Total Pageviews

Thursday, 30 June 2011

A GROWING FEAR "Cyber Bullying"

Cyber-bullying has been defined as "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person". 
Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation.

Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyber-bullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target.
According to research, boys initiate mean online activity earlier than girls do. However, by middle school, girls are more likely to engage in cyber-bullying than boys do.  Whether the bully is male or female, their purpose is to intentionally embarrass others, harass, intimidate, or make threats online to one another. This bullying occurs via email, text messaging, posts to blogs, and Web sites.
Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators.

In September 2006, ABC News reported on a survey prepared by I-Safe.org.  This survey of 1,500 students between grades 4-8 reported:
-  42% of kids have been bullied while online. One in four has had it happen more than once.
-  35% of kids have been threatened online. Nearly one in five had had it happen more than once.
-  21% of kids have received mean or threatening e-mails or other messages.
-  58% of kids admit someone has said mean or hurtful things to them online. More than four out of ten say it has happened more than once.
-  58% have not told their parents or an adult about something mean or hurtful that happened to them online.

A 2006 survey by Harris Interactive reported:
-  43% of U.S. teens having experienced some form of cyber-bullying in the past year.
Similarly, a Canadian study found:
-  23% of middle-schoolers surveyed had been bullied by e-mail
-  35% in chat rooms
-  41% by text messages on their cell phones
-  Fully 41% did not know the identity of the perpetrators.

Source: www.wikipedia.com

Types of Cyber Crime

Cyber-Crime ('computer crime') is any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them. In a wider sense, 'computer - related crime' can be any illegal ehavior committed by means of, or in relation to, a computer system or network; however, this is not cyber-crime.
The United Nations has categorized five offenses as cyber-crime: unauthorized access, damage to computer data or programs, sabotage to hinder the functioning of a computer system or network, unauthorized interception of data to, from and within a system or network, and computer espionage.
The categories of cyber-crime are:

Financial - crimes which disrupt businesses' ability to conduct 'e-commerce' (or electronic commerce).
Public confidence in the security of information processed and stored on computer networks and a predictable environment of strong deterrence for computer crime is critical to the development of e-commerce, or commercial transactions online. Companies' ability to participate in e-commerce depends heavily on their ability to minimize e-risk.
Risks in the world of electronic transactions online include viruses, cyber attacks (or distributed denial of service (DDOS) attacks) such as those which were able to bring Yahoo, eBay and other websites to a halt in February 2000, and e-forgery.
There also have been other highly publicized problems of 'e-fraud' and theft of proprietary information and in some cases even for ransom ('e-extortion').

Piracy - the act of copying copyrighted material. The personal computer and the Internet both offer new mediums for committing an 'old' crime. Online theft is defined as any type of 'piracy' that involves the use of the Internet to market or distribute creative works protected by copyright. 

Hacking - the act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed.

Cyber-terrorism - the effect of acts of hacking designed to cause terror. Like conventional terrorism, `e-terrorism' is classified as such if the result of hacking is to cause violence against persons or property, or at least cause enough harm to generate fear.

Online Pornography - There are laws against possessing or distributing child pornography. Distributing pornography of any form to a minor is illegal. The Internet is merely a new medium for this `old' crime, but how best to regulate this global medium of communication across international boundaries and age groups has sparked a great deal of controversy and debate.

In Schools - While the Internet can be a unique educational and recreational resource for students, it is important that they are educated about how to safely and responsibly use this powerful tool. The founding goal of B4USurf is to encourage empowering the young through knowledge of the law, their rights, and how best to prevent misuse of the Internet. 

Source:

http://www.b4usurf.org/index.php?page=types-of-cybercrime


LEAD DEFENDANT IN INTERNATIONAL COMPUTER HACKING RING SENTENCED IN TWO CASES TO 13 YEARS IN FEDERAL PRISON

 Los Angeles Man also Sentenced for Marijuana Grow Seen on YouTube

LOS ANGELES – Federal judges in two cases have imposed sentences totaling 13 years in prison against a Los Angeles man who was the leader of the domestic arm of an international “phishing” operation that used spam emails and bogus websites to collect personal information that was used to defraud American banks.

Kenneth Joseph Lucas, II, 27, was sentenced the second case, which involved an indoor marijuana grow at his residence in the Baldwin Hills district of Los Angeles.

