Index

Symbols

419 scams, 194–195

how they profit, 196

reporting, 198

sample letter, 197

A

accounts, monitoring to prevent identity theft, 63

Accurint, 78

Adam Walsh Act, 117

alt.suicide.holiday (ASH), 150–152

AMBER Alerts, 172–175

cell phones, 175

America Online (AOL), 140

Amy Boyer’s Law, 13

annualcreditreport.com, 63–64

anonymity, Internet, 268

anonymizers, 40–41

Anonymous Postmaster

Early Warning System (APEWS), 190

anonymous remailers, 40

anti-cyber stalking legislations, 17

AOL (America Online), 140

APEWS (Anonymous Postmaster Early Warning System), 190

art teacher beating, 224

ASH (alt.suicide.holiday), 150–152

Ashcroft v Free Speech, 129

AT&T, 140

ATM cards, Operation Bot Roast, 247

Atwood, Alan Wirth, 116

auction fraud, 206

credit cards, 206

escrow services, 206

secure versus nonsecure transactions, 207

sellers, 206

authentication, cookies, 243

AutoComplete (Internet Explorer), 256

AVG Anti-Virus, 252

Avila, Florentino, 50–51

awareness of social networking sites, 152–157

Ayotte, Kelly, 203

B

backpacks, voyeurism, 55

Bartel, Marsha, 90

Barzee, Wanda Ileen, 174

Beaman, Judy, 165

Bedford, Mark, 165

Behl, Taylor, 155–156

Bennett, Brooke, 170–171

Benson, Nick, 201–202

Berry, Justin, 167

betterwhois.com, 34–35

bibcams, 167

Billings, Kim, 217

blacklists, 139

Bluetooth locating, 38

bot attacks, 245

bot herders, 245–246

botnets, 245–246

Operation Bot Roast, 247–248

trends in operations, 248

what to do if you’re infected, 249–250

bots, 246

symptoms of, 248–249

Boucher, Sebastian, 133–134

Boudreaux, James, 49

boundaries, eliminating territorial boundaries, 277

Boyer, Amy, 12–13

boylinks.com, 149

Breyer, Stephen, 219

Brooks, Sammie, 174

Brooks, Tamara, 173

Buckmaster, Jim, 167

Bundy, Ted, 79

business/commercial identity theft, 61

C

Caldwell, Trina, 59

call to action, phishing, 180

Caller ID, fake Caller ID, 42–45

cameras, 229

art teacher beating, 224

caught in a trap, 224–225

covert cameras, 284

Florida teen beating, 222–224

location stamps, 229

webcams, sexual deviance, 178

YouTube, 225–228

Campbell, Jacquelyn, 18

CAN-SPAM (Controlling the Assault of Non-Solicited Pornography and Marketing) Act, 191

