SlideShare une entreprise Scribd logo
1  sur  21
InformationTechnology
Act
- An overview
By: AKSHAY BHARDWAJ
Branch- I.T(C1)
PRESENTATION ONPRESENTATION ON
CYBER CRIMECYBER CRIME
Cyber Crime – “Is the Internet the
new “Wild Wild West?”
In the News…….
 1 out of 5 children received a sexual solicitation
or approach over the Internet in a one-year
period of time (www.missingchildren.com)
 California warns of massive ID theft – personal
data stolen from computers at University of
California,Berkeley (Oct 21,2004 IDG news
service)
 Microsoft and Cisco announced a new initiative
to work together to increase internet security
(Oct 18,2004 www.cnetnews.com)
The New Wild Wild West
More cyber criminals than
cyber cops
Criminals feel “safe” committing
crimes from the privacy of their
own homes
Brand new challenges facing law
enforcement
Most not trained in the
technologies
Internet crimes span multiple
jurisdictions
Need to retrofit new crimes to
existing laws
Computer Crime
Computer used to commit a
crime
Child porn, threatening email,
assuming someone’s identity,
defamation, spam, phishing
Computer as a target of a crime
 Viruses, worms, industrial
espionage, software piracy, hacking
Computer Forensics
 What is it?
 an autospy of a computer or network to uncover
digital evidence of a crime
 Evidence must be preserved and hold up in a court
of law
 Growing field – Many becoming computer
forensic savvy
 FBI, State and Local Police, IRS, Homeland Security
 Defense attorneys, judges and prosecutors
 Independent security agencies
 White hat or Ethical Hackers
 Programs offered at major universities such as URI
http://homepage.cs.uri.edu/faculty/wolfe/cf
Uncovering Digital Evidence
Smart Criminals don’t use their own
computers
 Floppy disks
 Zip/Jazz disks
 Tapes
 Digital cameras
 Memory sticks
 Printers
 CDs
 PDAs
 Game boxes
 Networks
 Hard drives
Digital Evidence
Criminals Hide Evidence
 Delete their files and emails
 Hide their files by encryption, password
protection, or embedding them in
unrelated files (dll, os etc)
 Use Wi-Fi networks and cyber cafes to
cover their tracks
Forensics Uncover Evidence
 Restore deleted files and emails – they are
still really there!
 Find the hidden files through complex
password, encryption programs, and
searching techniques
 Track them down through the digital trail -
IP addresses to ISPs to the offender
Not obvious…….it’s most likely hidden on purpose
or needs to be unearthed by forensics experts
The Crime Scene
(with Computer Forensics)
 Similar to traditional crime scenes
 Must acquire the evidence while preserving the
integrity of the evidence
 No damage during collection, transportation,
or storage
 Document everything
 Collect everything the first time
 Establish a chain of custody
 But also different…….
 Can perform analysis of evidence on exact
copy!
 Make many copies and investigate them
without touching original
 Can use time stamping/hash code techniques
to prove evidence hasn’t been compromised
Spam
Viruses/Worms
Industrial Espionage and Hackers
Wi-Fi High Jacking
Top Cyber Crimes that Attack
Business
Spam
“Spam accounts for 9 out of every 10 emails in the
United States.”
“We do not object to the use of this slang term to describe
UCE (unsolicited commercial email),although we do
object to the use of the word“spam”as a trademark and
the use of our product image in association with that
term”
Can-Spam Act of 2003
 Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can-
Spam)
 Signed into law by President Bush on Dec 16, 2003
 Took effect Jan 1, 2004
 Unsolicited commercial email must:
 Be labeled
 Include Opt-Out instructions
 No false headers
 FTC is authorized (but not required) to establish a “do-not-email” registry
 www.spamlaws.com –lists all the latest in federal, state, and international laws
Spam is Hostile
 You pay for Spam, not Spammers
 Email costs are paid by email recipients
 Spam can be dangerous
 Never click on the opt-out link!
 May take you to hostile web site where mouse-
over downloads an .exe
 Tells spammers they found a working address
 They won’t take you off the list anyway
 What should you do?
 Filter it out whenever possible
 Keep filters up to date
 If you get it, just delete the email
Viruses and Worms
 Different types of “ailments”
 Viruses
 software that piggybacks on other
software and runs when you run
something else
 Macro in excel, word
 Transmitted through sharing programs
on bulletin boards
 Passing around floppy disks
 An .exe, .com file in your email
 Worms
 software that uses computer networks
to find security holes to get in to your
computer – usually in Microsoft OS!!
But worm for MAC was recently
written
Hackers are Everywhere
 Stealing data
 Industrial Espionage
 Identity theft
 Defamation
 Deleting data for fun
 A lot of bored 16 year olds late at night
 Turning computers into zombies
 To commit crimes
 Take down networks
 Distribute porn
 Harass someone
 Ethical/white hat hackers exist too
 Help break into networks to prevent crimes
Mafia Boy
Wireless Fidelity (Wi-Fi)
Using antennas to create “hot spots”
Hotspots – Internet Access (sometimes free)
Newport Harbor -All the boats in Harbor have internet access
San Francisco Giants Stadium – Surf the web while catching a game
UMass (need to register, but it’s free)
Cambridge, MA
Philadelphia, PA – just announced – entire city by 2006
Wi-Fi High Jacking
60-70% wireless networks are wide open
Why are the Wi-Fi networks unprotected?
Most people say “Our data is boring”
But… criminals look for wireless networks to commit their
crimes
And… the authorities will come knocking on your door…..
Protect your Computers!
 Use anti-virus software and
firewalls - keep them up to date
 Keep your operating system up to
date with critical security updates
and patches
 Don't open emails or attachments
from unknown sources
 Use hard-to-guess passwords.
Don’t use words found in a
dictionary. Remember that
password cracking tools exist
 Back-up your computer data on
disks or CDs often
 Don't share access to your
computers with strangers
 If you have a wi-fi network,
password protect it
 Disconnect from the Internet when
not in use
 Reevaluate your security on a
regular basis
 Make sure your employees and
family members know this info
too!
Web sites of Interest
http://homepage.cs.uri.edu/faculty/wolfe/cf
www.missingchildren.com
www.spamlaws.com
www.netsmartz.org
http://www.ifccfbi.gov - operation web snare – latest cyber
crimes to be aware of
http://www.dcfl.gov/dc3/home.htm
http://www.cops.org/
Thank you!
QUERY !

