Lee Ellis B.A. (Hons) RFTV (Digital Media) Monday 16 February 2004 DipHE Policing Lecture support New Technology & Crime (Internet Crime)

Slides:



Advertisements
Similar presentations
A PRESENTATION FOR THE PARENTS OF MIDDLETON PRIMARY SCHOOL
Advertisements

Highfields School Miss Laming - Assistant Head Miss Hughes – Head of Year.
Internet Safety. Internet use and Social networking There may be a knowledge gap between you and your children in this area. It may be an area that you.
SESSION TEN Online Relationships. Social Networking Sites There are a number of things to think about when using social networking sites: Be careful what.
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Online safety for parents and carers How to support your children to stay safe online.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
An introduction to Child Protection and Safeguarding
Sex Offender Registration and Community Notification Meeting The purpose of community notification is to provide information to protect you and your family,
INTERNET SAFETY FOR STUDENTS
INTERNET SAFETY and Social Networking
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
Co-funded by the European Union The challenge of cyber-bullying Current situation and counter-measures by the Safer Internet Centre Germany VI. International.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Children online: Risks they might face Awareness raising session – Secondary.
Youth and the Internet Info for Parents. Internet: Strengths and Weaknesses Internet is the free exchange of ideas Little to no regulation on information.
Internet Safety Awareness
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Helping to keep your children safe online. This presentation Why is internet safety important? What are the risks? Why is the internet so great? Know.
Co-funded By the European Union INHOPE The International Association of Internet Hotlines Budapest 25 September 2012 Denton Howard INHOPE Training & Services.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Welcome… Parent Awareness Session. Media Story 21 year old media student from Surrey who…… –Arranged to meet a 14-year-old at a railway station –Had.
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
By: Zach Oltmanns.
CLICKCEOP : MSN Messenger Live CLICKCEOP : Bebo.
Cyberbullying Online Social Aggression Guidelines for Educators.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Thursday 19 th November What is Fronter? How do we use it at West Pennard? Every child from Y2-6 has their own web space in Fronter. They can customise.
© Childnet International 2008 What are the risks?.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
It’s NOT OK Awareness Raising Tools This Awareness Raising Tool has been devised for you to use at your own pace. Just press the left mouse button to move.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
© Nichola Wilkin Ltd Online Safety Quiz Start Quiz.
Children online: Risks they might face Awareness raising session – Secondary.
Activity 2 Sharing Images – The Law. Sexting
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
CYBERBULLYING Cyberbullying is when someone bullies others over the internet or on a mobile phone by sending abusive s or texts directly or by posting.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
Safe Social Networking: Parent Workshop Helping to keep your children safe online.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Sexting in Schools – How do we need to respond. Images or videos generated by children under the age of 18, or of children under the age of 18 that are.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
E-Safety A Guide for Parents and Carers. The Internet is great because…
Say Hi is a free messenger app that allows individuals to find and chat to other people. Say Hi states “Say Hi can help you find new people nearby! It.
Cyber and Internet Safety (Parents’ Night)
Redfield Educate Together
E-Safety Briefing
MyLOL bills itself as the ‘#1 teen dating site in the US, Australia, UK and Canada’ and claims to have more than 300,000 members around the world. It invites.
Sharing Images – The Law
Online Safety! By: Michelle Deng.
Tips and Information for Parents
Appropriate Use of Technology
MyLOL bills itself as the ‘#1 teen dating site in the US, Australia, UK and Canada’ and claims to have more than 300,000 members around the world. It invites.
E-safety and Social Media
Predator Identification
A Gift of Fire Third edition Sara Baase
Welcome to the E Safety Workshop
A Gift of Fire Third edition Sara Baase
Online safety.
Risks and Opportunities
Presentation transcript:

Lee Ellis B.A. (Hons) RFTV (Digital Media) Monday 16 February 2004 DipHE Policing Lecture support New Technology & Crime (Internet Crime)

New Technology & Crime The international nature of the Internet means that any attempt to deal with Internet-related crime will always be complicated by questions of jurisdiction. Laws vary from country to country and UK police have no power to intervene directly against criminal material on computers in another country or against criminals operating in another country. Efforts to combat problems such as extreme hardcore porn, racist hate crime or malicious attempts to interfere with computer systems depend upon co-operation between law enforcement agencies in different countries and, vitally, upon the voluntary co-operation of the Internet industry. The UK has recently established a National High Tech Crime Unit to deal with technology related crimes that run across conventional police boundaries and require specialist investigation skills.

New Technology & Crime UK police can only take direct action where material falls within their jurisdiction. It often happens that reported offensive websites turn out to be based in another country. However, if: the people who created the material are in the UK or if the material has been published from or downloaded onto computers in the UK or if it might be evidence of offences committed in the UK or if it might be evidence of crimes committed by UK citizens travelling abroad then it may be a matter for UK police forces.