In relation to the narcotics case, United States District Judge Gary A. Feess sentenced Lucas this afternoon to five years in prison – with two years of that sentence to run consecutively to an 11-year sentence imposed last week in the phishing case.

Judge Feess observed that Lucas’ conduct spanning both cases was “astonishing” and that Lucas caused “great harm to many people.”

In the case stemming from the phishing scheme, United States District Judge Valerie Baker Fairbank sentenced Lucas on Friday to 11 years in prison after he pleaded guilty to 49 counts of bank and wire fraud, aggravated identity theft, computer fraud, and money laundering conspiracy charges.

During Friday’s sentencing hearing, Judge Fairbank said that Lucas’ role in the phishing scheme was “deliberate and ongoing,” and that his actions showed an “extreme disregard for the law and the community.” Lucas was a “key and active player in the bank fraud” that extended from Southern California to Nevada, North Carolina, Maryland, and overseas in Egypt, Judge Fairbank said.

In total, Lucas has been sentenced to 156 months in federal prison.

Lucas was the lead defendant in a 53-defendant indictment returned in the fall of 2009 as part of Operation “Phish Phry,” a multinational investigation conducted in the United States and Egypt that led to charges against 100 individuals – the largest number of defendants ever charged in a cybercrime case. As a result of Operation Phish Phry, 47 people have been convicted in federal court in Los Angeles.

Operation Phish Phry revealed how Egyptian hackers obtained bank account numbers and related personal identification information from an unknown number of bank customers through phishing – a technique that involves sending e-mail messages that appear to be official correspondence from banks or credit card vendors. Bank customers who received the spam emails were directed to fake websites purporting to be linked to financial institutions, where the customers were asked to enter their account numbers, passwords and other personal identification information. Because the websites appeared to be legitimate – complete with bank logos and legal disclaimers –
the victims did not realize that the websites were not related to legitimate financial institutions. Armed with the bank account information, members of the conspiracy hacked into accounts at two banks. Once they accessed the accounts, the individuals in Egypt coordinated transfers of funds from the compromised accounts to newly created fraudulent accounts and other accounts used as part of the scheme.

The United States part of the ring was directed by Lucas and two others, who directed associates to recruit runners to set up and use bank accounts where stolen funds could be held. A portion of the illegally obtained funds were transferred via wire services to the Egyptian co-conspirators. Judge Fairbank determined the total amount of intended loss was more than $1 million.

In the narcotics case, Lucas oversaw the construction of an indoor marijuana grow operation at his residence in 2009. After installing an irrigation system, ventilation equipment, indoor lights and fans, Lucas posted videos on YouTube that showcased the grow operation. On October 7, 2009, authorities found 100 marijuana plants in the grow room, and Lucas admitted to having grown and sold a prior crop, which netted him $45,000.

source: www.cybercrime.gov

Child Abuse & Internet Crime

FINAL DEFENDANT SENTENCED TO 7 YEARS IN FEDERAL PRISON FOR PARTICIPATING IN CHILD PORNOGRAPHY DISTRIBUTION RING

LOS ANGELES The fifth defendant charged in relation to an Internet-based child pornography trafficking ring that specialized in images depicting the sexual abuse of young girls was sentenced today to seven years in federal prison.

Kevin Kaller Wright, 44, of Santa Monica, received the 84-month sentence from United States District Judge Margaret M. Morrow.

Wright and four other people pleaded guilty over the past year to being members of the Quest4More Internet bulletin board, whose members “advocated the sexual torture of children,” according to court documents. Quest4More, which was investigated by U.S. Immigration and Customs Enforcement (ICE) Homeland Security Investigations (HSI), was a secret bulletin board that allowed members to post and view pictures and videos, which often depicted very young children, sometimes being tortured or in bondage.

The defendants previously sentenced in this case are:

  • Michael Pharis, 51, of Las Vegas, Nevada, who was sentenced in December to 15 years in prison; 
  • Daniel Murphy, 53, of Millville, New Jersey, who was sentenced in March to 151 months in prison;
  • Paul Challender, 54 of Big Rapids, Michigan, who was sentenced in March to 151 months in prison; and
  • William Ho, 39, of Hacienda Heights, California, who was sentenced in March to 135 months in prison. 

