Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Cyber Crimes. 2 3 4 5 6 Phillip Bryan Stewart txwantsome Investigator Curtis Sadler Arrested 07-31-2003 Kendall County Traveled to meet what he.

Similar presentations


Presentation on theme: "1 Cyber Crimes. 2 3 4 5 6 Phillip Bryan Stewart txwantsome Investigator Curtis Sadler Arrested 07-31-2003 Kendall County Traveled to meet what he."— Presentation transcript:

1 1 Cyber Crimes

2 2

3 3

4 4

5 5

6 6 Phillip Bryan Stewart txwantsome Investigator Curtis Sadler Arrested 07-31-2003 Kendall County Traveled to meet what he thought was a 13- year-old boy. Charged with criminal solicitation of a minor Also has a federal indictment for one count of Coercion and Enticement. Stewart was a married (now divorced) father of three children. His two boys were 10 and 12. His daughter was 8. Stewart was also a Little League baseball coach and coached basketball to minors in Junction.\ Convicted and sentenced to 5 years in prison and must register as a sex offender.

7 7 Gregory Battson battsongr8 Investigator Katherine Smith Arrested 03-25-2004 Walker County Arrested for Criminal Attempt ‑ Sexual Assault of a Child Married with children

8 8 Patrick Craig Investigator Steve May Arrested 04-20-2004 Walker County Arrested for Criminal Attempt ‑ Aggravated Sexual Assault of a Minor. College student, is single and resides with his mother. Plead guilty to Attempted Sexual Performance of a Child. Convicted and sentenced to 10 years probation, 180 days in county jail, $2,000 fine and must register as a sex offender for 20 years.

9 9 Johnathan Keith Kana Investigator Cody Smirl Hays County (Buda, Tx) Arrested 6/29/05 Kana attempted to meet what he believed was a 13 year old female. Subject will be charged with Criminal Attempt - Aggravated Sexual Assault of a Child, Criminal Attempt - Sexual Performance of a Child and Criminal Solicitation of a Minor. Kana resides in Lexington, Texas and is engaged to be married and has no children. Kana graduated in 2004 from Soutwestern University in Georgetown, Texas. Kana was attending Garrett-Evangelical Theological Seminary in pursuit of Master of Divinity and Master of Arts in Music Ministry.

10 10 National Statistics  There are 563,000 sex offenders in the U.S.  The National Center for Missing and Exploited Children.  On average, there is one child molester per square mile in the United States.  The average, child molester victimizes between 50 and 150 children before he is ever arrested.  The most common age at which sexual abuse begins is three. Age eight for girls.  Becker de, Gavin & Salter, Anna C. Ph.D.(2004). Predators:Who they are, How they Operate, and How we can protect ourselves and our children.

11 11 Objectives  The attendees will be able to recognize risks online.  The attendees will be able to define a Blog and recognize dangers of blogging.  The attendees will take a look at the characteristics of an “ideal” victim and the characteristics of an Online predeator.  The attendees will be able to recite Online Safety Tips.

12 RISKS ONLINE

13 13 RISKS FOR KIDS AND TEENS ONLINE RISKS FOR KIDS AND TEENS ONLINE Exposure to Inappropriate Material Exposure to Inappropriate Material

14 14 National Numbers  4.2 million pornographic web sites  100,000 Web sites offering child porn  68 million daily search engine requests for porn  1.5 billion monthly porn downloads  $2.5 billion Internet porn industry annual revenue. Top Ten Reviews: “Internet Filter Review”

15 15 Porn on the Internet More than 30 percent of spam,commercial e-mail, contains pornographic material. More than 30 percent of spam,commercial e-mail, contains pornographic material. Spam Recycling Center, COMTEX Newswire, 11/2/99.

16 16 Youth on the Internet According to NetValue, 27.5% of the younger population in the US (age 17 and younger) visited an adult website in Septemnber 2000. According to NetValue, 27.5% of the younger population in the US (age 17 and younger) visited an adult website in Septemnber 2000.  eStatnews, January 9, 2001.

17 17 70 percent of traffic on porn sites occurs between 9 a.m. and 5 p.m. 70 percent of traffic on porn sites occurs between 9 a.m. and 5 p.m. The Industry Standard, The National Catholic Register, 4/19/2000.

