Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 15-1 Today’s Topics n Shenanigan #5 n Fraud, bankruptcy and divorce n Bankruptcy overview n Bankruptcy participants.
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
Lecture 1: The Discovery of White Collar Crime
Missing and Abducted Persons Chapter 12:
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 5: Interviews and Interrogations.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Chapter 19 SEX CRIMES Criminal Investigation:
Criminal Justice 2011 Chapter 10: ROBBERY
2 Language of Computer Crime Investigation
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Chapter 5 White Collar Crimes. Introduction Historically, the field of criminology has emphasized the need to explain the occurrence of what has commonly.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 14 Crime and Justice in the New Millennium
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Anti-Money Laundering (AML)
Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
FORENSIC ACCOUNTING - BA Slide 15-1 Today’s Topics n Fraud, bankruptcy and divorce n Tax fraud n Bankruptcy overview n Bankruptcy participants.
FORENSIC ACCOUNTING - BA124 - Spring 2006Slide 15-1 Today’s Topics n Fraud, bankruptcy and divorce n Bankruptcy overview n Bankruptcy participants n Bankruptcy.
Criminal Justice 2011 Chapter 2: The Crime Scene: Field Notes, Documenting, and Reporting Criminal Investigation The Art and the Science by Michael D.
Crimes Against Children: Child Abuse Chapter 13: and Child Fatalities
Forensic Accounting. Agenda Definition History Skills Business scandals Cases.
Criminal Justice 2011 Chapter 6: Interviews and Interrogations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Criminal Justice 2011 Chapter 8 Management of Informants and Undercover Operations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber Crimes.
Business Law Chapter 14: Negotiable Instruments, Securities and Secured Transactions.
What does “secure” mean? Protecting Valuables
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Unethical use of Computers and Networks
CYBER CRIME.
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Computer Crime: Crime of the Information Age Valerie Russell CSCI 030 Delahunty.
First Look at Security and Privacy Jeremiah Burleson.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 22 Criminal Law and Procedure in Business.
Money laundering. What is money laundering? It is a process of making dirty money clean. Money is moved around the financial system again and again in.
Larry J. Siegel Valerie Bell University of Cincinnati, Cincinnati, OH Chapter Twelve Enterprise Crime: White-Collar Crime, Cyber.
Forensic Science: Fundamentals & Investigations, Chapter 10 1 Introduction Document analysts examine and compare questioned documents with known material.
2- PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ CRIMINALISTICS An Introduction to Forensic Science, 9/E By Richard Saferstein.
Computer crimes.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Computer and Network Security Brendan Duncombe Bahein Maung.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Corporate & Business Law ( ENG). 2 Section H: Governance & Ethical Issues Relating To Business Designed to give you knowledge and application of: H1.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Immigration, Cyber Crime, and White Collar Crime Chapter 17.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
A Project on CYBER SECURITY
Crimes against Property
Societal Issues in Computing (COMP466)
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting By the end of this chapter you will be able to: describe 12 types of handwriting characteristics.
Criminal Law for the Criminal Justice Professional
Presentation transcript:

Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

17.1 Understand the various types of white-collar crime Understand the problem of money-laundering investigations List the various techniques used by organized crime to hide or launder illicit financial proceeds Learn the different types of confidence games and how they work Describe the nature of computer crimes and the various types of computer offenses known today Know what evidence to look for in the investigation of computer crimes Understand the profile of the computer crime suspect. CHAPTER SUMMARY

Understand the various types of white-collar crime. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.1

White Collar Crime 17.1 Non-violent Committed for financial gain Accomplished by means of deception

White Collar Crime 17.1 The statutes are quite complicated! By virtue of his or her office, business or employment, or as trustee or bailee, having possession or custody of money or of a negotiable security, instrument, paper or other negotiable writing of another, intentionally uses, transfers, conceals, or retains possession of such money, security, instrument, paper or writing without the owners consent, contrary to his or her authority, and with intent to convert to his or her own use or to the use of any other person except the owner. Wisconsin State Statute, (1)(b)