All five men charged in this case pleaded guilty to one count of conspiracy to transport, receive, distribute and possess child pornography. They all admitted being part of the Quest4More bulletin board, which was used to distribute illegal images and videos depicting prepubescent children, including toddlers being subjected to various sexual and sadistic acts. The group also posted links to other sites that had images of child sexual abuse. Law enforcement was alerted to the group following the arrest of one of its members in 2008.

Each defendant made hundreds of posts to the bulletin board. Wright, for example, was one of the more prolific users of the bulletin board, making more than 400 posts, although he did not post any pictures to the site.
Wright was sentenced to 10 years of supervised release and the four other defendants were sentenced to a lifetime of supervised release following their prison terms.

This case was brought as part of Project Safe Childhood, a U.S. wide initiative to combat the growing epidemic of child sexual exploitation and abuse, launched in May
2006 by the Department of Justice.

source: www.cybercrime.gov

Monday, 27 June 2011

DEPARTMENT OF JUSTICE DISRUPTS INTERNATIONAL CYBERCRIME RINGS DISTRIBUTING SCAREWARE "Very Important"

JUNE 22, 2011 WASHINGTON –
Today the Department of Justice and the FBI, along with international law enforcement partners, announced the indictment of two individuals from Latvia and the seizure of more than 40 computers, servers and bank accounts as part of Operation Trident Tribunal, an ongoing, coordinated enforcement action targeting international cybercrime. The operation targeted international cybercrime rings that caused more than $74 million in total losses to more than one million computer users through the sale of fraudulent computer security software known as “scareware.”

Scareware is malicious software that poses as legitimate computer security software and purports to detect a variety of threats on the affected computer that do not actually exist. Users are then informed they must purchase what they are told is anti-virus software in order to repair their computers. The users are then barraged with aggressive and disruptive notifications until
they supply their credit card number and pay for the “anti-virus” product, which is, in fact, fake.

Warrants obtained from the U.S. District Court for the Western District of Washington and elsewhere throughout the United States led to the seizure of 22 computers and servers in the United States that were involved in facilitating and operating a scareware scheme. In addition, 25 computers and servers located abroad were taken down as part of the operation, including equipment in the Netherlands, Latvia, Germany, France, Lithuania, Sweden and the United Kingdom.
The first of the international criminal groups disrupted by Operation Trident Tribunal infected hundreds of thousands of computers with scareware and sold more than $72 million worth of the fake antivirus product over a three-year period. The scareware scheme used a variety of ruses to trick consumers into unknowingly infecting their computers with the malicious scareware products, including web pages featuring fake computer scans. Once the
scareware was downloaded, victims were notified that their computers were infected with a range of malicious software, such as viruses and Trojans and badgered into purchasing the fake
antivirus software to resolve the non-existent problem at a cost of up to $129. An estimated  960,000 users were victimized by this scareware scheme, leading to $72 million in actual losses.
Latvian authorities also executed seizure warrants for at least five bank accounts that were alleged to have been used to funnel profits to the scam’s leadership.
A second international crime ring disrupted by Operation Trident Tribunal relied on online advertising to spread its scareware products, a tactic known as “malvertising.” An indictment unsealed today in U.S. District Court in Minneapolis charges the two  perators of this scareware scheme with two counts of wire fraud, one count of conspiracy to commit wire fraud and one count of computer fraud. The defendants, Peteris Sahurovs, 22, and Marina Maslobojeva, 23, were arrested yesterday in Rezekne, Latvia, on the charges filed in the District of Minnesota. According to the indictment, the defendants created a phony advertising agency
and claimed that they represented a hotel chain that wanted to purchase online advertising space on the Minneapolis Star Tribune’s news website, startribune.com. The defendants provided an electronic version of the advertisement for the hotel chain to the Star Tribune, and technical staff
at startribune.com tested the advertising and found it to operate normally.
According to court documents, after the advertisement began running on the website, the defendants changed the computer code in the ad so that the computers of visitors to startribune.com were infected with a malicious software program that launched scareware on their systems. The scareware caused users’ computers to “freeze up” and then generate a series of pop-up warnings in an attempt to trick users into purchasing purported “antivirus” software,
which was, in fact, fake. Users’ computers “unfroze” if the users paid the defendants for the fake antivirus software, but the malicious software remained hidden on their computers. Users who
failed to purchase the fake antivirus software found that all information, data and files stored on the computer became inaccessible. The scam allegedly led to at least $2 million in losses. If convicted, the defendants face penalties of up to 20 years in prison and fines of up to $250,000 on the wire fraud and conspiracy charges, and up to 10 years in prison and fines of up to $250,000 on the computer fraud charge. The defendants also face restitution and forfeiture of their illegal profits. An indictment is merely a charge and defendants are presumed innocent until proven guilty.

