1 / 16

Electronic Crimes on the E-Information Highway

Electronic Crimes on the E-Information Highway. Violent Crimes. Impact of High-Technology on Your Safety. Greater & more enduring than drugs greater influence on the uninvolved National & International economy government law enforcement Collaboration

malo
Télécharger la présentation

Electronic Crimes on the E-Information Highway

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Electronic Crimes on the E-Information Highway

  2. Violent Crimes

  3. Impact of High-Technologyon Your Safety • Greater & more enduring than drugs • greater influence on the uninvolved • National & International • economy • government • law enforcement • Collaboration • working together, individuals, & families have the power to protect themselves

  4. Computers Add New Dimensionsto Traditional Crimes • Homicide and other violent crimes (sexual assault) • Child pornography • Theft • Narcotics offenses • Fraud, counterfeiting

  5. The Increasing Cost ofComputer Crime Bank Robbery - $2,500 Bank Fraud - $25,000 Computer Crime - $500,000 Theft of Technology - $1,900,000

  6. Fraud • Auction frauds • Get-rich-quick schemes • Senior citizen scams • Phishing

  7. Theft • Personal information • Credit card numbers • Identity theft • Computer equipment

  8. Narcotics and Gambling • Narcotics distribution • Unmatched convenience • compulsive & underage gamblers • Virtual casinos • gone with a keystroke • Day trading

  9. Crimes Against Children • Child pornography • Children lured into degrading situations • Chat rooms • Children keep silent to protect family

  10. Homicide • Violent criminals use computers • to acquire critical information about the victim(s) • as a tool for communication • as a storage device for evidence about motive and methods

  11. What Can You Do to Help? • Exert your influence • Law enforcement • Legislators & elected officials • Your family & friends • Practice & preach collaboration

  12. Take Action to Protect Yourself & Your Family • Stay informed as technology changes • learn about computer-dependent crimes • network intrusions • denial of service attacks • hacking • e-mail bombs • viruses & Trojan horses • learn how not to become a victim of them

  13. Take Action toProtect Yourself & Your Family • Move home computers into family room or area • Discuss Internet crime and safety issues with your children • do it often • Never allow children to meet Internet buddies without you

  14. Take Action to Protect Yourself & Your Family • Don’t give out personal or family information • when signing up for groups • anywhere else online • Encourage Internet safety discussions in community schools, PTOs, PTAs, etc. • Support the efforts of your local law enforcement agencies

  15. Take Action to Protect Yourself & Your Family • Urge legislators and officials to address the issues • send e-mail, snail mail, telephone • Report electronic crimes to your local law enforcement authorities

  16. We Thank You For your time & interest

More Related