This workshop will address the case of State of Connecticut v. Christopher Lamb, and how a single person can devastate numerous lives through a few keystrokes. In this case, the defendant hacked into and took over the cloud storage and social media accounts of over 20 teenage victims, through exploiting his friendship with the victims and simple social engineering. After taking over their accounts, the defendant downloaded all their personal information, including naked pictures and contacts, and subsequently engaged in “sextortion” by threatening to release these intimate pictures of them to all their contacts if they did not provide him with additional naked pictures. Ultimately, the defendant sent these pictures to all their contacts (including schools and employers), as well as posted them on various “slut-shaming” websites. Recorded post-conviction interviews give a unique insight into the thought process and methodical social engineering process utilized by the offender, as well as the motive behind his actions. Information and studies related to the growing criminal threat of “sextortion,” as well as recommendations regarding law enforcement investigations, charging and plea-negotiation considerations and addressing multiple victims’ needs will be presented.
As a result of this webinar, participants will be better able to:
- Explore the mind of a hacker and social media predator.
- Recognize the growing threat of “sextortion” and the devastating effects on victims.
- Discuss unique charging considerations and plea agreement negotiations involved in such cases, including addressing multiple victims needs and concerns.
- Identify the various resources available to assist victims of such crimes.
CONTINUING EDUCATION (NURSES ONLY)
EVAWI is approved by the California Board of Registered Nursing to provide Continuing Education contact hours for nurses (Provider #15641).
Registered Nurses may purchase 1.25 contact hours after completing this webinar.
With a paid registration or subscription, you are free to personally listen to this webinar, as many times as you wish. You may also excerpt or cite the material following accepted conventions. However, you may not allow other individuals to listen to this webinar without their own registration or subscription.