Cybercrime Exam 2
Problems with online prostitution/escorts
(a.) Several websites will take credit card information and never provide a return service. (b.) The clients have been robbed when they return from the shower and their wallets, car keys, and/or clothes are missing. (c.) An individual may schedule a date with one of these women on the basis of their website, only to discover when the woman arrives that she is not who she appeared to be on the Internet.
Mail-Order Bride Fraud - There are several types of mail-order bride fraud.
(a.) Women obtaining money from men to visit, and communication stops. (b.) Men being tricked repeatedly out of their money. (c.) Men pretending to be women to solicit money from unsuspecting men.
Nigerian 419 Schemes
(i) Focuses on a person's desire to make easy money. (ii) This form of fraud involves a victim receiving a letter or e-mail (mostly e-mails as we will discuss) in which the sender will claim to have gained access to a large sum of money. (iii) For the victim's help (money), the sender will promise a significant portion of the money. (iv)These scam operations operate on the belief that the people contacted will be willing to take a risk when there is even a slight possibility that they can make a large sum of money with minimal work.
Notify law enforcement
(i) Notifying either a local law enforcement agency or a report with the United States Postal Inspection Service. (ii.) Notify national fraud information center.
Attempt to persuade the seller to send the merchandise or a refund.
(i). Contact seller using e-mail or telephone number. (ii.) After 14 days, three approaches can be employed if problem is not solved: third-party dispute resolution, special protections offered by credit card companies, contacting shipping company.
Notify eBay
(i.) Buyer will file a fraud alert that will act as a formal complaint against the seller. (ii.) Required as a precursor to filling protection claims for financial reimbursement
File a protection claim
(i.) Help to determine how much, if any, financial reimbursement eBay will provide.
As of December 2009, there were _____ states to pass such legislation, recognizing that new and improved statutes would allow for easier investigation and prosecution of cyberstalking cases.
47
Criminal Justice Response to Cyberstalking
After California passed legislation in the early 1990s to criminalize stalking, federal lawmakers recognized that the behavior needed to be better defined by statutes around the country.
Physical Contact
An emotional bond, Physical bond if significant bond/first interaction is minor/touch is "accidental";Only a matter of time for further sexual activity
Recommendations available from ebay
Attempt to persuade the seller to send the merchandise or a refund, Notify eBay, File a protection claim, and notify law enforcement
Grooming
Breaking down certain barriers, Designed to gain child's trust, Breaking down the child's defenses, Physical relationship with an adult is an acceptable form of relationship
While a person of any age can be a victim of stalking
College-age individuals are considered more likely to become a victim.
According to the Cyberbullying Research Center, cyberbullying could be
Defined as intentional and repeated harm inflicted upon another by use of a computer, cellular telephone, or other electronic device (i.e. a social networking site).
Controlling child pornography became more
Difficult
Three of the more commonly employed cyberstalking tactics involve
E-mail bombs, forgery of messages, and the posting of harassing messages online.
Obtaining materials became infinitely
Easier
Amended in 2000 and specifically addressed harassment and stalking that takes place via
Electronic communications such as e-mails and other electronic messages
Technology advances in 1960s and 1970s led to:
European countries were the mass producers of child porn
A pattern of grooming a child through the use of pornography could appear as follows:
First, images showing children merely standing around in various stages of undress. Next, images of nude children touching each other. Final, images of children having sexual intercourse with an adult.
Phishing schemes
Fraudulent messages whereby a victim is asked to provide financial information and/or online banking passwords.
Nigerian 419 Schemes—Fraud Schemes based on...
Greed
Certain populations, such as prison populations...
Have easier access to materials
Over the last several years there has been a push for federal legislation concerning phishing
However, the legislation has thus far been unsuccessful in receiving enough support to be passed; several states have criminalized phishing.
Porn Phase
Introduce porn into grooming process. Used as means of convincing the child that sexual behavior is an acceptable manner of expressing feelings.
Purchasing of wives and prostitutes
Involves the fraudulent activities of mail-order bride and escort services.
Media coverage of criminal activities like pedo.
Is known as the most common victimization of children around the world
How do online fraud auctions work?
Occurs when the consumer has paid for the merchandise but does not receive the materials.
How cyberstalkers operate
Once the electronic contact information is obtained, then the stalker may begin one of serious actions that result in the harassment of the victim.
Cyberstalking
Refers to a process in which electronic communications, such as e-mails, instant messages and any other form of electronic communications, contain psychologically threatening remarks that harass a recipient or causes a victim to fear for his or her life.
Online auction fraud
Refers to fraudulent sales or purchases from Internet auction sites.
The Secrecy Phase
Relationship must be kept secret/gifts/parents would disapprove/parent would be upset/people could get hurt
Nigerian 419 schemes
Rrefers to a fraudulent activity whereby an individual claiming to be from a foreign country will promise a victim large sums of money for assisting them in secretly moving large sums of money
The Friendship Phase
Schools, shopping malls, and playgrounds have been historically popular places of recruitment. Chat rooms and online social networking sites have created additional areas that pedophiles may utilize to locate potential child victims, Victims come from homes in which the child believes they're not loved/given adequate attention, Pedophiles convince the child they're respected by the pedophile, loved and understood
Phishing is;
Seeking Out Passwords and Financial Information
Online harassment must be distinguished from
Spam
Phases of the grooming process
The Friendship Phase, The Secrecy Phase, Physical Contact, Porn Phase
Why do pedophiles start by gaining the parents trust before the child's
The child's trust may be expedited if the parents believe that the pedophile has a genuine interest
What greatly influenced the problem of child pornography?
The internet
Online Harassment:
The sending of repeated threatening or harassing electronic communications, via e-mail, websites, or other digital medium, that causes another individual to be harmed or deeply disturbed
Examples of online harassment:
Unsolicited emails or text messages containing information about yourself or someone you know, inappropriate postings on Internet websites, and repeated, unsolicited chat messages
Online auction fraud - Online auctions have combined the availability of the Internet with the very nature of consumers to spend
as little money as possible
Criminal Justice Response to Cyberstalking was modified in 1996 to include
criminal statutes prohibiting stalking
There is currently some ongoing debate about whether the possession of child pornography should be
criminalized
Harassment does not involve receiving one bothersome message: messages must be repeated and must cause the recipient
discomfort or harm
Phishing refers to
fraudulent messages or Internet pop-up screens that attempt to obtain a user's Internet passwords, usernames, bank account information, etc.
The increasing desire to view and engage children in sexual relationships has led some individuals to begin
manufacturing and distributing child pornography.
Cyberbullying is a form of
online harassment that has gained the interest of academics and educators alike, as more emphasis has been placed on understanding the phenomenon of bullying.
This perceived desire to develop a relationship with a child is
pedophilia
An important change in the realm of online harassment is the development of
social networking sites and anonymous gossip sites such as Facebook, MySpace, Twitter, Instagram.