electronic crimes on the e-information highway. violent crimes
TRANSCRIPT
Electronic Crimes on the Electronic Crimes on the E-Information HighwayE-Information Highway
Violent CrimesViolent Crimes
Impact of High-TechnologyImpact of High-Technologyon Your Safetyon Your Safety
Impact of High-TechnologyImpact of High-Technologyon Your Safetyon Your Safety
Greater & more enduring than drugsGreater & more enduring than drugs greater influence on the uninvolvedgreater influence on the uninvolved
National & InternationalNational & International economyeconomy governmentgovernment law enforcementlaw enforcement
Collaboration Collaboration working together, individuals, & families working together, individuals, & families
have the power to protect themselveshave the power to protect themselves
Computers Add New Computers Add New DimensionsDimensions
to Traditional Crimesto Traditional Crimes
Computers Add New Computers Add New DimensionsDimensions
to Traditional Crimesto Traditional Crimes
Homicide and other violent crimes Homicide and other violent crimes (sexual assault)(sexual assault)
Child pornography Child pornography TheftTheft Narcotics offensesNarcotics offenses Fraud, counterfeitingFraud, counterfeiting
The Increasing Cost ofThe Increasing Cost ofComputer CrimeComputer Crime
The Increasing Cost ofThe Increasing Cost ofComputer CrimeComputer Crime
Bank Robbery - $2,500Bank Robbery - $2,500
Bank Fraud - $25,000Bank Fraud - $25,000
Computer Crime - $500,000Computer Crime - $500,000
Theft of Technology - $1,900,000Theft of Technology - $1,900,000
FraudFraudFraudFraud
Auction frauds
Get-rich-quick schemes
Senior citizen scams
Phishing
TheftTheftTheftTheft
Personal informationPersonal information Credit card numbersCredit card numbers Identity theftIdentity theft Computer equipmentComputer equipment
Narcotics and GamblingNarcotics and GamblingNarcotics and GamblingNarcotics and Gambling
Narcotics distribution Unmatched convenience
compulsive & underage gamblers Virtual casinos
gone with a keystroke Day trading
Crimes Against ChildrenCrimes Against ChildrenCrimes Against ChildrenCrimes Against Children
Child pornographyChild pornography Children lured into degrading Children lured into degrading
situationssituations Chat roomsChat rooms
Children keep silent to protect Children keep silent to protect familyfamily
HomicideHomicideHomicideHomicide
Violent criminals use computersViolent criminals use computers to acquire critical information about the to acquire critical information about the
victim(s)victim(s) as a tool for communicationas a tool for communication as a storage device for evidence about as a storage device for evidence about
motive and methodsmotive and methods
What Can You Do to Help?What Can You Do to Help?What Can You Do to Help?What Can You Do to Help?
Exert your influenceExert your influence Law enforcementLaw enforcement Legislators & elected officialsLegislators & elected officials Your family & friendsYour family & friends
Practice & preach collaboration Practice & preach collaboration
Take Action to Take Action to Protect Yourself & Your FamilyProtect Yourself & Your Family
Take Action to Take Action to Protect Yourself & Your FamilyProtect Yourself & Your Family
Stay informed as technology changesStay informed as technology changes learn about computer-dependent crimeslearn about computer-dependent crimes
network intrusionsnetwork intrusionsdenial of service attacksdenial of service attackshackinghackinge-mail bombse-mail bombsviruses & Trojan horsesviruses & Trojan horses
learn how not to become a victim of themlearn how not to become a victim of them
Move home computers Move home computers into family room or into family room or areaarea
Discuss Internet crime Discuss Internet crime and safety issues and safety issues
with your childrenwith your children do it oftendo it often
Take Action toTake Action toProtect Yourself & Your FamilyProtect Yourself & Your Family
Take Action toTake Action toProtect Yourself & Your FamilyProtect Yourself & Your Family
Never allow children to meet Internet buddies without you
Take Action to Take Action to Protect Yourself & Your FamilyProtect Yourself & Your Family
Take Action to Take Action to Protect Yourself & Your FamilyProtect Yourself & Your Family
Don’t give out personal or family Don’t give out personal or family informationinformation
when signing up for groupswhen signing up for groups anywhere else onlineanywhere else online
Encourage Internet safety discussions inEncourage Internet safety discussions incommunity schools, PTOs, PTAs, etc. community schools, PTOs, PTAs, etc.
Support the efforts of your local law Support the efforts of your local law enforcement agenciesenforcement agencies
Take Action to Take Action to Protect Yourself & Your FamilyProtect Yourself & Your Family
Take Action to Take Action to Protect Yourself & Your FamilyProtect Yourself & Your Family
Urge legislators and officials to Urge legislators and officials to address the issuesaddress the issues send e-mail, snail mail, telephonesend e-mail, snail mail, telephone
Report electronic crimes to your Report electronic crimes to your locallocal
law enforcement authoritieslaw enforcement authorities
For your timeFor your time
&&
interestinterest
We Thank YouWe Thank YouWe Thank YouWe Thank You