cyberbullying & computer crimes

58
Cyberbullying Cyberbullying & Computer Crimes & Computer Crimes Chatham-Kent Police Service Crime Prevention and Community Safety

Upload: cody

Post on 10-Jan-2016

44 views

Category:

Documents


2 download

DESCRIPTION

Cyberbullying & Computer Crimes. Chatham-Kent Police Service Crime Prevention and Community Safety. What is Cyberbullying?. the use of information and communication technologies to bully, embarrass, threaten or harass another - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cyberbullying  & Computer Crimes

CyberbullyingCyberbullying & Computer Crimes & Computer Crimes

Chatham-Kent Police ServiceCrime Prevention and Community Safety

Page 2: Cyberbullying  & Computer Crimes

What is Cyberbullying?What is Cyberbullying? the use of information and communication

technologies to bully, embarrass, threaten or harass another

Millions of online users can access and witness such bullying situations

Page 3: Cyberbullying  & Computer Crimes

Communication TechnologiesCommunication Technologies Blogging - on-line diary, MySpace.com Cell Phones - camera phone with text messaging Discussion Boards, News Groups and Guest Books - often

used to make fun of others, people can add to it www.rateteacher.com

E-mail - not real time, forwarding hurtful e-mails Instant Messaging ”IM’s” - MSN, YAHOO, ICQ-Real time

chat, web cam, photos Interactive Games - bullying can occur while playing on-

line games-moderator can assist in terminating the bullying Profiles - personal information, pretend to be someone

else Websites – can be used to target victim

Page 4: Cyberbullying  & Computer Crimes

The Bully Has Come Into The Bully Has Come Into The HomeThe Home

There is no escape.Home is no longer a place to feel safe or free from the hurtful words.

Page 5: Cyberbullying  & Computer Crimes

Why Cyberspace?Why Cyberspace?Common Myths:Common Myths:

It is a virtual place to hide No witnesses No scene of the crime

Page 6: Cyberbullying  & Computer Crimes

Four Types of On-LineFour Types of On-Line Bullies Bullies

The Vengeful Angel The Power-Hungry The “Mean Girls” The Inadvertent Cyberbully or

“Because I Can”

Page 7: Cyberbullying  & Computer Crimes

The Vengeful AngelThe Vengeful Angel The victim of bullying retaliates Don’t see themselves as a bully Righting wrongs or protecting

themselves or others from the “Bad Guy”

Protecting a friend

Page 8: Cyberbullying  & Computer Crimes

Power HungryPower Hungry Like the schoolyard bullies Need an audience Want to exert their power Often brag about their actions

Page 9: Cyberbullying  & Computer Crimes

Computer SavvyComputer Savvy Often the victim of typical offline

bullying May be physically smaller The ones picked on for not being

popular enough Greater technical skills

Page 10: Cyberbullying  & Computer Crimes

““Mean Girls”Mean Girls” Done/planned in a group Entertainment Bullying other females Grows when fed by group

admiration, cliques or by the silence of others

Page 11: Cyberbullying  & Computer Crimes

Inadvertent CyberbullyInadvertent Cyberbully ““Because I can” Don’t believe they are cyberbullies Pretending to be tough online Don’t think before clicking “send”

Page 12: Cyberbullying  & Computer Crimes

How it HappensHow it Happens Flaming - - online “fights” with angry words Harassment - repeatedly sending offensive, rude,

and insulting messages Cyberstalking - repeatedly sending messages that

include threats of harm or are highly intimidating. Denigration -”Dissing” someone online. Impersonation - breaking into someone’s account,

posing as that person. Outing and Trickery - Sharing someone’s secrets.