Corporate Crime 17.1 Concealing defects Environmental Crimes Environmental Crimes Cheating customers Misleading investors A form of White Collar crime…

Understand the problem of money- laundering investigations. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.2

Money Laundering 17.2 Step Four: Obtain the $$$ back Step Four: Obtain the $$$ back Step Two: Hide $$$ from The Government Step Two: Hide $$$ from The Government Step One: Illegally earn $$$ Step One: Illegally earn $$$ Step Three: Use legitimate Businesses to wash the $$$ Step Three: Use legitimate Businesses to wash the $$$

List the various techniques used by organized crime to hide or launder illicit financial proceeds. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.3

Methods of Money Laundering 17.3 Double Invoicing Currency Exchanges Smurfing Bank Methods It is as varied as the businesses that exist in this country, both small and large Acquiring financial institutions Money orders

Learn the different types of confidence games and how they work. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.4

Confidence Games 17.4 Travel Scams The Pyramid Get Rich Quick Scheme The Bank Examiner Scheme The Pigeon Drop The spectrum of white-collar crime also extends to the timeless scam of the confidence game (or con). Home Repair Scams Contest Cons

Describe the nature of computer crimes and the various types of computer offenses known today. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.5

The introduction of fraudulent records or data Types of Computer Crime 17.5 Unauthorized use of computer- related facilities The alteration or destruction of information or files Stealing through use of the computer

Computer Crimes 17.5 Old Crimes in a new way Stalking Harassment Child pornography

Computer Crimes 17.5 New Crimes in a new era Hacking Scanning Masquerading Trojan horses, viruses, data diddling, piracy, etc…

Hardware Software Two Categories Computer Components 17.5 Computer

Know what evidence to look for in the investigation of computer crimes. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.6

Investigating Computer Crime 17.6 Obtain computer evidence Examine computer evidence Preserve evidence for court purposes Interview the suspect

Investigating Computer Crime 17.6 Obtaining computer evidence… Computer media Computer data Evidence online Other computer evidence including peripherals Insert a picture of the inside of a computer here please Insert a picture of the inside of a computer here please

Investigating Computer Crime 17.6 Examining computer evidence… Computer media Computer data Evidence online Other computer evidence including peripherals Insert a picture of an online history Here please Insert a picture of an online history Here please

Understand the profile of the computer crime suspect. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.7

Most perpetrators are young and were educated in colleges and universities where computer attacks are common and sometimes condoned as educational activity. The Profile! 17.7 Age

Most suspects are among the most skilled and higher-performing technologists. This is seen, in particular, in organizations in which a worker is overqualified for the work he or she is doing. The Profile! 17.7 Skills and knowledge

In most cases, perpetrators perform their acts while working at their jobs. Investigators should anticipate that vulnerabilities identified will usually result in the most qualified person taking advantage of them. The Profile! 17.7 Positions of trust

Perpetrators in many types of computer crime have been known to need assistance. This is because computer crimes require more knowledge and access than one person usually possesses. The Profile! 17.7 Assistance

Frequently, people working together may encourage each other to engage in unauthorized acts that escalate into serious crimes. The Profile! 17.7 Differential association

Most computer crime perpetrators interviewed in the study differentiated between harming people and organizations, the latter of which was easily condoned. In addition, they rationalized that they were only harming a computer and not causing any loss to people or organizations. The Profile! 17.7 Robin Hood syndrome

17.1 Understand the various types of white-collar crime Understand the problem of money-laundering investigations List the various techniques used by organized crime to hide or launder illicit financial proceeds Learn the different types of confidence games and how they work Describe the nature of computer crimes and the various types of computer offenses known today Know what evidence to look for in the investigation of computer crimes Understand the profile of the computer crime suspect. CHAPTER REVIEW