1 / 29

Internet Vulnerabilities & Criminal Activities

Learn how to stay safe on social networking sites, including tips for protecting your personal information and reporting inappropriate content. Understand the potential for crime on these sites and how they can be used in crime investigations.

mgerman
Télécharger la présentation

Internet Vulnerabilities & Criminal Activities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Vulnerabilities & Criminal Activities 4.2 – 10/3/2011 Social Networking, Cyberbullying, & Cyberstalking

  2. Is Cyberspace really a place? What should the jurisdiction be?

  3. Disinhibition “Unrestrained behavior resulting from a lessening or loss of inhibitions or a disregard of cultural constraints.”

  4. Social Networking Sites

  5. Safety Tips – MySpace • Don’t forget that your profile and MySpace forums are public spaces. • People aren't always who they say they are. • Harassment, hate speech and inappropriate content should be reported. • Don't post anything that would embarrass you later. • Don't say you're over 18 if you're not. Don't say you're younger than 18 if you're not.

  6. Safety Tips - Facebook Never share your password with anyone. Adjust your privacy settings to match your level of comfort, and review them often. Be cautious about posting and sharing personal information… Report users and content that violate our Statement of Rights and Responsibilities. Block and report anyone that sends you unwanted or inappropriate communications. Remember that while Facebook has always been based on a real name culture, and using fake names is a violation of our Statement of Rights and Responsibilities, people are not always who they say they are.

  7. Potential for Crime on Social Networking Sites Account Hijacking Spam Phishing Malware Child Exploitation Burglary Cyberbullying Cyberstalking

  8. Basis for Social Networking Site Crimes • Too Much Information!! • Personal Information • Real name • Address • Phone number • Family members • Work Information • Employer • Job position • Personal Schedule • Work schedule • Vacations

  9. Using Social Networking Sites for Crime Investigation Open Source information “Evidence Hub” Information about criminal acts Evidence of actions by known criminals Finding suspects MySpace Predator Caught by Code - http://www.wired.com/science/discoveries/news/2006/10/71948?currentPage=all

  10. Cyberbullying “The use of e-mail, instant messaging, chat rooms, pagers, cell phones, or other forms of information technology to deliberately harass, threaten, or intimidate someone.”

  11. Cyberbullying • Used more & more by children & teens • May be anonymous • Bully may be unknown to victim • Can reach a larger audience • Invades the victim’s home • No retreat from bully

  12. Methods of Cyberbullying? Text messages Pictures or videos of someone being bullied Private pictures made public Cell phone calls E-mail Chat rooms Instant messaging Websites Online threats Creating fake profiles

  13. When does Cyberbullying Become a Crime? • Computer fraud • Sexual harassment / cyber harassment • Child pornography • Physical harm / suicide • Some states have cyberbullying laws • http://www.cyberbullyalert.com/blog/category/cyber-bullying-law/ • Linda Sanchez (D, CA) – has twice (08 & 09) introduced Megan Meyer Cyberbullying Prevention Act

  14. Cyberstalking “A pattern of repeated and unwanted attention, harassment, contact, or any other course of conduct directed at a specific person that would cause a reasonable person to feel fear done via electronic means.”

  15. Goals of Cyberstalking Control of victim’s behavior Revenge Resume a previous relationship

  16. Cyberstalking Laws • All states have laws regarding stalking • California 1st in 1990 • Six states have cyberstalking laws • Illinois, Louisiana, Mississippi, North Carolina, Rhode Island, and Washington • Other states use stalking laws and harassment laws • Connecticut stalking laws - http://www.ncvc.org/SRC/main.aspx?dbID=DB_Connecticut195

  17. Types of Stalkers • Zona and colleagues (1993) – 3 types • Simple Obsessional • Erotomania • Love Obsessional • (Mullen, Pathe, Purcell, and Stuart, 1999) – 5 types based on motivation & context • The Rejected • The Intimacy Seeker • The Incompetent • The Resentful • The Predatory

  18. Simple Obsessional • A prior relationship exists between the victim and the stalker which includes the following: • Acquaintance, neighbor, customer, professional relationship, dating, and lover • The stalking behavior begins after either: • The relationship has gone “sour” • The offending individual perceives some mistreatment • The stalker begins a campaign either to rectify the schism, or to seek some type of retribution

  19. Erotomania Based on the Diagnostic Statistical Manual, 4th ed. The central theme of the delusion is that another person is in love with the individual The delusion often concerns idealized romantic love and spiritual union rather than sexual attraction — “a perfect match” The object of affection is usually of a higher status and can be a complete stranger Efforts to contact the victim are common, but the stalker may keep the delusion a secret Males, seen most often in forensic samples, come into contact with the law during misguided pursuits to “rescue” the individual from some imagined danger. Females are seen most often in clinical samples

  20. Love Obsessional • Similar to the erotomanic individuals: • The victim is almost always known through the media. • The delusion that the victim loves them may also be held • The erotomanic delusion is but one of several delusions and psychiatric symptoms — this individual has a primary psychiatric diagnosis • These individuals may be obsessed in their love, without having the belief that the target is in love with them • A campaign is begun to make his/her existence known to the victim

  21. The Rejected * As a result of a relationship dissolution (i.e. estrangement, disruptions, break-ups) from an ex-partner (but inclusive of a parent, friend, or work associate) this type of stalker can be observed desiring a mixture of reconciliation and revenge. This individual often experiences feelings of loss, frustration, anger, jealousy, malevolence, and depression. The Simple Obsessional subtype given previously closely approximates this type of stalker.

  22. The Intimacy Seeker These stalkers pursue an intimate relationship with an individual perceived as their true love, but their attentions are not wanted by the object of their affection. The type of stalkers who fall into this category often have a delusional disorder (i.e. erotomania). Those who represent "intimacy seekers" may suffer from other disorders (i.e. schizophrenia, mania) or hold morbid infatuations. Erotomania and Love Obsessional best represent this category.

  23. The Incompetent These intellectually limited and socially incompetent individuals desire intimacy, but the object of their affection does not reciprocate these feelings. They often lack sufficient skills in courting rituals. They may also display a sense of entitlement: believing they deserve a partner, but lack the ability or desire to engage in subdued, preliminary interpersonal relations. Another aspect of these stalkers is that they may have had previous stalking victims. Unlike the intimacy seekers, those in the incompetent category do not view the victim as having unique qualities; they are not infatuated with the victim -- only attracted, and do not assert that the affection is mutual.

  24. The Resentful The goal of this stalker is to frighten and distress the victim. These stalkers may also experience feelings of injustice and desire revenge.

  25. The Predatory The power and control that comes from stalking a victim gives these stalkers a great deal of enjoyment. The stalker often strives to learn more about the victim. The stalker may even mentally rehearse a plan to attack the victim. Most of these stalkers are diagnosed paraphilias and, compared to the previous four categories, they were more likely to have histories of sexual offense convictions.

  26. How Cyberstalking Differs • May be in different physical location than the victim • Stalker may use multiple online identities • The victim may not know the stalker • Stalker engages in different types of activities • Anonymity • Stalker may be embolden • Stalker may leave sparse identity clues

  27. Major Cyberstalking Behaviors E-mail stalking – direct communication via e-mail Internet stalking – global communications via the Internet Computer stalking – taking control of victim’s computer SMS – short message service & text messaging

  28. Cyberstalker’s Goal Control of victim and victim’s behavior

  29. Cybersmearing • Damaging victim’s reputation by online means • Can be more serious than physical stalking • Information can be more widespread • Information can be found online for a long time

More Related