Tricking someone into revealing secrets Exclusion - Intentionally excluding someone from

an online group, like a “buddy list”

Page 13: Cyberbullying  & Computer Crimes

BystandersBystanders Forward hurtful e-mail Visit a cyberbully’s “vote for the fat girl”

site Allow cyberbullies to take cell phone

photos or video of personal moments of others

Page 14: Cyberbullying  & Computer Crimes

Tips For The BulliedTips For The Bullied Block sender’s e-mail Change e-mail or cell phone number Don’t reply to messages from cyberbullies Don’t erase or delete messages Tell an adult Inform your ISP (Internet Service Provider) Call police if messages are threatening

Page 15: Cyberbullying  & Computer Crimes

Bully BewareBully Beware“You Can Be Found”“You Can Be Found” Internet service provider – you can be

held accountable and lose your privileges

A footprint is left on your hard drive with any messages sent

Page 16: Cyberbullying  & Computer Crimes

StatisticsStatistics In 1995 there was one hate related website. In 2004 there were 4700 hate related

websites. In Canada,14% of teens say they’ve been

threatened while using instant messaging. 16% admitted to having sent hateful

messages themselves. 75% of victims don’t call police. 25% of victims suffer in silence and never tell

anyone.

Page 17: Cyberbullying  & Computer Crimes

MisconceptionsMisconceptions Tell all - it’s okay to tell personal secrets

on the internet? I have the right to free speech? What happens on-line is just a game. It

is not real, so no one can get hurt? What happens online should stay online?

Page 18: Cyberbullying  & Computer Crimes

The Law - CyberbullyingThe Law - Cyberbullying Criminal Harassment cc 264 Utter Threats cc 264.1 Assault cc 265 Defamatory Libel cc 298(1) Extortion by Threats cc 346(1) Personation with Intent cc 403

Page 19: Cyberbullying  & Computer Crimes

Criminal Harassmentcc 264

No person shall, without lawful authority and knowing that another personis harassed or recklessly as to whether theother person is harassed engage inconduct referred to in subsection (2) thatcauses that other person reasonably, in allthe circumstances, to fear for their safetyor the safety of anyone known to them.

Page 20: Cyberbullying  & Computer Crimes

Utter Threats cc 264.1Utter Threats cc 264.1 Every one commits an offence who, in any

manner, knowingly utters, conveys or causes

any person to receive a threat

a) to cause death or bodily harm to any person

b) to burn, destroy or damage real or personal property; or

c) to kill, poison or injure an animal or bird that is the property of any person.

Page 21: Cyberbullying  & Computer Crimes

Assault cc 265Assault cc 265 A person commits an assault when:

a) without the consent of another person, he applies force intentionally to that other person, directly or indirectly;

b) he attempts or threatens, by an act or a gesture, to apply force to another person, if he has, or causes that other person to believe upon reasonable grounds that he has, present ability to effect his purpose; or

c) while openly wearing or carrying a weapon or an imitation thereof, he accosts or impedes or begs.

Page 22: Cyberbullying  & Computer Crimes

Defamatory LibelDefamatory Libel cc 298(1) & (2) cc 298(1) & (2)

Matter published without lawful justification or excuse, that is likely to injure the reputation of any person by exposing him to hatred, contempt or ridicule, or that is designed to insult the person of or concerning whom it is published.

May be expressed directly or by insinuation or irony(a) in words legibly marked upon any substance, or(b) by any object signifying a defamatory libel otherwise than by words.

Page 23: Cyberbullying  & Computer Crimes

Extortion by ThreatsExtortion by Threats

cc cc 346.1 346.1 Every one commits extortion who,

without reasonable justification or excuse

and with intent to obtain anything, by

threats, accusations, menaces or violence

induces or attempts to induce any person,

whether or not he is the person threatened,

accused or menaced or to whom violence

is shown, to do anything or cause anything

to be done.

Page 24: Cyberbullying  & Computer Crimes

Criminal HarassmentCriminal Harassmentcc 264(2)cc 264(2)

The conduct mentioned in subsection 1 consists of:(a) repeatedly following from place to place another person or anyone known to them;(b) repeatedly communicating with, either directly or indirectly, the other person or anyone known to them;(c) besetting or watching the dwelling-house, or place where the other person, or anyone known to them, resides, works, carries on business or happens to be;(d) engaging in threatening conduct directed at the other person or any member of their family.

Page 25: Cyberbullying  & Computer Crimes

Personation With IntentPersonation With Intent cc 403 cc 403

Every one who fraudulently personates any person, living or dead,(a) with intent to gain advantage for himself or another person,

(b) with intent to obtain any property or an interest in any property, or

(c) with intent to cause disadvantage to the person whom he personates or another person.