Canvas, Guillermo, 105

Carpenter, Scott, 219

cars, locking, 266

cases against individuals accused of music piracy, 216

challenges to lawsuits, 218

cases of child sexual assault, Simmons, Douglas, 121

cases of crimes on camera

art teacher beating, 224

Florida teen beating, 222–224

cases of data breaches

Hannaford Brothers, 202–203

Pfizer Pharmaceuticals, 203

TJ Maxx, 199–202

cases of identity theft

Alicia M., 66

Caldwell, Trina, 59

cases of kiddie porn

Atwood, Alan Wirth, 116

Boucher, Sebastian, 133–134

Cobb, David, 114–115

Ethier, Raymond, 124

Fritz, 113

Jones, Jerry, 106–107

Schenberger, John, 123

Silva, Jacob, 111–112

Simoncini, Scott, 103–104

Tara series, 141–142

Zidel, Marshall, 130–131

cases of online dating, Marsalis, Jeffrey, 76

cases of scams, Nigerian scams, 195

cases of sex offense, plea agreements, 120

cases of sexual deviance, 166

Bedford, Mark, 165

Bennett, Brooke, 170–171

Berry, Justin, 167

cases of social networking gone awry

Behl, Taylor, 155–156

Meier, Megan, 152–154

Neblett, Rachel, 154

Underwood, Kevin Ray, 157

cases of spam

Fiola, Michael, 189

MySpace, 192–193

Yahoo!, 193–194

cases of voyeurism, Presken, Brian, 52–53

caught in a trap, cameras, 224–225

cell phones

AMBER Alerts, 175

Bluetooth locating, 38

cyber stalking, 6–8

pornography, 175

safety, 261–262

SIM cards, 284

Spam, 192

CEOS (Child Exploitation and Obscenity Section), 168

charity phishing scams, 183

chat sessions with predators (graphic), 93–100

chatcheaters.com, 284

Child Advocacy Centers, 143–145

Child Alert Foundation, 172

Child Exploitation and Obscenity Section (CEOS), 168

child exploitation and pornography. See kiddie porn

child predators, 100–101. See also kiddie porn

Internet and, 105–106

child prostitution, 167–169

Craigslist, 166–167

child sex rings, 170–171

Child Victim Identification Program (CVIP), 127–129

children

identity theft, 66

preventing, 67

Innocence Lost Initiative, 165–166

Internet and, 105

Internet safety guidelines, 146

social networking sites, 152–157

victims of sexual abuse, 143–145

civilians, as police, 277–278

clean wipe, discarding computers, 263

“The Cloak,” 40

Cobb, David, 114–115

Cohen, Charles, 275

Collins, Audrey B., 193

common sense, scams, 213

Commtouch, 246

computer key stroke stalking, 5–6

computer-generated kiddie porn, 124–126, 132–133

Zidel, Marshall, 130–131

computers

discarding, 262–264

laptops, recovering, 265

Conway, Jack, 73

cookies, 242–243

preventing, 243–244

Cornwell, Patricia, 15

covert cameras, 284

Craigslist, 11

sexual deviance, 162–164

child prostitution, 166–167

Cramer, Robert E. “Bud,” 143

credit card skimmers, 285

credit cards

auction fraud, 206

identity theft, 58

Operation Bot Roast, 247

credit reports, preventing identity theft, 63–66

children’s credit reports, 66–67

crimes on camera

location stamps, 229

YouTube, 225–228

criminal history checks, 77–79

criminal identity theft, 61

CSI versus reality, 287–289

Cuomo, Andrew, 139

customs searches, laptops, 135–136

cut (drugs), 233

CVIP (Child Victim Identification Program), 127–129

cyber bullying, 154

cyber crime

cyber terrorism and, 280–281

fighting, 269, 272

changing law enforcement’s paradigm of cyber crime, 270

collecting statistics, 271–273

cooperation with financial institutions, 270

cops on the cyber beat, 275

education for parents, 276–277

eliminating territorial boundaries, 277

more training for law enforcement, 279

“new” community, 276

parental controls, 273–274

reporting, 271

sharing information, 274

standardized forms, 279

tougher laws, 278

understand the changing nature of cyber crime, 280

using police civilians as experts, 277–278

virtual policing and cyber patrols, 275

multijurisdictional crimes, 269

reporting, 271

statistics, 272

victim’s perspective of, 268

cyber patrols, 275

cyber playground, 109

cyber stalking, 1–4

Bluetooth locating, 38

cell phones, 6–8

