13.07.2015 Views

Informant Vol 10 No 2 - 2013 Spring - National White Collar Crime ...

Informant Vol 10 No 2 - 2013 Spring - National White Collar Crime ...

Informant Vol 10 No 2 - 2013 Spring - National White Collar Crime ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

(4))lupea XCV.M , SCTIONMMY D.This one-day seminar will cover the following topics:• Outlining the basics of the salvage auction fraudenvironment• A look at the virtual picture: what’s going onright now online• Case studies: Hurricane Sandy and lessonslearned from Katrina• Investigating the crime via the InternetFRAuoAHEADTo learn more go to: www.nw3c.org/training/specialty-training/vehicle-auction-fraudt .Law enforcement, DMV investigators andregulatory personnel involved in autotheft, motor vehicle investigations andautomobile fraud matters will find this isan excellent introductory seminar.A new C.. .. ..n.. w.... nra4 tr:nunG rir-i2INFORMANT: SPRING/SUMMER <strong>2013</strong>


Table of Contents<strong>Informant</strong> <strong>Spring</strong>/Summer <strong>2013</strong>4 Preventing Online FraudExecutive StaffDon Brackman, DirectorKen Brooks, Deputy DirectorDave Cummings, Deputy DirectorMark Gage, Deputy DirectorMary-Ellen Kendall, General CounselEditorial StaffKim Williams, Communications ManagerElizabeth Singer, Senior Writer and EditorTy Bowers, Print and MultimediaContent CoordinatorLindsey Bousfield, Graphic DesignerContact UsInternet: www.nw3c.orgMember Services: 804-967-62<strong>10</strong>membership@nw3c.orgInvestigative Support: 800-221-4424,ext. 3520Training: 877-628-7674, ext. 2234IC3: www.ic3.gov5 Identifying Electronic Evidence: USB/Flash Drives6 Superstorm Sandy Disaster Fraud Task Force8 Virtual Patrol: Global ‘Tweet-a-thon’ Uses Twitter ® to Pull BackCurtain on Day-t0-Day Police Work<strong>10</strong> Facebook Privacy11 Sneak Peak: Gaming System Research12 Tracking Down Stolen Phones: Law Enforcement, Industry andFCC Work to Curb the Black Market in Stolen Wireless Devices13 Social Media Best Practices: Los Angeles County Sheriff’sDepartment Using Social Media to Prevent <strong>Crime</strong>14 The Salvage Automobile and the <strong>White</strong> <strong>Collar</strong> <strong>Crime</strong> Connection17 Teen Uses Malware to Hack Phones and Obtain ExplicitImages of Children18 Cybercrime Trends: Child Predators Using “Sextortion”19 Cell Phone Thefts Lead to Sextortion<strong>National</strong><strong>White</strong><strong>Collar</strong><strong>Crime</strong>Center@NW3CNewsThis project was supported by Grant <strong>No</strong>. 2011-BE-BX-K002 awarded by the Bureau of Justice Assistance. The Bureau of Justice Assistance is a component of the Office of Justice Programs,which also includes the Bureau of Justice Statistics, the <strong>National</strong> Institute of Justice, the Office of Juvenile Justice and Delinquency Prevention, the Office for Victims of <strong>Crime</strong>, and the Office ofSex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking. Points of view or opinions in this document are those of the author and do not necessarily represent the officialposition or policies of the U.S. Department of Justice. The <strong>National</strong> <strong>White</strong> <strong>Collar</strong> <strong>Crime</strong> Center (NW3C) is the copyright owner of this document. This information may not be used or reproducedin any form without express written permission of NW3C. For questions or additional information, please contact Kimberly Williams, Communications Manager at 1-800-221-4424 ext. 3320or kwilliams@nw3c.org. NW3C TM and IC3 ® are trademarks of NW3C, Inc. and may not be used without written permission.©<strong>2013</strong>. NW3C, Inc. d/b/a the <strong>National</strong> <strong>White</strong> <strong>Collar</strong> <strong>Crime</strong> Center. All rights reserved. Bureau of Justice AssistanceU.S. Department of JusticeWWW.NW3C.ORG 3


Preventing Online FraudBy Kim WilliamsAlarge number of peopledo not take adequatesteps to protectthemselves from losing moneyvia online scams. Clever fraudstersmay fool even computersavvy,well-educated people.Below are tips to share withpeople in your communitiesto help them sidestep cybercrimes.1. Do not order merchandise while on a public computeror in an establishment with a shared Wi-Fi connection.These networks may not be secure and credit card andother personal information could be stolen.2. If an email or a notice on a friend’s Facebook® “wall”sounds too good to be true, it probably is. <strong>No</strong> one is givingout a free iPhone just for filling out a form. Instead,a fraudster will probably use this form to gather personalinformation to sell to spammers, access accountsor steal identities.3. Do not provide personal information to an unsolicitedoffer. For instance, if an unsolicited email claims it isfrom your bank and requests accountnumbers or other personaldata, do not provide this information.If you are unsure if an emailis legitimate, follow up first with aphone call before providing informationonline.4. Be wary of anyone with whomyou are doing business who doesnot use good English or who is inanother country.5. Do not wire money to someone you do not know.Fraudsters typically request a wire transfer instead of acheck or online payment because it is difficult to trace.6. Do not agree to a “work from home” offer where youjust have to cash checks or “reship” items. If someoneoffers to pay you to do something that does not soundlike work, then it probably is not a legitimate job.7. Never give out your Social Security number to someoneyou do not have a confirmed business relationshipwith.8. If someone you are dealing with online offers to sendyou a check and allow you to keep part of it in exchangefor wiring part of it back (for whatever reason), do notdo it. This check will bounce.9. Whenever possible, purchase items online with a creditcard. Credit card transactions are traceable and manycredit card companies provide protection from fraud.<strong>10</strong>. Do not believe the promise of large sums of money inexchange for your cooperation.11. Make sure you use software that protects your computerfrom viruses and malware. Malware is a malicioussoftware that can steal personal information and disruptyour computer’s operations.12. Use strong passwords when conducting any type ofonline business. A strong password combines symbolsand numbers with upper and lower case letters, and isnine or more characters in length. Periodically changeyour passwords, and never use the same password formultiple accounts.13. Protect the important files and information on yourcomputer by backing up data via a reputable company,backup software or external hard drive.By sharing online crime preventiontips, law enforcement may helppeople in their communities protecttheir bank accounts and personalinformation.With so many people using the Internet, it is importantfor law enforcement to keep up with online scams and shareinformation with their communities (go to www.ic3.gov foronline scam updates). As of June 2012, more than 80 percentof the U.S. population used the Internet, and this numbercontinues to grow. In addition, new social media platformsare created each month, and existing social media programs,like Facebook, continue to attract large numbers of users. Bysharing online crime prevention tips, law enforcement mayhelp people in their communities protect their bank accountsand personal information.4INFORMANT: SPRING/SUMMER <strong>2013</strong>