Page 26: Cyberbullying  & Computer Crimes

What Can Parents Do?What Can Parents Do? Security Software - Predator Guard -

scans all messages and “notices” when that text could be threatening to user

E-mail Tracker Pro - allows you to track Internet E-mail back to sender

Parental Controls - offers chat filtering protection for both instant messaging and chat rooms

Page 27: Cyberbullying  & Computer Crimes

What Can Parents Do?What Can Parents Do? Make it your business. Keep computer in a high traffic area of the

home. Check their online activities periodically and tell

them you will be doing this. Search for your child’s name online - check

their profiles, postings, blogs, webpages, etc. Watch out for secretive behavior online. Be a good listener. Stay calm and give your

child time to tell you how they fee. Make it clear that it’s not your child’s fault.

Page 28: Cyberbullying  & Computer Crimes

ResourcesResources www.cyberwise.ca www.cyberbullying.ca www.cybertip.ca www.transl8it.com www.safekids.com - on-line safety quiz www.stopcyberbullying.com www.wiredkids.org - on-line quiz www.bullying.org www.netbullies.com

Page 29: Cyberbullying  & Computer Crimes

Definition of Identity TheftDefinition of Identity Theft Refers to all types of crimes in which

someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.

Page 30: Cyberbullying  & Computer Crimes

How Does Identity Theft How Does Identity Theft Occur ?Occur ?

Consumers often become victims without knowing that the identity thieves have acquired their personal data.

Charging dinner at a restaurant on a credit card.

Using debit cards to purchase gasoline, rent a car, or rent a movie.

Mail theft. Conducting internet business.

Page 31: Cyberbullying  & Computer Crimes

SkimmingSkimmingIdentity thieves also “skim” or

“swipe” customer credit cards at restaurants or gas stations, using an electronic device. The skimmer records the personal information data from the magnetic strip on the back of the card. This information is then transferred to another location, where it is re-encoded onto fraudulently made credit cards.

Page 32: Cyberbullying  & Computer Crimes

Magnetic Strip ReadersMagnetic Strip Readers$90 - $120$90 - $120

Page 33: Cyberbullying  & Computer Crimes

PhishingPhishing E-mails linking users to spoofed websites.

Consumers enter personal data on web sites that appear to belong to legitimate firms.

No real connection to any businesses. 

Data is used in various fraud schemes.

Some direct you to a real site, but add a fake pop-up window.

Page 34: Cyberbullying  & Computer Crimes
Page 35: Cyberbullying  & Computer Crimes
Page 36: Cyberbullying  & Computer Crimes

An e-mail letter that was sent out as a fraud attempt disguised as an official CIBC e-mail.

This e-mail letter was in no way connected to CIBC.

It is important to note that CIBC is no more prone to such scams than any other institution.

CIBC Fraud ScamCIBC Fraud Scam

Page 37: Cyberbullying  & Computer Crimes

Dear CIBC Customer…Dear CIBC Customer,

As a customer of CIBC, the security of your personal and account information is extremely important to us. By practicing good security habits, you can help us to ensure that your private information is protected.Our new security system will help you to avoid frequently fraud transactions and to keep your investments in safety.

Due to technical update we recommend you to update your banking information of your account to update your account information we are asking you to provide CIBC all the information requested in the form, otherwise we will not be able to verify your identity and your CIBC Account's Access will be denied, you might update your records following the next link below:

www.cibconline.cibc.com/bvtrx01/script-root-tran/authentication/UpdateOnline

We appreciate your business. Its truly our pleasure to serve you.

Sincerely Canadian Imperial Bank of Commerce.

Page 38: Cyberbullying  & Computer Crimes

CIBC Scam De-BriefCIBC Scam De-Brief First and Foremost - No bank will ever send you an e-mail asking for any type of personal information.

What gave it away?

The original link was:

www.cibconline.cibc.com/bvtrx01/script-root-tran/authentication/updateinformation

When you click the hyper-link you are sent to this web address:

www.nufclearingcentre.co.uk/survey/.c/index.html

If you have a Debit Card - Think about how you originally selected your pin # - was it this transparent?

