By: Logan Kuehl & Kyle Hartwig. Think of “To Catch a Predator”

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Electronic Crimes on the E-Information Highway. Violent Crimes.
By Andy Scott, Michael Murray and Adam Kanopa
Part I: Making Good Online Choices
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
Implications and Security Issues of the Internet By Neelesh Patel.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
What is identity theft, and how can you protect yourself from it?
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
 The average pedophile will commit 117 sexual crimes in their lifetime.  According to the U.S. Justice Department, 33% or girls & 14% of boys are sexually.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Chapter 5 Legal & Ethical Issues; Privacy & Security Kristin Berglund Meredith Bratus Kathy Sypek.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Greg and Jamie unit 5 internet crime. INTERNET CRIME Computer crime refers to any crime that involves a computer and a network. The computer may have.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Beware! Consumer Fraud Module 9.1.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Unit 6 The unit of Financial Literacy. Credit card use Usually use if someone has no money. If over use may have to pay dept. Will have pay back the bank.
Internet Safety Dr. Steve Broskoske Misericordia University.
The Social Effect of Information System
Identity theft By: Blake D uncan.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 FSAIF – Florida Seniors Against Investment Fraud Provided by:
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
The Advantages & Disadvantages of The Internet:
Scams & Schemes Common Sense Media.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Unethical use of Computers and Networks
CYBER CRIME.
Protecting Society and helping keep people safe THE CHANGING NATURE OF POLICING SIR PETER FAHY Chief Constable.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
The Internet The Kingsway School. Drawbacks of the Internet Undesirable Material Security Finding Information Filtering.
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
KYLE GEORGE JULY 3 RD 2014 EDU-384. DO NOT SHARE ANY PERSONAL INFORMATION ONLINE: NAME, ADDRESS, CITY, STATE OR PHONE NUMBER SOCIAL SECURTIY NUMBER ANY.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Defenses Pages No Crime Has Been Committed The defendant usually must present evidence to show either… 1.There was no crime committed 2.There.
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
Computer crimes.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Identity Theft Project By: Timmy Townsend And Eric Fields.
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Anna Buchanan & Alix Gilmore. 6:43.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Protecting Your Identity From Fraud Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations.
Computer Crimes Justin A. Sarvey. Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics.
E-Fraud: Motives, Techniques, and Research Agenda Presentation at the Second Student Conference of Research in Business April 2008, HEC Montreal Muhammad.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
By: Micah Stevens Identity Theft in the World Today.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
高三年级 英语 Word study & reading, M10U4 授课者: 王时亮 湖南邵阳县第七中学
When you get caught for Identity Theft
Top Five Computer Related Crimes
Cybercrime By: Kimberly Foreiter
Phishing, Pharming, and Spam
Presentation transcript:

By: Logan Kuehl & Kyle Hartwig

Think of “To Catch a Predator”

an operation where criminal inducement is offered through use of internet designed to “create the opportunity to commit crime”.

Enticement vs Entrapment Entrapment- an officer overcoming the will of an otherwise unwilling person to commit a crime Officers and others cannot entrap persons. If it is proven to have done so the case has to be thrown out. They are allowed to entice persons.

fraud Identity theft prostitution Child pornography

Cops act like children in chat rooms Try to find pedifiles Get them to go to a specific house that they set up with cameras Cops waiting outside after the people inside find evidence that the pedifile was trying to have sex with a child If so the cops would arrest the person when they left the house

There are many internet stings done by volunteers (Pervertedjustice.com, Dateline NBC) Mostly involves child predator cases Anywhere there’s internet they can work so its cost efficient Provide the transcripts of messages to authorities who take over

Authorities set up fake business that look vulnerable Draws in criminals Trace the crime back to the criminal Sometimes requires the cooperation of other countries

In child predator cases there is high conviction rate There is lots of evidence from the transcripts usually If a predator shows up to a house it shows intent Business cases are a little less successful Usually over different countries, cooperation of different authorities is difficult They are believed to have saved thousands or maybe millions of dollars from being stolen

Site allowed perpetrators to buy and sell stolen credit cards, bank information, licenses and hacking techniques 24 criminals were caught. 11 in US, the other 13 were all from different countries on 4 different continents

Prostitution used internet advertising in San Fransico Discrete, used key words in communication with clients Police Dept. posed as clients Operation Firewall US government agencies posed as businesses Vulnerable to identity theft and credit card fraud Site led to arrest of 28 individuals throughout 6 different countries

Many argue whether or not one showing up shows intent The entrapment issue