Joshua S. Moulin
JoshMoulin.com
Instructor Background
 Former Police Lieutenant / FBI Cyber Crime Task
Force Commander
 Former Forensic Lab Director of Accredited
Laboratory
 Internationally certified in Cyber Security,
Digital Forensics, and Incident Response
 Currently a contractor working in National
Security for the US Federal Government as the
Digital Forensic/Incident Response Team Lead
of a Cyber Security Office
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 2
Oregon Ranks 3rd Highest in the Nation
Registered Sex Offenders Per Capita
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 3
Crimes Committed with Technology
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 4
Identity Theft
Domestic Violence
Homicide/Suicide
Internet Fraud/Forgery
E-mail Threats
Bomb Threats
Stalking & Harassment
Missing Persons
Child Exploitation & Abuse
Gambling
Prostitution
Extortion
Narcotics
Software Piracy
Intrusions/Hacking/Trade Secrets
Cyberstalking
 Each year, 3.4
million Americans
are the victims of
stalking
 65% of these stalking
cases are initiated
online!
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 5
Stalking Statistics
 3 in 4 victims are stalked by someone they know
 30% of victims are stalked by a current or former
partner
 10% are stalked by a stranger
 11% of victims have been stalked for 5 or more
years
 46% of victims experience at least one unwanted
contact per week
 10% of victims report being monitored with GPS,
8% with video/cameras/listening devices
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 6
Cyberstalking v. Offline Stalking -
Similarities
 The majority of cyber stalking suspects had an
intimate relationship with the victim
 Most victims are women and most suspects are
men
 Suspects are generally motivated by their desire
to control the victim
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 7
Cyberstalking v. Offline Stalking -
Differences
 Cyber stalking suspects can be located
anywhere they have Internet access, they aren’t
restricted to being near the victim
 Electronic communications make it easier for a
cyber stalker to encourage a third party to
threaten or harass the victim
 Cyber stalkers feel they are hidden by the
perceived anonymity of the Internet and often
are more brazen then traditional stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 8
Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 9
Oregon Statistics
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 10
2010 Domestic Violence Counts
Technologies that Facilitate Stalking
 Caller ID &
Voice changer
 Record calls
 Buy calling
cards with
cash
 Difficult to
locate
evidence
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 11
Call Spoofing
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 12
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 13
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 14
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 15
Mobile Phone Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 16
Technologies that Facilitate Stalking
 Allows users to record
messages using AOL
Instant Messenger
(AIM)
 Is anonymous
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 17
Technologies that Facilitate Stalking
 Instant Messaging (IM) and
chat programs are commonly
ways to encounter cyber
stalkers
 Viruses and other malware are
prevalent
 Some malware will infect a
computer and allow suspects
to track movements of the
victim online
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 18
Technologies that Facilitate Stalking
 Malware (Viruses, Trojan
Horses, etc.) are available
to allow remote access to
a computer
 Several software
applications are designed
to record user activity and
send reports to a third
party
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 19
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 20
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 21
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 22
Technologies that Facilitate Stalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 23
GPS Tracking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 24
Social Networking in Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 25
Social Networking in
Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 26
Social Networking in Cyberstalking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 27
Technology Tracking
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 28
Geotagging
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 29
Tips to avoid becoming a victim of
Cyberstalking
 Don’t respond to flaming
(provocation online)
 Choose a genderless screen
name
 Don’t flirt online – unless
you are prepared for the
consequences
 Save offending messages
and report them to your
service provider
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 30
Tips to avoid becoming a victim of
Cyberstalking
 If a threat is made in a chat room or message
board notify the moderator immediately
 Don’t confront the stalker/harasser
 Get out of a situation online that has become
hostile
 Google yourself occasionally to see what
information is being posted about yourself
(personal information)
 Don’t accept files or open attachments from
other users
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 31
Tips to avoid becoming a victim of
Cyberstalking
 Use strong passwords on all devices and don’t
allow others to use your electronic devices
 Be aware of social networking websites
“checking you in” to locations and geotagging
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 32
Contact Information
Joshua S. Moulin – GCFA,CFCE,CAWFE,DFCP,ACE,CEECS
Cyber Security and Digital Forensics
http://JoshMoulin.com
Email: Josh@JoshMoulin.com
© Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 33

Josh Moulin: Cyberstalking Presentation

  • 1.
  • 2.
    Instructor Background  FormerPolice Lieutenant / FBI Cyber Crime Task Force Commander  Former Forensic Lab Director of Accredited Laboratory  Internationally certified in Cyber Security, Digital Forensics, and Incident Response  Currently a contractor working in National Security for the US Federal Government as the Digital Forensic/Incident Response Team Lead of a Cyber Security Office © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 2
  • 3.
