud. Personal ID info used to
perform a fraud or criminal act.
Illegal acquisition of personal information:
● Name
● Social security number
● Driver's license
● Bank/credit account numbers
To engage in unlawful acts
Third degree felony s. 817.568,F.S.
Identity Theft
Prevention Resources
● Attorney General and FDLE have website
● Designed to serve as the State of Florida's
official portal for identity theft information
● www.myfloridalegal.com/identitytheft
● National ID Theft portal
● www.consumer.gov/idtheft
● Free pamphlets
Fraud
Fraud
What is it?
● The crime of obtaining money by deceiving
people.
● Advance fee fraud
● Goods never delivered
● Fake CASHIERS checks
● Lotteries
● Online auction fraud
Fraud
●
●
●
●
●
●
●
On-line Auctions
Non-delivery of goods
Bid fraud
Account Hacking
Misrepresentation
Pirated goods
Shell auctions
Internet fencing
Fraud
E-Bay and Craigslist
Fraud
Prevention Resources
● www.IC3.gov
● www.FraudBureau.com
● www.Fraud.org
Piracy
Piracy
What is it?
● Illegal copying, distribution, or use of:
● Software
● Movies
● Music
Piracy
●
●
●
●
Latest Trends?
Lawsuits against downloaders
Napster / Grokster
China
Camcorder movies
Piracy
Prevention Resources
● US Department of Justice
● http://www.usdoj.gov/criminal/cybercrime/
● Business Software Alliance
● http://www.bsa.org/usa/
Spyware
Spyware
●
●
●
●
What is it?
Gathers information without knowledge
Secretly collects information about the
user
Info sent to advertisers or other parties.
Can be installed on a computer:
● Part of a software virus
● Result of adding a new program
● By suspicious ex-spouse?
Spyware
Prevention Resources
● Complaints about spyware in the US
handled by the FTC
● Anti-spyware software:
● Spybot Search and Destroy
● Microsoft Windows Defender
● AdAware
● Spy Sweeper
Malware
Malware
What is it?
● Software used as a tool by hackers to
remotely access computers as well as
corrupt or destroy important data.
● Virus
● Trojan
● Worm
● Adware
● Hijackers
● Dialers
Malware
Prevention Resources
● Antivirus/Antispyware/Firewall programs
● www. Symantec.com
● www.Macafee.com
● www.microsoft.com
Spam
Spam
What is it?
● Commercial advertising sent to individual users
via direct e-mail messages.
● Mailing lists are created by
● Stealing or purchasing Internet mailing lists
● Searching the web for addresses using bots
● Searching forum postings.
Spam
The Law
● CAN SPAM Act, the "Controlling the Assault of
Non-Solicited Pornography and Marketing Act
of 2003" took effect on January 1, 2004.
● Established a set of strict guidelines that
spammers must follow in order to continue their
practices legally.
Spam
●
●
●
●
Florida Law
The Florida Electronic Mail
Communications Act.
Effective July 1, 2004.
No criminal penalties, only civil.
Prohibits commercial electronic mail
messages that falsely identify the origin
or identity of the sender or contain false
or misleading information in the subject
line.
Spam
Prevention Resources
● Anti-spam software
● Spamcop
● Norton Antispam
● Outlook junk mail filter
● Anti-spam practices
● Florida Computer Crime Center
●www.fdle.state.fl.us/Fc3/spam.html
● Federal Trade Commission
●www.ftc.gov
Securing the Computer
Conducting a Security
Survey
Where is the computer located?
Is your operating system updated regularly?
Do you have a firewall installed?
Computer Security Survey
● Have you adjusted your browser security
settings to medium or higher
● Blocked pop-ups
● Activated anti-phishing filter
Computer Security Survey
● Are you using an ISP or e-mail provider that
offers security?
● AOL
● Earthlink
● MSN
● Yahoo
Is your antivirus software up to date?
Consumer Reports Magazine
Do you use antispyware?
Consumer Reports Magazine
Do you use an antispam program?
Consumer Reports Magazine
Do you back up your files regularly?
Do you use strong passwords?
● Weak: TopCop1
● Strong: 482#tY-H6
● At least 8 characters
● Mix of upper and lower case
● Mix of letters, numerals, and
symbols
Do you use multiple e-mail addresses?
● One for family and friends
● One throw-away for everything else online
● Free
Do you use a peer-to-peer file sharing
program?
●
●
●
●
●
Napster
Kazaa
BitTorrent
Gnutella
BearShare
Do you have a wireless network?
● Activate encryption
● Change router’s default password
● Disguise your network
● SSID
● Create a “guest list”
● MAC
Social Networking Sites
Social Networking SItes
Social Photo Sites
Child Pornography
Child Pornography
What is it?
● Florida Statute 847.001(3) defines child
pornography as "any image depicting a
minor engaged in sexual conduct."
Child Pornography
Newest Dangers:
● Web cams
● Increased risks to children/teens in:
● Chat
● Instant messaging
● Websites
● Newsgroups
● Blogs
● Social Networking sites
● MySpace
● Face Book
Child Pornography
Prevention Resources
● Safety tips for children/parents on websites
● SecureFlorida.org
● Getnetwise.org
● Missing Children Information Clearinghouse
● National Center for Missing and Exploited
Children
On-line Predators
On-line Predators
Porn is used by the offender to:
● Arouse the child
● Lower child’s inhibitions
● Demonstrate to child what they
want them to do
● Communicate that a particular sex
act is okay and normal for children
On-line Predators
Protect children by:
● Locating computer in common area
● Keep the computer in a common room in
the house, not in your child's bedroom.
● Utilize parental controls provided by your
service provider and/or blocking
software.
● Always maintain access to your child's
on-line account and randomly check
his/her e-mail.
Warning Signs for Parents
● You find pornography on your child's
computer.
● Your child receives phone calls from
men you don't know or is making calls,
sometimes long distance, to numbers
you don't recognize.
● Your child receives mail, gifts, or
packages from someone you don't know.
Warning Signs for Parents
● Your child turns the computer monitor off
or quickly changes the screen on the
monitor when you come into the room.
● Your child is using an on-line account
belonging to someone else.
● You find the computer password
protected.
● Your child spends large amounts of time
on-line, especially at night.
Videos
Download