![Page 1: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/1.jpg)
Electronic Crime & Abuse
Presented by
Kingsley OgbonnaYe Tian
Mofolake Akinwonmi
![Page 2: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/2.jpg)
Outline
•Internet Fraud•Identity Theft•Computer Intrusion (i.e. Hacking)•Internet Security•Child Exploitation•Digital Media Piracy
![Page 3: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/3.jpg)
IntroductionWith the introduction of the internet, new technologically advanced crimes have evolved from old crimes.
A closer look Crimes include Fraud, Child pornography, Phishing, Spam, Cyber stalking, Denial of service and Hacking.
• Internet popularityAn opportunity for criminals to turn technology into a tool of crime and abuse.
•Internet anonymityDifficult and sometimes almost impossible to detect criminals.
![Page 4: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/4.jpg)
Internet Fraud What does it mean?
Fraud scheme that utilizes the various internet
facilities to present and commit fraudulent activities.
What are the major types?
Business-opportunity/work-at home schemes, Auction & Retail schemes online, Identity theft, Investment schemes, Credit card schemes, Advance fee fraud.
![Page 5: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/5.jpg)
Identity theft
• A current growing crime, causing individuals and governments a fortune.
• Annual cost to victims in the US is about $5 million.
Costs the UK economy £1.3billion in 2002 (cabinet office figures
2003)
![Page 6: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/6.jpg)
How identities are stolen
• Your identity can be obtained through Bin raiding, phishing, Shoulder-surfing,
Skimming cards, Spoof letters, lottery frauds etc.
• How is it used? Check fraud, credit card fraud, mortgage
fraud, and other financial crimes. To enable terrorism, illegal immigration,
obtain medical help and evade criminal prosecution.
![Page 7: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/7.jpg)
Tips on prevention
Can you protect yourself?Yes,
Don’t easily give away your data Destroy documents bearing your
personal Information Keep your important documents in a safe place. Treat your credit cards as if they are cash
![Page 8: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/8.jpg)
Computer Intrusion (i.e. Hacking)
Three Types of offence • Hacking -- breaking into computer
systems without authorization• Cracking -- breaking or removing
copy-protection on software• Phreaking -- exploring
communications (e.g. telephone) networks to gain free access, calls or information
![Page 9: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/9.jpg)
Hacking: types of attack
• Viruses - most common form of attack
• Denial of Service attacks (DoS & DDoS)
• Trojans (or Trojan horses)• Brute-Force and `Social
Engineering' Password attacks• Port scanning and spoofing• Phishing
![Page 10: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/10.jpg)
Loss caused by Hacking
Interest Harmed:• Confidentiality• Integrity• Availability• Financial loss
Computer crime cases
Target:• Private• Public• Threats to public
health or safety
![Page 11: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/11.jpg)
Internet Security
Three areas of Internet security:• Physical Security• Data Security• Server & Software Security
Three aspects of data protection:• Privacy• Integrity• Authenticity
![Page 12: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/12.jpg)
Legislation
Objective:• Protecting personal data • Promoting better access to public
data Acts:• Computer Misuse Act 1990 • Data Protection Act 1998• Freedom of Information Act 2000
![Page 13: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/13.jpg)
To be hacked or not to be,
It’s a question!
Acknowledgement
My brave Laptop…
![Page 14: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/14.jpg)
Child Exploitation On the Internet
• How much access
should children have on the Internet?
![Page 15: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/15.jpg)
Child Exploitation:
This can be described as the sexual exploitation of children through possession, distribution of child pornographic materials, and child trafficking.
Paedophile: A child sexual abuser.
Definitions
‘Child’ A young person below the age of
18 years. A person between birth and puberty who has not attained maturity.
![Page 16: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/16.jpg)
Child Exploitation Online
• The Internet has been of tremendous benefit for the child in learning and development.
• Internet has become a medium for child maltreatment, sexual and emotional abuse,
exposure to offensive material.
Paedophiles use a technique known as ‘online grooming’ to lure children into child pornography.
![Page 17: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/17.jpg)
Online Paedophile Presence - Prominence on the Web
In the U.K,
The W0nderland Club
Membership was granted when an individual could provide 10,000 pictures of children being sexually abused that would then be circulated to members worldwide.
