© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.

Slides:



Advertisements
Similar presentations
Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.
Advertisements

Criminal Justice Today
Homeland Security and the Future of Criminal Justice.
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Sixteen Police Technology Hi-Tech Crime.
 October 30, 2012Office of Student Services 1.  Melissa FiggeWelcome & Introductions  Becki Cohn-VargasBest Practices  Break  Didi HirschSocietySuicide.
Forms of Cyberbullying
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 15.  Focus on stopping illegal acts before they occur– not after the commission of crime  Cannot afford to allow the catastrophic acts of terrorism.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Chapter 14 Crime and Justice in the New Millennium
Computer Forensics BACS 371
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
CYBER CRIME AND SECURITY TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
The Future of Criminal Justice Chapter 18 Frank Schmalleger Criminal Justice Today 13 th Edition.
Overview of the Hernando County School District Anti-Bullying and Harassment Policy January 2009.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Mrs. Jefferson Business Information Management I.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Information Warfare Playgrounds to Battlegrounds.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
THE CRIMINAL JUSTICE SYSTEM TODAY Unit 1 Intro to LPSS.
Digital Citizenship Project By Allen Naylor Ed 505.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
Information Warfare Playgrounds to Battlegrounds.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
CJ © 2011 Cengage Learning Chapter 1 Criminal Justice Today.
Digital Citizen Project By: Frances Murphey Technology and Education.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
CHAPTER 14.  What is White-Collar Crime?  Not an official category of criminal behavior  Covers a broad range of illegal acts including lying, cheating,
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Immigration, Cyber Crime, and White Collar Crime Chapter 17.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Chapter 16 Today’s Challenges: Security vs. Liberty, Cyber Crime, and White-Collar Crime.
Securing Information Systems
MGMT 452 Corporate Social Responsibility
DIGITAL CITIZENSHIP What You Should Know!.
Computer Crime CJ 520 / CJ October 27, 2010.
Chapter 11 crime and security in the networked economy
COMPUTER CRIME.
Chapter 13 Security and Ethical Challenges.
Presentation transcript:

© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime © 2015 Cengage Learning

Learning Objective 1 Describe the concept of jihad as practiced by al Qaeda and its followers. A. Majeed/AFP/Getty Images

© 2015 Cengage Learning The Terror Threat Understanding terrorism: – Osama bin Laden – Al Qaeda – Global Jihad The struggle against evil in oneself The struggle against evil outside of oneself The struggle against non-believers

© 2015 Cengage Learning The Terror Threat © Cengage Learning. All Rights Reserved.

© 2015 Cengage Learning Lesson Objective 2 Identify three important trends in international terrorism. AP Photo/Elizabeth Williams

© 2015 Cengage Learning The Terror Threat 1.Terrorists have developed more efficient methods of financing their operations. 2.Terrorists have developed more efficient organizations. 3.Terrorists have exploited new communications technology to mount global campaigns.

© 2015 Cengage Learning Learning Objective 3 Explain the primary difference between the U.S. government’s treatment of enemy combatants and those terrorist suspects under jurisdiction of the criminal justice system.

© 2015 Cengage Learning The Terror Threat Criminal justice model: – Terrorism is treated like any other crime – Law enforcement, corrections, courts function as normal Military model: – Suspects can be detained as enemy combatants – Held/released on a case-by-case basis

© 2015 Cengage Learning The Terror Threat

© 2015 Cengage Learning The Terror Threat Border Security – Before 9/11 border security was not a national security issue. – The 9/11 commission report made protecting the national borders a relevant issue. Regulated ports of entry – “Terrorist risk factors” – No fly list

© 2015 Cengage Learning Learning Objective 4 Distinguish cyber crime from “traditional” crime. P.C. Vey/Conde Nast Publications/

© 2015 Cengage Learning Cyber Crime Cyberattack: attempt to damage or disrupt computer systems or electronic networks operated by computers. Infrastructure security Computer crime: Computer is the object of a crime Computer is the subject of a crime The computer is the instrument of a crime

© 2015 Cengage Learning Cyber Crime Cyber fraud: Theft of personal information Cyber theft: Identity theft Phishing

© 2015 Cengage Learning Cyber Crime

© 2015 Cengage Learning Cyber Crime © Cengage Learning. All Rights Reserved.

© 2015 Cengage Learning Cyber Crime Cyberstalking: – Harassing a person through the Internet and putting that person in reasonable fear for his or her safety Cyberbullying: – Willful and repeated emotional harm inflicted through electronic devices

© 2015 Cengage Learning Learning Objective 5 Describe the three following forms of malware: (a) botnots, (b) worms, and (c) viruses Nathan Alliard/Getty Images

© 2015 Cengage Learning Cyber Crime Botnots: – Networks of computers that have been appropriated by hackers without the knowledge of their owners Worms: – A program that is capable of reproducing itself as it spreads from one computer to the next Viruses: – Able to reproduce itself, but must be attached to an infested host file in order to travel

© 2015 Cengage Learning Cyber Crime Hacker – Person who breaks into another persons computer Spam – Junk that flood mailboxes Intellectual property – Products that result form intellectual, creative processes

© 2015 Cengage Learning Learning Objective 6 Explain how the Internet has contributed to piracy of intellectual property. Photo Courtesy of Seminole County Sheriff’s Office

© 2015 Cengage Learning Cyber Crime Pirating Intellectual Property: – Intellectual property is the products that result from intellectual, creative processes – Includes piracy of books, films, music and software – An estimated 29% of all software is pirated

© 2015 Cengage Learning Learning Objective 7 Outline the three major reasons why the Internet is conducive to the dissemination of child pornography. Richard Clement/Reuters/Landov

© 2015 Cengage Learning Cyber Crime Child pornography: 1.Speed 2.Security 3.Anonymity Online gambling: 1.Legal confusion 2.Questions of jurisdiction

© 2015 Cengage Learning Discussion Questions Research your state statutes regarding pornography and gambling laws. Discuss if there are limitations. If there are not limitations, should there be? How can you deter child pornography from happening? What can your state do to take a more aggressive approach?

© 2015 Cengage Learning Learning Objective 8 Indicate some of the ways that white-collar crime is different from violent or property crime. AP Photo/Sauk Valley Media, Alex T. Paschal, File

© 2015 Cengage Learning White-Collar Crime What is White-Collar Crime? – It covers a broad range of illegal acts involving “lying, cheating, stealing” that is not in an official category of criminal behavior

© 2015 Cengage Learning White-Collar Crime Victims of White-Collar Crime: – Sometimes the victims are obvious, in other instances however they are a little more difficult to define – Could be one person, multiple people, society, or the environment

© 2015 Cengage Learning White-Collar Crime To carry out a white-collar crime, criminals use: – Deception – Abuse of trust – Concealment and conspiracy

© 2015 Cengage Learning Discussion Questions Discuss the case of Martha Stewart. What are your thoughts on her criminal activity and sentencing? What are your overall thoughts on the victimization seen through white-collar crimes? Why is this crime charged differently than street crimes?

© 2015 Cengage Learning Learning Objective 9 Explain the concept of corporate violence. Ted Jackson/The Times-Picayune/Landov

© 2015 Cengage Learning White-Collar Crime Corporate Violence – Physical harm to individuals or the environment that occurs as the result of corporate policies or decision making Administrative laws attempt to control the actions of these corporations The U.S. department of justice for the responsibility of criminal prosecution of one of these agencies