Sunday, April 5, 2009

ConLude The DisCussioN

Hello....
This time I want to conclude the overall discussion of our topic- Internet Crime.

There are about six types of internet crime. The must most common of internet crime are identity theft, child pornography and privacy. Nowadays, computer crime issues have become high-profile, particularly those surrounding hacking, copyright infringement through wares, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise By knowing the ways to expose to the internet crime, there can make us always be careful while using the internet. The public also can get the information of the ways we can be exposed to the internet crime by magazines, television, internet and article. The computer crime such as phishing scams, cyber stalking, fraud harassment, drug trafficking stalking and cyber terrorism give the bad effect to society and also the government in aspect politic, social and economy.

So, we must know the ways how to protect ourselves from the risk of internet crime. There are seven basic step on how we can reduce the risk from being victim of internet crime. All you need is just to be alert bad be aware while you are online. The government especially must take the action to control the crime activities by computer crime. For example the action by the Department of Justice doing about the internet crime when in 1999, the Department of Justice established its Internet Fraud Initiative, the federal government has been expanding its efforts to combine criminal prosecution with coordinated analysis and investigation as part of a comprehensive approach to combating Internet fraud.

yATIe..---

To Sum Up....

I agree with you nani...
Although the internet
has made life easier in many ways, it’s smart to be concerned about Internet crimes. Internet crime is becoming a growing problem for law enforcement officials around the world. Unfortunately, since Internet crimes typically involve people from many different geographic areas, catching and punishing the guilty parties is a difficult task. So we ourselves need to be aware of what happen while online. This blog has giving you the information about how the use of internet sometimes can harm us. It's all in your hand to made up your mind, start to be aware and act rasionally while online. We hope this blog will help you to protect youself from becoming victims of internet abuse. Thank you..

Hyedah~

cONClusion++

Salam.....
Ok...along the discussion on this blog about almost one semester,
we have discussed about the situation of the phenomenon internet crime, the types of internet crime, the ways we can be exposed to the internet crime, the effects of internet crime and the prevention tips on internet crime.
So,,now let we conclude and give opinion about our topic- Internet Crime.

With computer technology permeating every aspect of our lives, there is little wonder that crimes involving the Internet have increased. Whether related to criminal sexual behavior or fraudulent actions, the consequences for a conviction can be serious. Having attorneys with the savvy and understanding of legal processes can make a vital difference in the outcome of your case.The Internet has changed everyday life in ways too numerous to count. Instantaneous communication with people all over the world has become commonplace. The new technology has also created new legal issues, particularly in the area of criminal law. Sometimes a simple mistake as opening a window or clicking a button on your computer screen can result in unwanted and unasked-for material. If you have been charged with possession of child pornography.

Computer crimes cover a broad range of potentially illegal activities. These crimes are usually divided into two categories:

  • Crimes that target computer networks or devices directly, such as malware and malicious code or viruses.
  • Crimes enabled by computer networks or devices with the primary target being independent of the computer network or device, such as cyber stalking, fraud and identity theft or phishing scams.
New types of crime, and new theories for criminal prosecution, will be implemented to meet the continually evolving state of the online world. Internet crime is undergoing constant change. If you have been charged with an Internet crime, seek legal advice from an attorney who is knowledgeable in this area of the law. So, beware in anywhere u are as while you are online.
Get much knowledge about internet crime as you don't expose to the internet crime or being a victim. Easily cheated, easily lost!

naniey~

Friday, April 3, 2009

The Economics Impact Of Cyber Attacks

The importance of electronic information systems is obvious to all participants in the modern economy. When information fails to circulate, whole sectors of the economy are vulnerable. Finance, wholesale and retail trade, transportation, much of manufacturing, and many service industries would slow to a crawl without computers. Vital public services – utilities, national defense, and medicine – are equally dependent.


Information security – the safeguarding of computer systems and the integrity, confidentiality, and availability of the data they contain – has long been recognized as a critical national policy issue. Two current trends indicate that its importance is growing. First, the integration of computers into more and more aspects of moder life continues. Second, cyber-attacks, or breaches of information security, appear to be increasing in frequency, and few observers are willing to ignore the possibility that future attacks could have much more severe consequences than what has been observed to date.


The core issue, in both public and private sectors, is whether we are devoting enough resources to information security. Part of the answer must come from economic analysis. What are the costs, both historical and potential, of security breaches? How frequently can attacks be expected? Can these factors be quantified precisely, so that business firms and other organizations can determine the optimal amount to spend on information security and measure the effectiveness of that spending?


This report surveys the state of knowledge on the cost of cyber-attacks and the economics of information security. First, we summarize several studies that use stock market capitalization as a measure of the cost of cyber-attacks to victim firms. The studies find substantial short-term drops in the prices of shares of firms following the announcement of an information security breach: between 1% and 5% of market capitalization, with greater losses (up to 15%) recorded by some financial institutions where attackers had gained access to confidential customer records.


Second, we present summaries of the existing empirical data on costs attributable to cyber-crime and computer worms and viruses. What is available is a limited amount of survey data, which is frankly described by its compilers anecdotal, but is nonetheless widely reported in the press. Third, we analyze the reasons for the lack o statistical data: firms and organizations have strong incentives to conceal information about cyber-attacks, and there are significant uncertainties and measurement difficulties that limit our ability to specify the dollar amount at risk from information security breaches. Theoretical models that describe the returns to spending on information security shed some light on the size of potential losses, but – in the absence of better statistical data – assigning an overall figure to the cost of cyber-attacks remains highly speculative.



NANIEY++

Thursday, April 2, 2009

Cybercrime And The Effect On Small Businesses

Small businesses lose an average of 800 GBP a year to internet fraud and other online crimes, according to a survey by the Federation of Small Businesses (FSB).

