13.07.2015 Views

Informant Vol 10 No 2 - 2013 Spring - National White Collar Crime ...

Informant Vol 10 No 2 - 2013 Spring - National White Collar Crime ...

Informant Vol 10 No 2 - 2013 Spring - National White Collar Crime ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3. Block users you don't know.4. Don't share personal information.5. Don't respond to unknown messages.6. Use privacy settings provided by social media sites.7. Never share information/pictures that you would notwant others to see.8. If anyone attempts to extort sexually explicit photos/videos or money contact the police immediately.9. Visit www.stopthinkconnect.org andwww.staysafeonline.org for more information.It is also important for law enforcement to know:• Cases often cross state lines, as the Internet allows predatorsto contact victims from anywhere with ease.• Victims as well as perpetrators can be either male orfemale.• Victims may be reluctant to report the crime or sharedetails about it for fear the perpetrator will act ontheir threats.• Some cases include women who entice men to performexplicit acts on webcams, with the recordedvideos used to blackmail the victim into providingmoney.• Online chat sessions may also spread malware to gainaccess to the victim’s computer. <strong>No</strong>tes:1. Middle District of Alabama U.S. Attorney George L.Beck, Jr. announced on January 30, <strong>2013</strong> that ChristopherPatrick Gunn, age 31 of Montgomery AL, was sentencedto 35 years in federal prison by U.S. District Judge MarkFuller. Gunn pleaded guilty to charges brought in theMiddle District of Alabama as well as the <strong>No</strong>rthernDistrict of Florida. His plea included two counts of makingchild pornography, 15 counts of interstate extortion, andseven counts of Internet stalking. www.justice.gov/usao/alm/press/<strong>2013</strong>/<strong>2013</strong>_01_23_gunn.html.Cell Phone Thefts Lead to SextortionBy Elizabeth SingerOnline sextortion cases usually involve people whointeract through social media or chat rooms andestablish a relationship that evolves into somethingmore sinister. Recent news reportshave uncovered the use ofexplicit pictures or videos on stolensmartphones to coerce potentialvictims into paying money orsending more pictures.A news report from LongBeach, CA discussed a womanwhose iPhone® was stolen. Storedon her phone were explicit photosthat she had taken of herself forher boyfriend. <strong>No</strong>t long after herphone was stolen, she receivedemails from a person threatening to distribute the photos ifshe did not pay $5,000. After she refused to pay, the personbegan demanding she send more explicit photos or he wouldpost them online.The victim cancelled her cell phone service, but the iPhone’sdata was still available and could be accessed through a Wi-Finetwork. The victim also did not change her social media andemail passwords after her phone was stolen, and she reportedthat she did not use the passcode lock on the device.Other victims have also come across explicit photos ofthemselves, posted on the Web, after their phones were stolen.Unlike the first victim, these people were not contactedto provide money or more pictures, but the shock and embarrassmentcan be overwhelming.Other cases involve minors whoparticipated in sexting and the imageswere leaked after their phoneswere stolen. Minors may face childpornography criminal charges ifthey are the perpetrators who postedthe pictures.Cell phone and digital camerausers need to beware – do not takepictures of yourself that you wouldnot want to end up on the Internet.Digital photos are shared in seconds.Once it is out there, you can not get it back. If you delete thepicture from your phone or computer, it can still be found.It is important for law enforcement to have tools necessaryfor analyzing data from cell phone providers and devices.NW3C’s Cyber Investigations <strong>10</strong>5 course provides the knowledgeand skill set to analyze data obtained from cell serviceproviders and Cyber Investigations 205 explains acquisitionand analysis of information internal to cell phones.To learn more about NW3C training and resources, go towww.nw3c.org. WWW.NW3C.ORG 19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!