computer key stroke stalking, 5–6

e-cards, 14–15

GPS Snitch device, 1

“How I Stalked My Girlfriend,” 4–5

IP addresses, 39

law and, 16–17

lethality assessment tools, 18–19

National School Boards Association survey, 23–24

Draker, Anna, 26

Trosch, Erik, 24

online games, 22

packet sniffers, 37–38

preventing, 19

prevention resources, 26

safety, 23

seriousness of, 13–14

statistics for, 17

suggestions if you think you are being cyber stalked, 19–21

teen/tech stalking, 21–22

victims, 8

Wal-Mart t-shirts, 14

websites created to harm people

Boyer, Amy, 12–13

Isenberg, Dean, 11

Wi-Fi tracking, 37

women perpetrators, 26

cyber suicide, 151

cyber terrorism, 280–281

cyber war, 280

D

Dabic, Dragan, 228

dangers of spam, 188–189

data breach laws, 204–205

data breaches, 198–200

Hannaford Brothers, 202–203

Pfizer Pharmaceuticals, 203

Privacy Rights Clearinghouse, 205

TJ Maxx, 199–202

Verizon Business Security Solutions, 203–204

date rape drugs, 85, 235

Dateline NBC, To Catch a Predator, 89–93

dating, online dating, 75

crimes

lack of evidence, 85–86

men against women, 81–84

victim reluctance to report, 82–84

women against men, 86–87

criminal history checks, 77–79

date rape drugs, 85

dilemmas of, 79–82

Marsalis, Jeffrey, 76

safety, 77

safety tips, 88

Davis, Todd, 72

death threats, spam, 191

delays in notification of identity theft, 62

digital footprints, 28

discarding computers, 262–264

dog license registration, 31

domino flash drives, 286

donations, fraudulent donations, 70

DontDateHimGirl.com, 36

downblousing, 47–49. See also video voyeurism

Draker, Anna, 26

drug dealers, technology and, 238

informants, 239

tools of, 238–239

drugs

ecstasy, 232, 234

GHB (date rape drug), 235

marijuana, 236–237

methamphetamine, 236

recipes for, 235–236

methamphetamine, 236

steroids, 237–238

techie dealers, 231

rave parties, 232–235

Duckworth, Carol, 217

E

e-cards, cyber stalking, 14–15

e-venge, 35

DontDateHimGirl.com, 36

Ecstasy, 232–234

educating parents, 276–277

educators, cyber stalking, 23–24

Draker, Anna, 26

Trosch, Erik, 24

Eichenwald, Kurt, 168

Elbert, III, Don L., 166

electronic depots, 264

eliminating territorial boundaries, 277

empathy, lack of when considering dating crimes, 85–86

Emperor’s Club, 164

encryption, securing Wi-Fi, 260

End User License Agreement (EULA), 154, 244

hackers, 245

escrow services, auction fraud, 206

Ethier, Raymond, 124

EULA (End User License Agreement), 154, 244

hackers, 245

evidence, lack of in dating crimes, 85–86

evil twin spoofing, 259

Experian, 72

F

Facebook, sex offenders, 138

fake Caller ID, 42–45

fake name generators, 42

fake websites, 185–186

fakenamegenerator.com, 42

Faunce, Frederick, 9

Fawley, Ben, 155–156

Federal and Local Cops Organized Nationally (FALCON), 169

Federal Interstate Stalking Statute, 17

Feingold, Russell, 136

felonies versus misdemeanors, kiddie porn, 101–102

Ferreri, Anthony, 62

Fielder, Edna, 195

fighting cyber crime, 269, 272

changing law enforcement’s paradigm of cyber crime, 270

collecting statistics, 271–273

cooperation with financial institutions, 270

cops on the cyber beat, 275

education for parents, 276–277

eliminating territorial boundaries, 277

more training for law enforcement, 279

“new” community, 276

parental controls, 273–274

reporting, 271

sharing information, 274

standardized forms, 279

tougher laws, 278

understand the changing nature of cyber crime, 280

using police civilians as experts, 277–278

virtual policing, 275

fighting for changes to laws, 50

file-sharing applications, 218

financial identity theft, 61

Fiola, Michael, 189

Florida teen beating, 222–224

Franklin, Shirley, 166

fraud

identity theft. See identity theft

online auction fraud, 206

credit cards, 206

escrow services, 206

secure versus nonsecure transactions, 207

sellers, 206

fraud alerts, 64

fraudulent donations, 70

Friendster.com, 148

G

Gagnon, Raymond, 171

games (online)