The FSB's report, "Inhibiting Enterprise: Fraud and online crime against small businesses" (2009) revealed that 54% of UK businesses have fallen victim to online crime in the last twelve months, with 15% being affected by viruses and hackers, and 37% being exposed to phishing emails, where fraudsters attempt to obtain sensitive information by posing as legitimate sources.

According to the FSB, such crimes typically cost small businesses between 500 GBP and 5,000 GBP, while the average cost is 768 GBP a year, yet the report revealed that around one third of small firms do not report online crime to the police or their banks because of "a lack of faith in the system".

However, 85% of respondents in Scotland and England said they would report fraud if a designated reporting centre were set up to gather data and use it to fight the crime and follow through with prosecutions - a system similar to that already established in Wales. The report also revealed overall weaknesses in businesses understanding of how online crime is policed, with 53% stating that they needed clearer information about how and where to report this type of crime.

Mike Cherry, Federation of Small Businesses Home Affairs Chairman, said, "E-crime is becoming an increasingly serious issue for small firms, which are losing up to 800 GBP a year to fraud and online crime - a cost which could have a significant impact on a small business."

When a business is hit by computer crime, it generally stands a much better chance of recovery if backed up by a strong and well enforced incident response policy. Core to this is prompt reporting of the incident so that experts can be called in to gather evidence. Such evidence must be obtained by qualified professionals, known as computer forensics experts, who conduct their investigations in line with guidelines set out by the Association of Chief Police Officers. If computer equipment is examined by untrained IT staff, or there is a delay in reporting the crime, evidence could be lost, corrupted or contaminated, making perpetrators harder to trace and reducing the chances of successfully securing a conviction.

Mr Cherry added, "The internet is a huge and unregulated area but businesses have to have confidence that there are at least some structures there to support them. It is important that the Met Police E Crime Unit and the National Fraud Reporting Centre must work hand in hand to set up an effective system to gather intelligence and use it to investigate and prosecute when this crime occurs. Businesses are currently simply being left very exposed."

This article can be one of the example on how internet and cyber crime can harm us. This evidence show us that we need to keep inform about the effect of this crime so that we will be aware.

~hyedah~

Wednesday, April 1, 2009

EFFECT INTERNET CRIME TO CHILDREN AND ADOLESCENTS

Hai everyone...
Do you know that internet crime give a bad impact to development of children and adolescents??
for example the child pornography which is familiar in young generation today...
Now I want to share with you all about some information that I found in internet...

It is critical to view the Internet as a new social environment in which universal adolescent issues pertaining to identity formation, sexuality, and self-worth are explored in a virtual world (Subrahmanyam et al.). As a social context, the Internet enables multiple communication functions, such as e-mail, instant messaging (IM), chat, and blogs, to allow adolescents
to participate and co-construct their own environments (Greenfield & Yan, 2006). According to data from the Pew Internet and American Life Project, the vast majority (89%)
of teens use e-mail; 75% use IM, which allows them to have multiple simultaneous conversations with a defined group of peers. Over 50% of teens possess more than one e-mail
address or screen name, which they can use to send private messages to friends or to participate anonymously in online forums, such as chat rooms.

Easy and continuous access to the Internet provides tremendous opportunities for adolescent socialization, allowing them to connect with their peers as well as with completestrangers from across the world. Clearly, the Internet is transforming the social world of adolescents by influencing how they communicate, establish and maintain relationships,and find social support. Therefore, it is essential to gainawareness of both the potential benefits and risks of teen
Internet use, and provide strategies to guide safe and positive practice.

RISK FACTORS OF TEENS INTERNET USE

Although the Internet has consistent positive impacts on modern society, it has also caused various societal concerns about privacy, security, pornography, Internet crime, and
virtual community (Greenfield & Yan, 2006). Its easy accessibility poses greater risks and dangers for youth as compared to other forms of media. According to the
National Altitudinal Poll, the number one media concern for parents has shifted from television to the Internet: 85% of parents reported that among all forms of media, the Internet
posed the greatest risk to their children (Common Sense Media, 2006). Parental concerns are valid, especially considering that teens are essentially free to view and post whatever they choose and communicate with whomever they want. Hand in hand with this, the Internet has become a highly effective and profitable means of distributing sexually explicit
material, as well as a sophisticated channel for compulsive sexual behavior, sex trafficking, and sex crimes (Galbreath & Berlin, 2002). According to a survey performed by the
London School of Economics (2002), 90% of children between ages 8 and 16 have viewed pornography on the Internet. In most cases, the sex sites were accessed unintentionally when
a child, often in the process of doing homework, used aninnocuous word to search for information or pictures.Such free access and exposure to this information byadolescents who have not yet developed a full maturitycould pose negative impacts on adolescent developmentand could potentially manifest in their social interactionswith peers, their sexual activity, and their emotionaldevelopment.


yatie@hayati~~~

Effect internet crime in Politics

hellO everyone...(yatie)^^
Thanks nani, now I want to share about the effect of internet crime in Politics...


~The Internet began in the 1970s as an academic computer science experiment funded by the U.S. Department of Defense. It proved valuable to researchers, and that value was recognised by research funding agencies, which continued to directly support it well into the 1990s. A time-line of Internet development is provided by RFC2235.

~Academic usage of the Internet came to extend well beyond the computer science discipline. In Australia, the Internet migrated at the end of 1989 from a mere research object to a fully professional service, AARNet. Gradual uptake by new communities (at first of scholars, and later in government, in industry and among society generally), together with successive new protocols and tools, has resulted in exponential growth in connected nodes, in traffic, and in users, being sustained over more than two decades.

~Because such a substantial proportion of the population of computers and users has already been attracted onto the `net, growth in those measures will necessarily gradually assume the shape of the logistics curve, i.e. with growth rates flattening out. Traffic, on the other hand, appears set to continue its rapid growth, as more people spend more time generating more messages; and as bandwidth-hungry image, sound and video-transmissions become more common. Statistical information is available on Internet growth-rates up to 1995 at Georgia Institute of Technology, and on subsequent host-count growth-rates at NetWizard.

