top of page
Image by Thom

THE DARK WEB

Cloud Analytics Modernization

I'm a paragraph. Click here to add your own text and edit me. It’s easy. Just click “Edit Text” or double click me to add your own content and make changes to the font. I’m a great place for you to tell a story and let your users know a little more about you.

Image by Sara Kurfeß
socialmediaimage.jpg

With an estimated 4,57 Billion Smartphones in the world, social media gives a criminal access into the family home where the family unit is attacked.

​

QEV Rescue offers solutions to online crime.

flowers2.png

The youth, family and elderly are exposed to:

CYBERBULLYING

​

Cyberbullying is the use of cell phones, instant messaging,
e-mail, chat rooms, or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone

SEXTORTION

Child Sexual Abuse Material (CSAM) is increasing and children are exploited online before physical exploitation takes place. 85% of
people viewing pornography became “hands-on”.

CYBER STALKING

Repeated use of the internet, email or digital electronic
communication device to annoy or threaten an individual

IDENTITY THEFT

Identity theft is the obtaining of your personal information byanother person in order to use your information to commit a crime, normally fraud. The information is harvested from your online personal accounts.

PHISHING

Tricking internet users into giving up personal information.

CATFISHING

Luring someone into a relationship by adopting a fictional (fake) online personal.

HUMAN TRAFFICKING

The exploitation of people for the purposes of sexual services and labour practices is the major reasons for human trafficking which is an extremely profitable business. The other major purposes are for child marriage and organ harvesting.

ORGANISED CRIME

A structured group of three or more people, existing for a period of time, working together to commit crimes, mostly for financial gain.

bottom of page