Page 39: Cyberbullying  & Computer Crimes

Ministry of Transportation Ministry of Transportation AlertAlert

An advisory was posted by the Ministry of Transportation alerting Ontario Drivers about an attempted internet scam aimed at their personal information.

Most organizations will alert their customers as soon as they are aware of an internet scam.

Personal information obtained from one scam can be used for another.

Page 40: Cyberbullying  & Computer Crimes

Public Advisory:Beware Internet E-mail Fraud

The Ministry of Transportation has recently learned that a fraudulent e-mail is being sent to members of the public. It contains a link to a web page which looks similar to the Ministry of Transportation website. It states that the ministry is updating its licence database system and requests that the recipient confirm driver license information such as name, address and driver's license number.

Do not comply with this fraudulent request. This email was not sent by the Ministry of Transportation.

We are investigating this situation. The police have been notified. Do not, under any circumstances, respond to this e-mail. If you receive further e-mails from the same source, or anyone you know receives a similar e-mail, please notify the Licensing Administration Office at [email protected] and attach the suspect e-mail to your correspondence.

To safeguard your security we recommend prudence when communicating personal information in e-mail or online. The Internet is not always a secure communications vehicle.

The Government of Ontario is committed to privacy protection. The safety and integrity of personal information are top priorities. Ontario's e-government services are built on secure technologies and processes to ensure privacy.

We do not tolerate any misuse of your personal information

Ministry of Transportation of Ontario

Page 41: Cyberbullying  & Computer Crimes

Vishing Joins Phishing Vishing Joins Phishing As Security ThreatAs Security Threat

July 11, 2006 - Just as Internet surfers have gotten wise to the fine art of phishing, along comes a new scam utilizing a new technology.

“Vishing” uses Voice Over Internet Protocol (VoIP) uses phones instead of a misdirected Web link to steal user information.

The thieves use a war dial over a VoIP system to blanket call an area. A recorded message tells the person receiving the call that their credit card has been breached and to “call the following (regional) phone number immediately.”

When the user calls the number, another message is played stating”this is account verification please enter your 16 digit account.”

The VoIP phone can recognize and capture telephone key strokes.

Protection against this Fraud- if you are concerned about a debit or credit card number being breached call the CUSTOMER SERVICE NUMBER ON THE BACK OF YOUR CARD

Page 42: Cyberbullying  & Computer Crimes

Theft From Company or Theft From Company or Government DatabasesGovernment Databases

Significant appeal of large databases.

Theft of computer hard drives and bribing employees to obtain personal data.

Hacking into databases.

Page 43: Cyberbullying  & Computer Crimes

Trojan HorsesTrojan Horses

Malicious security breaking program disguised as something benign

Example: downloading a music or movie file

=

erased disks, credit card numbers and passwords sent to strangers, computers

hijacked

Page 44: Cyberbullying  & Computer Crimes

Key LoggingKey Logging Achieved by installing software, clicking on a link, or opening an attachment.

Software is secretly installed on your computer.

All typing is recorded (online banking).

Thieves retrieve information.

Page 45: Cyberbullying  & Computer Crimes

Internet BusinessInternet Business Purchasing products on E-bay can be

risky, ensure that the seller has a good reputation.

Work with someone who has experience in making purchases on line.

Use a pay-pal account or similar banking device to funnel funds for these purchases.

Make sure that the site is secure, check for the yellow padlock icon.

Page 46: Cyberbullying  & Computer Crimes

Check Security Before Check Security Before You TypeYou Type

In Internet Explorer check the yellow lock icon in the bottom right corner.

Double click to see the security certificate. “issued to” name should match the real site name.

In the address bar look for https:// not http://

Page 47: Cyberbullying  & Computer Crimes

Digital Crooks Hone Craft Digital Crooks Hone Craft Of Phishing For SuckersOf Phishing For Suckers Fake websites are now being concocted by

phishers. Even if you clicked on the little security link, a

pop-up containing a certificate would “confirm” that you were indeed securely connected to the financial institution.

Warning do NOT respond to e-mails from financial institutions

Banks do not send out e-mails to their customers

Telephone the bank or go in person and check your accounts. Source Chatham Daily News Page 5, Sept. 12, 2006

Page 48: Cyberbullying  & Computer Crimes

If You Are A VictimIf You Are A Victim Contact your bank or credit card company

and keep a log of dates, person(s) that you spoke with and exactly what was said.

