Josh Moulin: Cyberstalking Presentation

Post on 29-Nov-2014

532 views 0 download

description

In this presentation Josh Moulin provides information on Cyberstalking.

Transcript of Josh Moulin: Cyberstalking Presentation

CYBERSTALKINGJoshua S. MoulinJoshMoulin.com

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 2

Instructor Background Former Police Lieutenant / FBI Cyber Crime Task

Force Commander Former Forensic Lab Director of Accredited

Laboratory Internationally certified in Cyber Security, Digital

Forensics, and Incident Response Currently a contractor working in National

Security for the US Federal Government as the Digital Forensic/Incident Response Team Lead of a Cyber Security Office

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 3

Oregon Ranks 3rd Highest in the Nation Registered Sex Offenders Per Capita

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 4

Crimes Committed with Technology

Identity TheftDomestic ViolenceHomicide/Suicide

Internet Fraud/ForgeryE-mail ThreatsBomb Threats

Stalking & HarassmentMissing Persons

Child Exploitation & AbuseGambling

ProstitutionExtortionNarcotics

Software PiracyIntrusions/Hacking/Trade Secrets

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 5

Cyberstalking

Each year, 3.4 million Americans are the victims of stalking

65% of these stalking cases are initiated online!

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 6

Stalking Statistics 3 in 4 victims are stalked by someone they know 30% of victims are stalked by a current or former

partner 10% are stalked by a stranger 11% of victims have been stalked for 5 or more

years 46% of victims experience at least one unwanted

contact per week 10% of victims report being monitored with GPS,

8% with video/cameras/listening devices

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 7

Cyberstalking v. Offline Stalking - Similarities

The majority of cyber stalking suspects had an intimate relationship with the victim

Most victims are women and most suspects are men

Suspects are generally motivated by their desire to control the victim

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 8

Cyberstalking v. Offline Stalking - Differences

Cyber stalking suspects can be located anywhere they have Internet access, they aren’t restricted to being near the victim

Electronic communications make it easier for a cyber stalker to encourage a third party to threaten or harass the victim

Cyber stalkers feel they are hidden by the perceived anonymity of the Internet and often are more brazen then traditional stalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 9

Cyberstalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 10

Oregon Statistics

2010 Domestic Violence Counts

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 11

Technologies that Facilitate Stalking

Caller ID & Voice changer

Record calls Buy calling

cards with cash

Difficult to locate evidence

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 12

Call Spoofing

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 13

Mobile Phone Stalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 14

Mobile Phone Stalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 15

Mobile Phone Stalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 16

Mobile Phone Stalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 17

Technologies that Facilitate Stalking

Allows users to record messages using AOL Instant Messenger (AIM)

Is anonymous

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 18

Technologies that Facilitate Stalking

Instant Messaging (IM) and chat programs are commonly ways to encounter cyber stalkers

Viruses and other malware are prevalent

Some malware will infect a computer and allow suspects to track movements of the victim online

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 19

Technologies that Facilitate Stalking

Malware (Viruses, Trojan Horses, etc.) are available to allow remote access to a computer

Several software applications are designed to record user activity and send reports to a third party

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 20

Technologies that Facilitate Stalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 21

Technologies that Facilitate Stalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 22

Technologies that Facilitate Stalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 23

Technologies that Facilitate Stalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 24

GPS Tracking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 25

Social Networking in Cyberstalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 26

Social Networking in Cyberstalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 27

Social Networking in Cyberstalking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 28

Technology Tracking

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 29

Geotagging

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 30

Tips to avoid becoming a victim of Cyberstalking

Don’t respond to flaming (provocation online)

Choose a genderless screen name

Don’t flirt online – unless you are prepared for the consequences

Save offending messages and report them to your service provider

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 31

Tips to avoid becoming a victim of Cyberstalking

If a threat is made in a chat room or message board notify the moderator immediately

Don’t confront the stalker/harasser Get out of a situation online that has become

hostile Google yourself occasionally to see what

information is being posted about yourself (personal information)

Don’t accept files or open attachments from other users

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 32

Tips to avoid becoming a victim of Cyberstalking

Use strong passwords on all devices and don’t allow others to use your electronic devices

Be aware of social networking websites “checking you in” to locations and geotagging

Contact Information

Joshua S. Moulin – GCFA,CFCE,CAWFE,DFCP,ACE,CEECSCyber Security and Digital Forensics

http://JoshMoulin.comEmail: Josh@JoshMoulin.com

© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 33