~The innovation that brought the Internet squarely into public focus was the World-Wide Web, which began its explosive growth in 1993. The Web enables organisations and people everywhere to become publishers, and has resulted in a vast leap in the public availability of information. Retrospectively, many newcomers have discovered the benefits of pre-existing services, particularly email, but also file-transfer and newsgroups.

~In addition to the wide range of valuable services that it supports, the Internet in general, and particular Internet services, have been co-opted to meet the needs of less tasteful purposes. The result has been a reaction by some socially conservative people and organisations against the Internet per se.

Examples of areas in which public concern has been stimulated include:

  • pornography generally, circulation of which is quite common using FTP and newsgroups;
  • child pornography in particular; and
  • the incitement of racial hatred / `hate-speech'.

In some countries, the Internet has generated even deeper reactionary feelings. Some governments have sought to stifle, and even prevent, the use of the Internet, because of its potential to support:

  • the infiltration of foreign, western, secular, english-language and/or American culture, resulting in the erosion of traditional culture and values; and/or
  • political activism (particularly in countries with traditions of limited freedom of speech, or with dictatorial regimes).

~Meanwhile, it is reasonably argued that `organised crime', terrorists, and `subversives' more generally, are using, or will soon use, the Internet for their own purposes. Law enforcement agencies are accordingly taking a closer look at the `net. They are seeking means of limiting its use for illegal purposes, as well as applying it to their own needs.

~A further initiative of relevance is the U.S. President's Commission on Critical Infrastructure Protection, which is concerned not only with energy, water, transportation and essential services, but also with communications. It was particularly concerned about `new cyber threats'. Its report of 20 October 1997 identified `a wide spectrum of threats', including:
  • natural events and accidents;
  • blunders, errors, and omissions;
  • insiders;
  • recreational hackers;
  • criminal activity;
  • industrial espionage;
  • terrorism;
  • (foreign) national intelligence; and
  • information warfare.

~The threats to Internet freedom have, predictably enough, stimulated reactions by individuals and organisations who are opposed to the exercise of power by nation-states. The intellectually and technically most virile of these are loose coalitions associated with the terms `crypto-anarchist' and `cypherpunk'. Their arguments vary from the inevitability of the collapse of the nation-state as a result of cryptography, to the need for crypto-armed rebellion to destroy the nation-state.


~yatie@hayati~ A124337

EFFECTS OF INTERNET CRIME

hyee hyee
me again...

After we have discussed about the prevention of internet crime...there still left one important aspect of this phenomenon...that is effects of internet crime..
sO..how about the impact to us?? So far the internet crime not only give impact in individual, it's also influence the public. So I want start the discussion about the effects of the internet crime.

Effects on Individuals.
In many cases, individual data is sold by hackersexternal link and used for harmful purposes like using their accounts (Banks 1997). Also, after being hacked, the psychology of individual will have the fear of being following when surfing internet (Seo 2001). In addition, there is a financial damage to individuals when credit cardexternal link details and passwords are stolen, and computer systems also will stop working as usual after hacked (Thomas & Loader 2000).

Effects on Organizations.
A financial effect is considered as the most important effect that faced organizations or company. According to Niccolai (2000) hacking is cost $ 1.2 billion of the global economy. Also, hacking caused many bankruptcy of many companies because they loss the customer trust in the security ability of the company (Furnell 2002). Further, hackers also affect the customer’s details by breaking into the systems of companies.

Effects on Countries.
Countries are also another possible of hacking attacks. This kind of attacks may lead in some circumstances to collapse of countries. For example, North Korea is using 600 hackers against United States, Japan and South Korea to congregate military information (Banks 1997). The aim of this kind of attacks is to steal essential countries information regarding to their foreign policies and strategies. This leads to serious problems between countries that of course will affect the society at last.

Effects on individuals, organization and countries have a strong relation with society; if they affect by hacking, the society absolutely will affect.

_Naniey_

Tuesday, March 31, 2009

More tips...

I want to add some points on how we can reduce the risk from being internet crime victims.

This point will focus on spam, Identity theft and phishing.



Spam

* Don't open spam. Delete it unread.

* Never respond to spam as this will confirm to the sender that it is a "live" email

address.

* Have a primary and secondary email address - one for people you know and one for

all other purposes.

* Avoid giving out your email address unless you know how it will be used.

* Never purchase anything advertised through an unsolicited email.


Identity Theft

* Ensure websites are secure prior to submitting your credit card number.

* Do your homework to ensure the business or website is legitimate.

* Attempt to obtain a physical address, rather than a P.O. box or maildrop.

* Never throw away credit card or bank statements in usable form.

* Be aware of missed bills which could indicate your account has been taken over.

* Be cautious of scams requiring you to provide your personal information.

* Never give your credit card number over the phone unless you make the call.

* Monitor your credit statements monthly for any fraudulent activity.

* Report unauthorized transactions to your bank or credit card company as soon as

possible.

* Review a copy of your credit report at least once a year.


Phishing/Spoofing

* Be suspicious of any unsolicited email requesting personal information.

* Avoid filling out forms in email messages that ask for personal information.

* Always compare the link in the email to the link that you are actually directed

to.

* Log on to the official website, instead of "linking" to it from an unsolicited email.

* Contact the actual business that supposedly sent the email to verify if the email

is genuine.


