Presentation is loading. Please wait.

Presentation is loading. Please wait.

What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.

Similar presentations


Presentation on theme: "What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities."— Presentation transcript:

1

2 What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities for identity theft? How has the Internet expanded opportunities for identity theft? What are three reasons that cyberstalking may be more commonplace than physical stalking?  What are three reasons that cyberstalking may be more commonplace than physical stalking?  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 2

3 What are three major reasons that the Internet is conducive to juvenile cyber crime? What are three major reasons that the Internet is conducive to juvenile cyber crime? How do encryption programs protect digital data from unauthorized access? How do encryption programs protect digital data from unauthorized access? © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 3

4 Computer crime: “any violation of criminal law that involves knowledge of computer technology for [its] perpetration, investigation, or prosecution.” Three categories: Computer crime: “any violation of criminal law that involves knowledge of computer technology for [its] perpetration, investigation, or prosecution.” Three categories: – Computer is the object of a crime. – Computer is the subject of a crime. – Computer is the instrument of a crime. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 4

5 Cyber Consumer Fraud: Any act directed against computers or that uses computers as an instrumentality of a crime. Cyber Consumer Fraud: Any act directed against computers or that uses computers as an instrumentality of a crime. – Online Auction Fraud. – Online Retail Fraud.  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 5

6 Cyber Consumer Fraud (cont’d). Cyber Consumer Fraud (cont’d). – Cyber Theft. Identity Theft. Phishing. Vishing. Employment Fraud. – Cyberstalking. Threat of Cyberstalking. An Easier Alternative? © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 6

7 Cyber Consumer Fraud (cont’d). Cyber Consumer Fraud (cont’d). – Cyberstalking (cont’d). Cyberstalking on Social Networks. State v. Cline CASE 7.1 State v. Cline (2008). What were the court’s reasons for venue? © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7

8 Credit-Card Crime. Credit-Card Crime. Hackers. Hackers. – The Scope of the Problem. – Juvenile Cybercrime. New Service-Based Hacking at Low Cost. New Service-Based Hacking at Low Cost. Cyberterrorism. Cyberterrorism. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8

9 Pirating Intellectual Property Online. Pirating Intellectual Property Online. – Business Software Alliance estimates 35% of software is pirated, with losses exceeding $5 billion/year. – The Grokster case. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9

10 State Regulation of Spam. State Regulation of Spam. The Federal CAN-SPAM Act. The Federal CAN-SPAM Act. The U.S. Safe Web Act. The U.S. Safe Web Act. – Allows the FTC to share information with foreign governments, and to jointly investigate and prosecute internet fraud. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 10

11 Generally, gambling is illegal and assets from gambling can be seized. Generally, gambling is illegal and assets from gambling can be seized. – CASE 7.2 United States v. $6,976,934.65, Plus Interest, Deposited into Royal Bank of Scotland International (2009). What right does the United States have to forfeit funds located in another country? In 2006, Congress passed the Unlawful Internet Gambling Enforcement Act. In 2006, Congress passed the Unlawful Internet Gambling Enforcement Act. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 11

12 Prosecution of Cyber Crime. Prosecution of Cyber Crime. – “Location” of crime is an issue. – Jurisdiction of courts is an issue. Computer Fraud and Abuse Act. Computer Fraud and Abuse Act. – Person is liable if he accesses a computer online, without authority, to obtain classified, private, or protected information. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 12

13 Private Efforts to Combat Cyber Crime. Private Efforts to Combat Cyber Crime. – Firewalls and Antivirus software. – Encryption is another means to secure data. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 13


Download ppt "What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities."

Similar presentations


Ads by Google