Let’s be careful out there – Part 1.



Sexting/ Grooming.

– Victim is encouraged to share naked pictures of themselves (or explicit mes- sages) via text/ apps/ emails. Often involves children being groomed by adults or their peers.

There will often be offences under the Sex Offences Act 2003; and always a big risk of being pressured into going further or having full sex.

Frequently linked to or develops into Sextortion. https://www.youtube.com/watch?v=DwKgg35YbC4 (Megan’s Story – Sexting 1:52) https://www.youtube.com/watch?v=sc-Mt5fS0fY (My story – online grooming 0:56)


• Victim has engaged in intimate online communication with the offender via webcam. The victim is filmed without their knowledge and then blackmailed for money and threatened with their video being revealed to friends and family. Adults or children can be victims.

https://www.youtube.com/watch?v=Ba3uxhg1X4Y (Singapore crime message 2:27 mins),  https://www.youtube.com/watch?v=et5jMaNxn0Y (Sextortion public service announcement, 1:30 mins)

Phishing emails.

• Victim receives an email purporting to be from the victim’s bank or similar, containing a link to a fake website. When the victim clicks the link either a virus/ ransomware is downloaded, or they are asked to enter their banking details and password, which are then used to steal money from their account.

https://www.youtube.com/watch?v=fyfAKQM3qTY (Phishing real world example 2:53 mins),  https://www.youtube.com/watch?v=9TRR6lHviQc (Safety in Canada, 3mins, Phishing), https://www.youtube.com/watch?v=oOmzX1WAkMc (1 min, Spear phishing)

Remote access Tool (RAT) / TeamViewer (software brand)

Victim receives a phone call from the offender who purports to be from the victim’s bank or similar. The suspect usually tells the victim that their account or computer has been compromised and in order to fix the problem the victim is instructed to go online and download software. The software the victim is actually downloading is TeamViewer or similar which then gives the suspect remote access to the victim’s computer including the webcam and screen. The suspect then elicits personal information such as banking details in order to steal the victim’s money.

E.g. Microsoft scam https://www.youtube.com/watch?v=sz0cEo2h3f8 (10:18 mins, first 6 mins only necessary)


• This can be installed a number of ways; by the victim following a link on a fake email, by downloading a program online that has ransomware hidden inside, or by the victim’s computer or network being hacked due to weak passwords etc. Once installed the ransomware will encrypt all of the files on the system preventing the victim accessing them. This can include photographs, business documents etc. The victim will be unable to use their computer while the machine is infected. They will normally see instructions on the screen asking for money in order to get their files and computer unencrypted. Often the payment can be requested in bitcoin (online currency).

https://www.youtube.com/watch?v=v-ITcpD1KcQ (1:03 mins Kaspersky Lab)


• These can be installed in a number of ways similar to ransomware. The purpose can be varied; disruption of the victim’s computer system, as a means of obtaining personal information from the infected computer or in order to use the computers processing power as part of a “botnet” (collection of infected computers). Many offenders will use a botnet to send out millions of phishing emails or launch a DDOS (distributed denial of service) attack on a website to take it down and cause disruption


(Difference between viruses, worms, malware, Trojans, ransomware and spyware – Kaspersky lab, 2:45 min).


This entry was posted in Computers, From Bideford's Beat. and tagged , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.