Tuesday, 12/6 Agenda Finish Cyber-Crime Terrorism Crimes of the Powerful.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.
Introduction and Overview of Digital Crime and Digital Terrorism
Political Organization
Lecture 1: The Discovery of White Collar Crime
Chapter 12 © 2004 Pearson Education, Inc. White-Collar and Organized Crime © 2004 Pearson Education, Inc.
Enterprise Crime: White-Collar Crime and Organized Crime
White-Collar Crime Chapter Twelve. White-Collar Crime Industrial Revolution – Captains of Industry: Andrew Carnegie (Steel) J.P. Morgan (Banking) John.
“White Collar Crime” Sutherland’s Definition –Coined “white collar crime” –People of “status” in course of “occupation” Types of White collar crime –Corporate.
Copyright © 2012, 2009, 2006, 2001, 1997 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved 0 Criminology: A Sociological.
“ Copyright © Allyn & Bacon 2010 Deviance 10e Chapter Thirteen: Privileged Deviance This multimedia product and its contents are protected under copyright.
Chapter 13 White-Collar and Organized Crime
Property Crime, White Collar Crime & Organized Crime
 In my opinion White- Collar Crime is worse well, not necessarily worse than street crime, but I believe white collar crime gets overlooked simply.
Political and White Collar Crime
Computer Fraud Chapter 5.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 14 Crime and Justice in the New Millennium
Corporate Crime Group Members: Lauren Raulerson Katy Bailey.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
White Collar Crime Political Crime Social Context Social Context Defining WCC Defining WCC Types of WCC/Examples Types of WCC/Examples Applying Theory.
Chapter Eleven Political Crime and Terrorism. Political Crime Since 9/11 political crime and terrorism have become important areas of criminological inquiry.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
AGENDA Finish doing drugs Cyber-stuff. Drug Legalization? Pro? Reduce crime by eliminating “drug-defined crimes” Reduce Prison Costs Reduce violence generated.
Quick! What is a crime?. So, just how much has to be proven in court to find someone guilty of a crime? Burden of Proof The prosecution has the burden.
Finish Doing Drugs Cyber-Crime Terrorism Crimes of the Powerful
Chapter 1: Accounting Information Systems and the Accountant
Unethical use of Computers and Networks
CYBER CRIME.
Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Tuesday, 12/4 Agenda Finish Doing Drugs Cyber-Crime, Terrorism Crimes of the Powerful Law Enforcement.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Illegal Immigration. Stats According to the Center for Immigration Studies –January 2000 there were 7 million illegal aliens in the US –Illegal alien.
Class Name, Instructor Name Date, Semester Criminology 2011 Chapter 13 WHITE-COLLAR AND ORGANIZED CRIME.
Chapter 5 Our Criminal Laws Lesson 5-1 Criminal Law.
Lesson 12 – White Collar and Organized Crime Robert Wonser Introduction to Criminology Crime and Delinquency 1.
Chapter 5 Crimes. Offenses Against Society When a crime occurs, society, acting through such employees as police and prosecutors, attempts to identify,
Investment-Related Crimes  Insider trading: the use of material, non- public, financial information to obtain an unfair advantage in trading securities.
Copyright 2006 Prentice Hall Prentice Hall PoliticalScienceInteractive Magleby et al. Government by the People Chapter 20 Special Topic The War on Terrorism.
Larry J. Siegel Valerie Bell University of Cincinnati, Cincinnati, OH Chapter Twelve Enterprise Crime: White-Collar Crime, Cyber.
THOMSON REUTERS ACCELUS The Future of Regulation The Cost of Compliance vs The Cost of non-Compliance.
Chapter 5 Our Criminal Laws
White Collar Crime Political Crime The Other White Meat.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
How La Cosa Nostra Makes Money
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
AIM: HOW ARE CRIMES CLASSIFIED? DO NOW: BASED ON AN EARLIER LESSON HOW DO WE CLASSIFY THE THREE LEVELS OF CRIME IN NYS AND NYC?
Cybercrime What is it, what does it cost, & how is it regulated?
CJ © 2011 Cengage Learning Chapter 1 Criminal Justice Today.
Lesson 11 (Chapter 14 from text) Privileged Deviance.
Deviance and the Criminal Justice System 1.Illegitimate Opportunity Structures and perceptions of crime in our society 2.The Criminal Justice System 3.The.
* * Chapter Four Demanding Ethical and Socially Responsible Behavior Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
Crime and Social Control. Crime Definition: An act that is labeled as such by those in authority, is prohibited by law, and is punishable by the government.
Five Unethical Uses of Computers
Chapter 10 White-Collar and Organized Crime
Chapter 13 Globalization and Terrorism: Our Small World
Criminology A Unit 2 Practice Test
Presentation transcript:

Tuesday, 12/6 Agenda Finish Cyber-Crime Terrorism Crimes of the Powerful

Administrative Extra credit option is posted on course page Updated schedule – Final two classes = slides/lecture only – No reading assignments – Material will still be on exam Study guide to be provided for final exam – Will post on web next week – Exam not cumulative

Cyber-Crime Crime that occurs over the internet using a computer – Cyber markets – Fraud – Development of criminal communities

Cyber-Markets Piracy – Software, Music, Movies, Television Broadcasts, Books… Requires minimal skill, but does entail some risks (viruses, lawsuits, etc.) Estimates vary, but roughly 1/3 of Americans report pirating Higher estimates among youth, especially COLLEGE KIDS! Music and video piracy appears to be declining…why? Beyond pirating—use of legitimate (eBay, Craig's list) and illegitimate sites to engage in crime (sell stolen goods, trade in illicit drugs/sex).

Cyber pornography market Defining “pornography” has always been problematic Other major issues – Access by Minors – Unwanted solicitation – Child pornography Federal legislation has had limited success… – Communications Decency act of 1996 – Child Online Protection Act (COPA) of 1998 – Children’s Internet Protection Act (CIPA) of 2000

Cyber Fraud Traditional Fraud Scams – A friend from Nigeria wished to transfer a million dollars into your account Phishing and Pharming scams – Your Ebay account has been compromised! Hacking Major concern with many of these techniques is identity theft – Use your information to take out loans, get credit cards, etc.

Identity Theft The unlawful use of another person’s identifying information – Use of name, DOB, social security number, credit card number…to commit fraud or other crimes – Internet and information age has made this much easier

Combating Identity Theft State Legislation – “Freeze laws” – stops access to credit reports – Laws to redact fraudulent transactions from credit reports – Disclosure laws—if your info has been compromised New emphasis on information privacy Risk minimization – Guard SS# and other private info, look at credit reports, shred sensitive paper, don’t open suspicious …

Cybercrime Communities Anonymity of cyberspace – Deviant Subcultures have arena to share information and engage in crime Child Pornography Drug Distribution

Terrorism Definitions Vary Widely – The use of violence to influence the political, social, or religious attitudes and/or behaviors of others – Premeditated, politically motivated violence, designed to spread fear and perpetrated against civilians

“START” DATA National Consortium for the Study of Terrorism and Response to Terrorism – University of Maryland Convergence of several databases + new additions from media – What qualifies: Intend to coerce/intimidate/convey message beyond immediate victims Aimed at attaining political/social/religious goal Context outside of legitimate warfare – Almost 100,000 terrorist incidents between 1970 and ,000 bombings, 14,000 assassinations, and 4,700 kidnappings Interactive Chart

Thinking about Terrorism Political/Secular vs. Religious Organization and Support Domestic Terrorism Response to Terrorism

Political vs. Secular Motivations of terrorists – Those with political agenda may be more selective regarding civilian casualties Logic = the non-believers are all enemies HOWEVER, it is sometimes difficult to separate the religious from the secular Osama Bin Laden and the 9/11 attacks had both a religious and political/secular component

Terrorist “Cells” Cell Structure – Chain of command at the top (hierarchy), but operation in smaller, tightly kit “cells” Cells independent of each other, somewhat autonomous Cells have limited or no contact with leaders of terror group – Long history of use Irish Republican Army

Types of Terrorism Domestic terrorism – U.S. Left Wing (Weathermen, Eco-Terrorism) Right Wing (Militias, Timothy McVeigh) State terrorism – Against domestic or foreign “enemies” German atrocities against Jews circa WWII Assassination of foreign leaders

Terrorism and the Media Scholars have pointed out that there is a natural match – Terrorists depend on media Use event to coerce larger audience: high visibility targets, graphic acts, pre-event contact with media outlets, post-event videos – Media as a natural venue for terrorism Dramatic, violent, visual, timely (vs. wars which are protracted, highly complex…) HIGH RATINGS

Response to Terrorism Difficult balance – Aggressive response  detection deterrence – Concern  civil rights, overreaching Examples – USA Patriot Act Warrantless search and seizures, wiretapping, etc. – Global War on Terror Interrogation techniques, use of drones to assasinate, etc.