~hyedah~

PREVENTION ON CREDIT CARD FREUD

hello...nani here!
I have tell u about the prevention tips on businesses. Now I want to share the tips to prevent the credit card fraud.
As we know credit card fraud is one of the types of internet crime that we easily to expose on it.
If we don't care n not beware, we easily can be a victim. Just stay and read below this:


Credit Card Fraud Prevention tips:
• Don’t give out your credit card number(s) online unless the website is both secure and reputable. Sometimes a tiny icon of a padlock appears to symbolize a higher level of security to transmit data. This icon is not a guarantee of a secure site, but may provide you some assurance.
• Before using a site, check out the security software it uses to make sure that your information will be protected.
• Make sure you are purchasing merchandise from a reputable/legitimate source. Once again investigate the person or company before purchasing any products.
• Try to obtain a physical address rather than merely a post office box and a phone number. Call the seller to see if the number is correct and working.
• Send them e-mail to see if they have an active e-mail address and be wary of sellers who use free e-mail services where a credit card wasn’t required to open the account.
• Do not purchase from sellers who won’t provide you with this type of information.
• Check with the Better Business Bureau to see if there have been any complaints against the seller before.
• Check out other websites regarding this person/company.
• Be cautious when responding to special offers (especially through unsolicited e-mail).
• Be cautious when dealing with individuals/companies from outside your own country.
• If you are going to purchase an item via the Internet, use a credit card since you can often dispute the charges if something does go wrong.
• Make sure the transaction is secure when you electronically send your credit card numbers.
• You should also keep a list of all your credit cards and account information along with the card issuer’s contact information. If anything looks suspicious or you lose your credit card(s) contact the card issuer immediately.

nanIey++

Tuesday, March 24, 2009

FRAUD PREVENTION

Thanx nani..know I have information about how we prevent ourself from internet crime in topic Fraud Prenvention.

~Fraud Prevention.

The solutions to Internet-related crime and particularly fraud involve a wide range of strategies which extend from traditional crime control measures to novel technology-based means of preventing illegal conduct from being carried out electronically. Fraud prevention in the digital age requires the use and adaptation of traditional measures (such as the use of appropriate fraud control policies and the provision of information) as well as the use of novel technological approaches (such as the use of effective means to authenticate users of computers and to track
how they are using computers). Fraudulent conduct may also be deterred through the use of prosecution and punishment, although in the digital age this is often difficult and costly to achieve.

The so-called ‘onion model’ of fraud prevention is likely to yield the greatest benefits. This entails the use of various layers of protection including encryption, firewalls, intrusion detection systems, incident response procedures, and monitoring of systems by external auditors.

~Similar advice is available from the Internet Fraud Complaint Center (IFCC
2001) on topics including:
• Internet auction fraud;
• non-delivery of merchandise;
• credit card fraud;
• investment fraud;
• Nigerian letter scams; and
• business fraud.
The National Fraud Information Cent

>This is some of fraud prevention.

1)Fraud Detection Software
If one is unable to prevent online fraud from taking place entirely, it may at least be possible to identify the presence of fraudulent transactions quickly in order to reduce the extent of any losses which are suffered or the occurrence of repeat victimisation. A number of organisations are now providing software for use in the prevention of Internet fraud. Software has been devised to analyse user spending patterns in order to alert individuals to the presence of unauthorised transactions and also merchant deposit monitoring techniques to detect claiming patterns of corrupt merchants. The success of such an approach depends, however, upon the extent to which the software cannot be interfered with or modified.

2)Tracking and Surveillance
The use of computer software to monitor the business activities of government agencies also provides an effective means of detecting fraud and deterring individuals from acting illegally. The Australian Health Insurance Commission, for example, employs artificial neural networks to
detect inappropriate claims made by health care providers and members of the public in respect of various government-funded health services and benefits. In 1997–98, this technology contributed to the Commission locating $7.6 million in benefits which were paid incorrectly to providers and the public.

~yatie@ hayati~

Prevention on Business

Now let me share with u all about the ways to prevent on business. We know that business is major using the internet because this domain should be link to the international relationship. So, this is very important to the company, private company, or other businesses know how to prevent internet crime.

Prevention tips for Businesses:
• Do not accept orders unless complete information is provided (including full address and phone number). Require address verification for all of your credit card orders. Require anyone who uses a different shipping address than their billing address to send a fax with their signature and credit card number authorizing the transaction.
• Be especially careful with orders that come from free e-mail services -- there is a much higher incidence of fraud from these services. Many businesses won’t even accept orders that come through these free e-mail accounts anymore. Send an e-mail requesting additional information before you process the order asking for: a non-free e-mail address, the name and phone number of the bank that issued the credit card, the exact name on credit card, and the exact billing address.
• Be wary of orders that are larger than your typical order amount and orders with next day delivery.
• Pay extra attention to international orders. Validate the order before you ship your product to a different country.
• If you are suspicious, pick up the phone and call the customer to confirm the order.
• Consider using software or services to fight credit card fraud online.
• If defrauded by a credit card thief, you should contact your bank and the authorities.

_naNiey_

PREVENTION...

Thank you Haidah by explaining about the prevention of internet crime. Now let me add the other points of that issue.

  • Make sure your passwords have both letters and numbers, and are at least eight characters long.
  • Avoid common words: some hackers use programs that can try every word in the dictionary.
  • Don't use your personal information, your login name or adjacent keys on the keyboard as passwords-and don't share your passwords online or over the phone.
  • Protect yourself from viruses by installing anti-virus software and updating it regularly. You can download anti-virus software from the Web sites of software companies, or buy it in retain stores; the best recognize old and new viruses and update automatically.
  • Prevent unauthorized access to your computer through firewall software or hardware, especially if you are a high-speed user. A properly configured firewall makes it tougher for hackers to locate your computer. Firewalls are also designed to prevent hackers from getting into your programs and files. Some recently released operating system software and some hardware devices come with a built-in firewall. Some firewalls block outgoing information as well as incoming files. That stops hackers from planting programs called spyware-that cause your computer to send out your personal information without your approval.
  • Don't open a file attached to an e-mail unless you are expecting it or know what it contains. If you send an attachment, type a message explaining what it is. Never forward any e-mail warning about a new virus. It may be a hoax and could be used to spread a virus.
  • When something bad happens-you think you've been hacked or infected by a viruse- mail a report of the incident to your Internet provider and the hacker's Internet provider, if you can tell what it is, as well as your software vendor.

