Do you have a Facebook account?
Do you know who is out there
viewing your profile?
You might be surprised!
Click on the link below to get this lesson on
Cyber Crime started :
(you must have a Facebook account to do this first activity…
if you don’t, find a friend or family member to help you. This is a secure and educational
activity, no personal information is saved.)
(You may need to update your Adobe Flash player to view this)
What IS Cyber Crime?
The Department of Justice categorizes computer
crime in three ways:
• The computer as a target: attacking the computers of
others (spreading viruses is an example).
• The computer as a weapon: using a computer to
commit "traditional crime" that we see in the physical
world (such as fraud or illegal gambling).
• The computer as an accessory: using a computer as a
"fancy filing cabinet" to store illegal or stolen information.
Types of Cyber Crime:
4- Cyber Terrorism
5- Online Pornography
The United Nations has categorized five offenses as cyber-crime:
unauthorized access, damage to computer data or programs,
sabotage to hinder the functioning of a computer system or
network, unauthorized interception of data to, from and within a
system or network, and computer espionage.
Click on this link to learn the definitions of each type of cyber crime.
Other types of inappropriate
online behavior :
go to this website to learn more!
• Spreading lies
• Can you think of
Go to this website to learn more!
Click below to view real-life stories of cyber crime in teen lives
Go to this link to read more about
During this lesson you learned what
cybercrime is, the 5 types of cybercrime,
other inappropriate online behavior and
explored several examples of how these
crimes affect peoples’ lives.
Be sure to use this information for your
BSA. (2012). Types of Cybercrime. B4USurf - Types of Cybercrime. Retrieved July 18, 2013, from
Cybercrime. (2012, April 27). YouTube. Retrieved July 18, 2013, from http://www.youtube.com/watch?v=-
Federal Bureau of Investigation. (2010, May 21). Cyber Crime Stories. FBI. Retrieved July 18, 2013, from
Jameson, B. (2013). Take This Lollipop. Take This Lollipop. Retrieved July 18, 2013, from
National Center for Missing & Exploited Children. (2013). NSTeens - Making Safer Online Choices. NSTeens.
Retrieved July 18, 2013, from http://www.nsteens.org/videos.aspx?Brand=Real-Life-Stories
National Conference of State Legislatures. (2013). State Cyberstalking and Cyberharassment Laws. National
Conference of State Legislators. Retrieved July 18, 2013, from http://www.ncsl.org/issues-
U.S. Department of Health & Human Services. (n.d.). Cyberbullying. Stopbullying.gov. Retrieved July 18,
2013, from http://www.stopbullying.gov/cyberbullying/