Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.

Similar presentations


Presentation on theme: "© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber."— Presentation transcript:

1 © 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime © 2015 Cengage Learning

2 Learning Objective 1 Describe the concept of jihad as practiced by al Qaeda and its followers. A. Majeed/AFP/Getty Images

3 © 2015 Cengage Learning The Terror Threat Understanding terrorism: – Osama bin Laden – Al Qaeda – Global Jihad The struggle against evil in oneself The struggle against evil outside of oneself The struggle against non-believers

4 © 2015 Cengage Learning The Terror Threat © Cengage Learning. All Rights Reserved.

5 © 2015 Cengage Learning Lesson Objective 2 Identify three important trends in international terrorism. AP Photo/Elizabeth Williams

6 © 2015 Cengage Learning The Terror Threat 1.Terrorists have developed more efficient methods of financing their operations. 2.Terrorists have developed more efficient organizations. 3.Terrorists have exploited new communications technology to mount global campaigns.

7 © 2015 Cengage Learning Learning Objective 3 Explain the primary difference between the U.S. government’s treatment of enemy combatants and those terrorist suspects under jurisdiction of the criminal justice system.

8 © 2015 Cengage Learning The Terror Threat Criminal justice model: – Terrorism is treated like any other crime – Law enforcement, corrections, courts function as normal Military model: – Suspects can be detained as enemy combatants – Held/released on a case-by-case basis

9 © 2015 Cengage Learning The Terror Threat

10 © 2015 Cengage Learning The Terror Threat Border Security – Before 9/11 border security was not a national security issue. – The 9/11 commission report made protecting the national borders a relevant issue. Regulated ports of entry – “Terrorist risk factors” – No fly list

11 © 2015 Cengage Learning Learning Objective 4 Distinguish cyber crime from “traditional” crime. P.C. Vey/Conde Nast Publications/www.cartoonbank.com

12 © 2015 Cengage Learning Cyber Crime Cyberattack: attempt to damage or disrupt computer systems or electronic networks operated by computers. Infrastructure security Computer crime: Computer is the object of a crime Computer is the subject of a crime The computer is the instrument of a crime

13 © 2015 Cengage Learning Cyber Crime Cyber fraud: Theft of personal information Cyber theft: Identity theft Phishing

14 © 2015 Cengage Learning Cyber Crime

15 © 2015 Cengage Learning Cyber Crime © Cengage Learning. All Rights Reserved.

16 © 2015 Cengage Learning Cyber Crime Cyberstalking: – Harassing a person through the Internet and putting that person in reasonable fear for his or her safety Cyberbullying: – Willful and repeated emotional harm inflicted through electronic devices

17 © 2015 Cengage Learning Learning Objective 5 Describe the three following forms of malware: (a) botnots, (b) worms, and (c) viruses Nathan Alliard/Getty Images

18 © 2015 Cengage Learning Cyber Crime Botnots: – Networks of computers that have been appropriated by hackers without the knowledge of their owners Worms: – A program that is capable of reproducing itself as it spreads from one computer to the next Viruses: – Able to reproduce itself, but must be attached to an infested host file in order to travel

19 © 2015 Cengage Learning Cyber Crime Hacker – Person who breaks into another persons computer Spam – Junk email that flood mailboxes Intellectual property – Products that result form intellectual, creative processes

20 © 2015 Cengage Learning Learning Objective 6 Explain how the Internet has contributed to piracy of intellectual property. Photo Courtesy of Seminole County Sheriff’s Office

21 © 2015 Cengage Learning Cyber Crime Pirating Intellectual Property: – Intellectual property is the products that result from intellectual, creative processes – Includes piracy of books, films, music and software – An estimated 29% of all software is pirated

22 © 2015 Cengage Learning Learning Objective 7 Outline the three major reasons why the Internet is conducive to the dissemination of child pornography. Richard Clement/Reuters/Landov

23 © 2015 Cengage Learning Cyber Crime Child pornography: 1.Speed 2.Security 3.Anonymity Online gambling: 1.Legal confusion 2.Questions of jurisdiction

24 © 2015 Cengage Learning Discussion Questions Research your state statutes regarding pornography and gambling laws. Discuss if there are limitations. If there are not limitations, should there be? How can you deter child pornography from happening? What can your state do to take a more aggressive approach?

25 © 2015 Cengage Learning Learning Objective 8 Indicate some of the ways that white-collar crime is different from violent or property crime. AP Photo/Sauk Valley Media, Alex T. Paschal, File

26 © 2015 Cengage Learning White-Collar Crime What is White-Collar Crime? – It covers a broad range of illegal acts involving “lying, cheating, stealing” that is not in an official category of criminal behavior

27 © 2015 Cengage Learning White-Collar Crime Victims of White-Collar Crime: – Sometimes the victims are obvious, in other instances however they are a little more difficult to define – Could be one person, multiple people, society, or the environment

28 © 2015 Cengage Learning White-Collar Crime To carry out a white-collar crime, criminals use: – Deception – Abuse of trust – Concealment and conspiracy

29 © 2015 Cengage Learning Discussion Questions Discuss the case of Martha Stewart. What are your thoughts on her criminal activity and sentencing? What are your overall thoughts on the victimization seen through white-collar crimes? Why is this crime charged differently than street crimes?

30 © 2015 Cengage Learning Learning Objective 9 Explain the concept of corporate violence. Ted Jackson/The Times-Picayune/Landov

31 © 2015 Cengage Learning White-Collar Crime Corporate Violence – Physical harm to individuals or the environment that occurs as the result of corporate policies or decision making Administrative laws attempt to control the actions of these corporations The U.S. department of justice for the responsibility of criminal prosecution of one of these agencies


Download ppt "© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber."

Similar presentations


Ads by Google