1 / 58

Cyberbullying & Computer Crimes

Cyberbullying & Computer Crimes. Chatham-Kent Police Service Crime Prevention and Community Safety. What is Cyberbullying?. the use of information and communication technologies to bully, embarrass, threaten or harass another

cody
Télécharger la présentation

Cyberbullying & Computer Crimes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberbullying & Computer Crimes Chatham-Kent Police Service Crime Prevention and Community Safety

  2. What is Cyberbullying? • the use of information and communication technologies to bully, embarrass, threaten or harass another • Millions of online users can access and witness such bullying situations

  3. Blogging - on-line diary, MySpace.com Cell Phones - camera phone with text messaging Discussion Boards, News Groups and Guest Books - often used to make fun of others, people can add to it www.rateteacher.com E-mail - not real time, forwarding hurtful e-mails Instant Messaging ”IM’s” - MSN, YAHOO, ICQ-Real time chat, web cam, photos Interactive Games - bullying can occur while playing on-line games-moderator can assist in terminating the bullying Profiles - personal information, pretend to be someone else Websites – can be used to target victim Communication Technologies

  4. The Bully Has Come Into The Home There is no escape. Home is no longer a place to feel safe or free from the hurtful words.

  5. Why Cyberspace?Common Myths: • It is a virtual place to hide • No witnesses • No scene of the crime

  6. Four Types of On-Line Bullies • The Vengeful Angel • The Power-Hungry • The “Mean Girls” • The Inadvertent Cyberbully or “Because I Can”

  7. The Vengeful Angel • The victim of bullying retaliates • Don’t see themselves as a bully • Righting wrongs or protecting themselves or others from the “Bad Guy” • Protecting a friend

  8. Power Hungry • Like the schoolyard bullies • Need an audience • Want to exert their power • Often brag about their actions

  9. Computer Savvy • Often the victim of typical offline bullying • May be physically smaller • The ones picked on for not being popular enough • Greater technical skills

  10. “Mean Girls” • Done/planned in a group • Entertainment • Bullying other females • Grows when fed by group admiration, cliques or by the silence of others

  11. Inadvertent Cyberbully • “Because I can” • Don’t believe they are cyberbullies • Pretending to be tough online • Don’t think before clicking “send”

  12. How it Happens • Flaming- online “fights” with angry words • Harassment - repeatedly sending offensive, rude, and insulting messages • Cyberstalking - repeatedly sending messages that include threats of harm or are highly intimidating. • Denigration -”Dissing” someone online. • Impersonation - breaking into someone’s account, posing as that person. • Outing and Trickery - Sharing someone’s secrets. Tricking someone into revealing secrets • Exclusion - Intentionally excluding someone from an online group, like a “buddy list”

  13. Bystanders • Forward hurtful e-mail • Visit a cyberbully’s “vote for the fat girl” site • Allow cyberbullies to take cell phone photos or video of personal moments of others

  14. Block sender’s e-mail Change e-mail or cell phone number Don’t reply to messages from cyberbullies Don’t erase or delete messages Tell an adult Inform your ISP (Internet Service Provider) Call police if messages are threatening Tips For The Bullied

  15. Bully Beware“You Can Be Found” • Internet service provider – you can be held accountable and lose your privileges • A footprint is left on your hard drive with any messages sent

  16. Statistics • In 1995 there was one hate related website. • In 2004 there were 4700 hate related websites. • In Canada,14% of teens say they’ve been threatened while using instant messaging. • 16% admitted to having sent hateful messages themselves. • 75% of victims don’t call police. • 25% of victims suffer in silence and never tell anyone.

  17. Misconceptions • Tell all - it’s okay to tell personal secrets on the internet? • I have the right to free speech? • What happens on-line is just a game. It is not real, so no one can get hurt? • What happens online should stay online?

  18. The Law - Cyberbullying • Criminal Harassment cc 264 • Utter Threats cc 264.1 • Assault cc 265 • Defamatory Libel cc 298(1) • Extortion by Threats cc 346(1) • Personation with Intent cc 403

  19. Criminal Harassmentcc 264 • No person shall, without lawful authority and knowing that another person is harassed or recklessly as to whether the other person is harassed engage in conduct referred to in subsection (2) that causes that other person reasonably, in all the circumstances, to fear for their safety or the safety of anyone known to them.

  20. Utter Threats cc 264.1 • Every one commits an offence who, in any manner, knowingly utters, conveys or causes any person to receive a threat a) to cause death or bodily harm to any person b) to burn, destroy or damage real or personal property; or c) to kill, poison or injure an animal or bird that is the property of any person.