To avoid falling victim to a scareware scheme, computer users should avoid purchasing computer security products that use unsolicited “free computer scans” to sell their products. It is
also important for users to protect their computers by maintaining an updated operating system and using legitimate, up-to-date antivirus software, which can detect and remove fraudulent scareware products.

Additional tips on how to spot a scareware scam include:

- Scareware advertising is difficult to dismiss. Scareware purveyors employ aggressive techniques and badger users with pop-up messages into purchasing their products. These fake alerts are often difficult to close and quickly reappear.

- Fake anti-virus products are designed to appear legitimate, and can use names such as Virus Shield, Antivirus or VirusRemover. Only install software from trusted sources that you seek out. Internet service providers often make name-brand anti-virus products available to their customers for free.

Become familiar with the brand, look and functionality of the legitimate anti-virus software that is installed on your computer. This will assist you in identifying scareware.

source: www.cybercrime.gov

Identity Theft

All over the world, Identity theft is a fast growing crime. Statistics say that it is one of the fastest growing crimes in America primarily because of their reliance on credit card numbers and Social Security Numbers to make transactions. Because of this, people can take these for granted and make your life a living hell. If numbers are the Devil's language, than an identity thief is the devil himself.
Anyone who relies heavily on credit cards, Social Security Numbers or network blogging is more susceptible to credit identity theft. Many of our modern conveniences also come with a risk and less protection. The digital age is the perfect age for the Cyber criminal to commit it. Think of the internet as a dark alley in the middle of the night. And these cyber criminals are those people hiding there waiting for you to make a mistake.
Credit identity theft is a very damaging crime because it not only damages the person financially but also damages the person's reputation as well. Imagine someone borrowing money using your name and never telling you. You will both bear with the burden of paying back the money he borrowed and suffer the humiliation of having this blunder under your name.
Now that we know that identity theft is a serious threat, what do we do to take care of it? First of all be weary of who you are going to send out your personal information to. People who perform credit identity theft can be ruthless. For one, they have no care for any of their victims and would bury them in debt if the chance comes. Secondly, it is a crime that relies on ambiguity. A person performing credit identity theft usually never met their victim personally and thus would least likely feel guilty stealing his identity.
We have to always keep a look out for telltale signs of possible phishers in the internet. Such as strange emails saying you won a prize especially if you never joined anything. Many emails such as this should be dismissed if they ask you for too much information such as your social security number. A legitimate prize does not ask for your Social Security Number as a proof of your identity.
Links that point to strange URLs are also possible phishing sites. Make sure that the URLs have an HTTP at the beginning to assure that you won't be a victim.
On the off chance that you become a victim of identity theft, stay calm and try and make an identity theft check. Make a trace of all transactions you made within this past two weeks and look for something suspicious such as transactions you never did. If you find any, close all these accounts immediately and double check if other existing accounts have been created in your name.
It is important to close all accounts as soon as you learn that you are a victim so that you can begin to repair the damage that has already been made before it gets any worse. Making a regular identity theft check on your accounts will help ward off phishers from accessing any personal information about you. It may not be possible to completely stop identity theft, but if you can't stop them, at least give them a harder time trying to get it.


Article Source: http://EzineArticles.com/3119132

BELARUSIAN NATIONAL IS SENTENCED TO 41 MONTHS IN PRISON FOR PARTICIPATING IN INTERNATIONAL ONLINE SCHEME TO STEAL U.S. TAX REFUNDS

WASHINGTON – A Belarusian national and resident of Nantucket, Mass., was sentenced today in federal court to 41 months in prison for his participation in an international online scheme to steal income tax refunds from U.S. taxpayers around the U.S.

Mikalai Mardakhayeu, 31, was sentenced by U.S. District Court Judge George A. O’Toole Jr. in the District of Massachusetts. Mardakhayeu pleaded guilty in January 2011 to one count of conspiracy and nine counts of wire fraud. Judge O’Toole also sentenced Mardakhayeu to two years of supervised release and ordered him to pay $209,000 in restitution.