_nANIEy_

Sunday, March 22, 2009

How To Prevent Internet Crime?...

As technology changes and millions of people have access to the internet the possibility of internet crime grows. Crime may occur in the form of fraud, identity theft and online stalking. Parents should be aware that children are vulnerable to online predators that may use the internet to lure children into inappropriate chat rooms or in person meetings. There are way to protect yourself and your family from becoming a victim of internet crime.

Step1

Install anti-spyware and antivirus software. Spyware is hidden programs that run on your computer. They monitor what you are doing online without you realizing it. It can lead to identity theft. Anti-spyware helps prevent spyware from being used. Also install antivirus software to prevent your computer from being infected with a virus.

Step2

Turn on your firewall. This helps prevent hackers from getting information such as passwords to bank accounts and other information they could use to steal funds or steal your identity.

Step3

Monitor the websites your children go to. Put your computer in a location where you can keep on eye on what they are doing online. Use software that blocks children from going to inappropriate websites. Set rules and limits for internet use.

Step4

Talk with your children about online predators. Teach children not to engage in online chats with adults and never to give out their address to someone they meet online. Warn them never to meet someone in person they met online. Tell children to talk to you about anything that happens inappropriate to them online.

Step5

Go to the FBI website to learn about internet scams. They keep the public informed about current scams that maybe circulating online. They also have information on how to avoid online identity theft and investment fraud.

Step6

Use secured websites when purchasing items online and giving credit card numbers. Be wary of solicitations for donations. Check out charities before giving money.

Step7

Report suspected internet crimes.In addition you can contact your local law enforcement agency to report internet crime and they will refer you to the appropriate agency to take your report.


This step are the basic ways to prevent internet crime. There are another ways to prevent internet crime. We will continue to discuss it soon.


Hyedah~

Tuesday, March 10, 2009

Child Pornography..It's Bad.!!

I very agree with Haidah...
She had given an opinion about expose to the child pornography..
Now...I want to elaborate more point about child pornography.
According to the National Coalition for the Protection of Children and Families, "child pornography consists of photographs, videotapes, magazines, books, and films that depict children in sex acts, all of which are illegal.
The very existence of child porn is considered 'contraband,' or illegal because the very act of photographing a child in any sexual context is abusive." In the area of technology misuse, the Internet is becoming an easy place where children can access adult pornography.
"The Internet Online Summit held in 1997 in Washington, D.C., revealed that 70 percent of children viewing pornography on the Internet are doing so in public schools and libraries." (National Coalition for the Protection of Children and Families).

Educators need to know the harm of pornography, the many-faceted sides of the issue, how to safeguard their rooms from becoming sources of pornography, and what to do to help stop child pornography on the Internet. Pornography itself has been known to be both destructive and addictive. Educators would not intentionally expose children to things which could be harmful in the future.

+NaniEy++

ConTinue...expose to The Internet Crime..

3.Credit card Freud

In Pakistan, leading international and local banks have suffered huge losses from credit card fraud, despite the expensive and extensive security measures they have in place. Victims include Citibank, American Bank, Union Bank, Askari Bank, the Muslim Commercial Bank.

4. Cyber Terrorism

Cyber criminals often attack official government websites, hack into security systems send obnoxious e-mails, damage information systems and send viruses. These days, even terrorists use the Internet to collect information on targets and build worldwide contacts and sympathisers.

It is widely accepted that there is a need to establish a policy to curb cyber crime. The hackers manage to hack information systems, official websites and get access to unauthorised official data which is a hidden threat to the government. “Cyber Crime wing will coordinate efforts to stop increasing cyber crimes in Pakistan, the threats and the measures to counter them. It will focus on criminals communications, make fair online business, protect official websites from hackers and make solid security policy for networks and Online Official Documents,” an official of Cyber Crime Wing told Daily Times.

5. Stalking

A stalker might repeatedly follow a victim when she/he drives to work. He or she might repeatedly wait for the victim outside her/his home or office. A stalker might call the victim on the phone and make threats or hang up each time the victim answers. Some stalkers slash tires, vandalize homes and threaten their victims with weapons. Some stalkers send flowers, gifts and cards to solely to intimidate their target. While a stalker’s harassment and threats might at first seem just annoying or a little scary, they can quickly escalate to serious violence. Someone who stalks is someone who could be dangerous. Stalkers have beaten, raped and murdered the people they stalked. Threats should be taken seriously.Although there is no standard way to assess the seriousness of a case, there are some factors that should be considered:• History of violence exhibited by the stalker

  • Presence of physical abuse or domestic violence
  • Presence or absence of threats. Verbal or written threats very frequently precede acts of violence
  • Obsession with the same or similar victim over a period of time
  • Destruction of property
  • Access and approach behaviors of the stalker (Letter writing or face-to-face contact)
  • Knowing the mental status of the stalker
  • Meaning or value the stalker places on the victim
  • Knowledge of the relationship between the stalker and the victim
Stalking often includes, but is not limited to:
  • Inappropriate approaches and confrontations
  • Appearances at a place of work or residence
  • Telephone threats
  • Unwanted gifts
  • Unwanted e-mails
  • Misuse of GPS technology
  • Damage to property
  • Physical assaultsSexual assault
+Naniey++

Thursday, March 5, 2009

A popular internet crime site's moderator exposed as a pedophile!!