cyber stalking, 22

malware, 23

GHB (date rape drug), 235

Glover, Steve, 48

Goldacre, Ben, 4

Gonzalez, Albert, 201

Goodwin, Keith, 166

Google

personal information, 28

research, 211

GPS (Global Positioning System), 4

cell phone tracking, 4

law enforcement, 9

GPS Snitch device, 1–2

Graham, Jim, 9

H

hackers, EULAs, 245

hacking, 256

into school systems, 256

Hagerman, Amber, 172

Halo, 22

Hannaford Brothers, 202–203

Hansen, Chris, 89

hi5.com, 148

HidePod, 228

hoaxes, 208

“How I Stalked My Girlfriend,” 4–5

Huskey, James Bartholomew, 142

Huskey, Sherri Ann, 142

hyperlinks phishing, 181–182

I

IC3 (Internet Crime Complaint Center), 71, 271

Phishing, 185

ICAC (Internet Crimes Against Children), 129, 140, 170

Tara series, 141–142

identity assumption, 9–10

identity cloning, 61

identity fraud versus identity theft, 59

identity theft, 57–58

Caldwell, Trina, 59

credit cards, 58

delays in notification, 62

fraudulent donations, 70

versus identity fraud, 59

P2P networks, 219

preventing, 63, 67–69

annual credit reports, 63–66

annual credit reports, children, 66–67

monitoring your accounts, 63

recovering from, 60–61

NCIC Identity Theft File, 60

shredding documents, 69–70

types of, 61

what to do if you’re a victim, 70–71

identity theft services, 72–73

LifeLock, 72

iDisguise.com, 265

IEA (involuntary emergency admission), 86

III (Interstate Intelligence Index), 77

illegal drugs. See drugs

InfidelityCheck.org, 284

informants, drug dealers, 239

Innocence Lost Initiative, 165–166

instincts, trusting, 208

Internet

anonymity of, 268

child predators and, 105–106

children and, 105

safety guidelines for children, 146

Internet Crime Complaint Center (IC3), 71, 271

Internet Crimes Against Children (ICAC), 129, 170

Interstate Intelligence Index (III), 77

involuntary emergency admission (IEA), 86

IP addresses, 38–40

iPods, 265–266

Isenberg, Dean, 11

J

Jacques, Michael, 170

jailbreaking, 228

Jones, Jerry, 106–107

Judd, Grady, 223

K

Karadzic, Radovan, 227

Keeping the Internet Devoid of Sexual Predators (KIDS) Act, 139

keylogging programs, 5

keystroke loggers, 283–284

keystroke stalking, 5–6

keystroke-logging programs, 6

kiddie porn, 89. See also child predators

across state lines, 113

cases of

Atwood, Alan Wirth, 116

Boucher, Sebastian, 133–134

Cobb, David, 114–115

Ethier, Raymond, 124

Fritz, 113

Jones, Jerry, 106–107

Schenberger, John, 123

Silva, Jacob, 111–112

Simoncini, Scott, 103–104

Zidel, Marshall, 130–131

collectors of, 113–114

hygiene issues, 116

lingerie, 117

computer-generated images, 124–126, 132–133

development of laws in U.S., 124

Landslide Productions, Inc., 129–130

laws, variations by state, 102

male versus female offenders, 107–109

misdemeanors versus felonies, 101–102

organizations of, 143

P2P networkrs, 219

predators. See child predators

shutting down websites with, 139–140

Tara series, 141–142

To Catch a Predator, 89–93

trading, 145

triple threats, 106

victims of, 143–145

kids, Internet and, 105

KIDS (Keeping the Internet Devoid of Sexual Predators) Act, 139

L

Landslide Productions, Inc., 129–130

LAP (Lethality Assessment Program), 18

laptops

customs searches, 135–136

recovering stolen laptops, 265

law enforcement

GPS, 9

social networking sites, 158

laws

cyber stalking and, 16–17

data breach laws, 204–205

fighting for changes to, 50

kiddie porn

