Josh Moulin: Cyberstalking Presentation
-
Upload
josh-moulin -
Category
Technology
-
view
532 -
download
0
description
Transcript of Josh Moulin: Cyberstalking Presentation
CYBERSTALKINGJoshua S. MoulinJoshMoulin.com
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 2
Instructor Background Former Police Lieutenant / FBI Cyber Crime Task
Force Commander Former Forensic Lab Director of Accredited
Laboratory Internationally certified in Cyber Security, Digital
Forensics, and Incident Response Currently a contractor working in National
Security for the US Federal Government as the Digital Forensic/Incident Response Team Lead of a Cyber Security Office
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 3
Oregon Ranks 3rd Highest in the Nation Registered Sex Offenders Per Capita
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 4
Crimes Committed with Technology
Identity TheftDomestic ViolenceHomicide/Suicide
Internet Fraud/ForgeryE-mail ThreatsBomb Threats
Stalking & HarassmentMissing Persons
Child Exploitation & AbuseGambling
ProstitutionExtortionNarcotics
Software PiracyIntrusions/Hacking/Trade Secrets
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 5
Cyberstalking
Each year, 3.4 million Americans are the victims of stalking
65% of these stalking cases are initiated online!
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 6
Stalking Statistics 3 in 4 victims are stalked by someone they know 30% of victims are stalked by a current or former
partner 10% are stalked by a stranger 11% of victims have been stalked for 5 or more
years 46% of victims experience at least one unwanted
contact per week 10% of victims report being monitored with GPS,
8% with video/cameras/listening devices
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 7
Cyberstalking v. Offline Stalking - Similarities
The majority of cyber stalking suspects had an intimate relationship with the victim
Most victims are women and most suspects are men
Suspects are generally motivated by their desire to control the victim
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 8
Cyberstalking v. Offline Stalking - Differences
Cyber stalking suspects can be located anywhere they have Internet access, they aren’t restricted to being near the victim
Electronic communications make it easier for a cyber stalker to encourage a third party to threaten or harass the victim
Cyber stalkers feel they are hidden by the perceived anonymity of the Internet and often are more brazen then traditional stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 9
Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 10
Oregon Statistics
2010 Domestic Violence Counts
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 11
Technologies that Facilitate Stalking
Caller ID & Voice changer
Record calls Buy calling
cards with cash
Difficult to locate evidence
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 12
Call Spoofing
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 13
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 14
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 15
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 16
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 17
Technologies that Facilitate Stalking
Allows users to record messages using AOL Instant Messenger (AIM)
Is anonymous
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 18
Technologies that Facilitate Stalking
Instant Messaging (IM) and chat programs are commonly ways to encounter cyber stalkers
Viruses and other malware are prevalent
Some malware will infect a computer and allow suspects to track movements of the victim online
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 19
Technologies that Facilitate Stalking
Malware (Viruses, Trojan Horses, etc.) are available to allow remote access to a computer
Several software applications are designed to record user activity and send reports to a third party
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 20
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 21
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 22
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 23
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 24
GPS Tracking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 25
Social Networking in Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 26
Social Networking in Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 27
Social Networking in Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 28
Technology Tracking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 29
Geotagging
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 30
Tips to avoid becoming a victim of Cyberstalking
Don’t respond to flaming (provocation online)
Choose a genderless screen name
Don’t flirt online – unless you are prepared for the consequences
Save offending messages and report them to your service provider
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 31
Tips to avoid becoming a victim of Cyberstalking
If a threat is made in a chat room or message board notify the moderator immediately
Don’t confront the stalker/harasser Get out of a situation online that has become
hostile Google yourself occasionally to see what
information is being posted about yourself (personal information)
Don’t accept files or open attachments from other users
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 32
Tips to avoid becoming a victim of Cyberstalking
Use strong passwords on all devices and don’t allow others to use your electronic devices
Be aware of social networking websites “checking you in” to locations and geotagging
Contact Information
Joshua S. Moulin – GCFA,CFCE,CAWFE,DFCP,ACE,CEECSCyber Security and Digital Forensics
http://JoshMoulin.comEmail: [email protected]
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 33