According to court documents and information presented at the change of plea hearing, from 2006 through 2007, Mardakhayeu’s co-conspirators lured victims by operating websites that falsely claimed to be authorized by the IRS to offer lower-income taxpayers free online tax return preparation and electronic tax return filing (e-filing). After taxpayers input and uploaded their tax information, co-conspirators in Belarus collected the data and altered the returns to increase the refund amounts and to direct the refunds to U.S. bank accounts controlled by Mardakhayeu. They then caused the fraudulently altered returns to be e-filed with the IRS. The conspirators ultimately caused the U.S. Treasury and various state treasury departments to deposit more than $200,000 in stolen refunds into bank accounts controlled by Mardakhayeu.


Source: www.cybercrime.gov

Saturday, 4 June 2011

Norton: Cybercrime strikes 83 percent of Internet users in Malaysia

Up to 83 percent of Internet users in Malaysia have fallen victim to cybercrimes, says security software maker Norton in a new study released recently.

According to the Norton Cybercrime Report: The Human Impact, the crimes include computer viruses, online credit card fraud and identity theft. This silent digital epidemic is the result of consumers´ apathy, which leaves them vulnerable and exposed in the online world.
Although one in three Malaysians blamed the criminals behind the cybercrime, one third of Malaysians felt highly responsible for cybercriminal activities that resulted from their response to online scams and phishing attacks.


However, solving cybercrime can be highly frustrating. According to the report, 45 percent of cybercrime victims in Malaysia have never fully resolved the cybercrime.


This is no surprise when it takes an average of 30 days and an average cost of MYR7,323 to come to a resolution. Twenty percent of the respondents said the biggest hassle they faced when dealing with cybercrime was the loss of irreplaceable data or items of sentimental value; and sixty percent said their biggest fear when it comes to being a victim of cybercrime is the financial loss.
Nevertheless, despite the hassle, reporting a cybercrime is critical.
"We all pay for cybercrime, either directly or through pass-along costs from our financial institutions," said Effendy Ibrahim, Internet safety advocate & consumer business head, Asia, Symantec.
"Cybercriminals purposely steal small amounts to remain undetected, but all of these add up. If you fail to report a loss, you may actually be helping the criminal stay under the radar. Ultimately, the cost of resolving cybercrime is losing money and time -- one way or another the victim is paying a ´price´ and the impact is not just financial but emotional too."


The report also examined the emotional impact of cybercrime and found that Malaysian victims´ strongest reactions are anger (73 percent), feeling cheated (55 percent) and upset (51 percent).
Besides cybercrime and its emotional impact, the report also looked at the "human aspect," which delved further into the little crimes or white lies consumers perpetrate against friends, family, loved ones and businesses.
Thirty-six percent of the respondents think it´s morally okay to download a single music track, album or movie without paying; 20 percent believe it is legal to secretly view someone else´s browser history files and 12 percent believe it is legal to check someone else´s emails.


However, these behaviours, such as downloading files, open people up to additional security threats as cybercriminals lurk in places where people download illegal content and make use of these channels to distribute malware.
Still, it is not all bad news. The good thing is that more than 80 percent of respondents feel that it´s unethical to sell someone´s personal information, hack into someone´s online account and use someone else´s personal information online.


The study shows that digital respect is given as Malaysians´ online rules include not passing along spam (73 percent), not passing along embarrasing photos (68 perecent), not bullying or threatening others online and not harassing or stalking people online (65 percent respectively).
The study serves as a stark reminder that there is still a need for people to take simple steps to protect themselves on the online space.


Source : http://gadgets.emedia.com.my/product.php?id=1205

Friday, 3 June 2011

COMPUTER PROGRAMMER SENTENCED TO FEDERAL PRISON FOR UNAUTHORIZED COMPUTER ACCESS

CHARLOTTE, NC - A former Bank of America (BOA) computer programmer was sentenced to 27 months in federal prison yesterday, to be followed by two years of supervised release for unauthorized access to the financial institution’s protected computers, announced Anne M. Tompkins, U.S. Attorney for the Western District of North Carolina. U.S. Attorney Tompkins is joined in making today’s announcement by Russell F. Nelson, Special Agent in Charge of the U.S. Secret Service, Charlotte Field Division.


