Presentation is loading. Please wait.

Presentation is loading. Please wait.

Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.

Similar presentations


Presentation on theme: "Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes."— Presentation transcript:

1 Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes

2 Summarize vice crimes and laws. Describe white-collar and corporate crime. : Summarize the crime of money laundering. Identify the different types of computer crime. Describe how computer crime investigations are conducted. CHAPTER SUMMARY 14.6 Describe hit-and-run crimes and how they are investigated.

3 Summarize vice crimes and laws. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.1

4 Vice Crimes 14.1 Generally speaking “vice crimes” involve conduct that is both illegal and immoral Picture of a prostitute working the streets

5 Vice Crimes 14.1 Prostitution and related crimes Illegal Gambling Pornography including child pornography Drugs

6 Vice and Sexual Morality Statutes 14.1 Many states have such laws… Photo placeholder

7 Vice and Sexual Morality Statutes 14.1 Specific crimes in Wisconsin: Photo placeholder

8 Describe white-collar and corporate crime. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.2

9 White Collar Crime 14.2 Non-violent Committed for financial gain Accomplished by means of deception

10 White Collar Crime 14.2 The statutes are quite complicated! “By virtue of his or her office, business or employment, or as trustee or bailee, having possession or custody of money or of a negotiable security, instrument, paper or other negotiable writing of another, intentionally uses, transfers, conceals, or retains possession of such money, security, instrument, paper or writing without the owner’s consent, contrary to his or her authority, and with intent to convert to his or her own use or to the use of any other person except the owner.” Wisconsin State Statute, (1)(b)

11 Corporate Crime 14.2 Concealing defects Environmental Crimes Environmental Crimes Cheating customers Misleading investors A form of White Collar crime…

12 Summarize the crime of money laundering. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.3

13 Money Laundering 14.3 Step Four: Obtain the $$$ back Step Four: Obtain the $$$ back Step Two: Hide $$$ from The Government Step Two: Hide $$$ from The Government Step One: Illegally earn $$$ Step One: Illegally earn $$$ Step Three: Use legitimate Businesses to “wash” the $$$ Step Three: Use legitimate Businesses to “wash” the $$$

14 Methods of Money Laundering 14.3 Double Invoicing Currency Exchanges Smurfing Bank Methods It is as varied as the businesses that exist in this country, both small and large Acquiring financial institutions Money orders

15 Identify the different types of computer crime. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.4

16 The introduction of fraudulent records or data Types of Computer Crime 14.4 Unauthorized use of computer- related facilities The alteration or destruction of information or files Stealing through use of the computer

17 Computer Crimes 14.4 Old Crimes in a new way Stalking Harassment Child pornography

18 Computer Crimes 14.4 New Crimes in a new era Hacking Scanning Masquerading Trojan horses, viruses, data diddling, piracy, etc…

19 Describe how computer crime investigations are conducted. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.5

20 Hardware Software Two Categories Computer Components 14.5 Computer

21 Investigating Computer Crime 14.5 Obtain computer evidence Examine computer evidence Preserve evidence for court purposes Interview the suspect

22 Investigating Computer Crime 14.5 Obtaining computer evidence… Computer media Computer data Evidence online Other computer evidence including peripherals Insert a picture of the inside of a computer here please Insert a picture of the inside of a computer here please

23 Investigating Computer Crime 14.5 Examining computer evidence… Computer media Computer data Evidence online Other computer evidence including peripherals Insert a picture of an online “history” Here please Insert a picture of an online “history” Here please

24 Describe hit-and-run crimes and how they are investigated. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.6

25 Hit and Run Crimes 14.6 Causing injury Or damage Leaving the Scene

26 Hit and Run Crime 14.6 Felony If death or an injury is the result of the accident The person who caused the accident knows that the accident occurs The suspect flees the scene without aiding the victim

27 Hit and Run Crime 14.6 Misdemeanor If damage is the result of the accident The person who caused the accident knows that the accident occurs The suspect flees the scene without notifying police or the owner of the property

28 Investigating Hit and Run 14.6 Step One Respond to the scene quickly Be on the alert for vehicles fleeing the scene with fresh damage Protect the scene when you arrive from further accidents

29 Investigating Hit and Run 14.6 Update dispatch Step Two Aid any victim that is injured Obtain statement regarding H&R vehicle

30 Investigating Hit and Run 14.6 Step Three Send out BOLO Process crime scene Return scene to normal

31 Investigating Hit and Run 14.6 Step Four Send out TTY to other jurisdictions Send evidence to Crime Lab for analysis Check garages for vehicle repairs that match suspect damage

32 Summarize vice crimes and laws. Describe white-collar and corporate crime. : Summarize the crime of money laundering. Identify the different types of computer crime. Describe how computer crime investigations are conducted. CHAPTER REVIEW 14.6 Describe hit-and-run crimes and how they are investigated.


Download ppt "Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes."

Similar presentations


Ads by Google