development of laws in U.S., 124

variations by state, 102

loopholes and, 134–135

lawsuits, TJ Maxx, 200

Leahy, Patrick, 136

Legend of Mir 3, 22

Lethality Assessment Program (LAP), 18

lethality assessment tools, 18–19

LexusNexis, 78

LifeLock, 72

lingerie, kiddie porn collectors, 117

LiveJournal, 155

location stamps, cameras, 229

locator software, 265

locking your car, 266

Loehrs, Tami, 189

loopholes to laws, 134–135

M

mail theft, 68

makeadifferenceforkids.org, 154

malicious software, 23, 218, 245

malware, 23, 218

Malware City, 253

malware detection programs, 253

Marcille, Greg, 53

marijuana, 236–237

Marris, Herb, 174

Marris, Jacqueline, 173

Marsalis, Jeffrey, 76

Maryland Lethality Assessment Program for First Responders, 18

massively multiplayer online games (MMOGs), 22

Match.com, 86

McAfee Antivirus, 252

Meier, Megan, 152–153

men

kiddie porn, 107–109

versus women, scams, 213

metadata, 13

methamphetamine, 236

misdemeanors versus felonies, kiddie porn, 101–102

Missouri, trading kiddie porn, 145

Mitchell, Brian David, 174

MMOGs (massively multiplayer online games), 22

Mobile Adult Content Conference, 175

money mules, 211

MoneyGram, 210

monitoring accounts, preventing identity theft, 63

Moore, Kevin D., 136

multijurisdictional crimes, 269

music piracy, 215–216

cases against individuals, 216

P2P networks, 216

RIAA investigations, 217

challenges to lawsuits, 218

university cooperation, 217

MySpace, 147

fake profiles, 25

sex offenders, 138

spam, 192–193

mystery shoppers, 210

N

NAMBLA (North American Man Boy Love Association), 149

nanny cams, 54–55

National Alert Registry, 118

National Center for Missing and Exploited Children (NCMEC), 127

Child Victim Identification Program (CVIP), 127–129

survey of kids’ online behavior, 146

National Crime Information Center (NCIC), 77

National Incident-Based Reporting System), 272

National School Boards Association survey, cyber stalking, 23–24

Draker, Anna, 26

Trosch, Erik, 24

National Sex Offender Public Registry, 122–123

National White Collar Crime Center (NW3C), 71

NCIC (National Crime Information Center), 77

NCIC (National Crime Information Center) Identity Theft File, 60

NCMEC (National Center for Missing and Exploited Children), 127

Child Victim Identification Program (CVIP), 127–129

survey of kids’ online behavior, 146

Neblett, Mark, 154

Neblett, Rachel, 154

NetSmartz, 29

“new” communities, 276

NIBRS (National Incident-Based Reporting System), 272

Nigerian letter scam, 194–195

how they can profit, 196

reporting, 198

sample letter, 197

nonsecure transactions versus secure transactions, 207

North American Man Boy Love Association (NAMBLA), 149

notification of identity theft, delays in, 62

NW3C (National White Collar Crime Center), 71

O

online auction fraud, 206

credit cards, 206

escrow services, 206

secure versus nonsecure transactions, 207

sellers, 206

online dating, 75

crimes

lack of evidence, 85–86

men against women, 81–84

victim reluctance to report, 82–84

women against men, 86–87

criminal history checks, 77–79

date rape drugs, 85

dilemmas of, 79–82

Marsalis, Jeffrey, 76

safety, 77

safety tips, 88

online games

cyber stalking, 22

malware, 23

online memorials, 32

online profiles, 241

online safety

cell phones, 261–262

keeping your system updated, 251–252

passwords, 253–255

creating strong passwords, 254