Identifying Electronic EvidenceUSB/Flash DrivesAsuspect is arrested and, while searching, you collecta cell phone, wallet, lighter and a pack of gum.Which of these items may hold digital evidence?All of them.The cell phone is an obvious answer, but a lighter anda pack of gum? Some novelty USB/flash drives are easy tospot, but others are rather clever in their disguises. Thesedevices may be getting smaller and more unusual, but thestorage capacity is growing. For example, flash drives witha terabyte of storage are available to consumers (a terabytecan hold a million one-megabyte photos).Analysts from Sophos®, a digital security company,pulled random flash drives from the Sydney commutertrain station’s lost and found. They discovered that none ofthe drives held critical data; however, they did hold personaldata like photos, employment and financial informationabout the user, their family or friends. They alsodiscovered that none of the drives were password protectedor encrypted, allowing easy access to the data.USB/flash drives can look like action figures, rubberbracelets or other fun items, but developers have also becomecreative in integrating flash drives with items of uselike pens and lighters. NW3C’s Cyber-Investigations <strong>10</strong>0:Identifying and Seizing Electronic Evidence course teachesinvestigators techniques for identifying digital storagedevices (www.nw3c.org/computer-crime/19).Below are pictures of USB/flash drives that range fromquirky to well disguised. WWW.NW3C.ORG 5


Superstorm Sandy Disaster Fraud Task ForceBy Elizabeth SingerLast fall, Superstorm Sandy made its way up the eastcoast leaving a trail of destruction and devastationin its wake. Monmouth County, New Jersey, isone of many areas along the east coast to suffer significantdamage. More than <strong>10</strong>,000homes are in need of extensiverepair and FEMA received morethan 35,000 applications fromthis county alone.After surveying the damagein the area, Acting MonmouthCounty Prosecutor ChristopherJ. Gramiccioni decided to takea proactive approach to protectthe citizens in his districtby establishing the MonmouthCounty Superstorm SandyFraud Task Force.“As people work towards rebuildingtheir lives, some willsee this as an opportunity todefraud or engage in improperor negligent business practices.By establishing this Task Force,we can streamline citizens’ complaintprocess and provide a single,fully integrated entity to ensureprompt resolution of theircomplaint while simultaneouslyeducating the public about suchrisks and pitfalls in rebuilding,”said Acting Prosecutor Gramiccioni.A release from the Prosecutor’sOffice stated that the missionof the Superstorm Sandy Fraud Task Force missionis two-fold:1. Provide affected county residents with materials andinformation to help them avoid becoming victims ofunscrupulous home improvement contractors or conartists;and2. Provide county residents victimized by unscrupulouscontractors with a single integrated entity to receiveand assess complaints, coordinate a subsequent investigation,and provide relief or resolution for the aggrievedhomeowner or citizen.To accomplish this mission, Acting Prosecutor Gramiccionicontacted law enforcement and government agenciesin other states affected by serious disasters in the past. Oneresource, the Miami-Dade (FL) Office of the State Attorneyestablished a similar fraudtask force after Hurricane Andrew.They provided supportand materials to assist theprosecutor and his team withthe establishment of a plan.“Miami-Dade’s advice tous was to get out ahead ofit,” explained Acting ProsecutorGramiccioni. “We alsolearned from partners in theGulf, who were affected byKatrina, that disasters like thisbring out people looking tomake a quick buck and causefurther harm financially. Thatis what we are going to stop.”The Task Force is staffedby prosecutors, law enforcementofficers and regulatoryofficials from a number ofcounty, state and federal agencies,including the CountyProsecutor’s Office; the Sheriff’s Office; the Departmentof Consumer Affairs; theDivision on Aging, Disabilitiesand Veterans’ Services;the Division of Weights andMeasures; the Departmentof Parks and Recreation; theFederal Bureau of Investigation; and the Internal RevenueService.“We wanted all of these agencies working together underone roof to give customers a ‘one-stop-shop’ to help vetthe complaints to determine whether they are criminal orcivil matters, and then point the property owners to the appropriateagency to file their complaint,” Acting ProsecutorGramiccioni explained.The prosecutor’s office established command of thefraud center, and partner agencies signed off on a memorandumof agreement to participate for one year, but maycontinue longer if necessary.6INFORMANT: SPRING/SUMMER <strong>2013</strong>


“When we receive a call, the information is forwardedto me, and then the group reviews the issue to evaluate thesituation and assign the best agency to respond,” said AssistantProsecutor Andrew Fried of the Office’s Financial<strong>Crime</strong>s and Public Corruption Bureau, who oversees theTask Force.For some cases, sworn law enforcement officers speakto the accused to persuade them to right the wrong, byeither returning the money or completing the work. TheTask Force closed more than 15 cases without court orlegal process by using this method of law enforcementoutreach. Criminal cases make up <strong>10</strong> to 15 percent of thecomplaints and may require further legal intervention.“We continue to monitor and follow up with each caseto ensure it is properly handled,” Assistant ProsecutorFried said. As of February 5, <strong>2013</strong>, 60 cases were openedand more are likely to come in as citizens receive insuranceand Federal Emergency Management Agency monetaryrelief to start rebuilding.Acting Prosecutor Gramiccioni emphasized that thelarge majority of contractors are law-abiding citizens andgood people. This disaster has put residents in a uniquelyvulnerable position, which is not limited to just this area,but may affect any area struck by a disaster.Assistant Prosecutor Fried stated that the biggest challengefor them has been publicity, but they successfully metthis challenge. The Miami-Dade District Attorney’s Officealso emphasized that publicity is key.“Our public information officer has done a great job gettingthe word out about the Task Force,” Acting ProsecutorGramiccioni said. “We had established relationships withthe media, which helped, and we worked with the New JerseyTransit Authority to post free information. We also hadthe support of community groups, elected officials and advertisingagencies that gave us billboard space at a reducedcost.”Members of the Task Force are proactively workingwith municipal governments and media outlets to sharefraud prevention information. The aggressive campaignsupports the message that criminals and fraudsters shouldbe wary of trying to scheme citizens in Monmouth County.The Task Force has a physical location that allows citizensto engage in face-to-face time with Task Force members.Citizens can also contact the Task Force through the websiteat www.sandyfraud.com or the hotline at 1-855-SANDY39.If a disaster should strike in your area, Assistant ProsecutorFried advises it would be best to establish a fraudprevention task force as soon as possible.“Agencies working together can accomplish a lotmore than on our own. It is beneficial to have these partnersso we can enhance the ability to help the people inour community.”Some pre-planning may occur as part of an agency’scontinuity of operations or emergency response plan.However, establishing partnerships and relationshipswith other organizations prior to an event may help expeditethe formation of a fraud task force in response to adisaster.PROSECUTOR'S QFFICE<strong>10</strong>%The Monmouth County community has suffered great personal lossas a result of Supersronn Sandy. Some lost our homes, and manyothers have had to endure extensive damage to our property.In the wake of Superstorm Sandy, Monmouth County residents willturn to Horne Improvement Contractors (HICs) to repair and rebuildtheir storm-damaged properties and the Monmouth CountySuperstorm Sandy Fraud Task Force is here to help. The informationcontained in this brochure is Intended to help you avoid becomingthe victim of unscrupulous contractors or con-artists as thecommunity begins to heal from the wrath of superstomi Sandy.Christopher J. GramiccioniActing Monmouth County ProsecutorThe Monmouth County Prosecutor's OfficeSuperstorm Sandy Fraud Task Force1-(855)-SAN DY39SandyFraud.comWWW.NW3C.ORG 7


Virtual PatrolGlobal ‘Tweet-a-thon’ uses Twitter ® to pull back curtain on day-to-day police workBy Ty BowersOn paper, Master Patrol Officer Al Joyner’s shifton Friday, March 22 looked routine. The 18-yearRichmond (VA) Police Department (RPD) veteranbegan with a careful pass through some back streetsin an area of town that recently suffered a rash of burglaries.He took a citizen’s report of a roaming dog in theneighborhood and gave a brief search for the waywardanimal, despite his fear of dogs. He served some temporarydetention orders at the local hospital. He wrote aparking ticket, responded to two car crashes and madeseveral business checks.Screen shot highlighting tweets shared by law enforcementduring the “Tweet-a-thon.”Officer Joyner’s shift appeared routine in nearly everyrespect, save for one. Dionne Waugh, a member of theDepartment’s Public Affairs Unit, rode along with him,broadcasting updates and photos via Twitter® for most ofthe afternoon. The virtual ride along (“tweet-along”) wasa first for Richmond Police. In fact, Joyner and Waughjoined hundreds of other law enforcement professionalsin a global first – a 24-hour Police “Tweet-a-thon.” Usingthe Twitter hash tag #poltwt to identify their participatingtweets, more than 230 agencies worldwide joined in theevent. The goal of which, according to organizer Lauri Stevens,“was to call attention to the work police do and alsoto law enforcement use of social media.”Stevens’ LAwS Communications provides interactivemedia consultation services to law enforcement agencies,especially in the area of social media strategy. “Using socialmedia in law enforcement is more than the fluff somepeople (inside and outside law enforcement) think it is,”Stevens said. “I think (with the Global Tweet-a-thon) weachieved that and much more.”Positive FeedbackThe Global Tweet-a-thon attracted considerable attentionboth on Twitter and in the mainstream press. Ultimatelythe 24-hour event became a top-<strong>10</strong> trending topicon the site in the U.S., according to data compiled by theWeb-monitoring company BrightPlanet. News outletsthroughout the country filed reports documenting localagencies’ contributions to the effort.In Richmond, the reaction was similar. “We receivedpositive feedback, questions and some good-natured ribbingfrom some of our fellow agencies who have differentlevels of interest in social media use,” Waugh said. “Ithink most of them were quite curious about how it wouldwork, the responses we would get and the overall experience.Since we learn from each other’s experiences and weall talk about issues that cross jurisdictional boundaries, Ithink it was a good event that encouraged others to considerdoing something similar.”Worldwide, feedback from law enforcement, the pressand citizens was positive as well, Stevens noted. “The lawenforcement participants all seemed to think it was a hugesuccess given that it trended in the top <strong>10</strong> everywhere,starting in New Zealand and spreading to Europe andthen <strong>No</strong>rth America. Some of the comments from themwere absolutely, effusively positive.”In addition to the Public Affairs Unit, Richmond PoliceDeputy Chief John Buturla (@RPDDepChiefJB) andSector Lieutenant David Naoroz (@RPDLtDave) maintainTwitter accounts. During the Tweet-a-thon, both of themposted more often, taking the opportunity to “connectwith their fellow law enforcement tweeters from aroundthe world,” Waugh explained. “It was an eye-opening experiencefor all of us at Richmond Police to receive tweetsfrom Iceland and England and to read about crime andpolice issues around the world.”StrategyEach agency that participated in the event could determineprecisely how it would approach the concept,whether by “tweeting the beat” or posting about all callsfor service or some other mix of content.For instance, RPD decided it would participate on Fridayafternoon during the event because Twitter users aremost active during that time. The downtown area was tar-8INFORMANT: SPRING/SUMMER <strong>2013</strong>


geted because the Department thought residents, studentsand businesses would be most interested. “Then we lookedfor an officer who liked the idea and was happily willing toshare his patrol experience with everyone,” Waugh said.“And we were quite lucky that Master Police Officer AlJoyner volunteered for the assignment.”The key to pulling off a successful tweet-a-thon or“tweet-the-beat” event, Stevens said, comes down to goalsetting:What doesyour agency wantto accomplish? Takethe time to informfollowers about theevent and how theycan follow along andengage participatingofficers, she added.“As far as content,Twitter doesn’tchange anything.They should sharewhat’s appropriateand in accordancewith their departmentpolicy. Havingsaid that, it’s importantto be ‘real’ andnot to come acrossas the stereotypical stiff cop. Don’t be afraid to use humorand show a little personality. Also, enrich the tweets withphotos or video when possible as well.”Throughout the RPD tweet-a-thon, Waugh posted severalpictures of Joyner at work. At the conclusion of theDepartment’s participation in the event, she also posteda video message from the officer. Other agencies postedphotos and public service announcements, used Foursquare®to check into various locations while out on patrol,and linked to outside content or re-tweeted other colleagues’messages.“When it comes to handling public interactions, agenciesshould be prepared for positive and negative ones andjust plan in advance for how you want to respond,” Waughnoted. “The more prepared you are, the better you are ableto respond when you get questioned or criticized.”Overall, Waugh thought RPD’s participation in theTweet-a-thon benefited both the Department, “which getsto communicate and share information, and the community,which gets an ‘inside-look’ at policing that they normallydon’t see and they can ask questions and interact.”Future ‘Tweet-a-thons’Stevens would like to see certain states or regions organizesimilar events on their own in the future. “I think Texas, Massachusetts,Ontario (Canada), the entire United Kingdom orCalifornia had enough participants in the Global Tweet-athonthat they would be obvious candidates to organize similarevents,” she said.RPD received one tweeted suggestion that merits furtherconsideration,Waugh said. A followerproposed theconcept of tweetingfrom the city’s Divisionof EmergencyCommunicationsCenter (911 Center).The concept ofa tweet-a-thon ortweet-along is startingto take rootthroughout the U.S.at agencies big andsmall.In a case studyGoogle® Maps provides locations for “Tweet-a-thon” participants. Most were locatedin the U.S. and Great Britain.International Asso-published on theciation of Chiefs ofPolice (IACP) Center for Social Media website (www.iacpsocialmedia.org),the Arlington (TX) Police Department(APD) reports using tweet-alongs to build a robust onlinefollowing and reach out to its residents in a meaningful way.“Instead of highlighting a single officer during a shift, thePIO team touches on the work of many officers, highlightingdifferent types of calls and experiences,” APD staff wrote inthe IACP case study report.Further success with tweet-alongs has led APD to proposeteaming up with other agencies throughout the countryto conduct joint operations in the future. “APD now has conductedjoint tweet-alongs with the Fort Worth (TX) PoliceDepartment and has future plans with the Richmond (VA),Tampa (FL) and Las Vegas (NV) Departments,” the reportstated.“These events bring immense value to both RPD and thecommunity because they encourage communication andpromote information-sharing,” Waugh said. “We want peopleto know what we do, what an average day is like for anofficer and who these great officers are that the communityhas working for them.” WWW.NW3C.ORG 9


Facebook ® PrivacyIn an attempt to protect your information and privacy,you may have your Facebook information lockeddown or limited, but are your friends unknowinglysharing your personal information?Many Facebook users may be unaware that personaldata like birthdays, interests and photos can be accessedby third party apps that their friends are using. You mayhave passed up on the chance to play Candy Crush Sagabecause you did not want the app to access your information,but unless you lock down your app privacy settings,your information may still be accessed by the apps yourfriends are using. Quick Guide:How to Protect Your Personal Facebook Data1. On the upper right hand side of the Facebook menubar, click on the gear and select Privacy Settings.2. On the Privacy Settings and Tools page, select Appson the left-hand navigation bar.3. Under App settings, select the option for Appsothers use.4. Under the Apps others use box, you will see the informationthat you are sharing with other Apps. Be sureto unclick all the items you are not comfortable sharingand save changes.<strong>10</strong>INFORMANT: SPRING/SUMMER <strong>2013</strong>


Sneak PeakGaming System ResearchBy Elizabeth SingerThe days of simply playing QBert on Atari® are gone.Today’s gaming systems allow users to do muchmore than chomp through a maze. The top gamingsystems, Xbox®, Wii® and Playstation®, continue to evolveto enhance the gaming experience while integrating interactivecapabilities.These systems have memory capacity to store games,images and videos, while also connecting to the Internet.The Wii, for example, allows the user to download appsthat bring them to YouTube®, Netflix® and other websiteswith ease. Handheld gaming devices also offer WiFi connectivity.NW3C computer forensiccourses teach investigatorsabout wheredigital evidence may bestored on various gamingdevices. An Internet<strong>Crime</strong>s Against ChildrenTask Force may investigatea suspected childpornographer, and uponsearching the house failto find a computer. However,the suspect has agaming device, whichcould hold important informationrelated to the case.These systems also helped create a sub-culture of “secondlife” gamers. Multi-player, online games allow theplayers to enter a fantasy realm, where they can becomeogres, super heroes or other imaginary people. While inthese games, the players take on the personas of theircharacters and easily interact with others from aroundthe world.This gaming world is vast, and many take their secondlife personas very seriously. They spend hours on queststo gather riches or swords endowed with powers that holdvalue to the players. Even in a virtual world, crime exists.Reports of these objects stolen from gamers have emerged,and court systems in other countries have even looked athow to handle this type of crime.Police departments in the U.S. cannot investigate thetheft of a virtual sword, but online gaming is also a popularactivity for real-world criminals like hackers and gangmembers. It provides a place to meet to discuss activitiesand share information.Because these systems can hold essential digital evidence,NW3C computer crime specialists are tearingapart various gaming systems for a better understandingof how data can be retrieved. This team of specialists hasXbox 360®’s, PS3®’s, PSVita®’s, Wii®’s and Nintendo 3DS®’s.In a controlled environment they use testers to “play”with the devices andsearch the Internet tocreate a trail of evidence.Once this phase is complete,the specialistswork with the systems tosee if they can extract thedata for forensic analysis.The initial testingshowed that data fromthe two Sony® productsis encrypted, which maymake it unviewable. TheWii has flash memorywhich means that screencaptures may be necessaryto view information. The 3DS has a memory cardthat stores data in an easy-to-read format. It may also beeasy-to-extract data from the Xbox360, but with the needto sign into Xbox servers (where most of the informationis stored, i.e. chat messages, friends list, etc.), the data maybe limited.These findings are preliminary and offer just a snapshotof the beginning of this research. The next step willinclude a meeting with law enforcement subject matterexperts who will provide their ideas, expertise and experiencewith these systems. The Bureau of Justice Assistanceis supporting this research and, once completed,the specialists will produce a white paper outlining theirfindings. This white paper will be featured on the NW3Cwebsite as a resource for investigators. WWW.NW3C.ORG 11


Tracking Down Stolen PhonesLaw enforcement, Industry and FCC work to curb the black marketin stolen wireless devices12Wireless devices outnumber humans in this world.In the United States, the number of Internetconnectedphones and tablets now stands at 330million (the U.S. has more than 315 million residents). Thepopularity and value of these devices, which contain an extraordinaryamount of user data, invite theft.Cell phones were stolen in more than 30 percent of allrobberies nationwide in 2012, according to the Federal CommunicationsCommission (FCC). In the biggest cities, thepercentage was higher. In San Francisco, CA, and Washington,D.C., more than 40 percent of 2012 robberies involvedcell phones. Apple® products have become so popular amongthieves in New York City that police saw a 40-percent increasein thefts of iPads®, iPhones® and iPods® in the first ninemonths of 2012. Authorities in Boston, MA, have placed adsin the city’s buses and commuter trains warning riders of thethreat of cell phone theft.Washington, D.C., police were among the first in the nationto appeal to federal policymakers for a national solutionto the scourge of wireless theft. D.C. had seen a 54-percentincrease in cell phone thefts since 2007.Reuniting consumers with their lost or stolen phonesand tablets, however, can prove difficult to downright impossiblefor law enforcement. A large and lucrative blackmarket exists for these devices in the U.S. and abroad.Clamping down on the theft of wireless devices requires theconcerted effort of law enforcement, government, industryand consumers.Last fall, the four largest wireless carriers in the U.S. –AT&T, T-Mobile, Verizon and Sprint – switched on databasesthat would catalogue the International Mobile EquipmentIdentity (IMEI) number of every device using their respectiveservices. When a user reports a stolen phone or Internetenableddevice, the database blocks the IMEI number.INFORMANT: SPRING/SUMMER <strong>2013</strong>By Ty BowersPreviously, wireless carriers blocked the SIM (SubscriberIdentification Module) card of stolen phones, which preventedunauthorized calls. However, enterprising thieves easilyfound a way around that obstacle. They installed new SIMcards before re-selling the phones on the secondary market.IMEI numbers are unique to every device, a bit like anautomobile’s vehicle identification number plate. In the caseof a stolen phone, carriers can essentially render it useless – aterm called “bricking.”The Boston Police Department (BPD) actively advisesconsumers to consider “bricking” lost or stolen phones.“Bricking” cannot be undone. It renders all informationstored on a device inaccessible.Boston police logged more than 2,200 reports of stolenphones in 2012. “By bricking your phone, everybody wins.<strong>No</strong>t only will you protect your private information, but you’llalso help police eliminate the black market that exists forstolen smart phones,” BPD urged residents in a February 20,<strong>2013</strong> blog posting on its website. “Said another way, you canhelp reduce robberies by eliminating the reason criminalssteal smart phones in the first place.”Currently, AT&T and T-Mobile operate a common databasefor devices that use their network technology – GlobalSystem for Mobile Communications (GSM). Verizon andSprint, which both use CMDA (Code Division Multiple Access),operate their own databases.By <strong>No</strong>vember <strong>2013</strong>, those wireless providers, will linktheir respective databases in an effort to cover nearly all U.S.cell phone users, according to CTIA, the wireless industry’strade association. Smaller cellular providers have plans tolink to the larger database as well. CTIA worked with theFCC and police departments of major cities to develop thesephone and device databases as well as public education campaignsto promote more proactive behavior on the part ofconsumers to protect the data stored on their devices.All consumers who activate a new phone will receiveinstructions on how to lock their device remotely if it isever stolen.On its website, CTIA® (www.ctia.org) offers informationto consumers about how to handle a lost or stolen smartphoneor wireless device. The Association evaluates a numberof applications available for download that can remotelytrack, lock or erase smartphones.The FCC also offers a number of safety tips at www.fcc.gov/guides/stolen-and-lost-wireless-devices. These tips canbe used by police departments to aide citizens as well.


Social Media Best PracticesLos Angeles County Sheriff’s Department Using Social Media to Prevent <strong>Crime</strong>By Elizabeth SingerThe Los Angeles County Sheriff ’s Department(LASD) launched a new unit dedicated to monitoringand connecting through social media. Theunit, named the Electronic Communications Triage Unit(eComm) is an around-the-clock operation that is integratedinto the Department’s media and public outreach.“Social media is playing a large role in policing,” DeputyTony Moore said. “People want to receive informationthrough social media and other open-source tools.”LASD Captain Mike Parker commands the Sheriff ’sHeadquarters Bureau (SHB) and coordinates the Department’smedia and public outreach. He identified a needto create a dedicated unit for managing and monitoringLASD’s social media presence.The unit includes three deputies and five law enforcementtechnicians (who are civilian employees). The teamis responsible for maintaining multiple social media accountsthat include Facebook®, Twitter®, YouTube®, Nixle®and Pinterest®.“Law enforcement agencies need to understand thevalue of social media.” Deputy Moore said. “Even smallagencies can connect through Facebook, but it is importantto maintain the page. An empty page leaves a wrongimpression.”Community ConnectionThe <strong>No</strong>. 1 goal of eComm is to maintain a tool thatconnects LASD with the community. The LASD Facebookpage, for example, provides a look at staff on the job,news highlights and crime prevention/alerts. A recent postfeatured a story of a baby seal rescued by deputies after itstrayed into traffic.The baby seal story received numerous ‘likes,’ ‘shares’and comments, as it illustrates a more compassionate sideof law enforcement. Implementing social media can establisha more personal connection and put a face on lawenforcement. This connection can demonstrate that policeofficers are there to help – no matter the cost.eComm also monitors social media for mentions ofLASD for reputation management. “We respond to thecommunity to answer questions and prevent misinformationfrom spreading,” Deputy Moore explained. If law enforcementhas a presence on social media, people are morelikely to go to the source for information.SurveillanceSurveillance is integrated into LASD’s social mediamanagement. Keeping an eye out for mentions of illegalactivities or emergencysituations has createda new type of policingdubbed “we’re payingattention policing” byCaptain Parker. As such,the Department hasbeen featured on severalnews media outlets forthe use of social mediasurveillance to preventillegal parties often referredto as “FacebookParties.”Party organizers mayadvertise events openlyon social media, andannounce there will bedrugs and alcohol available.These parties promote underage drinking and druguse. Many have led to violence and gang activities.The eComm unit monitors social media for activitieslike these illegal parties, triages the information and forwardsit to the appropriate unit for response. In some casesthe information is forwarded to neighboring agencies.This surveillance and information sharing allows lawenforcement to intervene and stop the parties before theyhappen. Prior to social media monitoring, police wouldbe called to the parties, usually after fights erupted. Today,fewer parties take place.Deputy Moore explained “we knew advertisements forFacebook parties were there, but when they started advertisingNOZZ (nitrous oxide), alcohol and drugs, we startedmonitoring posts more closely.” Some advertisementsfor the parties state they charge for admission, which mayviolate municipal codes.Deputy Moore emphasized that eComm is not solelysurveillance, but is more focused on community relations.He also noted that LASD provides training for employeesand outside agencies throughout California on socialmedia.To view some of LASD’s social media sites go to:• http://pinterest.com/lacountysheriff/• https://www.facebook.com/LosAngelesCountySheriffsDepartment• https://twitter.com/LASDTalk• https://twitter.com/LASDChris WWW.NW3C.ORG 13


The Salvage Automobile and the <strong>White</strong> <strong>Collar</strong><strong>Crime</strong> ConnectionBy Howard Nusbaum, <strong>National</strong> Salvage Vehicle Reporting Program AdministratorUsed and salvaged vehicles are underappreciatedfor their capacity to serve as instruments forcriminal enterprises. Sales of these vehicles allowfor transferring large sums of money, yet require onlya very small footprint that is hard to trace. The businessof salvage vehicles has historically been poorly regulatedand monitored. Increasingly, transactions take place overthe Internet and on a global scale, making use of brokers,agents and fictitious entities to mask identities of the partiesengaged in the commerce.Improper titling, brandingand corruption in thesalvage car business createsan environment in which itis easy for criminals to exploitthis multi-billion-dollarmarket. Illicit ventures rangefrom consumer fraud anddomestic organized crimeto international organizedcrime and trade-based moneylaundering.Traditional vehicle monitoringfocuses on the theft,recovery and identificationof the vehicles, rather thanon trade-based money launderingand the identificationof the parties engagedin salvage vehicle auction fraud. A new course offered byNW3C educates law enforcement professionals about howto identify and fight this type of crime.Online auctions allow criminals to easily purchase carsand use titles and VIN numbers on stolen vehicles thatmatch the make of the salvaged car.What is online auto salvage fraud?When a wrecked, flooded or otherwise damaged vehicleis deemed a total loss by an insurance company, thecompany determines that it is more economical, to theinsurer, to pay off the claim (less the deductible) and sellthe vehicle in its unrepaired state. The next decision comeswhen the insurance company disposes of the vehicle. Inmost cases, insurance companies sell the vehicles theyhave acquired through total loss pay-offs at salvage autoauctions.Salvage auto auctions sell approximately 3.5 millionvehicles each year in the United States. Insurance companiesprovide approximately 80 percent of the vehicles soldat auction, but the salvage auctions also acquire vehiclesfrom banks and financial institutions, charities, car dealerships,fleet operators, vehicle rental companies and privateparties. Increasingly, these salvage auctions are doing theirbusiness online.Salvage vehicles have value beyond the sum of theirreusable parts when they can be sold with unbranded –or “clean” – titles or with “underbranded” titles that allowflood-damaged, badly burnt or otherwise significantlydamaged vehicles to be classifiedas repairable, meaningthey can legally be put backon the road.In some cases, unethicalintermediate buyers maypurchase these vehicles forresale. Because of the extentof the damage, bringing thevehicle back to safe operatingcondition is not profitableand resellers are likely tomake only minor repairs beforeoffering these extremelydamaged, and likely unsafe,vehicles for resale. In othercases, clean title and underbranded,badly damagedvehicles are purchased bycriminal groups for their paper work in order to “cover”subsequent thefts of other vehicles.The <strong>National</strong> Salvage Vehicle Reporting Program (NS-VRP), is a not-for-profit law enforcement support organizationdedicated to reducing auto theft, title fraud andabuse. NSVRP regularly monitors online auctions, trackingvehicles that are erroneously and sometimes illegallyoffered for sale with unbranded or clean titles, vehicleswhose titles are “skipped” when sellers avoid reporting requirementsillegally or through state and federal loopholesand vehicles whose titles are “washed” using interstatetransfers.NSVRP’s monitoring shows that underbranding resultingfrom improper and, in some cases, fraudulent initialassessment of the extent of the damage by insurers andother owners, who offer these badly damaged cars for sale,14INFORMANT: SPRING/SUMMER <strong>2013</strong>


can lead to enhanced bidding. Enhanced bidding providesincreased returns for the sellers and the auction companiesthat receive a percentage of the final sale price. Italso creates an environment in which these vehicles canbe used by criminals to defraud consumers or perpetrateother hard-to-trace crimes.Who are the players in perpetrating the fraud?After Hurricane Katrina hit the Gulf Coast in 2005,large numbers of flood damaged cars were reintroducedto the consumer marketplace. This was able to occur inpart due to weaknesses in the system at the time. Many improvementshave since been put into place to help addressthese weaknesses, including getting the <strong>National</strong> MotorVehicle Title Information System (NMVTIS) operational.NMVTIS is an electronic system established by federallaw in 1992 that enables state titling agencies, law enforcement,consumers, automotive recyclers and insurance carriersto access and verify key automobile titling information,including brand history. NMVTIS provides statesand consumers with enhanced protection from title fraud,making it more difficult for criminals to use salvage vehiclesfor criminal purposes, and provides better tools for law enforcementto identify, investigate and prosecute auto-relatedcrimes. As of 2009, all entities that handle used or junk vehicles,including insurers, fleet operators such as rental carcompanies, salvage pools, tow operators, automotive dismantlersand recyclers and others, are required by federalregulation to report to NMVTIS each salvage vehicle theytake into their possession, with some limited exceptions.However, even with the federal reporting and recordingrequirements of NMVTIS and the Odometer Act inplace, major businesses involved in the sale of used andsalvage vehicles and the parties that resell those vehiclesdomestically and internationally have continued to findopportunities to game the system.In fact, after Hurricane Sandy hit the mid-Atlanticstates in October 2012, NSVRP followed a sample of 213Hurricane Sandy flood-loss vehicles that were offered forsale through a number of salvage auctions which werenoted by those auctions on their websites as having beenflood-damaged vehicles. Of the 213 vehicles sampled, 123of those vehicles were not reported by these auctions intothe NMVTIS system as having been handled, as requiredunder federal law.Consumers may not be aware the used vehicle theyare purchasing once looked like this, and substandardrepairs may place them in danger.It appears that the problems with titling, brandingavoidance, NMVTIS non-compliance and title skippinghave been deliberate on the part of many parties, includingsalvage auto auction chains, the suppliers of the vehiclessuch as insurers and rental car companies, and others,and that the violations have taken place in spite of clearnotifications and policy advisories issued by the U.S. Departmentof Justice (DOJ), <strong>National</strong> Highway Traffic SafetyAdministration and other parties. The sales took placeover the Internet, with improperly titled or improperlybranded vehicles and where other federal violations ofNMVTIS or the Odometer Act took place. In many cases,the vehicles themselves crossed state boundaries.A significant new and alarming trend consists of largevolumes of inaccurately clean-title cars being bought forexport as part of trade-based money-laundering schemes(TBML). According to the founder of auto auction companyCopart, the fraction of cars being bought from theCopart pools by international buyers is now roughly 25percent of total sales. In December 2011 the U.S. indicted30 dealers under the USA Patriot Act for purchasing usedand salvage vehicles on behalf of Hezbollah and allegedlyshipping them to Benin for resale, with the funds depositedin accounts at the Lebanese Canadian Bank and transferredinto Hezbollah-controlled accounts. The amount ofmoney involved is substantial and was noted in the indictmentsto have been as much as $200 million dollars in onemonth.WWW.NW3C.ORG 15