Reporting illegal internet material through the IWF The IWF is only able to deal with material that falls into the following three categories: Child Pornography located anywhere in the world Adult material that would breach the Obscene Publications Act, but only if the offending site or service is hosted or registered in the UK. Criminally racist material - but only if it is physically hosted in the UK The procedure is as follows:

Contact the IWF If they decide action is needed they will contact... The ISP The Police The police should not be contacted directly - the IWF are qualified to judge the illegality of the material and will report it to the police if necessary. Reporting illegal internet material through the IWF

Useful Web sites:

The INHOPE Association exists to facilitate co-operation between European Internet Hotline providers. It's mission is to eliminate child pornography from the Internet and protect young people from harmful and illegal uses of the Internet.

The Safer Internet Programme concerns the promotion of safety on the Internet and is the European Union’s response to tackling the controversial issue of illegal, harmful and racist content on the Internet.

Hacking and other computer crime The Kent Police Computer Crime Unit (CCU) deals with crimes such as hacking and virus writing. Kent Police Computer Crime Unit Police HQ Sutton Road Maidstone Kent ME15 9BZ Tel: Fax:

Further Research Association of Chief Police Officers (ACPO) Computer Crime Group Good Practice Guide for Computer Based Evidence (v.2): Presented as.pdf – can be downloaded from: or viewed at:

Offensive s "Spam" or general unwanted , will not always come from where it seems to come from. In most cases spammers will use false addresses, or use other peoples s addresses, without there consent or knowledge. Police can generally only assist in criminal matters and there is little that they can do in relation to general "spam", such as commercial advertising and campaign mailing, especially if it turns out that it originates from another country. ISP’s (Internet service providers) may be able to provide advice on identifying the origin of and on selectively blocking messages. If someone is exploiting personal information in order to send unwanted e- mail they may be breaching data protection laws. In the UK the authority responsible for overseeing data protection laws is the Information Commissioner (

Viruses Police forces do not need to be notified about viruses. There are three main reasons for this: 1.A great many virus alerts are hoaxes - the forwarding of hoaxes in the belief that they are real has become such a problem that it is now sometimes classified as a type of virus in itself! 2.If viruses are ed to police forces and it is a genuine a virus then it could be passed on to the police force. 3.The IT industry and law enforcement agencies around the world have established systems to alert each other about genuine virus threats. If however, an IT systems manager believes that a possible virus may be part of an attempt to hack or otherwise misuse their companies system, they should contact their local police force. Excellent source for information can be obtained from the Unified Incident Reporting and Alert Scheme (UNIRAS). [

UNIRAS was established in 1992 with the role of gathering information on IT security incidents in Government departments and agencies, producing periodic analysis and assessment of incidents and trends, and issuing alerts and briefings on matters of IT security concern.

Internet Grooming "Grooming" is the technique that paedophiles use on the Internet to entice children into sexual activity. It is generally recognised that there are five stages in the grooming process:

Internet Grooming 1. Friendship In the chat room the perpetrator will lie about their age. They will target young people who appear vulnerable, flattering the child into talking in a private chatroom where they will be isolated. The child will often be asked for a non-sexual picture of themselves.

Internet Grooming 2. Forming a relationship By carefully asking the child what problems they may have, they create the illusion of being their best friend. At this stage, there could be an invitation to use instant messaging.

Internet Grooming 3. Risk assessment Asking the child about the location of their computer and who else has access to it in order to assess the risk of being detected. There would likely be an invitation to at this stage. The paedophile has now chosen a potential victim and is beginning to isolate the youth from others.

Internet Grooming 4. Exclusivity Creating trust, the paedophile will try to build a feeling of familiarity or comfort. Building up a sense of mutual love and trust with the child, suggesting that they can discuss "anything". The paedophile will be testing what the child will put up with.

Internet Grooming 5. Sex talk This is the stage that seriously violates boundaries. The paedophile may send pornographic images, and engage the child in explicit conversations, possibly requesting sexually explicit pictures from them. At this time the paedophile may admit to being older than they originally said (How would you feel if I were more your uncle's age?). The paedophile may ask what kind of sexual experiences the youth has had and the paedophile will usually try to arrange a meeting with the child. By this time, the youth may be using a cell phone to communicate with the perpetrator.

Further Research SEXUAL OFFENCES ACT The Sexual Offences Bill finished its passage through Parliament on 18 November and received Royal Assent on 20 November The government aim to implement the new legislation in May 2004.

Further Research 'Protecting the Public' - Home Secretary Launches Sexual Offences Bill White Paper The Home Secretary David Blunkett has published the Sexual Offences Bill white paper, providing details of the Government's proposals on the strengthening of sex offender registration and the reform of the law on sex offences. Presented as.pdf – can be downloaded from: or viewed at: al.pdf al.pdf

Further Research See handout 3 for reports from: BBC News Times Online Telegraph.co.uk (news) Guardian Unlimited

Further Information Lee Ellis (PGCE) CCCUC URL: