Josh Moulin: Cyberstalking Presentation

33
CYBERSTALKING Joshua S. Moulin JoshMoulin.com

description

In this presentation Josh Moulin provides information on Cyberstalking.

Transcript of Josh Moulin: Cyberstalking Presentation

Page 1: Josh Moulin:  Cyberstalking Presentation

CYBERSTALKINGJoshua S. MoulinJoshMoulin.com

Page 2: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 2

Instructor Background Former Police Lieutenant / FBI Cyber Crime Task

Force Commander Former Forensic Lab Director of Accredited

Laboratory Internationally certified in Cyber Security, Digital

Forensics, and Incident Response Currently a contractor working in National

Security for the US Federal Government as the Digital Forensic/Incident Response Team Lead of a Cyber Security Office

Page 3: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 3

Oregon Ranks 3rd Highest in the Nation Registered Sex Offenders Per Capita

Page 4: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 4

Crimes Committed with Technology

Identity TheftDomestic ViolenceHomicide/Suicide

Internet Fraud/ForgeryE-mail ThreatsBomb Threats

Stalking & HarassmentMissing Persons

Child Exploitation & AbuseGambling

ProstitutionExtortionNarcotics

Software PiracyIntrusions/Hacking/Trade Secrets

Page 5: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 5

Cyberstalking

Each year, 3.4 million Americans are the victims of stalking

65% of these stalking cases are initiated online!

Page 6: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 6

Stalking Statistics 3 in 4 victims are stalked by someone they know 30% of victims are stalked by a current or former

partner 10% are stalked by a stranger 11% of victims have been stalked for 5 or more

years 46% of victims experience at least one unwanted

contact per week 10% of victims report being monitored with GPS,

8% with video/cameras/listening devices

Page 7: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 7

Cyberstalking v. Offline Stalking - Similarities

The majority of cyber stalking suspects had an intimate relationship with the victim

Most victims are women and most suspects are men

Suspects are generally motivated by their desire to control the victim

Page 8: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 8

Cyberstalking v. Offline Stalking - Differences

Cyber stalking suspects can be located anywhere they have Internet access, they aren’t restricted to being near the victim

Electronic communications make it easier for a cyber stalker to encourage a third party to threaten or harass the victim

Cyber stalkers feel they are hidden by the perceived anonymity of the Internet and often are more brazen then traditional stalking

Page 9: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 9

Cyberstalking

Page 10: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 10

Oregon Statistics

2010 Domestic Violence Counts

Page 11: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 11

Technologies that Facilitate Stalking

Caller ID & Voice changer

Record calls Buy calling

cards with cash

Difficult to locate evidence

Page 12: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 12

Call Spoofing

Page 13: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 13

Mobile Phone Stalking

Page 14: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 14

Mobile Phone Stalking

Page 15: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 15

Mobile Phone Stalking

Page 16: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 16

Mobile Phone Stalking

Page 17: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 17

Technologies that Facilitate Stalking

Allows users to record messages using AOL Instant Messenger (AIM)

Is anonymous

Page 18: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 18

Technologies that Facilitate Stalking

Instant Messaging (IM) and chat programs are commonly ways to encounter cyber stalkers

Viruses and other malware are prevalent

Some malware will infect a computer and allow suspects to track movements of the victim online

Page 19: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 19

Technologies that Facilitate Stalking

Malware (Viruses, Trojan Horses, etc.) are available to allow remote access to a computer

Several software applications are designed to record user activity and send reports to a third party

Page 20: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 20

Technologies that Facilitate Stalking

Page 21: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 21

Technologies that Facilitate Stalking

Page 22: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 22

Technologies that Facilitate Stalking

Page 23: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 23

Technologies that Facilitate Stalking

Page 24: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 24

GPS Tracking

Page 25: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 25

Social Networking in Cyberstalking

Page 26: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 26

Social Networking in Cyberstalking

Page 27: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 27

Social Networking in Cyberstalking

Page 28: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 28

Technology Tracking

Page 29: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 29

Geotagging

Page 30: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 30

Tips to avoid becoming a victim of Cyberstalking

Don’t respond to flaming (provocation online)

Choose a genderless screen name

Don’t flirt online – unless you are prepared for the consequences

Save offending messages and report them to your service provider

Page 31: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 31

Tips to avoid becoming a victim of Cyberstalking

If a threat is made in a chat room or message board notify the moderator immediately

Don’t confront the stalker/harasser Get out of a situation online that has become

hostile Google yourself occasionally to see what

information is being posted about yourself (personal information)

Don’t accept files or open attachments from other users

Page 32: Josh Moulin:  Cyberstalking Presentation

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 32

Tips to avoid becoming a victim of Cyberstalking

Use strong passwords on all devices and don’t allow others to use your electronic devices

Be aware of social networking websites “checking you in” to locations and geotagging

Page 33: Josh Moulin:  Cyberstalking Presentation

Contact Information

Joshua S. Moulin – GCFA,CFCE,CAWFE,DFCP,ACE,CEECSCyber Security and Digital Forensics

http://JoshMoulin.comEmail: [email protected]

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 33