This document discusses cybercrime and its impact. It notes that according to the 2011 Norton Cybercrime Report, 431 adults globally become victims of cybercrime every second, resulting in $388 billion in losses annually. The most common cybercrime is computer viruses and malware. Cybercrime involves computers being used to commit crimes, as targets of crimes, or to store evidence of crimes. Types of cybercrime include both traditional crimes conducted online like identity theft and child pornography, as well as technological crimes like hacking and malware. Law enforcement faces challenges in combating cybercrime like computer-literate criminals, issues with jurisdiction, and challenges in digital evidence collection and integrity. The document provides tips for protecting yourself like using antivirus software and strong passwords.
2. CYBERCRIME:
ARE YOU THE NEXT VICTIM?
Sandra J. Putnam
Assistant Special Agent in Charge
Georgia Bureau of Investigation
Tina Freestone
Chair of the Criminal Justice Degree Program
Grantham University
3. Cost of Cybercrime
Norton Cybercrime Report for 2011
431 adult victims globally
Losses of $388 billion (time & money loss)
14 adults become a victim every second
Most common type of cyber crime is computer
viruses and malware
4.
5. Cost of Cybercrime
Norton Cybercrime Report for 2011
431 adult victims globally
Losses of $388 billion (time & money loss)
14 adults become a victim every second
Most common type of cyber crime is computer
viruses and malware
6. What is Cybercrime?
Computers being used to commit crime
Computers as the target of a crime
Computers storing evidence of a crime that
has been committed
7. Types of Cybercrime
Traditional Crimes Technological Crimes
Child Pornography Viruses
Human Trafficking Malware
Identity Theft Hacking
Drugs Dealing Denial of Service Attacks
Harassment/Threats Copyright Violations
Fraud/White Collar Crime Cyber-Stalking
Murder Phishing
Theft Sexting
8. Challenges to Law Enforcement
Computer Literate Criminals
Availability of technology for low or no cost
Technology is pushing society into the information age
Who is responsible for policing the Internet?
Jurisdiction of crime
Training and Equipment costs
Evidence Integrity
Physical versus Digital Evidence
9. How to Protect Yourself
Understand that cybercrime exist and your vulnerable
Protect your computer with the latest anti-virus and malware
software
Use good passwords
Lock down all social networking sites to only be visible to
“FRIENDS”
Run an annual credit report
Residential wireless router should be encrypted
and password protected
10. AN ICAC CASE STUDY
A GBI Internet Crimes Against Children Task Force
Investigation into finding the identity of 3 little girls
whose images were posted on the Internet.
13. Grantham University and the
Criminal Justice department
Thank You for attending and
participating in today's Webinar.
We encourage you to follow up with any
questions you may have regarding
Criminal Justice or Cybercrime:
tfreestone@grantham.edu
Tina Freestone
14. Grantham University and the
Criminal Justice department
Thank You for attending and
participating in today's Webinar.
We encourage you to follow up with any
questions you may have regarding
Criminal Justice or Cybercrime:
tfreestone@grantham.edu
Tina Freestone
IACP Conference Booth #4711