© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ 07458 Unit 4 Auction Fraud & Child Pornography The use of the Internet in an online.

Slides:



Advertisements
Similar presentations
E-Auctions. Electronic CommercePrentice Hall © Learning Objectives 1.Define the various types of e-auctions and list their characteristics. 2.Describe.
Advertisements

How to protect yourself, your computer, and others on the internet
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods Electronic.
Welcome to Jeopardy!.
Chapter 10 E-Auctions.
CJ 316 Seminar 4 – 1/31/11 CJ 316 Seminar
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Sex, Laws and Videos: 21st Century Sex Crimes Use of Recording Devices, Film, Cell Phones, Computers and the Internet Ginger Kimes Staff Attorney Prosecutor.
Voroat Kong ENG393 Section 501 Date: 6 th May, 2010.
Chapter #6. Section #6.1 Discuss the basic characteristics of the marketplace. List and describe the three basic components of a free enterprise system.
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of.
Internet Fraud By Brianna Byard. What is it? The Internet is a place where you can buy products, meet people, and socialize. But it is very easy for people.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Diamond: Fashion Retailing: A Multi-Channel Approach. (C) 2006 Pearson Education, Upper Saddle River, NJ All Rights Reserved Chapter 2: The Emergence.
Buying & Selling on eBay Richard Kershenbaum Endacott Society Computer Study Group
E-Commerce Michael Andrianus – Vincentius
With Internet Explorer 8© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Go! with Internet Explorer 8 Getting Started.
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods What.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
The Crime Picture Chapter 2 Frank Schmalleger Criminal Justice Today 13 th Edition.
Computers Are Your Future Tenth Edition Spotlight 2: E-Commerce Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Business & Personal Finance CONSUMER RESPONSIBILITIES.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 1.
Human Trafficking in Maryland Amanda K. Rodriguez, Esq. Manager of DV & Human Trafficking Policy Governor’s Office of Crime Control & Prevention.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Employee Guidelines for Acceptable Use of Technology Resources.
Commerce Done by: Sadoun AL-Suwaida Turki AL-Anazi.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
E-Marketplaces: Mechanisms, Tools, and Impacts of E-commerce.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Managing Online Auctions Expanded Capability Unit 8-3 Managing the Digital Enterprise Pinker, Seidmann, and Vakrat.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Tracing.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Week 7 Cyber Crimes Investigating High-Tech Crime By Michael Knetzger and Jeremy.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Dynamic Trading: E-Auctions, Bartering, and Negotiations.
© 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
E-Marketplaces: Mechanisms, Tools, and Impacts of E-commerce.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
25-1 Chapter 18 Formation of Sales and Lease Contracts.
2- PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ CRIMINALISTICS An Introduction to Forensic Science, 9/E By Richard Saferstein.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Connecting.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Software.
ONLINE SHOPPING. Refers to buying and selling of goods and services using websites accessed through the internet physical goods such as clothes and books.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
QUESTION… Is the internet bad?. GOODBad News/Finances Homework Research Shopping Games Education Sports Travel Entertainment Genealogy Pornography.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
 Project 6 Grades  Much better grades than on Project 3  Biggest “problem” was failure to address all of the areas of the assignment requirement 
What is Harassment?? Harassment is when hurtful or upsetting things are repeatedly said or done to someone. Harassment CAN: Involve physical violence.
Digital Crimes Cell Phone Computer. Malicious Use of a Telephone MCL e Threatening physical harm or damage to a person or property in the course.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Cyber Crime Awareness EFREN LAGAC FERNANDEZ II, GCTCP Police Chief Inspector Chief, Administrative Branch Chief, MIS/Forensic Sec, Investigation Branch.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Modus Operandi.
Child Pornography and Offenders
Computer Security Fundamentals
CHAPTER 33 Cyberlaw.
What is Commerce According to Dictionary.com
Virtual Child Pornography and Freedom of Expression
Chapter 5 B2B E-Commerce.
Computers and the Internet
Identity Theft Samuel H. Slater.
Presentation transcript:

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Unit 4 Auction Fraud & Child Pornography The use of the Internet in an online transaction between buyer and seller the failure to deliver or pay is fraud. The illicit sex trade has thrived for years and has been exasperated by the Internet. Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Internet Auction Fraud How does fraud occur?

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Common Forms of Auction Fraud Has anyone heard of these types of Auction Frauds ? Bid siphoning Shill bidding Bid shielding

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Bid Siphoning Con artists lure bidders off legitimate auction sites by offering to sell the “same” item at a lower price. Their intent is to trick consumers into sending money without proffering the item. By going off-site, buyers lose any protections the original site may provide, such as insurance, feedback forms, or guarantees.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Shill Bidding  When fraudulent sellers or their “shills” bid on “sellers” items to drive up the price. This is also sometimes referred to as “Phantom Bidding.”

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Bid Shielding When fraudulent buyers submit very high bids to discourage other bidders from competing for the same item and then retract those bids so that people they know can get the item at a lower price.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Auction Fraud Suspect Profile 75% male 25% female Most likely residing in California, New York, Florida, Texas, Illinois, or Ohio Average loss between $ and $ Average victim age 38.6 years

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Auction Fraud Prevention Be familiar with auction site Know available recourse action offered Examine seller feedback Know where the seller is located Note any warranties or return policies Avoid overpriced shipping costs

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Auction Fraud Investigation What is the name of the Web Site and/or web address (Uniform Resource Locator — URL) of the site that the purchase was made from? Did you save a copy of the screen that documented the transaction? Did you save any in connection with the transaction? Did you save any electronic payment receipts in connection with the transaction?

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Child Pornography Computers have become the most common way for child pornographers to share their illegal images and lure children. There are many definitions of “child pornography.” “A photographic film or other visual representation made by electronic, mechanical, or other means that depicts a child less than 18 years old engaged in or depicted to be engaged in explicit sexual activity.”

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Child Pornography, Con’t Simple cut-and-paste commands have made victimizing and sharing illegal images too simple. Multiple images can be created in seconds and shared via instant messaging, file transfer, or . The Child Pornography Prevention Act (1996) attempted to curb this.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Child Pornography Prevention Act Would have outlawed computer-generated images of minors engaged in sexual situations. Since such images, the court reasoned, do not victimize real children, they do not qualify as child pornography.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Scope of the Problem Actual number of suspects arrested are difficult to measure because it’s not tracked by the UCRs. The new NIBRs system is designed to allow for tracking pornography and child exploitation arrests. Studies estimate that 20,000 images of child pornography are posted on the Internet each week.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Scope of the Problem, Con’t Former Soviet Union is the capital of the child pornography trade. Unstable economy and high unemployment contribute to the problem. 20–30% of street children in Moscow are engaged in prostitution or production of pornographic material. Estimated that 100,000 child pornography sites exist on the Internet today.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Child Pornography Law Elements Knowingly possesses an undeveloped film, photographic negative, motion picture, videotape, computer image, or other recording: –Of a child (a person under 18 years old), –Or, person he or she should have reasonably known was under 18 years old, –Engaged in sexually explicit conduct or a sexually explicit sex act

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski Lolita Images 18-year-old “models” that look much younger to satisfy the child porn perversion and are not illegal. The Department of Defense Cyber Crime Center, using the MD5 message digest, can help identify known child pornography images.

© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Investigating High-Tech Crime By Michael Knetzger and Jeremy Muraski MD5 Message Digest An algorithm that creates a 128-bit “fingerprint” similar in appearance to an automobile Vehicle Identification Number (VIN), but much longer. Known images of child pornography are kept in this Department of Defense database, which can be searched via the MD5 message digest number that it creates.