  21. Assault cc 265 • A person commits an assault when: a) without the consent of another person, he applies force intentionally to that other person, directly or indirectly; b) he attempts or threatens, by an act or a gesture, to apply force to another person, if he has, or causes that other person to believe upon reasonable grounds that he has, present ability to effect his purpose; or c) while openly wearing or carrying a weapon or an imitation thereof, he accosts or impedes or begs.

  22. Defamatory Libel cc 298(1) & (2) • Matter published without lawful justification or excuse, that is likely to injure the reputation of any person by exposing him to hatred, contempt or ridicule, or that is designed to insult the person of or concerning whom it is published. • May be expressed directly or by insinuation or irony (a) in words legibly marked upon any substance, or (b) by any object signifying a defamatory libel otherwise than by words.

  23. Extortion by Threats cc 346.1 • Every one commits extortion who, without reasonable justification or excuse and with intent to obtain anything, by threats, accusations, menaces or violence induces or attempts to induce any person, whether or not he is the person threatened, accused or menaced or to whom violence is shown, to do anything or cause anything to be done.

  24. Criminal Harassmentcc 264(2) • The conduct mentioned in subsection 1 consists of: (a) repeatedly following from place to place another person or anyone known to them; (b) repeatedly communicating with, either directly or indirectly, the other person or anyone known to them; (c) besetting or watching the dwelling-house, or place where the other person, or anyone known to them, resides, works, carries on business or happens to be; (d) engaging in threatening conduct directed at the other person or any member of their family.

  25. Personation With Intent cc 403 • Every one who fraudulently personates any person, living or dead, (a) with intent to gain advantage for himself or another person, (b) with intent to obtain any property or an interest in any property, or (c) with intent to cause disadvantage to the person whom he personates or another person.

  26. What Can Parents Do? • Security Software - Predator Guard - scans all messages and “notices” when that text could be threatening to user • E-mail Tracker Pro - allows you to track Internet E-mail back to sender • Parental Controls - offers chat filtering protection for both instant messaging and chat rooms

  27. What Can Parents Do? • Make it your business. • Keep computer in a high traffic area of the home. • Check their online activities periodically and tell them you will be doing this. • Search for your child’s name online - check their profiles, postings, blogs, webpages, etc. • Watch out for secretive behavior online. • Be a good listener. Stay calm and give your child time to tell you how they fee. • Make it clear that it’s not your child’s fault.

  28. Resources • www.cyberwise.ca • www.cyberbullying.ca • www.cybertip.ca • www.transl8it.com • www.safekids.com - on-line safety quiz • www.stopcyberbullying.com • www.wiredkids.org - on-line quiz • www.bullying.org • www.netbullies.com

  29. Definition of Identity Theft • Refers to all types of crimes in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.

  30. How Does Identity Theft Occur ? • Consumers often become victims without knowing that the identity thieves have acquired their personal data. • Charging dinner at a restaurant on a credit card. • Using debit cards to purchase gasoline, rent a car, or rent a movie. • Mail theft. • Conducting internet business.

  31. Skimming • Identity thieves also “skim” or “swipe” customer credit cards at restaurants or gas stations, using an electronic device. The skimmer records the personal information data from the magnetic strip on the back of the card. This information is then transferred to another location, where it is re-encoded onto fraudulently made credit cards.

  32. Magnetic Strip Readers$90 - $120

  33. Phishing • E-mails linking users tospoofed websites. • Consumers enter personal data on web sites that appear to belong to legitimate firms. • No real connection to any businesses.  • Data is used in various fraud schemes. • Some direct you to a real site, but add a fake pop-up window.

  34. CIBC Fraud Scam • An e-mail letter that was sent out as a fraud attempt disguised as an official CIBC e-mail. • This e-mail letter was in no way connected to CIBC. • It is important to note that CIBC is no more prone to such scams than any other institution.

  35. Dear CIBC Customer… Dear CIBC Customer, As a customer of CIBC, the security of your personal and account information is extremely important to us. By practicing good security habits, you can help us to ensure that your private information is protected.Our new security system will help you to avoid frequently fraud transactions and to keep your investments in safety. Due to technical update we recommend you to update your banking information of your account to update your account information we are asking you to provide CIBC all the information requested in the form, otherwise we will not be able to verify your identity and your CIBC Account's Access will be denied, you might update your records following the next link below: www.cibconline.cibc.com/bvtrx01/script-root-tran/authentication/UpdateOnline We appreciate your business. Its truly our pleasure to serve you. Sincerely Canadian Imperial Bank of Commerce.

  36. CIBC Scam De-Brief • First and Foremost - No bank will ever send you an e-mail asking for any type of personal information. • What gave it away? • The original link was: www.cibconline.cibc.com/bvtrx01/script-root-tran/authentication/updateinformation • When you click the hyper-link you are sent to this web address: www.nufclearingcentre.co.uk/survey/.c/index.html • If you have a Debit Card - Think about how you originally selected your pin # - was it this transparent?

  37. Ministry of Transportation Alert • An advisory was posted by the Ministry of Transportation alerting Ontario Drivers about an attempted internet scam aimed at their personal information. • Most organizations will alert their customers as soon as they are aware of an internet scam. • Personal information obtained from one scam can be used for another.

  38. Public Advisory:Beware Internet E-mail Fraud The Ministry of Transportation has recently learned that a fraudulent e-mail is being sent to members of the public. It contains a link to a web page which looks similar to the Ministry of Transportation website. It states that the ministry is updating its licence database system and requests that the recipient confirm driver license information such as name, address and driver's license number. Do not comply with this fraudulent request. This email was not sent by the Ministry of Transportation. We are investigating this situation. The police have been notified. Do not, under any circumstances, respond to this e-mail. If you receive further e-mails from the same source, or anyone you know receives a similar e-mail, please notify the Licensing Administration Office at lao@mto.gov.on.ca and attach the suspect e-mail to your correspondence. To safeguard your security we recommend prudence when communicating personal information in e-mail or online. The Internet is not always a secure communications vehicle. The Government of Ontario is committed to privacy protection. The safety and integrity of personal information are top priorities. Ontario's e-government services are built on secure technologies and processes to ensure privacy. We do not tolerate any misuse of your personal information Ministry of Transportation of Ontario

  39. Vishing Joins Phishing As Security Threat • July 11, 2006 - Just as Internet surfers have gotten wise to the fine art of phishing, along comes a new scam utilizing a new technology. • “Vishing” uses Voice Over Internet Protocol (VoIP) uses phones instead of a misdirected Web link to steal user information. • The thieves use a war dial over a VoIP system to blanket call an area. A recorded message tells the person receiving the call that their credit card has been breached and to “call the following (regional) phone number immediately.” • When the user calls the number, another message is played stating”this is account verification please enter your 16 digit account.” • The VoIP phone can recognize and capture telephone key strokes. • Protection against this Fraud- if you are concerned about a debit or credit card number being breached call the CUSTOMER SERVICE NUMBER ON THE BACK OF YOUR CARD

  40. Theft From Company or Government Databases • Significant appeal of large databases. • Theft of computer hard drives and bribing employees to obtain personal data. • Hacking into databases.

  41. Trojan Horses Malicious security breaking program disguised as something benign Example: downloading a music or movie file = erased disks, credit card numbers and passwords sent to strangers, computers hijacked

  42. Key Logging • Achieved by installing software, clicking on a link, or opening an attachment. • Software is secretly installed on your computer. • All typing is recorded (online banking). • Thieves retrieve information.

  43. Internet Business • Purchasing products on E-bay can be risky, ensure that the seller has a good reputation. • Work with someone who has experience in making purchases on line. • Use a pay-pal account or similar banking device to funnel funds for these purchases. • Make sure that the site is secure, check for the yellow padlock icon.

  44. Check Security Before You Type • In Internet Explorer check the yellow lock icon in the bottom right corner. • Double click to see the security certificate. “issued to” name should match the real site name. • In the address bar look for https:// not http://

  45. Digital Crooks Hone Craft Of Phishing For Suckers • Fake websites are now being concocted by phishers. • Even if you clicked on the little security link, a pop-up containing a certificate would “confirm” that you were indeed securely connected to the financial institution. • Warning do NOT respond to e-mails from financial institutions • Banks do not send out e-mails to their customers • Telephone the bank or go in person and check your accounts. Source Chatham Daily News Page 5, Sept. 12, 2006

  46. If You Are A Victim • Contact your bank or credit card company and keep a log of dates, person(s) that you spoke with and exactly what was said. • Report the matter to your local police service. • Report your identity theft case to “watchdog” agencies.

  47. If You Are a Victim • Contact the fraud departments of: • Trans Union Canada 1-877-525-3823 www.tuc.ca/TuCop/consumer/personalsolutions.htm • Equifax Canada 1-877-323-2598 www.equifax.com/EFX_Canada

  48. If You Are A Victim • Request that a “Fraud Alert” be placed on your files. At this time order copies of your credit reports. • Contact the fraud dept. of creditors for any accounts that have been fraudulently opened or tampered with, ie: credit card companies, phone companies, banks and other lenders. • Contact Phone Busters National Call Centre.

More Related