From my reading, I found this....
>On the 26th of February, news of a moderator who went by the nic Windchime, Terry AnnaMarie Cavalito aka Terri Stipp, has been outed as a pedophile. Unfortunately she’s not on the sexual offenders registry as she missed it by at least a year or two before the “felony registration” rule was imposed. At that news was received by shock in the website Websleuths forums and creating a virtual storm throughout the internets crimesites populace.
Terry AnnaMarie Cavalito aka Terri Stipp has possibly had access to alot of personal information while working as a moderator on a web site that considers itself a child advocate site that also regulary dealt with children related crimes. You might remember seeing her on television at Jaye Blanchard Park yelling at Cindy and George Anthony.
>In a concerning turn of events Terry's sister using the nic Tinker_bell_1967 and tinkerbelle, who is a moderator in a chatroom at MURTWITNESSONE at Paltalk, has stated that the 3 children involved are liars, belittling the victims, even though the charges are public record and Terry Stipp aka Terry AnnaMarie Cavalito plead guilty to two of the four charges. Her husband was jailed for 15 yrs Tinkerbelle publicly vowed to destroy Princess of Beaconhell.com because she believed her to be responsible for bringing this travesty to light. Documetation showing the criminal charge sheets has been made availabe to view through the beaconhell.com site through this link at docstop.com. I have added the link but would like to post a cautionary note advising that the charges she plead guilty to are more than unpleasant and some people might be permanently scarred by viewing them especially if like me they have ever posted on that site and therefor had their IP viewable to such a monster.


yatie(>_<)

Sunday, February 22, 2009

Easily cheated, easily loss.......

That true nani..I totally agreed about identity theft and phishing scams. The perpetrators very skillfull to manage all these crimes. I want to add something here about spam and internet child pornography.These two thing are also can easily exposed to perpetrators.

As the use of Electronic Mail increases throughout the world, so has the emergence of Unsolicited Commercial E-mail (UCE), which is more commonly known as "spam." For many consumers, UCE is a time-consuming nuisance. For others, it has been a costly learning experience as they have lost money responding to bogus scams that arrived in their e-mail inbox. Often, e-mail spammers purchases bulk e-mail addresses from a list broker. These brokers are able to compile addresses from a wide array of electronic "directories". If your e-mail address appears in a newsgroup posting, on a website, in a chat room, or in an online service's membership directory, it may find its way into the hands of a broker. Marketers then use special software capable of sending hundreds of thousands - even millions - of email messages to the addresses at the just click of a mouse!.

For Child pornography, parents who neglect the role to observes the online activities of their children may welcome perpetrators. Adults who prey on children often befriend children they meet online and arrange meetings with them for sexual purposes. The children who agree to meet an online "friend" typically do so without knowing that the person on the other end is an adult pretending to be a child.

That’s how person are easily exposed to perpetrators. Every types of internet crime have their own ways on how ones person can be exposed. Maybe if there is any information, others can add it, so that we become aware against this crimes.


Hyedah~

Friday, February 20, 2009

Victims on Internet Crime

There are several ways we can expose to the internet crime or we can be a victim of this problem. Internet crime is a general term that embraces such crimes as phishing, credit card frauds, identity theft, child pornography, kidnapping children via chat rooms, scams, cyber terrorism, creation and/or distribution of viruses, spam and so on. All such crimes are computer related and facilitated crimes.

With the evolution of the Internet, along came another revolution of crime where the perpetrators commit acts of crime and wrongdoing on the World Wide Web. Internet crime takes many faces and is committed in diverse fashions. The number of users and their diversity in their makeup has exposed the Internet to everyone. Some criminals in the Internet have grown up understanding this superhighway of information, unlike the older generation of users. This is why Internet crime has now become a growing problem in the United States. Some crimes committed on the Internet have been exposed to the world and some remain a mystery up until they are perpetrated against someone or some company.

1. Identity Theft

One of the fastest growing crimes in the country is identity theft. Identity theft is simply when someone steals your personal information and uses it to commit a fraudulent transaction. It's a terrible crime that can wreak havoc on not only the financial lives but also the emotional and mental well-being of its victims. One of the reasons this crime is growing so quickly is that the Internet makes it easier for the criminals to obtain other people's personal information.

Before the proliferation of the Internet identity theft still occurred. There are many off-line ways to obtain peoples personal information like stealing people's mail or going through their trash to find discarded financial documents. The Internet offers these thieves easier access to their victims sensitive information. There are websites and forums where people actually buy and sell things like credit card numbers, Social Security numbers, driver's license numbers etc.

In addition to simply purchasing information from another criminal, one way these thieves obtain the information they're looking for is called phishing. In phishing scams, internet-based communications often purport to be from legitimate organisations, such as banks, and use that perception of a trusted relationship to get people to reveal personal information.

2. Phishing

A phishing scam the mark, or potential victim, will usually receive an e-mail asking them to click on a link taking them to an official looking webpage to fill in their personal information. The e-mail will claim to be from a legitimate business or institution such as a bank. The e-mail you receive will say something like "there's been suspicious activity on your account please click this link to log in and update your account information". If you click the link you'll be taken to a page that looks just like a page from your bank's website but it's really just a cloned page. The cloned page looks identical to your bank's page but everything you type in on that page is recorded by the person running the phishing scam. The information you typed in can now be used to steal money from your bank account, open lines of credit in your name that will be maxed out and never paid, or they may just sell your information to someone else who will do all of those things.

>>to be continuee.....

Naniey++

Thursday, February 19, 2009

How we can be the victims of internet crime?

Hello...

Have we ever think about this? We live in the age of possibilities. Not to say that all of these possibilities are good, because we all know that some of them are quite horrid. But, as always, we have to take the good with the bad. One aspect of technology that introduced a vast array of possibilities was the personal computer. Or should I say is the personal computer? There is still more yet to come. The outstanding advantage this technology offers us concerns the Internet. Suddenly everything was within our reach. No more writing letters on paper or driving to the bank to deposit a check. Home computers offer us unlimited conveniences. We can do all of our internet banking, we can contact people anywhere in the world within seconds, we could even play computer games against multiple opponents across the globe simaltaniously.