hacking, 256

password management tools, 255

spyware and malware detection programs, 253

virus protection, 252

Wi-Fi, 256–257

evil twin spoofing, 259

piggybacking, 257

securing, 259–261

wardriving, 258

online suicides, 151

Operation Avalanche, 130

Operation Bot Roast, 247–248

Operation Cross Country, 165

Operation FALCON (Federal and Local Cops Organized Nationally), 169

Operation Raw Deal, steroids, 238

P

P2P (peer-to-peer) networks, 216–218

dangers of, 218

data breach, Supreme Court Justice’s personal information, 219

identity theft, 219

kiddie porn, sharing, 219

music piracy, 216

packet sniffers, 37–38

packets, 37

Paisley, Brad, 80

parental controls, fighting cyber crime, 273–274

parents, educating, 276–277

PASO (People Against Sex Offenders), 172

password management tools, 255

passwords, online safety, 253–255

creating strong passwords, 254

hacking, 256

password management tools, 255

Patch Tuesday, 251

Payment Card Industry (PCI), 200

PCI (Payment Card Industry), 200

Peak, Robert, 7

Peak, Sherri, 6

pedophiles. See child predators

pedophilia, social networking sites, 149

peer-to-peer (P2P) networks, 216–218

dangers of, 218

data breach, Supreme Court Justice’s personal information, 219

identity theft, 219

kiddie porn, sharing, 219

music piracy, 216

people, resources for finding out about

dog license registration, 31

Google, 28–29

online memorials, 32

people search sites, 33

political contributions, 32

searching for your own name, 33–34

town and city websites, 29–31

Tracking Teresa, 29

Wayback Machine, 34

website registration records, 34–35

Zillow, 31

People Against Sex Offenders (PASO), 172

people search sites, resources for

finding out about people, 33

personal identifying information (PII), 199

personal information, 28. See also private information

Perverted Justice, 90

Pfizer Pharmaceuticals, 203

PGP (Pretty Good Privacy), 134

pharming, 185–186

phishers, how they make money, 183

phishing, 179–185. See also vishing

call to action, 180

charity phishing scams, 183

hyperlinks, 181–182

IC3, 185

phone numbers, 69

phreakers, 261

piggybacking, 257

PII (personal identifying information), 199

pill thumb drives, 286

piracy, music piracy, 215–216

P2P networks, 216

plea agreements, sex offense cases, 120

police, police civilians (using as experts), 277–278

political contributions, resources for finding out about people, 32

pornography

cell phones, 175

children. See kiddie porn

identity assumption, 10

Porta 2030, 55

predators. See also child predators

advances on children, 100–101

chat sessions with (graphic), 93–100

Presken, Brian, 52–53

Pretty Good Privacy (PGP), 134

preventing

becoming a victim of voyeurism, 54

cookies, 243–244

cyber stalking, 19

identity theft, 63, 67–69

annual credit reports, 63–66

annual credit reports, for children, 66–67

monitoring your accounts, 63

prevention resources, cyber stalking, 26

privacy

reasonable expectation of privacy, 52

versus safety, 136–137

Privacy Rights Clearinghouse, 205

private information, 27–28

probable cause, 135

profiling, 241–242

cookies, 242–243

preventing, 243–244

EULAs, 244

Hackers, 245

Project Safe Child, 130

Project Safe Childhood initiative, 140

prostitution, 164. See also sexual deviance

PROTECT (Prosecutorial Remedies and Other Tools to End the Exploitation of Children Today) Act, 132