In the U.S,
The North American Men/Boy Love Association (NAMBLA)
Their goal:
“To end the extreme oppression of men and boys in mutually consensual relationships” by “building understanding and support for such
relationships” and “educating the general public on the benevolent nature of man/boy love” (NAMBLA, 2001).
![Page 18: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/18.jpg)
Child Predators Use the Internet……
1. Provides easy access to victims i.e. children.
2.Internet provides anonymity in
identity.
3.Easy access to private details .
e.g. phone no
4. Internet chat rooms provides avenue for grooming activity.
5. Children divulge sensitive information easily through chat rooms.
6. Easy duplication and distribution of
inappropriate / pornographic materials.
![Page 19: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/19.jpg)
Preventive Measures for Child Safety Online1. Keep user names &
profiles generic and anonymous.
2. Avoid posting personal photos online.
3. Keep private
information private.
4. Keep computer in open area.
5. Remind children that unknown online ‘friends’ are strangers.
6. Be a part of your child’s online experience.
7. Be aware of phone calls, chat messages , mails sent by your child.
![Page 20: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/20.jpg)
Child Safety Online – Everyone’s Responsibility
Govt Provide virtual police services that empower children
to report crime, restricting child access to unprotected sites.
Parents Monitor, supervise child surfing activity on the
internet.Online Communities Outreaches to empower students, teachers , parents ,
and adults to safeguard the child’s online experience. Development of ‘watch dog’ organisations for online safety, software to safeguard children online.
![Page 21: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/21.jpg)
Digital Media Piracy
Piracy is an illegal theft or reproduction of creative works by owners of intellectual property. For distributors and retailers, the people who sell or rent out legitimate CDs, DVDs, the increased availability of pirate copies isa major threat to their businesses.
Pirate profiteering doesn't just affect big businesses but everyone whose livelihood relies on sales of legitimate product - from technicians to retail staff; script writers to independent shopkeepers.
![Page 22: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/22.jpg)
Producers, songwriters, artists, distributors, and retailers make
huge losses annually due to piracy.
Latest figures by the Recording Industry Association of America (RIAA) gives a total loss estimate of $ 4.2 billion worldwide each year in the recording industry. "Copyright" is a term of intellectual property law that
prohibits the unauthorized duplication, adaptation or distribution of a creative work.
Drawbacks on Music/Movie Producers Battle Against Piracy
Consumer resistance to stop illegal download of digital media.
Proliferation of File Sharing and P2P Networks For Music. Issues on consumer rights to distribution of digital media purchased.
![Page 23: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/23.jpg)
Copyright Laws & Penalties for Infringement
ACTS
1.Digital Millennium Copyright Act of 1998
2. The U.S. No Electronic Theft Law (NET Act) – 1997
3. U.S. Copyright Law
PENALTIESUnder Criminal CasesSound recording infringements is Punishable by up to:
5yrs in prison + $250,000 in fine10yrs in prison (repeat
offenders)
Online infringement is punishable up to:
3yrs in prison + $250,000 in fine6yrs in prison (repeat offenders)
Under Civil CasesIndividuals can be held liable for damages or lost profits up to:$150,000 per work infringed.
![Page 24: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/24.jpg)
Conclusion The growing trend and sophistication of internet and
identity theft frauds, suggests that increased technology and social awareness should also be enhanced if they are to be controlled.
Hacking will always exits, but with proper preventive controls, legislation, and technology, the risk can be mitigated.
A child should be given restricted access to the internet, ideally on a ‘need to know’ basis, and must be empowered to guarantee a safe online experience.
The Battle against Piracy will continue to be a Rat
Race if the motivation behind the fight against piracy is based on personal gains or financial rewards.
![Page 25: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/25.jpg)
ANY QUESTIONS?
![Page 26: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/26.jpg)
BACK
![Page 27: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/27.jpg)
BACK
![Page 28: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/28.jpg)
Next
![Page 29: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/29.jpg)
BACK
![Page 30: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/30.jpg)
BACK
![Page 31: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/31.jpg)
BACK
![Page 32: Electronic Crime & Abuse Presented by Kingsley Ogbonna Ye Tian Mofolake Akinwonmi](https://reader036.vdocument.in/reader036/viewer/2022062619/5515d79f550346dd6f8b492d/html5/thumbnails/32.jpg)
Back