However, there is also a deep, dark, and dangerous side to these wonderous machines, which also concerns the web. Surely the phrase "Internet crime" is more than one occasion. Type in a search and you'll hear all about people who have had their bank accounts or paid for items they never received. Some people unlucky enough to be a victim of internet crime have even had their identity stolen. The question is; how we can be exposed to internet crime?...

Hyedah~

Changes In The Crime Rate..

hi,(yatie) ^_^

I found another long study.

>which demonstrated that young people are the greatest determinant in changes in the crime rate. In essence, each new crop of kids determines the change in the crime rate for the coming year. Appearently older folks stop becoming violent criminals in a predictable manner.

>And even poor kids have access to the Internet in school. It can have a proportionally greater impact on a poor child's life who has nothing and is surrounded by dis-empowered people, to jump on the Internet and discover the whole world at his/her fingertips.

The Good News is:
A) For some mysterious reason, the violent crime rate has steadily dropped since 1994 to 1/3 of its previous level.
B) Kids today are hyper-empowered and excited about the future as a direct result of the awesome potential the Internet provides.
C) We all know how amazing the Internet is, but it's cool to see it possibly having such an important and measurable effect on our society

Friday, February 13, 2009

Children as Targets of Internet Crimes—Who Is Vulnerable?


I agree with you nani...children and teens nowaday are easy to involved with this kind of crime and most of the time they will be the victim.
Do you know that both intrafamilial offenders and strangers have found that young children and teenagers are perfect targets for criminal acts because they are often trusting, naive, curious, adventuresome, and eager for attention and affection. However, the most attractive factor to predators is that children and teenagers historically have not been viewed as credible witnesses. Today, the danger to children is even greater because the Internet provides predators anonymity. Whether the victimization occurs in person or over the Internet, the process is the same—the perpetrator uses information to target a child victim. For example, the predator may initiate an online friendship with a young person, sharing hobbies and interests. This may lead to the exchange of gifts and pictures. Just like the traditional predator who targets children in person, the online predator usually is willing to spend considerable time befriending and grooming a child. The predator wants to build the child’s trust, which will allow the predator to get what he or she ultimately wants from the child.

Although no family is immune to the possibility that their child may be exploited and harassed on the Internet, a few factors make some children more vulnerable than others. Older children tend to be at greater risk because they often use the computer unsupervised and are more likely to engage in online discussions of a personal nature. Some victims become unwitting participants as they actively participate in chat rooms, trade e-mail messages, and send pictures online. Troubled or rebellious teens who are seeking emancipation from parental authority can be susceptible to Internet predators. The risk of victimization is greater for emotionally vulnerable youth who may be dealing with issues of sexual identity. These young people may be willing to engage in conversation that is both titillating and exciting but appears innocent and harmless. Unfortunately, Internet interactions that initially appear innocent can gradually lead to sexually explicit conduct.
This may cause internet crime against children likes child pornography.

Siti Haidah bte Mohd Ijam
A123090

Wednesday, February 11, 2009

+Up My Knowledge+

Hyee nani here!!
Firstly, thanks to hyedah because she explained about the internet crime problem that happened illegally.
I would agree with that idea which internet crime is a criminal act that is committed while using the internet or while on the internet.
It is because internet crime does not give any benefit to anyone who involved on it.

Actually. I very interested with the types of the internet crime and the important one is child pornography. I think the parents now had very low mentality and discipline in teaching their children. They were busy on their job, unfortunately, they have no time with their children ,they do not care about their children and they do not responsible. So, their children had more time with their own and they do something that had wrong because they know their parents don't know about that. It's a big problem because the parents should play their role.

Tuesday, February 10, 2009

Welcome to internet crime.

The Internet provides a medium for communication and information sharing unparalleled in the history of this planet. Unfortunately, there is also a darker side to all this technological glitter: Internet Crime. You've probably experienced Internet Crime in one form or another: spam, chain-letters, scams, and viruses being the common nuisances that they are. You might even be committing Internet Crimes consciously or unconsciously yourself: using pirated software or borrowing someone's intellectual property without their consent. "Are these things criminal activities?" you may be asking yourself. And, that is a good question to ask. What constitutes an Internet Crime? Who decides? Who will enforce the laws which will inevitably arise in an attempt to control Internet Crime? The answer to these questions is where the heart of the problem of Internet Crime lies.

There is no standard definition of what constitutes an Internet Crime. Generally, internet crime is a criminal act that is committed while using the internet or while on the internet.

Types of internet crime.

Surely you've heard the phrase "Internet crime" on more than one occasion. Type in a search and you'll hear all about people who have had their bank accounts or paid for items they never received. Some people unlucky enough to be a victim of internet crime have even had their identity stolen. To be aware of this crime, we need to know the types of the internet crime.

1. Internet fraud.

The term "Internet fraud" refers generally to any type of fraud scheme that uses one or more components of the Internet - such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to other connected with the scheme. Internet fraud categories listed below:

  • Financial Institution Fraud- Knowing misrepresentation of the truth or concealment of a material fact by a person to induce a business, organization, or other entity that manages money, credit, or capital to perform a fraudulent activity. Credit/debit card fraud is an example of financial institution fraud that ranks among the most commonly reported offenses to the IFCC.
  • Gaming Fraud- To risk something of value, especially money, for a chance to win a prize when there is a misrepresentation of the odds or events. Sports tampering and claiming false bets are two examples of gaming fraud.
  • Communications Fraud- A fraudulent act or process in which information is exchanged using different forms of media. Thefts of wireless, satellite, or landline services are examples of communications fraud.
  • Utility Fraud- When an individual or company misrepresents or knowingly intends to harm by defrauding a government regulated entity that performs an essential public service, such as the supply of water or electrical services.
  • Insurance Fraud- A misrepresentation by the provider or the insured in the indemnity against loss. Insurance fraud includes the “padding” or inflating of actual claims, misrepresenting facts on an insurance application, submitting claims for injuries or damage that never occurred, and “staging” accidents.
  • Government Fraud- A knowing misrepresentation of the truth, or concealment of a material fact to induce the government to act to its own detriment. Examples of government fraud include tax evasion, welfare fraud, and counterfeit currency.
  • Investment Fraud- Deceptive practices involving the use of capital to create more money, either through income-producing vehicles or through more risk-oriented ventures designed to result in capital gains. Ponzi/Pyramid schemes and market manipulation are two types of investment fraud.
  • Business Fraud- When a corporation or business knowingly misrepresents the truth or conceals a material fact. Examples of business fraud include bankruptcy fraud and copyright infringement.

