Cyber Crime By: Benjamin Lewis, Alex Lesko, Patricia Di Pietro, & Gabbrielle Cadieux.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Electronic Crimes on the E-Information Highway. Violent Crimes.
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Measuring Cybercrime Pieter Hartel. How? Victim reporting initiatives »FBI Internet Criminal Complaint Centre Population and business surveys »CBS (Statistics.
CYBER CRIME. is a CRIMINAL activity done using COMPUTERS and INTERNET.
Chapter 14 Crime and Justice in the New Millennium
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Wireless Access Code:
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Computer Crime Team Tuna: Kevin Chu Kendric Evans Alice Nailis.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
Internet Fraud By: Noelle Woodman.
Lesson 1: Understanding Browsers. This unit is a set of investigations into how to protect against digital threats, and how to detect digital crimes.
Greg and Jamie unit 5 internet crime. INTERNET CRIME Computer crime refers to any crime that involves a computer and a network. The computer may have.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Answer these questions What is globalisation? What new crimes have emerged as a result of globalisation?
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
Military Sentinel Presentation November 19, 2008 John Krebs, Attorney Consumer Sentinel Network Program Manager Federal Trade Commission.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
CYBER CRIME.
Information Warfare Playgrounds to Battlegrounds.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.
1 Book Cover Here SECTION III SPECIAL TOPICS Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
By: Logan Kuehl & Kyle Hartwig. Think of “To Catch a Predator”
Cybercrime. Professional Hackers Paid per the job, usually flat rates State-side hackers can earn up to $200K a year The work is usually writing tools.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Information Warfare Playgrounds to Battlegrounds.
Group 1 FBI, CIA, and Homeland Security. Intoduction Original meaning of Encryption is “secrete writing” The purpose: To secure electronic commerce and.
Computer crimes.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
Cybersecurity Test Review Introduction to Digital Technology.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
Fraud and the internet Sandra Peaston Assistant Director, Insight Cifas, The UK’s Fraud Prevention Service.
14 Cybercrime.
CYBER DANGERS TASHA LYON BOISE STATE UNIVERSITY. CYBER DANGERS Cyber bullying Online Predators Cyber Crime To Stop Cyber Dangers Parent Resources Bullying.
Cyber Crime and Jurisdiction By Zach Archer COCS 380.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
What is ‘Crime’?.
A Project on CYBER SECURITY
Computer Crime CJ 520 / CJ October 27, 2010.
COMPUTER CRIME.
Cyber Crime Today we will look at: Different types of cyber-crime
Crime DOES Pay (Unless you get caught)
Prepared By : Binay Tiwari
 Available in regional language  One of the best marketing medium  Track Actions
Presentation transcript:

Cyber Crime By: Benjamin Lewis, Alex Lesko, Patricia Di Pietro, & Gabbrielle Cadieux

Types of Cyber Crime Targets Computers: –Malware –Viruses –Code –Hacking –Spam –Vandalism Uses Computers –ID Theft –Internet Scams –Cyber Stalking/Harassment/Chil d Pornography –Fraud –Drug Trafficking –Cyber Terrorism –Disposal of Illegal Goods (Black Market)

Using the Internet for Law Enforcement Pros: –More efficient –Saves resources –Easy integration & communication Cons: –Cannot execute arrests –Vulnerable to hacking/cyber attack

Cyber Crime Statistics Complaints about cyber crime rose 33% from 2007 to 2008 Since 2000 internet usage has grown 132.9% in North America 77.4% of perpetrators were male 66.1% were from the USA Statistics provided by the Internet Crime Complaint Center

Will Law Enforcement ever be able to be fully integrated into the Internet? No, the way crimes are investigated and persecuted currently require physical interaction, which makes it impossible to use solely the internet to discover, investigate, and persecute crime. Photo Credit: picturejpg.jpg