How it affects the community and law enforcementMillions of salvage vehicles are sold each year. Nearlyevery online salvage auction NSVRP has monitored offersseverely damaged cars with inexplicably clean titles andmany are purchased at these auctions and resold with undisclosedprior damage to consumers.Often, the organizations lookingto resell these total losses to unsuspectingconsumers at near retailbook value are not small-time, inexperiencedgroups. Quite often, a reseller’ssite leads to multiple businessesoperating from fictitious addressesand parties with criminal records forautomotive-related crimes. They areoften clearly set up in a way that isdesigned to defraud unsuspectingconsumers and are more than likelyengaged in other activities that cause problems for law enforcement.In many cases, groups taking advantage of abuses inthe sale of used and salvage vehicles remarket badly damaged,clean-title vehicles to unsuspecting consumers whohave no idea of the true extent of the prior damage, thepotential for compromised safety and the likelihood thatadditional extensive repairs will be required in the not-sodistantfuture. Furthermore, by using the Internet and layersof insubstantial businesses, consumers have little in theway of protection from these sorts of practices.How can law enforcement become more active in fightingthis type of crime?DOJ cites salvage pools as “one of the most significantsources used by criminal groups as a source of paperworkand as a way to fund their operations.” While it is apparentthat global direct access to U.S. used and salvage auto auctionsis facilitating domestic and international crime andtrade-based money laundering in addition to domesticconsumer fraud, this activity is not very well understoodand it is very difficult to trace.However, once investigators know what to look for,lower-level leads can uncover enterprise-level crime activityin a surprising number of cases. When you see acloned car, or see a car that has been title washed, considerhow it happened. Quite often, this can lead back to a patternproblem and can serve as an entry point into a largerstructural problem.Recently, the San Juan New Mexico Sheriff ’s Office announcedaction against a business that had been illegallyengaged in the purchase of vehicles for the purpose of convertingthem to scrap. The Sheriff ’s Office reached out andNearly every online salvage auction NSVRPhas monitored offers severely damaged carswith inexplicably clean titles, and many arepurchased at these auctions and resold withundisclosed prior damage to consumersthrough various means.worked separately with DOJ and NSVRP to identify 533vehicles purchased in violation of NMVTIS, amountingto civil fines and penalties of nearly $60,000. One of thebusiness’ owners pleaded guilty to five counts of fraud andsentencing will take place later this year.A first step is to check and re-check all documentation,including the DMV title for genuine source information;state information for dual identities; and support documentssuch as emission labels, shipping labels, and colormatches.Furthermore, be sure to use all of the resources availableto you, including NMVTIS, the <strong>National</strong> Vehicle ServiceDatabase (NVS), NSVRP, <strong>National</strong> Insurance <strong>Crime</strong>Bureau and others.Depending upon the role of your agency, vehicles canrepresent more than just a question of a stolen car. If youare in a position to deal specifically with salvage or usedcars, you may be interested in looking at the <strong>National</strong><strong>White</strong> <strong>Collar</strong> <strong>Crime</strong> Center’s course to help law enforcementofficials identify structural problems in the sale ofused and salvage vehicles that are contributing to defraudingconsumers and enriching criminal organizations.To learn more about the Online Salvage Vehicle AuctionFraud seminar (funded by the Bureau of Justice Assistance)or to register go to www.nw3c.org/training/specialty-training/vehicle-auction-fraud16INFORMANT: SPRING/SUMMER <strong>2013</strong>


Teen Used Malware to Hack Phones andObtain Explicit Images of ChildrenBy Elizabeth SingerCobb County (GA) Police arrested a 17-year-old forhacking cell phones and posting explicit images ofminors on child pornography sites.Michael William Cook, of Acworth, Georgia,was charged with eight counts of crueltyto children and one count of sexually exploitingchildren. Cobb County Police SergeantDana Pierce said Cook was arrested and isaccused of posting photos of his victims to achild pornography website between <strong>No</strong>vember2012 and January <strong>2013</strong>.Sgt. Pierce advised the media that Cookhacked into the victims’ cell phones by sendingtext messages to his victims from a companycalled “Maxi Focus Photography.” Whenthe victims responded to the texts, malwarewas installed on their phones. This malware allowed Cookto access the victims’ accounts on social media and sexuallyexplicit photos stored on their phones.Sgt. Pierce explained that "Cook took the pictures outof there and sent them to pornographic websites.” Policeserved a search warrant at Cook’s Acworth home andseized his computer in order to search for more photosand, potentially, more victims.As of March 18, investigators knew of eight victims;the youngest of whom is 14 years old.Sgt. Pierce also discussed with the mediathat the challenge they face now is positivelyidentifying all of the victims in the pictures.Police are asking anyone who's correspondedwith “Maxi Focus Photography” to call theCobb County Police Department's <strong>Crime</strong>sAgainst Children Unit at (770) 801-3470.Cook did not contact the victims to extortmoney or more pictures, but this situationhighlights the danger of taking explicit picturesof oneself. Children, especially, need tounderstand the serious repercussions of takingand sharing photos of themselves.It is also important that smartphone users know itis risky to click on links from unexpected sources, andshould protect phones, computers and tablets againstmalware with securityware when possible.NNATIONAL WHITE COLLAR/I N TFG !;lME CENTE RS ERV ICENW3C ILooKIXTraining CourseThis 5-day course will teach participants how to use the fullcapabilities of the ILooKIX software for recovering and examiningdigital media.When: Courses will begin in August.Where: Fairmont, WVFor more information, consult http://www.nw3c.org/trainingWhat does ILooKIX training cover?• Case Initialization• Category Usage• Keyword Searches• Internet Artifact• IValult Integration• Encrypted Files Identification• File System Temporal Analysis• IXImager Usage• Hash Analysis• Registry Analysis• Metadata Analysis• File Deconstruction• GUI Familiarization• Salvage• Email Searches• Password Cracking• Human Image Detection ReportingWWW.NW3C.ORG 17