Pumpkin Man, 114

R

Ratliff, Roy, 173

rave parties, 232–235

reality versus CSI, 287–289

reasonable expectation of privacy, 52

recipes for drugs, 235–236

methamphetamine, 236

Record Industry Association of America (RIAA), 215

recovering

from identity theft, 60–61

NCIC Identity Theft File, 60

stolen laptops, 265

reducing spam, 190–191

Reedy, Janice, 130

Reedy, Thomas, 130

reformatting versus secure wipe, 263

reluctance to report crimes, victims and online dating, 82–84

reporting

cyber crime, 271

Nigerian letter scam, 198

spam, 193

reputations, identity assumptions, 9–10

researching work-at-home scams, 211

resolved back, 11

resources for finding out about people

dog license registration, 31

Google, 28–29

online memorials, 32

people search sites, 33

political contributions, 32

searching for your own name, 33–34

town and city websites, 29–31

Tracking Teresa, 29

Wayback Machine, 34

website registration records, 34–35

Zillow, 31

revenge websites, 35

DontDateHimGirl.com, 36

RFID (radio frequency identification), 285

RIAA (Record Industry Association of America), 215

actual cases, 216

investigations into music piracy, 217

challenges to lawsuits, 218

university cooperation, 217

P2P networks, 216

Rines, Walter, 192

robbery, sex and, 169

rogue accounts, credit reports, 65

RottenNeighbor.com, 148

S

S&M (sadomasochism), 176–177

sadomasochism, 176–177

SAFE (Securing Adolescents From Exploitation Online), 137

safe words, 176

safety

children Internet safety guidelines, 146

online dating, 77

versus privacy, 136–137

while online, 23

safety guidelines

for online dating, 88

for social networking sites, 158–159

Scam Cannabis, 236–237

scams

common sense, 213

men versus women, 213

Nigerian letter advance fee (419), 194–195

how they profit, 196

reporting, 198

sample letter, 197

social engineering scams, 212–213

work-at-home scams, 209–211

money mules, 211

mystery shoppers, 210

research, 211

Scheeres, Julia, 150

Schenberger, John, 123

searching for yourself, 33–34

secure transactions versus nonsecure transactions, 207

secure wipe versus reformatting, 263

securing Wi-Fi connections, 259–261

changing default username and password, 261

changing SSID, 260

encryption, 260

routers, shutting off, 261

Securing Adolescents From Exploitation Online (SAFE), 137

SeekingArrangement.com, 161

sellers, auction fraud, 206

Sentinel Tech, 138

sex offender registries, 118

sex offender websites, 117–122

National Sex Offender Public Registry, 122–123

sex offenders, social networks and, 137–139

sex parties, 177–178

sex slavery, 169. See also child prostitution

sexual abuse, 143. See also kiddie porn

children, 143–145

sexual deviance, 161–162

AMBER Alert, 172–175

Bedrod, Mark, 165

cell phones, pornography, 175

child prostitution, 167–169

child sex rings, 170–171

Craigslist, 162–164

child prostitution, 166–167

Emperor’s Club, 164

Innocence Lost Initiative, 165–166

sadomasochism, 176–177

sex and robbery, 169

swinging sex parties, 177–178

webcams, 178

sharing kiddie porn, P2P networks, 219

sharing information, fighting cyber crime, 274

shredding documents, 69–70

shutting down kiddie porn websites, 139–140

shutting off Wi-Fi routers, 261

Silva, Jacob, 111–112

SIM cards, 284

Simmons, Douglas, 121

Simoncini, Scott, 103–104

skimmers, 285

smart cards, 285

Smart, Elizabeth, 174

Smart, Mary Katherine, 174

Smart, Pamela, 108

sniffer programs, 201

SnoopStick, 6

Snowden, Katheryne, 52

social engineering scams, 212–213

social networking, 147–148

awareness, 152–157

bullying, 154

law enforcement and, 158

MySpace, 147

Stickam, 51

social networking sites

fighting cyber crime, 275

Meier, Megan, 152

Pedophilia, 149

safety guidelines for, 158–159

suicide assistance sites, 150–152

social networks

sex offenders and, 137–139

specialized social networks, 148–149

Soloway, Robert Alan, 191

spam, 187

CAN-SPAM Act, 191

