Cybercrime Exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Problems with online prostitution/escorts

(a.) Several websites will take credit card information and never provide a return service. (b.) The clients have been robbed when they return from the shower and their wallets, car keys, and/or clothes are missing. (c.) An individual may schedule a date with one of these women on the basis of their website, only to discover when the woman arrives that she is not who she appeared to be on the Internet.

Mail-Order Bride Fraud - There are several types of mail-order bride fraud.

(a.) Women obtaining money from men to visit, and communication stops. (b.) Men being tricked repeatedly out of their money. (c.) Men pretending to be women to solicit money from unsuspecting men.

Nigerian 419 Schemes

(i) Focuses on a person's desire to make easy money. (ii) This form of fraud involves a victim receiving a letter or e-mail (mostly e-mails as we will discuss) in which the sender will claim to have gained access to a large sum of money. (iii) For the victim's help (money), the sender will promise a significant portion of the money. (iv)These scam operations operate on the belief that the people contacted will be willing to take a risk when there is even a slight possibility that they can make a large sum of money with minimal work.

Notify law enforcement

(i) Notifying either a local law enforcement agency or a report with the United States Postal Inspection Service. (ii.) Notify national fraud information center.

Attempt to persuade the seller to send the merchandise or a refund.

(i). Contact seller using e-mail or telephone number. (ii.) After 14 days, three approaches can be employed if problem is not solved: third-party dispute resolution, special protections offered by credit card companies, contacting shipping company.

Notify eBay

(i.) Buyer will file a fraud alert that will act as a formal complaint against the seller. (ii.) Required as a precursor to filling protection claims for financial reimbursement

File a protection claim

(i.) Help to determine how much, if any, financial reimbursement eBay will provide.

As of December 2009, there were _____ states to pass such legislation, recognizing that new and improved statutes would allow for easier investigation and prosecution of cyberstalking cases.

47

Criminal Justice Response to Cyberstalking

After California passed legislation in the early 1990s to criminalize stalking, federal lawmakers recognized that the behavior needed to be better defined by statutes around the country.

Physical Contact

An emotional bond, Physical bond if significant bond/first interaction is minor/touch is "accidental";Only a matter of time for further sexual activity

Recommendations available from ebay

Attempt to persuade the seller to send the merchandise or a refund, Notify eBay, File a protection claim, and notify law enforcement

Grooming

Breaking down certain barriers, Designed to gain child's trust, Breaking down the child's defenses, Physical relationship with an adult is an acceptable form of relationship

While a person of any age can be a victim of stalking

College-age individuals are considered more likely to become a victim.

According to the Cyberbullying Research Center, cyberbullying could be

Defined as intentional and repeated harm inflicted upon another by use of a computer, cellular telephone, or other electronic device (i.e. a social networking site).

Controlling child pornography became more

Difficult

Three of the more commonly employed cyberstalking tactics involve

E-mail bombs, forgery of messages, and the posting of harassing messages online.

Obtaining materials became infinitely

Easier

Amended in 2000 and specifically addressed harassment and stalking that takes place via

Electronic communications such as e-mails and other electronic messages

Technology advances in 1960s and 1970s led to:

European countries were the mass producers of child porn

A pattern of grooming a child through the use of pornography could appear as follows:

First, images showing children merely standing around in various stages of undress. Next, images of nude children touching each other. Final, images of children having sexual intercourse with an adult.

Phishing schemes

Fraudulent messages whereby a victim is asked to provide financial information and/or online banking passwords.

Nigerian 419 Schemes—Fraud Schemes based on...

Greed

Certain populations, such as prison populations...

Have easier access to materials

Over the last several years there has been a push for federal legislation concerning phishing

However, the legislation has thus far been unsuccessful in receiving enough support to be passed; several states have criminalized phishing.

Porn Phase

Introduce porn into grooming process. Used as means of convincing the child that sexual behavior is an acceptable manner of expressing feelings.

Purchasing of wives and prostitutes

Involves the fraudulent activities of mail-order bride and escort services.

Media coverage of criminal activities like pedo.

Is known as the most common victimization of children around the world

How do online fraud auctions work?

Occurs when the consumer has paid for the merchandise but does not receive the materials.

How cyberstalkers operate

Once the electronic contact information is obtained, then the stalker may begin one of serious actions that result in the harassment of the victim.

Cyberstalking

Refers to a process in which electronic communications, such as e-mails, instant messages and any other form of electronic communications, contain psychologically threatening remarks that harass a recipient or causes a victim to fear for his or her life.

Online auction fraud

Refers to fraudulent sales or purchases from Internet auction sites.

The Secrecy Phase

Relationship must be kept secret/gifts/parents would disapprove/parent would be upset/people could get hurt

Nigerian 419 schemes

Rrefers to a fraudulent activity whereby an individual claiming to be from a foreign country will promise a victim large sums of money for assisting them in secretly moving large sums of money

The Friendship Phase

Schools, shopping malls, and playgrounds have been historically popular places of recruitment. Chat rooms and online social networking sites have created additional areas that pedophiles may utilize to locate potential child victims, Victims come from homes in which the child believes they're not loved/given adequate attention, Pedophiles convince the child they're respected by the pedophile, loved and understood

Phishing is;

Seeking Out Passwords and Financial Information

Online harassment must be distinguished from

Spam

Phases of the grooming process

The Friendship Phase, The Secrecy Phase, Physical Contact, Porn Phase

Why do pedophiles start by gaining the parents trust before the child's

The child's trust may be expedited if the parents believe that the pedophile has a genuine interest

What greatly influenced the problem of child pornography?

The internet

Online Harassment:

The sending of repeated threatening or harassing electronic communications, via e-mail, websites, or other digital medium, that causes another individual to be harmed or deeply disturbed

Examples of online harassment:

Unsolicited emails or text messages containing information about yourself or someone you know, inappropriate postings on Internet websites, and repeated, unsolicited chat messages

Online auction fraud - Online auctions have combined the availability of the Internet with the very nature of consumers to spend

as little money as possible

Criminal Justice Response to Cyberstalking was modified in 1996 to include

criminal statutes prohibiting stalking

There is currently some ongoing debate about whether the possession of child pornography should be

criminalized

Harassment does not involve receiving one bothersome message: messages must be repeated and must cause the recipient

discomfort or harm

Phishing refers to

fraudulent messages or Internet pop-up screens that attempt to obtain a user's Internet passwords, usernames, bank account information, etc.

The increasing desire to view and engage children in sexual relationships has led some individuals to begin

manufacturing and distributing child pornography.

Cyberbullying is a form of

online harassment that has gained the interest of academics and educators alike, as more emphasis has been placed on understanding the phenomenon of bullying.

This perceived desire to develop a relationship with a child is

pedophilia

An important change in the realm of online harassment is the development of

social networking sites and anonymous gossip sites such as Facebook, MySpace, Twitter, Instagram.


Kaugnay na mga set ng pag-aaral

Leadership Quiz 1 Study Guide (after the fact)

View Set

Econ Exam 2 Questions and Vignettes

View Set

TOPIC 7B Implement Knowledge-Based Authentication

View Set

Ch. 9 Transport Layer & Ch. 10 Application Layer

View Set

PET Vocabulary List - difficult words

View Set

ATI RN Nutrition Online Practice 2023 A

View Set

Photosynthesis and Cell Respiration Study Guide

View Set