Contenu connexe

Tendances

C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
sunnysmith
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
Elizabeth Hall
 

Tendances (20)

[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
Ethics piracy
Ethics piracyEthics piracy
Ethics piracy
 

En vedette

Responsive HTML Email for iOS
Responsive HTML Email for iOSResponsive HTML Email for iOS
Responsive HTML Email for iOS
Steve Noone
 
Kauri ph presentation 2012 11 22 full
Kauri ph presentation 2012 11 22 fullKauri ph presentation 2012 11 22 full
Kauri ph presentation 2012 11 22 full
Nhel Nobleza
 
Healthcare Open House Presentation
Healthcare Open House PresentationHealthcare Open House Presentation
Healthcare Open House Presentation
jbyers2
 
50 images of brassai's works
50 images of brassai's works50 images of brassai's works
50 images of brassai's works
Stephanie Mizzi
 
How To Survive The Zombie Apocalypse
How To Survive The Zombie ApocalypseHow To Survive The Zombie Apocalypse
How To Survive The Zombie Apocalypse
elbryan108
 

En vedette (11)

Responsive HTML Email for iOS
Responsive HTML Email for iOSResponsive HTML Email for iOS
Responsive HTML Email for iOS
 
Kauri ph presentation 2012 11 22 full
Kauri ph presentation 2012 11 22 fullKauri ph presentation 2012 11 22 full
Kauri ph presentation 2012 11 22 full
 
Healthcare Open House Presentation
Healthcare Open House PresentationHealthcare Open House Presentation
Healthcare Open House Presentation
 
Xmed 2015 Lucien Engelen
Xmed 2015 Lucien EngelenXmed 2015 Lucien Engelen
Xmed 2015 Lucien Engelen
 
Organics recovery mass recycle r3 gogan
Organics recovery mass recycle r3 goganOrganics recovery mass recycle r3 gogan
Organics recovery mass recycle r3 gogan
 
The road to the future : how technology is changing the way we consider autom...
The road to the future : how technology is changing the way we consider autom...The road to the future : how technology is changing the way we consider autom...
The road to the future : how technology is changing the way we consider autom...
 
50 images of brassai's works
50 images of brassai's works50 images of brassai's works
50 images of brassai's works
 
How To Survive The Zombie Apocalypse
How To Survive The Zombie ApocalypseHow To Survive The Zombie Apocalypse
How To Survive The Zombie Apocalypse
 
Bill Gates
Bill GatesBill Gates
Bill Gates
 
Social Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of AgeSocial Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of Age
 
Untitled.fr11
Untitled.fr11Untitled.fr11
Untitled.fr11
 

Similaire à Cybercrime and IT ACT

cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
Ajay Singh
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
ravikanthh
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
netapprad
 

Similaire à Cybercrime and IT ACT (20)

Cybercrimeg
CybercrimegCybercrimeg
Cybercrimeg
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Information security
Information securityInformation security
Information security
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Dernier (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Cybercrime and IT ACT

