Internet Safety and Computer Security Florida Crime Prevention Training Institute Crime Prevention Residential Applications Remember the Good Ol’ Days? Topics Scope of the Problem Growth of the Problem Top 5 National IC3 Complaints Contact Method E-mail 74% Webpage 29% Telephone 16% IM 10.3% Mail 8% Fax 3% Top Ten by Victim Florida Referred Complaints Age of Victims (National) Gender of Victims (National) Amount Lost by Fraud Type for FLORIDA Complaint Type Median $ Loss per Complaint Relationship Fraud Overpayment Fraud $ 3060 $ 2526 Spam Advance Fee Fraud Identity Theft Computer Fraud $ 1507 $ 1316 $ 1000 $ 1000 Amount Lost for FLORIDA Demographic Type Median $ Loss Under 20 20 - 29 30 - 39 40 - 49 50-59 60 and Older $ 380 $ 685 $ 688 $ 800 $ 700 $ 900 Total Florida Complaints Types of Computer Crimes ● ● ● ● ● ● ● ● ● ● ● Cyberstalking Nigerian Scam Letter Phishing Identity Theft Fraud Piracy Spyware Malware Spam Child Pornography On-line Predators Internet Hoaxes Before we talk about Computer Crimes… Internet Hoaxes What are they? ● NOT a crime ● So why should Crime prevention Officer care? ● Prevent embarrassment ! ● E-mail messages warning people about: ● A phony virus ● Malicious software program ● Urban myths Internet Hoaxes Prevention Resources ● Snopes (www.snopes.com)The online reference for Internet hoax information. ● Urban Legends at About.com (www.about.com) ● Symantec – the maker of Norton antivirus (www.symantec.com) Internet Hoaxes *77 Cell Phone Notification Advisory about contacting police by calling *77 on a cell phone. 809 Area Code Scam Warning about scammers' sending pages from the 809 area code. Wasp Spray Claim that wasp spray is a preferable alternative to pepper spray for protection against assailants. Now on to the Crimes… Cyberstalking Cyberstalking What is it? Florida Statute 784.048: "engaging in a course of conduct to communicate, or to cause to be communicated, words, images, or language by or through the use of electronic mail or electronic communication, directed at a specific person, causing substantial emotional distress to that person and serving no legitimate purpose. Cyberstalking ● ● ● ● ● ● Electronic Mail or Communications E-mail Instant Messaging Chat rooms Blogs newsgroups Forums Cyberstalking Electronic Communications: ● Text messaging ● Images ● Camera phones Cyberstalking Midemeanor or Felony (2) Any person who willfully, maliciously, and repeatedly… cyberstalks another person commits the offense of stalking, a misdemeanor of the first degree, (3) Any person who willfully, maliciously, and repeatedly… cyberstalks another person, and makes a credible threat with the intent to place that person in reasonable fear of death or bodily injury of the person, or the person's child, sibling, spouse, parent, or dependent, commits the offense of aggravated stalking, a felony of the third degree… Cyberstalking Prevention Resources FDLE Florida Computer Crime Center www.fdle.state.fl.us/Fc3/cyberstalking.html Nigerian Scam Letter Nigerian Scam Letter What is it? ● Also known as "419" fraud. ● Variation of an advance fee scheme. ● Offers the "opportunity" to share in a percentage of millions of dollars. ● Trying to transfer money illegally out of Nigeria. Nigerian Scam Letter Variations ● Other countries ● Beneficiary of a Will ● Bogus Cashiers Checks ● Donation Solicitations ● Fake Web Site ● American Soldier in Afghanistan or Iraq Nigerian Scam Letter Prevention Resources ● Forward letter to U.S. Secret Service ● Spearheading effort against these scams ● People that have lost money: ● Call local Secret Service office ● More information at FDLE website: ● http://www.fdle.state.fl.us/Fc3/nig erian.html Phishing Phishing - What is it? ● ‘Spoofed' e-mail appears to come from ● Banks ● Insurance agencies ● Retailers ● Credit card companies ● Return addresses, links, and branding ● E-mails look "official“ causing some recipients to respond to them. Phishing ● Designed to trick the recipients into disclosing personal information ● Account usernames ● Passwords ●Credit card numbers ● Social security numbers ● Home addresses Phishing Variations ● Smaller financial institutions ●Community banks ● Credit Unions ● Keyloggers replacing password stealing malicious code URLs ● Spear Phishing ● Includes your name Vishing ● Latest variations ● Fake emails don't provide URL link ● Phone number to voice mail system ● Asks for account number and password ● (Don’t forget Caller ID Spoofing) Phishing Prevention Resources ● Anti-Phishing Working Group ● www.antiphishing.org ● FDLE Florida Computer Crime Center ● www.fdle.state.fl.us/Fc3/phishing.html ● Federal Trade Commission ● www.ftc.gov (free pamphlets) Identity Theft Identity Theft ● ● ● ● What is it? Impersonation fraud. Personal ID info used to perform a fraud or criminal act. Illegal acquisition of personal information: ● Name ● Social security number ● Driver's license ● Bank/credit account numbers To engage in unlawful acts Third degree felony s. 817.568,F.S. Identity Theft Prevention Resources ● Attorney General and FDLE have website ● Designed to serve as the State of Florida's official portal for identity theft information ● www.myfloridalegal.com/identitytheft ● National ID Theft portal ● www.consumer.gov/idtheft ● Free pamphlets Fraud Fraud What is it? ● The crime of obtaining money by deceiving people. ● Advance