    Oregon Ranks 3rdHighest in the Nation Registered Sex Offenders Per Capita © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 3
  • 4.
    Crimes Committed withTechnology © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 4 Identity Theft Domestic Violence Homicide/Suicide Internet Fraud/Forgery E-mail Threats Bomb Threats Stalking & Harassment Missing Persons Child Exploitation & Abuse Gambling Prostitution Extortion Narcotics Software Piracy Intrusions/Hacking/Trade Secrets
  • 5.
    Cyberstalking  Each year,3.4 million Americans are the victims of stalking  65% of these stalking cases are initiated online! © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 5
  • 6.
    Stalking Statistics  3in 4 victims are stalked by someone they know  30% of victims are stalked by a current or former partner  10% are stalked by a stranger  11% of victims have been stalked for 5 or more years  46% of victims experience at least one unwanted contact per week  10% of victims report being monitored with GPS, 8% with video/cameras/listening devices © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 6
  • 7.
    Cyberstalking v. OfflineStalking - Similarities  The majority of cyber stalking suspects had an intimate relationship with the victim  Most victims are women and most suspects are men  Suspects are generally motivated by their desire to control the victim © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 7
  • 8.
    Cyberstalking v. OfflineStalking - Differences  Cyber stalking suspects can be located anywhere they have Internet access, they aren’t restricted to being near the victim  Electronic communications make it easier for a cyber stalker to encourage a third party to threaten or harass the victim  Cyber stalkers feel they are hidden by the perceived anonymity of the Internet and often are more brazen then traditional stalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 8
  • 9.
    Cyberstalking © Josh Moulin- GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 9
  • 10.
    Oregon Statistics © JoshMoulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 10 2010 Domestic Violence Counts
  • 11.
    Technologies that FacilitateStalking  Caller ID & Voice changer  Record calls  Buy calling cards with cash  Difficult to locate evidence © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 11
  • 12.
    Call Spoofing © JoshMoulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 12
  • 13.
    Mobile Phone Stalking ©Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 13
  • 14.
    Mobile Phone Stalking ©Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 14
  • 15.
    Mobile Phone Stalking ©Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 15
  • 16.
    Mobile Phone Stalking ©Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 16
  • 17.
    Technologies that FacilitateStalking  Allows users to record messages using AOL Instant Messenger (AIM)  Is anonymous © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 17
  • 18.
    Technologies that FacilitateStalking  Instant Messaging (IM) and chat programs are commonly ways to encounter cyber stalkers  Viruses and other malware are prevalent  Some malware will infect a computer and allow suspects to track movements of the victim online © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 18
  • 19.
    Technologies that FacilitateStalking  Malware (Viruses, Trojan Horses, etc.) are available to allow remote access to a computer  Several software applications are designed to record user activity and send reports to a third party © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 19
  • 20.
    Technologies that FacilitateStalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 20
  • 21.
    Technologies that FacilitateStalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 21
  • 22.
    Technologies that FacilitateStalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 22
  • 23.
    Technologies that FacilitateStalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 23
  • 24.
    GPS Tracking © JoshMoulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 24
  • 25.
    Social Networking inCyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 25
  • 26.
    Social Networking in Cyberstalking ©Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 26
  • 27.
    Social Networking inCyberstalking © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 27
  • 28.
    Technology Tracking © JoshMoulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 28
  • 29.
    Geotagging © Josh Moulin- GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 29
  • 30.
    Tips to avoidbecoming a victim of Cyberstalking  Don’t respond to flaming (provocation online)  Choose a genderless screen name  Don’t flirt online – unless you are prepared for the consequences  Save offending messages and report them to your service provider © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 30
  • 31.
    Tips to avoidbecoming a victim of Cyberstalking  If a threat is made in a chat room or message board notify the moderator immediately  Don’t confront the stalker/harasser  Get out of a situation online that has become hostile  Google yourself occasionally to see what information is being posted about yourself (personal information)  Don’t accept files or open attachments from other users © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 31
  • 32.
    Tips to avoidbecoming a victim of Cyberstalking  Use strong passwords on all devices and don’t allow others to use your electronic devices  Be aware of social networking websites “checking you in” to locations and geotagging © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 32
  • 33.
    Contact Information Joshua S.Moulin – GCFA,CFCE,CAWFE,DFCP,ACE,CEECS Cyber Security and Digital Forensics http://JoshMoulin.com Email: Josh@JoshMoulin.com © Josh Moulin - GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 33