Report the matter to your local police service. Report your identity theft case to “watchdog”

agencies.

Page 49: Cyberbullying  & Computer Crimes

Contact the fraud departments of:

Trans Union Canada 1-877-525-3823 www.tuc.ca/TuCop/consumer/personalsolutions.htm

Equifax Canada 1-877-323-2598www.equifax.com/EFX_Canada

If You Are a Victim

Page 50: Cyberbullying  & Computer Crimes

If You Are A VictimIf You Are A Victim Request that a “Fraud Alert” be placed

on your files. At this time order copies of your credit reports.

Contact the fraud dept. of creditors for any accounts that have been fraudulently opened or tampered with, ie: credit card companies, phone companies, banks and other lenders.

Contact Phone Busters National Call Centre.

Page 51: Cyberbullying  & Computer Crimes

The LawThe Law Theft cc 322(1)(a) & (d) Unauthorized Use of Computer 342.1 Possession of Device to Obtain

Computer Service cc 342.2(1) Theft, Forgery, etc., of Credit Card

342(3) Fraud cc 380(1) Mischief 430(1.1)(c)

Page 52: Cyberbullying  & Computer Crimes

Theft cc 322(1)(a) & (d)Theft cc 322(1)(a) & (d) Every one commits theft who fraudulently and

without colour of right takes, or fraudulently and without colour of right converts to his use or to the use of another person, anything whether animate or inanimate, with intent,(a) to deprive, temporarily or absolutely, the owner of it or a person who has a special property or interest in it, of the thing or of his property or interest in it.(d) to deal with it in such a manner that it cannot be restored in the condition in which it was at the time it was taken or converted.

Page 53: Cyberbullying  & Computer Crimes

Unauthorized Use of Unauthorized Use of Computer cc 342.1(1)Computer cc 342.1(1)

Every one who, fraudulently and without colour of right,(a) obtains, directly or indirectly, any computer service,(b) by means of an electro-magnetic, acoustic, mechanical or other device, intercepts or causes to be intercepted, directly or indirectly, any function of a computer system,(c) uses or causes to be used, directly or indirectly, a computer system with intent to commit an offence under paragraph (a) or (b) or an offence under section 430 in relation to data or a computer system, or(d) uses, possesses, traffics in or permits another person to have access to a computer password that would enable a person to commit an offence under paragraph (a), (b) or (c)

Page 54: Cyberbullying  & Computer Crimes

Possession of Device to Possession of Device to Obtain Computer ServiceObtain Computer Service

cc 342.2(1) cc 342.2(1) Every person who, without lawful justification or

excuse, makes, possesses, sells, offers for sale or distributes any instrument or device or any component thereof, the design of which renders it primarily useful for committing an offence under section 342.1, under circumstances that give rise to a reasonable inference that the instrument, device or component has been used or is or was intended to be used to commit an offence contrary to that section.

Page 55: Cyberbullying  & Computer Crimes

Theft, Forgery, Etc., of Credit Theft, Forgery, Etc., of Credit Card cc 342(3)Card cc 342(3)

Every person who, fraudulently and without colour of right, possesses, uses, traffics in or permits another person to use credit card data, whether or not authentic, that would enable a person to use a credit card or to obtain the services that are provided by the issuer of a credit card holders.

Page 56: Cyberbullying  & Computer Crimes

FraudFraud cc 380(1) cc 380(1)

Every one who, by deceit, falsehood or other fraudulent means, whether or not it is a false pretence within the meaning of this Act, defrauds the public or any person, whether ascertained or not, of any property, money or valuable security [is guilty of an offence].

Page 57: Cyberbullying  & Computer Crimes

Mischief cc 430(1.1)(c)Mischief cc 430(1.1)(c) Everyone commits mischief who

willfully:

(a) destroys or alters data;

(b) renders data meaningless, useless, or ineffective

(c) obstructs, interrupts or interferes with the lawful use of data

Page 58: Cyberbullying  & Computer Crimes

Questions?