dangers of, 188–189

death threats, 191

how people profit from, 188

legality of, 191

MySpace, 192–193

reducing, 190–191

reporting, 193

text spam, 192

Yahoo!, 193–194

spam spiders, 190

spam vigilantes, 190

[email protected], 193

Spamhaus Project, 194

specialized social networks, 148–149

Spencer, Michelle, 121

spiders, spam, 190

Sprint Nextel, 139

spyware detection programs, 253

SSID (Service Set Identifier), securing Wi-Fi, 260

Staffcentrix, 209

stalking. See cyber stalking

stalking orders, 16

standardized forms, fighting cyber crime, 279

statistics, cyber crime, 271–273

steroids, 237–238

Stevens, Didier, 213

Stevenson, Richard, 49

Stickam, 51

stolen laptops, recovering, 265

StopBadware.org, 253

Storm Worm, 245

Sugar Babe, 161

suicide, online suicides, 151

suicide assistance sites, 150–152

suicide pacts, 150

swatting, 45

swinging sex parties, 177–178

Symantec AntiVirus, 252

Symantec Corporation, EULAs, 245

symptoms of bots, 248–249

T

Tara series, 141–142

teachers, cyber stalking, 23–24

Draker, Anna, 26

Trosch, Erik, 24

techie dealers (drugs), 231

rave parties, 232–235

technology, drug dealers and, 238

informants, 239

tools, 238–239

teen/tech stalking, 21–22

terrorism, cyber terrorism, 280–281

Think Geek, 258

threat assessment, 17

thumb drives, 285–286

Time Warner, America Online (AOL), 140

Time Warner Cable, 139

TJ Maxx, 199–202

To Catch a Predator, 89–93

tools of drug dealers, 238–239

town and city websites, finding out about people, 29–31

Tracking Teresa, 29

trading kiddie porn, 145

travelers, 92

triple threats, 106

Trojan-horse programs, Storm Worm, 245

Trosch, Erik, 24

Trowbridge, Jason R., 45

True.com, 77

trusting instincts, 208

types of identity theft, 61

U

Underwood, Kevin Ray, 157

universities, cooperation with RIAA investigations, 217

updating your system, online safety, 251–252

upskirting, 47–49. See also video voyeurism

Usenet discussion groups, 139

Usenet groups, 139

V

Vedas, Brandon, 151

Verizon Business Security Solutions, data breaches, 203–204

Verizon Communications, 139

Vest, Herb, 77

victim’s perspective of cyber crime, 268

victims

cyber stalking, 8

reluctance to report crimes, online dating, 82–84

of sexual assault, children, 143–145

video, 229. See also cameras

video voyeurism, 48–50

video-hosting sites, 229

Violence Against Women Act, 13, 17

virtual child pornography, 126

virtual playground, 109

virtual policing, 275

virus protection, 252

vishing (voice phishing), 43, 183–185

voyeurism

backpacks, 55

how to prevent becoming a victim of, 54

Ohio 2008 voyeurism case,

Presken, Brian, 52–53

prevalence of, 53

video voyeurism, 48–50

W–X

Wal-Mart, t-shirts, 14

Wallace, Sanford, 192

Walsh, Adam, 117

Walsh, John, 117

Ward, Chad A., 45

wardriving, 258

watch thumb drives, 286

Wayback Machine, searching for people, 34

webcams, sexual deviance, 178

website registration records, searching for people, 34–35

websites

fake websites, 186

kiddie porn websites, shutting down, 139–140

websites created to harm someone, 10–12

Boyer, Amy, 12–13

Isenberg, Dean, 11

WEP (Wireless Equivalency Protocol), 260

Western Union, 210

Whitrick, Kevin, 151

whosarat.com, 239

Wi-Fi, online safety, 256–257

evil twin spoofing, 259

piggybacking, 257

securing, 259–261

wardriving, 258

Wi-Fi Protected Access (WPA), 260

Wi-Fi spoofing, 259

Wi-Fi t-shirt, 258

Wi-Fi tracking, 37

Williams, Michael, 132

Wilson, Susan, 48

wine bottle USB drives, 286

Wireless Equivalency Protocol (WEP), 260

women, kiddie porn, 107–109

women perpetrators, cyber stalking, 26

work-at-home scams, 209–211

money mules, 211

mystery shoppers, 210

research, 211

World of Warcraft, 22

WPA (Wi-Fi Protected Access), 260

Y

Yahoo!, spam lawsuit, 193–194

Youens, Liam, 12–13

YouTube, 225–228

Z

Zidel, Marshall, 130–131

Zillow, 31

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.134.110.16