  • 1. InformationTechnology Act - An overview By: AKSHAY BHARDWAJ Branch- I.T(C1) PRESENTATION ONPRESENTATION ON CYBER CRIMECYBER CRIME
  • 2. Cyber Crime – “Is the Internet the new “Wild Wild West?”
  • 3. In the News…….  1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time (www.missingchildren.com)  California warns of massive ID theft – personal data stolen from computers at University of California,Berkeley (Oct 21,2004 IDG news service)  Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18,2004 www.cnetnews.com)
  • 4. The New Wild Wild West More cyber criminals than cyber cops Criminals feel “safe” committing crimes from the privacy of their own homes Brand new challenges facing law enforcement Most not trained in the technologies Internet crimes span multiple jurisdictions Need to retrofit new crimes to existing laws
  • 5. Computer Crime Computer used to commit a crime Child porn, threatening email, assuming someone’s identity, defamation, spam, phishing Computer as a target of a crime  Viruses, worms, industrial espionage, software piracy, hacking
  • 6. Computer Forensics  What is it?  an autospy of a computer or network to uncover digital evidence of a crime  Evidence must be preserved and hold up in a court of law  Growing field – Many becoming computer forensic savvy  FBI, State and Local Police, IRS, Homeland Security  Defense attorneys, judges and prosecutors  Independent security agencies  White hat or Ethical Hackers  Programs offered at major universities such as URI http://homepage.cs.uri.edu/faculty/wolfe/cf
  • 7. Uncovering Digital Evidence Smart Criminals don’t use their own computers  Floppy disks  Zip/Jazz disks  Tapes  Digital cameras  Memory sticks  Printers  CDs  PDAs  Game boxes  Networks  Hard drives
  • 8. Digital Evidence Criminals Hide Evidence  Delete their files and emails  Hide their files by encryption, password protection, or embedding them in unrelated files (dll, os etc)  Use Wi-Fi networks and cyber cafes to cover their tracks Forensics Uncover Evidence  Restore deleted files and emails – they are still really there!  Find the hidden files through complex password, encryption programs, and searching techniques  Track them down through the digital trail - IP addresses to ISPs to the offender Not obvious…….it’s most likely hidden on purpose or needs to be unearthed by forensics experts
  • 9. The Crime Scene (with Computer Forensics)  Similar to traditional crime scenes  Must acquire the evidence while preserving the integrity of the evidence  No damage during collection, transportation, or storage  Document everything  Collect everything the first time  Establish a chain of custody  But also different…….  Can perform analysis of evidence on exact copy!  Make many copies and investigate them without touching original  Can use time stamping/hash code techniques to prove evidence hasn’t been compromised
  • 10. Spam Viruses/Worms Industrial Espionage and Hackers Wi-Fi High Jacking Top Cyber Crimes that Attack Business
  • 11. Spam “Spam accounts for 9 out of every 10 emails in the United States.” “We do not object to the use of this slang term to describe UCE (unsolicited commercial email),although we do object to the use of the word“spam”as a trademark and the use of our product image in association with that term”
  • 12. Can-Spam Act of 2003  Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can- Spam)  Signed into law by President Bush on Dec 16, 2003  Took effect Jan 1, 2004  Unsolicited commercial email must:  Be labeled  Include Opt-Out instructions  No false headers  FTC is authorized (but not required) to establish a “do-not-email” registry  www.spamlaws.com –lists all the latest in federal, state, and international laws
  • 13. Spam is Hostile  You pay for Spam, not Spammers  Email costs are paid by email recipients  Spam can be dangerous  Never click on the opt-out link!  May take you to hostile web site where mouse- over downloads an .exe  Tells spammers they found a working address  They won’t take you off the list anyway  What should you do?  Filter it out whenever possible  Keep filters up to date  If you get it, just delete the email
  • 14. Viruses and Worms  Different types of “ailments”  Viruses  software that piggybacks on other software and runs when you run something else  Macro in excel, word  Transmitted through sharing programs on bulletin boards  Passing around floppy disks  An .exe, .com file in your email  Worms  software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written
  • 15. Hackers are Everywhere  Stealing data  Industrial Espionage  Identity theft  Defamation  Deleting data for fun  A lot of bored 16 year olds late at night  Turning computers into zombies  To commit crimes  Take down networks  Distribute porn  Harass someone  Ethical/white hat hackers exist too  Help break into networks to prevent crimes Mafia Boy
  • 16. Wireless Fidelity (Wi-Fi) Using antennas to create “hot spots” Hotspots – Internet Access (sometimes free) Newport Harbor -All the boats in Harbor have internet access San Francisco Giants Stadium – Surf the web while catching a game UMass (need to register, but it’s free) Cambridge, MA Philadelphia, PA – just announced – entire city by 2006
  • 17. Wi-Fi High Jacking 60-70% wireless networks are wide open Why are the Wi-Fi networks unprotected? Most people say “Our data is boring” But… criminals look for wireless networks to commit their crimes And… the authorities will come knocking on your door…..
  • 18. Protect your Computers!  Use anti-virus software and firewalls - keep them up to date  Keep your operating system up to date with critical security updates and patches  Don't open emails or attachments from unknown sources  Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist  Back-up your computer data on disks or CDs often  Don't share access to your computers with strangers  If you have a wi-fi network, password protect it  Disconnect from the Internet when not in use  Reevaluate your security on a regular basis  Make sure your employees and family members know this info too!
  • 19. Web sites of Interest http://homepage.cs.uri.edu/faculty/wolfe/cf www.missingchildren.com www.spamlaws.com www.netsmartz.org http://www.ifccfbi.gov - operation web snare – latest cyber crimes to be aware of http://www.dcfl.gov/dc3/home.htm http://www.cops.org/