U.S. District Judge Frank D. Whitney also ordered Rodney Reed Caverly, 54, of Mint Hill to pay restitution in the amount of $419,310.90. The restitution amount includes $284,750 Caverly stole from ATMs and $134,750.90 in costs incurred by BOA to remove from the bank’s ATM computer system a malicious computer code entered by Caverly. U.S. Secret Service agents also recovered $167,010 of stolen cash based on information provided by the defendant.


According to court records and sentencing proceedings, Caverly, who was hired by BOA to design and maintain its computer systems, had been assigned to work on a project involving the bank’s automated teller machine (ATM) system. Filed documents and court records show that from March 2009 to October 2009, Caverly knowingly and with intent to defraud exceeded his authorized access by gaining access to one or more protected BOA computers and deployed a malicious computer code to select BOA ATMs. The malicious code caused a limited number of infected ATMs to disburse cash from the ATMs without any transaction record of the cash disbursements.


The code Caverly entered caused only the unauthorized disbursement of cash stored in the ATM machines and did not affect any financial accounts of BOA’s customers.
Caverly pleaded guilty on April 13, 2010 and was released pending his sentencing hearing. Upon designation to a federal facility, he will report to the custody of the Federal Bureau of Prisons. Federal sentences are served without the possibility of parole.

Thursday, 2 June 2011

Be careful what you share online

"There’s just way too much information  in internet and a lot of people who are looking for it generally not for good purposes,"


You're getting ready for a vacation or for a night out with friends. As part of your routine, you post an update on Facebook or send a tweet.

Keri McMullen didn't think anything of doing the same thing, updating her Facebook status with her plans to attend a concert. When she got back home, $10,000 worth of her possessions was gone.
"I posted that on my Facebook page, who the band was, where we were going. The band started at 8," she said.
The burglary was caught on security video that the woman had running in her home.
One of the suspects was one of McMullen's 500 Facebook friends, a man she hadn't seen in 20 years.
Police believe her status update tipped off the burglars.
"I will never again put that I'm going anywhere on Facebook," McMullen said. "You really don't know who your friends are."
Stories such as McMullen's inspired the Web sitePleaseRobMe.com, which cautions against over-sharing your information on the Web.

"The more people know about us, especially the people we don't know and can't trust, the more at risk we are," Internet safety expert Parry Aftab said. "Think before you click, think before you post, think before you share too much information."
There are 400 million Facebook users worldwide. The Web site urges caution.
"Pick your friends just as carefully on Facebook as you do in real life … use the privacy tools to restrict more sensitive updates to your closest friends," the company told "Good Morning America" in a statement.
"Use privacy settings, make sure you're using those that lock out people you don't want," she said. "As Facebook said, choose your friends selectively. You're also going to make sure that you don't share information that you don't want to get out there even with your friends.

Tuesday, 31 May 2011

Children as a target for cyber criminals

While on-line computer exploration opens a world of possibilities for children, expanding their horizons and exposing them to different cultures and ways of life, they can be exposed to dangers as they hit the road exploring the information highway. There are individuals who attempt to sexually exploit children through the use of on-line services and the Internet. Some of these individuals gradually seduce their targets through the use of attention, affection, kindness, and even gifts. These individuals are often willing to devote considerable amounts of time, money, and energy in this process. They listen to and empathize with the problems of children. They will be aware of the latest music, hobbies, and interests of children. These individuals attempt to gradually lower children's inhibitions by slowly introducing sexual context and content into their conversations.


There are other individuals, however, who immediately engage in sexually explicit conversation with children. Some offenders primarily collect and trade child-pornographic images, while others seek face-to-face meetings with children via on-line contacts. It is important for parents to understand that children can be indirectly victimized through conversation, i.e. "chat," as well as the transfer of sexually explicit information and material. Computer-sex offenders may also be evaluating children they come in contact with on-line for future face-to-face contact and direct victimization. Parents and children should remember that a computer-sex offender can be any age or sex the person does not have to fit the caricature of a dirty, unkempt, older man wearing a raincoat to be someone who could harm a child.
Children, especially adolescents, are sometimes interested in and curious about sexuality and sexually explicit material. They may be moving away from the total control of parents and seeking to establish new relationships outside their family. Because they may be curious, children/adolescents sometimes use their on-line access to actively seek out such materials and individuals. Sex offenders targeting children will use and exploit these characteristics and needs. Some adolescent children may also be attracted to and lured by on-line offenders closer to their age who, although not technically child molesters, may be dangerous. Nevertheless, they have been seduced and manipulated by a clever offender and do not fully understand or recognize the potential danger of these contacts.
This guide was prepared from actual investigations involving child victims, as well as investigations where law enforcement officers posed as children.