Cybercrime TrendsChild Predators Using ‘Sextortion’By Elizabeth SingerOnline sextortion is often described by authoritiesas a variant of “sexting” in which someoneassumes a false identity and manipulates victimsinto providing sexually explicit material.Most cases involve adults coercing other adults inthis twisted scheme. However, cases of child predatorsextorting sexually explicit pictures or videos from youngvictims have become more widespread. This alarmingtrend highlights the fact that children who are activeonline face a very real risk of coming into contact with apredator.These cases frequently involve pre-teens and teenagers,as they are more active on social media than youngerchildren. A national survey conducted by Common SenseMedia states that nine out of <strong>10</strong> teenagers in the U.S. usesocial media.“Today’s 13- to 17-year-olds are the first generation togo through their entire teen years with such an array ofdigital devices and platforms,” CEO and founder of CommonSense James P. Steyer said in a press release.Smartphones, tablets and other technologies allowteens more opportunities to connect to the Internet, butthey are less likely to take advantage of privacy settingsthat prevent strangers from gleaning information aboutthem. Children of this age may also not understand theconsequences of sharing information. A high number ofteens (58 percent) state they do not think posting photosor other personal information on social networking sitesis unsafe.The average teen user has morethan 200 friends or followers on Facebook®and Instagram®, and is morelikely to “friend” people that they donot know in the offline world. Theserisky behaviors help create a perfect storm for predatorsto creep in and connect with teenagers and tweens.Christopher Gunn 1 of Montgomery, AL, contacted hundredsof young girls across the country employing sextortionto gain pornographic videos and images of the girls. He wassentenced to 35 years in federal prison by U.S. District JudgeMark Fuller on Jan. 30, <strong>2013</strong>.Gunn used computers, chat rooms and other social mediato befriend and eventually coerce teenage girls into sendinghim explicit photos of themselves via the Internet. He posedas the new kid in town or even popular teen star Justin Bieberto build a friendship and gather secrets and photos.From a young age, children are taught not totalk to strangers, but this conversation oftendoes not include talking to strangers online.According to officials, Gunn would elicit intimate detailsfrom the girls, and as the online relationship becamemore intimate, Gunn pushed things further and requesteda photo of the victim in her bra. Next he would ask herto take more explicit pictures and if she refused he wouldthreaten to send previous conversations or photos to parents,friends and school officials.He was charged with producing child pornography andengaging in interstate extortion. The Gunn case is similarto others involving children and sextortion.To help protect their children, some parents use parentalcontrols, and have access to their children’s social mediasites. A survey conducted by online security companyMcAfee found that 23 percent of parents were not monitoringtheir children’s online behavior.Even if parents are keeping watch over their children,the same survey found that 70 percent of teenagers hidtheir online behavior from their parents in 2012.With children openly sharing information, connectingwith strangers and hiding their behavior from their parents,how can crimes like sextortion be stopped?The Gunn case, as well as others like it, can be used asan opportunity to teach children and young adults aboutonline dangers. From a young age, children are taught notto talk to strangers, but this conversation often does notinclude talking to strangers online.Law enforcement can engage children, parents andschool officials in conversations about protecting childrenonline. Tips to share include:1. Only follow friends that you know in person.2. Be wary of messages from unknown people who wantto befriend you.18INFORMANT: SPRING/SUMMER <strong>2013</strong>


3. Block users you don't know.4. Don't share personal information.5. Don't respond to unknown messages.6. Use privacy settings provided by social media sites.7. Never share information/pictures that you would notwant others to see.8. If anyone attempts to extort sexually explicit photos/videos or money contact the police immediately.9. Visit www.stopthinkconnect.org andwww.staysafeonline.org for more information.It is also important for law enforcement to know:• Cases often cross state lines, as the Internet allows predatorsto contact victims from anywhere with ease.• Victims as well as perpetrators can be either male orfemale.• Victims may be reluctant to report the crime or sharedetails about it for fear the perpetrator will act ontheir threats.• Some cases include women who entice men to performexplicit acts on webcams, with the recordedvideos used to blackmail the victim into providingmoney.• Online chat sessions may also spread malware to gainaccess to the victim’s computer. <strong>No</strong>tes:1. Middle District of Alabama U.S. Attorney George L.Beck, Jr. announced on January 30, <strong>2013</strong> that ChristopherPatrick Gunn, age 31 of Montgomery AL, was sentencedto 35 years in federal prison by U.S. District Judge MarkFuller. Gunn pleaded guilty to charges brought in theMiddle District of Alabama as well as the <strong>No</strong>rthernDistrict of Florida. His plea included two counts of makingchild pornography, 15 counts of interstate extortion, andseven counts of Internet stalking. www.justice.gov/usao/alm/press/<strong>2013</strong>/<strong>2013</strong>_01_23_gunn.html.Cell Phone Thefts Lead to SextortionBy Elizabeth SingerOnline sextortion cases usually involve people whointeract through social media or chat rooms andestablish a relationship that evolves into somethingmore sinister. Recent news reportshave uncovered the use ofexplicit pictures or videos on stolensmartphones to coerce potentialvictims into paying money orsending more pictures.A news report from LongBeach, CA discussed a womanwhose iPhone® was stolen. Storedon her phone were explicit photosthat she had taken of herself forher boyfriend. <strong>No</strong>t long after herphone was stolen, she receivedemails from a person threatening to distribute the photos ifshe did not pay $5,000. After she refused to pay, the personbegan demanding she send more explicit photos or he wouldpost them online.The victim cancelled her cell phone service, but the iPhone’sdata was still available and could be accessed through a Wi-Finetwork. The victim also did not change her social media andemail passwords after her phone was stolen, and she reportedthat she did not use the passcode lock on the device.Other victims have also come across explicit photos ofthemselves, posted on the Web, after their phones were stolen.Unlike the first victim, these people were not contactedto provide money or more pictures, but the shock and embarrassmentcan be overwhelming.Other cases involve minors whoparticipated in sexting and the imageswere leaked after their phoneswere stolen. Minors may face childpornography criminal charges ifthey are the perpetrators who postedthe pictures.Cell phone and digital camerausers need to beware – do not takepictures of yourself that you wouldnot want to end up on the Internet.Digital photos are shared in seconds.Once it is out there, you can not get it back. If you delete thepicture from your phone or computer, it can still be found.It is important for law enforcement to have tools necessaryfor analyzing data from cell phone providers and devices.NW3C’s Cyber Investigations <strong>10</strong>5 course provides the knowledgeand skill set to analyze data obtained from cell serviceproviders and Cyber Investigations 205 explains acquisitionand analysis of information internal to cell phones.To learn more about NW3C training and resources, go towww.nw3c.org. WWW.NW3C.ORG 19


The <strong>Informant</strong> is Moving!The <strong>Informant</strong> is moving to an online news Web page! Rather than producinga magazine, NW3C will launch a new section of its website dedicated tonews, trends and training updates. This site will be updated frequently toensure the latest news on financial crime and cybercrime is available.®9:3©c =00=INFORMANTVbliel 34 s, I^ficb,ghas startedtoga-rer more arcernonwrhc^^. gerer; lerrnaper: r]vlenn aeveC t w,e not*roei,c:s . .ann esar d er4 t"$mg1eo srrc ',30eflooriThe new NW3C news website will allowyou to:1. Stay up-to-date on the latest trends, newsand investigative information2. Easily read articles on your mobile device3. Sign up to receive email updates4. Share articles and information via socialmediameactegr npwn moeren; po.-; a sehar, raN ro reve,rarcene,.yea a mar e amp New cS,. raw o0maen y roam ,e na tiere o+Inl. ndarnerrIlU J29 .., nal br bn erforcenerr, a,ileadepn beammarearlgrwec rvanrc :m to Io emre::,amaK .re,. d law a nr,,er,r csammaem.P11yore, ; rae.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!