Your SlideShare is downloading. ×
Joshua S. Moulin
JoshMoulin.com
Instructor Background
 Former Police Lieutenant / FBI Cyber Crime Task
Force Commander
 Former Forensic Lab Director of ...
Oregon Ranks 3rd Highest in the Nation
Registered Sex Offenders Per Capita
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 3
Crimes Committed with Technology
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 4
Identity Theft
Domestic Violence
Homicid...
Cyberstalking
 Each year, 3.4
million Americans
are the victims of
stalking
 65% of these stalking
cases are initiated
o...
Stalking Statistics
 3 in 4 victims are stalked by someone they know
 30% of victims are stalked by a current or former
...
Cyberstalking v. Offline Stalking -
Similarities
 The majority of cyber stalking suspects had an
intimate relationship wi...
Cyberstalking v. Offline Stalking -
Differences
 Cyber stalking suspects can be located
anywhere they have Internet acces...
Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 9
Oregon Statistics
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 10
2010 Domestic Violence Counts
Technologies that Facilitate Stalking
 Caller ID &
Voice changer
 Record calls
 Buy calling
cards with
cash
 Difficult...
Call Spoofing
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 12
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 14
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 15
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 16
Technologies that Facilitate Stalking
 Allows users to record
messages using AOL
Instant Messenger
(AIM)
 Is anonymous
©...
Technologies that Facilitate Stalking
 Malware (Viruses, Trojan
Horses, etc.) are available
to allow remote access to
a c...
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 20
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 21
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 22
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 23
GPS Tracking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 24
Social Networking in Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 25
Social Networking in
Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 26
Social Networking in Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 27
Technology Tracking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 28
Tips to avoid becoming a victim of
Cyberstalking
 Don’t respond to flaming
(provocation online)
 Choose a genderless scr...
Tips to avoid becoming a victim of
Cyberstalking
 If a threat is made in a chat room or message
board notify the moderato...
Contact Information
Joshua S. Moulin – GCFA,CFCE,CAWFE,DFCP,ACE,CEECS
Cyber Security and Digital Forensics
http://JoshMoul...
Josh Moulin:  Cyberstalking Presentation
Josh Moulin:  Cyberstalking Presentation
Josh Moulin:  Cyberstalking Presentation
Josh Moulin:  Cyberstalking Presentation
Upcoming SlideShare
Loading in...5
×

Josh Moulin: Cyberstalking Presentation

637

Published on

In this presentation Josh Moulin provides information on Cyberstalking.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
637
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
53
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Josh Moulin: Cyberstalking Presentation"

  1. 1. Joshua S. Moulin JoshMoulin.com
  2. 2. Instructor Background  Former Police Lieutenant / FBI Cyber Crime Task Force Commander  Former Forensic Lab Director of Accredited Laboratory  Internationally certified in Cyber Security, Digital Forensics, and Incident Response  Currently a contractor working in National Security for the US Federal Government as the Digital Forensic/Incident Response Team Lead of a Cyber Security Office © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 2
  3. 3. Oregon Ranks 3rd Highest in the Nation Registered Sex Offenders Per Capita © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 3
  4. 4. Crimes Committed with Technology © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 4 Identity Theft Domestic Violence Homicide/Suicide Internet Fraud/Forgery E-mail Threats Bomb Threats Stalking & Harassment Missing Persons Child Exploitation & Abuse Gambling Prostitution Extortion Narcotics Software Piracy Intrusions/Hacking/Trade Secrets
  5. 5. Cyberstalking  Each year, 3.4 million Americans are the victims of stalking  65% of these stalking cases are initiated online! © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 5
  6. 6. Stalking Statistics  3 in 4 victims are stalked by someone they know  30% of victims are stalked by a current or former partner  10% are stalked by a stranger  11% of victims have been stalked for 5 or more years  46% of victims experience at least one unwanted contact per week  10% of victims report being monitored with GPS, 8% with video/cameras/listening devices © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 6
  7. 7. Cyberstalking v. Offline Stalking - Similarities  The majority of cyber stalking suspects had an intimate relationship with the victim  Most victims are women and most suspects are men  Suspects are generally motivated by their desire to control the victim © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 7
  8. 8. Cyberstalking v. Offline Stalking - Differences  Cyber stalking suspects can be located anywhere they have Internet access, they aren’t restricted to being near the victim  Electronic communications make it easier for a cyber stalker to encourage a third party to threaten or harass the victim  Cyber stalkers feel they are hidden by the perceived anonymity of the Internet and often are more brazen then traditional stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 8
  9. 9. Cyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 9
  10. 10. Oregon Statistics © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 10 2010 Domestic Violence Counts
  11. 11. Technologies that Facilitate Stalking  Caller ID & Voice changer  Record calls  Buy calling cards with cash  Difficult to locate evidence © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 11
  12. 12. Call Spoofing © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 12
  13. 13. Mobile Phone Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 13
  14. 14. Mobile Phone Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 14
  15. 15. Mobile Phone Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 15
  16. 16. Mobile Phone Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 16
  17. 17. Technologies that Facilitate Stalking  Allows users to record messages using AOL Instant Messenger (AIM)  Is anonymous © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 17
  18. 18. Technologies that Facilitate Stalking  Instant Messaging (IM) and chat programs are commonly ways to encounter cyber stalkers  Viruses and other malware are prevalent  Some malware will infect a computer and allow suspects to track movements of the victim online © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 18
  19. 19. Technologies that Facilitate Stalking  Malware (Viruses, Trojan Horses, etc.) are available to allow remote access to a computer  Several software applications are designed to record user activity and send reports to a third party © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 19
  20. 20. Technologies that Facilitate Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 20
  21. 21. Technologies that Facilitate Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 21
  22. 22. Technologies that Facilitate Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 22
  23. 23. Technologies that Facilitate Stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 23
  24. 24. GPS Tracking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 24
  25. 25. Social Networking in Cyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 25
  26. 26. Social Networking in Cyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 26
  27. 27. Social Networking in Cyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 27
  28. 28. Technology Tracking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 28
  29. 29. Geotagging © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 29
  30. 30. Tips to avoid becoming a victim of Cyberstalking  Don’t respond to flaming (provocation online)  Choose a genderless screen name  Don’t flirt online – unless you are prepared for the consequences  Save offending messages and report them to your service provider © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 30
  31. 31. Tips to avoid becoming a victim of Cyberstalking  If a threat is made in a chat room or message board notify the moderator immediately  Don’t confront the stalker/harasser  Get out of a situation online that has become hostile  Google yourself occasionally to see what information is being posted about yourself (personal information)  Don’t accept files or open attachments from other users © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 31
  32. 32. Tips to avoid becoming a victim of Cyberstalking  Use strong passwords on all devices and don’t allow others to use your electronic devices  Be aware of social networking websites “checking you in” to locations and geotagging © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 32
  33. 33. Contact Information Joshua S. Moulin – GCFA,CFCE,CAWFE,DFCP,ACE,CEECS Cyber Security and Digital Forensics http://JoshMoulin.com Email: Josh@JoshMoulin.com © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 33

×