Thursday, 19 May 2011

ATTEMPT TO HACK HOUSTON ATMs NETS NORTH CAROLINA RESIDENT A PRISON TERM

(HOUSTON) - A 20-year-old computer hacker from North Carolina has been sentenced to prison for planning to hack into Houston area ATMs, United States Attorney José Angel Moreno announced today.

Thor Morris, 20, of Jacksonville, N.C., was sentenced to 37 months in federal prison without parole for fraud and related activity in connection with computers, a violation of 18 U.S.C. Sec. 1030(a)(4) and (b). Indicted in July 2010 for knowingly and with the intent to defraud attempting to access a protected automated teller machine without authorization to obtain money, Morris pleaded guilty to the federal felony offense in January 2011. 

U.S. District Judge Vanessa Gilmore sentenced Morris to 37 months in federal prison without parole. The charges against Morris came after an intensive computer intrusion investigation was initiated by FBI-Houston’s Cyber Crimes Division in the early spring of 2010. Agents uncovered a scheme where Morris planned to travel to Houston to hack into approximately 35 ATMs located throughout the city in an attempt to embezzle more Than $200,000. FBI Agents arrested Morris while in the act of attempting to gain unauthorized access into a storefront ATM machine on April 22, 2010.

Morris has been permitted to remain on bond pending the issuance of an order to surrender to a Board of Prisons facility to be designated in the near future.

COLLEGE STUDENT CHARGED WITH CREATING AND DISSEMINATING COUNTERFEIT ONLINE COUPONS OVER THE INTERNET

PREET BHARARA, the United States Attorney for the Southern District of New York, and JANICE K. FEDARCYK, Assistant-Director-In-Charge of the New York Field Office of the Federal Bureau of Investigation ("FBI"), announced the unsealing of a criminal complaint charging LUCAS TOWNSEND HENDERSON with wire fraud and trafficking in counterfeit goods, in connection with his creation, dissemination and use of counterfeit online coupons for consumer and electronic goods ranging from Tide laundry detergent to PlayStations. 

As a result of HENDERSON’s conduct, retailers and manufacturers paid out on the coupons and lost hundreds of thousands of dollars through the scheme. HENDERSON surrendered in federal court in Rochester, New York, earlier today.

According to the Complaint unsealed today in Manhattan Federal Court:
Since July 2010, HENDERSON allegedly created fraudulent coupons designed to look like legitimate online print-at-home coupons available to consumers on the Internet at www.SmartSource.com. These counterfeit coupons, which ranged from lower-priced consumer items such as energy drinks, beer and cigarettes, to more expensive consumer products such as X-Box and PlayStation, all made unauthorized use of the "Powered by SmartSource" logo, as well as a distinctive border, both of which are registered trademarks belonging to News America Marketing, a subsidiary of Manhattan-based News Corporation.




Between July 2010 and March 2011, HENDERSON made a number of the counterfeit coupons he had created available on the Internet by anonymously posting on two message boards devoted to the discussion of online coupons – using the nicknames "Anonymous 123," "Anonymous234," and "Anonymous345." In addition to creating and disseminating fake coupons himself, HENDERSON also wrote tutorials, which he posted online, providing instructions to others for creating counterfeit coupons using their own computers.

HENDERSON’s actions have resulted in substantial losses not only to the manufacturers of various affected products but also to retailers and consumers themselves. For example, in or about December 2010, $200,000 worth of counterfeit coupons for Tide laundry detergent were redeemed by consumers over a two to three week period. Proctor & Gamble, which manufactures Tide and is the single largest coupon issuer in the United States, has never issued a single online print-at-home coupon. The costs associated with the redemption of those counterfeit coupons were subsequently borne by Proctor & Gamble and the various retailers victimized by the fraud.


HENDERSON, 22, of Lubbock, Texas, is charged with one count of wire fraud, which carries a maximum sentence of 20 years in prison, and one count of trafficking in counterfeit goods, which carries a maximum sentence of 10 years in prison. Mr. BHARARA praised the work of the FBI. He added that the investigation is continuing.
This case is being handled by the Office’s Complex