Fraud is more likely to affect an individual than a company. And fraud is more likely to be performed by an individual than a company. With a little common sense, most Internet fraud can be avoided.

2. Child pornography.

Initially, the idea of child pornography and sexual abuse is appalling to most people. Innocent young bodies and minds unprepared for the physical and emotional assault of sexual abuse and manipulation by alleged adults is one side of the coin. On the other side, the right for children to have sexual identities is being arbitrarily denied them. Again, it is a problem of definitions.

How do we define a "child" or an "adult"? How do we determine when a child is biologically and emotionally ready to engage in sexual activities? For that matter, how do we define "sex", "pornography", "obscenity", and "abuse"? In the U.S. alone, the age of legal consent can vary state-to-state from age 14 to age 18. Some countries have not established a legal age of consent. Other countries have set the legal age of consent as low as age 12. "Children" themselves have no voice in the decision making process. Rather, the legal age of consent is based on social/cultural/political/religious/historical biases and not on any quantifiable, scientific data. The problem goes even deeper than this.

3. Piracy.

In 2001, the Business Software Alliance commissioned a study on worldwide business software piracy. The study showed that in 2000:

The world piracy rate increased to 37%

$11.75 billion was lost due to piracy.

By region, Eastern Europe had the highest piracy rate at 63%, and has had the highest piracy rate in every study since 1994.

North America's piracy rate decreased to 25% from 31% in 1994.

Vietnam has a piracy rate of 97%—the highest rate of all countries in the study.

What is intellectual property? According to the World Intellectual Property Organization, "Intellectual property refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. Intellectual property is divided into two categories: Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of source; and Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs." As you can see, intellectual property covers a lot of territory. Unfortunately, the nature of the Internet lends itself well to piracy. Piracy is the act of copying copyrighted material. Every page you visit is stored on your computer for some amount of time. And, we are forever being asked to download something: software itself, upgrades, patches, files, graphics, sounds, and scripts. It becomes habit forming, and we begin to believe that we have a right to acquire anything we find on the Internet. But, this is simply not the case. I think we need to remind ourselves of this regularly.

4. Privacy.

As with all Internet Crime topics, there is a problem with definitions. What is privacy? Do we have rights to privacy? In what situations could our right to privacy be abused? What is the difference between privacy and security? Definition of privacy is: information, data, or facts about us taken without our expressed permission or consent; and information, data, or facts about used for purposes without our expressed permission or consent. Receiving information that has not been requested and automatically being redirected to a different website seem like invasions of privacy to me. I think that the difference between privacy and security is that privacy is the protection of an individual. Security is the protection of a group: a network, a company, or a nation.

While not necessarily illegal, there are several things on the Internet which it consider being an invasion of my privacy: spam (mass e-mailing), chain-letters, pop-up windows for advertisements, automatically being redirected to a different site, cookies, and Spy ware being the first ones to come to mind. Most of these things can be dealt with by downloading software or turning on features of the software one already owns that blocks or filter out these nuisances. Take a look at the links on the left side of the screen to get more information on how to go about this.

Are there illegal activities concerning privacy on the Internet? Unfortunately, yes, there are. Identity Theft is probably the most serious instance. When your credit card information, passwords and ID's for your accounts, or other information that uniquely identifies you are stolen, it is an illegal activity which can have serious consequences for you as well as the person committing the crime if (when?) they are caught

Businesses also need information to better market and target their products. Web designers would like to create sites that attract people and are useful to people. Governments require information to better serve their citizens. Information has become a valuable commodity. The Internet is a useful source for information. Is a lack of privacy the price we pay for using the Internet? Is it a price you are willing to pay?

5. Security.

In the privacy section of this site definition of security is: protection of a group; a company, a network, or even a government. Security also affects individuals directly and indirectly; though for political or economic reasons this is less likely to be the case. It is more profitable to steal data about a group of people than an individual. And, activities such as hacktivism (hack + activism) are more likely to draw mass media attention if a large number of people are involved. Security affects us indirectly in that governments increase taxes in order to implement costly security systems, and companies raise their prices to cover rising security costs. As protection devices become more sophisticated, so do the means of attack.


6. Stalking

Cyber stalking has received a lot of media hype in the past couple of years. Cyber stalking is a type of Internet crime that is of particular concern for teenagers and young adults. Social networking websites such as “MySpace” make it very easy for criminals to learn private details about a victim’s hobbies, interests, friends, family, and daily schedule. Cyber stalking Internet crimes may also lead to sexual assault if the perpetrator is able to convince the victim to appear for a personal meeting. Yet, cyber stalking is another online phenomenon difficult to define. Spamming, flaming, sexual predators, pedophilia, harassment, threats, hate crime, date/acquaintance rape, and identity theft have all in some way been associated with cyber stalking. However, there is a lack of any concrete statistical evidence to support the claims made about cyber stalking. Depending on the definition of cyber stalking and harassment, the Internet does provide an environment in which cyber stalking could proliferate.

To conclude, as the Internet continues to develop, new legal issues will also develop. New types of crime, and new theories for criminal prosecution, will be implemented to meet the continually evolving state of the online world. Internet crime is undergoing constant change. If you are charged with an Internet crime, seek legal advice from an attorney who is knowledgeable in this area of the law.