18 18 RISKS FOR KIDS AND TEENS ONLINE Sexual Solicitations

19 19 NCMEC Survey – Youth on the Internet (Ages 10 – 17)  1 in 33 received an aggressive sexual solicitation such as arranging for a meeting, called on telephone, sent them letters, etc.  1 in 4 received unwanted exposure to pictures of nude people having sex in the last year.  1in 17 was threatened or harassed.  Approximately 1 in 5 received a sexual solicitation or approach.  NCMEC (2000)

20 20 Where did this Sexual Solicitation take place?  Computer Locations –70% at home –22% at someone else’s home –4% at school –3% at library  Internet –65% in chatrooms –24% in Instant Message

21 21 RISKS FOR KIDS AND TEENS ONLINE Harassment and Bullying Harassment and Bullying

22 22 A blog (short for Web Log) is a Website of your own where you enter information ordered by date. An online diary or online journal that is shared with others online.

23 23 Blogging Stats  Myspace.com membership since January 2004 is at 84 million.  270,000 new accounts created daily.  MySpace.com is ranked No. 4 on the entire U.S. internet in terms of page hits in October.  College students make up most of the 9.5 million members on Facebook.com  Xanga’s membership has expanded to 45 million. –Wikipedia.org

24 24 Dangers of Blogging  If your real identity is tied to the blog anyone can find you.  Children and teens tend to put personal information on blogs, such as pictures, name, date of birth and location.  If personal information is not used, there can be slips which will lead to personal information.  Blogs can be password protected or they can be public. (Double edge sword)

25 25 Dangers of Blogging  Once something is posted it is there, there is no taking it back.  Many can be misunderstood by a certain comment.  This is where bullying, harassment and a misunderstanding can lead to violence.  We can not over look threats made online. Zitz, Marcy (2005) Family Internet: About Kid’s Blogs and Online Journals and Online Diaries

26 26 Recent Headlines : October 07, 2005 Missing Virginia Student Taylor Behl’s Body Identified… Suspect held on 16 Counts Child Pornography Box of Bones and Machete recovered from suspect’s home

27 27 Blog Sites  Select an Age Appropriate Blog Site- make sure other people your age are using this site.  Read the Privacy Statement-read to make to see what will happen to information you post.  Look for Support-#’s and emails in case problems arise.  Cost?-any cost involved with creating and maintaining your blog

28 28 Member of a Blog  Hide your account details  Blog Topic  Password Protect your Blog  E-mail  Use of Avatars and Photos  Hide your Profile from public view  Hide your blog from search engines-most blogs describe how to do this.

29 29 Blog Sites  Facebook  Xanga  Myspace  Espinthebottle  Tagged  Blogspot  Cpixel  Hi5  Yahoo!360

30 30 www.MYSpace.com

31 31 www.Xanga.com

32 32 www.espinthebottle.com

33 CHARATERISTICS OF AN ONLINE VICTIM

34 34

35 35 CHILDREN— THE “IDEAL” VICTIM  Naturally curious  Easily led by adults  Need for attention and affection  Need to defy parents

36 36 REPORTING THE CRIME  25% of the youth who encountered a sexual solicitation or approach told a parent.  Less than 10% of sexual solicitations were reported to authorities such as a law- enforcement agency, an Internet Service Provider, or a hotline.

37 CHARATERISTICS OF AN ONLINE PREDATOR

38 38 INTERNET SEX CRIMES AGAINST MINORS  OFFENDERS –99% were male –86% older than 25 –97% acted alone  Arrests –39% Internet Crimes Against Identified Children –25% Internet Solicitations to Undercover Law Enforcement –36% Internet Child Pornography

39 39 Texas Statistics  Beginning December 2002-May 2006; State of Texas as arrested 66 child pornographers and have convicted 44.  Cyber Crimes Unit has also arrested 83 online predators for traveling to meet what they believed to be a minor and have convicted over 50.  Fugitive Unit has arrested 333 absconders since 2003. Child Sex Offender/Parole Violators: 282 and Operation Missing Predator: 51

40 40

41 ONLINE SAFETY TIPS

42 42 INTERNET SAFETY TIPS 1. Establish rules for Internet use  What sites can your child visit  Who can they talk to?  How long will they be online  Where can they use a computer? KEEP HOUSE RULES POSTED NEAR THE COMPUTER!

43 43 INTERNET SAFETY TIPS 2. Keep the computer in a common room and no webcams. (not a child’s bedroom)

44 44 Safety Tips  Webcams: –“Hacker Uses Webcam To Spy On Family” Click2Houston.com (2004). 15 yr old female surfing Internet Typing message to girlfriend and her message turns sexually explicit Hacker opened her disc drive Controlling not only computer but webcam The hacker even listened to conversations thru the microphone attached to the webcam

45 45 Safety Tips  The worms and Trojan horse programs are the viruses used  Available to anyone on the Internet  Disguised as popular movies, songs or videos  Student fined for spying on women with webcam.(2005) Malaga, Spain

46 46 Safety Tips Safety Tips 3. No Camera Phones

47 47 Safety Tips  Camera Phones –Still pictures –Video –E-mail

48 48 Safety Tips 4. Beaware of Video Games and Computer Games.