fee fraud ● Goods never delivered ● Fake CASHIERS checks ● Lotteries ● Online auction fraud Fraud ● ● ● ● ● ● ● On-line Auctions Non-delivery of goods Bid fraud Account Hacking Misrepresentation Pirated goods Shell auctions Internet fencing Fraud E-Bay and Craigslist Fraud Prevention Resources ● www.IC3.gov ● www.FraudBureau.com ● www.Fraud.org Piracy Piracy What is it? ● Illegal copying, distribution, or use of: ● Software ● Movies ● Music Piracy ● ● ● ● Latest Trends? Lawsuits against downloaders Napster / Grokster China Camcorder movies Piracy Prevention Resources ● US Department of Justice ● http://www.usdoj.gov/criminal/cybercrime/ ● Business Software Alliance ● http://www.bsa.org/usa/ Spyware Spyware ● ● ● ● What is it? Gathers information without knowledge Secretly collects information about the user Info sent to advertisers or other parties. Can be installed on a computer: ● Part of a software virus ● Result of adding a new program ● By suspicious ex-spouse? Spyware Prevention Resources ● Complaints about spyware in the US handled by the FTC ● Anti-spyware software: ● Spybot Search and Destroy ● Microsoft Windows Defender ● AdAware ● Spy Sweeper Malware Malware What is it? ● Software used as a tool by hackers to remotely access computers as well as corrupt or destroy important data. ● Virus ● Trojan ● Worm ● Adware ● Hijackers ● Dialers Malware Prevention Resources ● Antivirus/Antispyware/Firewall programs ● www. Symantec.com ● www.Macafee.com ● www.microsoft.com Spam Spam What is it? ● Commercial advertising sent to individual users via direct e-mail messages. ● Mailing lists are created by ● Stealing or purchasing Internet mailing lists ● Searching the web for addresses using bots ● Searching forum postings. Spam The Law ● CAN SPAM Act, the "Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003" took effect on January 1, 2004. ● Established a set of strict guidelines that spammers must follow in order to continue their practices legally. Spam ● ● ● ● Florida Law The Florida Electronic Mail Communications Act. Effective July 1, 2004. No criminal penalties, only civil. Prohibits commercial electronic mail messages that falsely identify the origin or identity of the sender or contain false or misleading information in the subject line. Spam Prevention Resources ● Anti-spam software ● Spamcop ● Norton Antispam ● Outlook junk mail filter ● Anti-spam practices ● Florida Computer Crime Center ●www.fdle.state.fl.us/Fc3/spam.html ● Federal Trade Commission ●www.ftc.gov Securing the Computer Conducting a Security Survey Where is the computer located? Is your operating system updated regularly? Do you have a firewall installed? Computer Security Survey ● Have you adjusted your browser security settings to medium or higher ● Blocked pop-ups ● Activated anti-phishing filter Computer Security Survey ● Are you using an ISP or e-mail provider that offers security? ● AOL ● Earthlink ● MSN ● Yahoo Is your antivirus software up to date? Consumer Reports Magazine Do you use antispyware? Consumer Reports Magazine Do you use an antispam program? Consumer Reports Magazine Do you back up your files regularly? Do you use strong passwords? ● Weak: TopCop1 ● Strong: 482#tY-H6 ● At least 8 characters ● Mix of upper and lower case ● Mix of letters, numerals, and symbols Do you use multiple e-mail addresses? ● One for family and friends ● One throw-away for everything else online ● Free Do you use a peer-to-peer file sharing program? ● ● ● ● ● Napster Kazaa BitTorrent Gnutella BearShare Do you have a wireless network? ● Activate encryption ● Change router’s default password ● Disguise your network ● SSID ● Create a “guest list” ● MAC Social Networking Sites Social Networking SItes Social Photo Sites Child Pornography Child Pornography What is it? ● Florida Statute 847.001(3) defines child pornography as "any image depicting a minor engaged in sexual conduct." Child Pornography Newest Dangers: ● Web cams ● Increased risks to children/teens in: ● Chat ● Instant messaging ● Websites ● Newsgroups ● Blogs ● Social Networking sites ● MySpace ● Face Book Child Pornography Prevention Resources ● Safety tips for children/parents on websites ● SecureFlorida.org ● Getnetwise.org ● Missing Children Information Clearinghouse ● National Center for Missing and Exploited Children On-line Predators On-line Predators Porn is used by the offender to: ● Arouse the child ● Lower child’s inhibitions ● Demonstrate to child what they want them to do ● Communicate that a particular sex act is okay and normal for children On-line Predators Protect children by: ● Locating computer in common area ● Keep the computer in a common room in the house, not in your child's bedroom. ● Utilize parental controls provided by your service provider and/or blocking software. ● Always maintain access to your child's on-line account and randomly check his/her e-mail. Warning Signs for Parents ● You find pornography on your child's computer. ● Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize. ● Your child receives mail, gifts, or packages from someone you don't know. Warning Signs for Parents ● Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room. ● Your child is using an on-line account belonging to someone else. ● You find the computer password protected. ● Your child spends large amounts of time on-line, especially at night. Videos