49 49 Safety Tips  Video Games  Xbox System  Chatting  Webcams  Xbox Live  Computer Games  Chatting

50 50 INTERNET SAFETY TIPS 5. Discuss the importance of telling you or a trusted adult if something ever makes your child or teen feel scared, uncomfortable, or confused while online.

51 51 INTERNET SAFETY TIPS 6. Communicate  Prepare yourself beforehand  Talk and be open with your kids and teens  Keep your cool. Be cool. Encourage them to confide in you.

52 52 INTERNET SAFETY TIPS 7. Be informed  Learn everything you can about the Internet  Ask your kids to show you places they go  Learn chatroom lingo by going to www.cybertipline.com for a list of acronyms like POS=Parent Over Shoulder www.cybertipline.com

53 53 “Chatroom Lingo”  (((((((((name)))))))) - Giving so-and-so person a hug  AKA - Also Known As  ASAP - As Soon As Possible  B4 - Before  bbl - Be Back Later  bfn - Bye For Now  brb - Be Right Back  *EG* - an evil grin  FAQ - Frequently Asked Questions  FYI - For Your Information  *G* - a grin  G2G - Got To Go  GB - Goodbye  *GBG* - a great big grin  *GBS* - a great big smile  GG - Good Game  gl - Good Luck  imho - In My Humble Opinion  imo - In My Opinion  imnsho - In My Not So Humble Opinion  kotc - Kiss On The Cheek  kotl - Kiss On The Lips  l8r - Later  lmao - Laughing My Ass/Arse Off  lol - Laugh Out Loud  msg - Message  MYOB - Mind Your Own Business  pls - Please  rofl - Rolling On the Floor Laughing  roflmao - Rolling On Floor, Laughing My Ass Off  *S* - a smile  ttyl - Talk To You Later  ttys - Talk To You Soon  ty - Thank You  w/ - With  *W* - a wink  wb - Welcome Back  *weg* - Wicked Evil Grin  wtf - What The F**k  yw - Your Welcome  9- Adult has entered room  99- Adult has left room

54 54 1-131_1_0 /\/\ y /\/4/\/\3 I$ P4[_]1_ 71-1i$ i5 !337$p34x 71-1i$ 51-10\/\/$ 7r4i/\/i/\/g 1$/\/331>31>

55 55 Leetspeak Numbers are often used as letters. The term "leet" could be written as "1337," with "1" replacing the letter L, "3" posing as a backwards letter E, and "7" resembling the letter T. Others include "8" replacing the letter B, "9" used as a G, "0" (zero) in lieu of O, and so on. Non-alphabet characters can be used to replace the letters they resemble. For example, "5" or even "$" can replace the letter S. Applying this style, the word "leetspeek" can be written as "133t5p33k" or even "!337$p34k," with "4" replacing the letter A. Letters can be substituted for other letters that may sound alike. Using "Z" for a final letter S, and "X" for words ending in the letters C or K is common. For example, leetspeekers might refer to their computer "5x1llz" (skills). Rules of grammar are rarely obeyed. Some leetspeekers will capitalize every letter except for vowels (LiKe THiS) and otherwise reject conventional English style and grammar, or drop vowels from words (such as converting very to "vry"). Mistakes are often left uncorrected. Common typing misspellings (typos) such as "teh" instead of the are left uncorrected or sometimes adopted to replace the correct spelling. Non-alphanumeric characters may be combined to form letters. For example, using slashes to create "/\/\" can substitute for the letter M, and two pipes combined with a hyphen to form "|-|" is often used in place of the letter H. Thus, the word ham could be written as "|-|4/\/\."

56 56 INTERNET SAFETY TIPS 8. Consider safeguarding options  Check out blocking, filtering and rating applications  Learn about filtering and monitoring software and when to use them. www.internetfilterreview.com  Education is a key part of prevention.

57 57 Safety Tips  Pay attention to probabilities  No matter if high or low probabilities  Avoid high risk situations No opportunity No Abuse!

58 58 Resources  Presentation Information provided by NetSmartz and The National Center for Missing and Exploited Children. (2002)

59 59

60 QUESTIONS? Sgt. Paul Aleman Cyber Crimes Unit (512) 936-7954 Paul.aleman@oag.state.tx.us


Download ppt "1 Cyber Crimes. 2 3 4 5 6 Phillip Bryan Stewart txwantsome Investigator Curtis Sadler Arrested 07-31-2003 Kendall County Traveled to meet what he."

Similar presentations


Ads by Google