Crimes of the Powerful Organized Crime White Collar Crime – Occupational Crime – Corporate Crime

Organized Crime Criminal activity committed by groups with some manner of formalized structure – Primary goal is typically money and power Some ambiguity here – Street gangs versus drug cartels – Terrorist groups

Just how organized is it? The Alien Conspiracy Model (foreign criminals) – Highly organized and centralized – Sicilian “Mafia” (La Cosa Nostra) as poster child Mafia code (loyalty, respect, discipline), secret oaths, traditions, etc Local, ethnic group model – Strong family ties and obligations related to kinship and ethnicity Distrust of outsiders and government Capacity for organization and cooperation among groups Ability to cultivate good will of local residents – Influence limited to cities/geographical areas

Crimes of the organized Illegal Industries – Gambling, narcotics distribution, loan sharking, extortion, insurance scams, fencing… – Violence associated with enforcement Legitimate industry – Used to launder money + create monopolies + extort Restaurants/food, garbage disposal, garment manufacturing, labor unions, construction… Political – Bribery, fixing elections, coercing agents of criminal justice, etc.

The Mafia Mafia is often used as general term – Usually refers to Italian Americans (Sicilian), or La Cosa Nostra (“our thing” in Italian) Fodder for entertainment media (Sopranos, The Godfather, Goodfellas) Famous New York crime families (Gambino, Genovese)] Joseph Valachi testimony (1963) before the Senate – The organization and crime families do exist, but the level of organization often exaggerated – Does “stand apart” because of its pervasiveness, control over illegitimate markets, and penetration into legitimate industry

Law Enforcement Methods Headhunting – Target heads of organized crime families, use informants + surveillance to indict – Successful? Fairly successful at knocking off “heads” but still organized crime Organized Crime Control Act (1970) – Racketeer Influenced and Corrupt Organizations (RICO) Statutes – Prosecutor ability to provide witness protection

The Russian Mafia The new media darling – Law and Order, more recent movies Similar to Italian Mafia Both began by extorting money from fellow immigrants and quickly moved into other areas, and both have reputation for violence Differences – Less cultural/ethnic loyalty, partnerships more opportunistic Fewer “bosses” who collect a cut of illicit ventures, greater flexibility

White Collar Crime Edwin Sutherland – “A crime committed by a person of respectability and high social status in the course of his occupation” Urged criminologists to focus on crimes of the upper class, as opposed to street crime (still an issue today) What is “counted” counts – Sutherland’s study of 70 largest corporations: official records revealed over 980 law violations (fraud, bribery, antitrust) » Much “War Profiteering” A BIT better with NIBRS data, but nowhere near as good as “street crime” data

More recent typology of WCC Occupational Crime – Crimes committed by individuals in the course of their occupation for personal gain Theft/embezzlement, medical fraud by physicians, therapist having sex with client… Corporate or Organizational Crime – Crimes committed by corporations (and their executives) for the benefit of the corporation Organizations include small business and blue collar endeavors (auto repair shops)

Occupational Crimes Employee embezzlement and pilferage – Collective embezzlement Savings and Loans crime wave in the 1980s (land flips) Professional Fraud – Lawyers, Physicians How many hours to bill clients Unnecessary procedures and surgeries, Medicaid/Medicare fraud

Organizational Crime Many organizational crimes are “blue collar” – Auto repair, appliance repair 20/20 and 60 minutes stings – Fraudulent businesses (roofing, blacktop) – Small businesses

Corporate Crime Fraud, Cheating, Corruption – The Enron Scandal Not alone—the most egregious of the 1990s/2000s era – Halliburton, WorldCom, Rite Aid, Adelphia… Enron = cooking books to artificially inflate the value of their stocks (overstate earnings, hide losses), manipulation of California’s energy market to drive up costs – Accounting firm (Arthur Anderson) complicit the fraud – 31 people indicted (Jeff Skilling, Ken Lay) – The “Great Recession”? Housing bubble (mortgage industry) + mortgage backed securities + bailout… Housing bubble (mortgage industry) + mortgage backed securities + bailout…

Corporate Crime II Other financial – Price Fixing / Collusion (gas prices) – False advertising (bait and switch) Corporate Violence – Unsafe work conditions (miners, asbestos) – Unsafe products (contaminated food) FORD PINTO CASE PHARMACEUTICAL INDUSTRY (Dalkon Shield) – Pollution

Cost of WCC Cost MUCH higher than street crime – $17 billion vs. roughly $400 billion – 16,000 homicides vs. 100,000 unnecessary deaths

What causes WCC? Lenience? – Double standard embedded in culture—not “real” criminals Weak/absent regulations –rely on “ethics” and self- regulation Difficulty in proving crime (complex, good lawyers, lack resources to prosecute) – SEC  over 10 years, 600 cases referred for prosecution, and less than 1/3 resulted in convictions with less than 1/6 resulting in jail or prison time Weak punishment  civil settlements with no admission of wrongdoing – Fines often less than 1% of corporate PROFITS for a year

Irony Conservatives cry out for punishment for street crimes, but believe that much corporate “crime” can be cured by self-regulation Liberals decry harsh punishment, especially for non-violent offenders, but believe that WCC could be reduced greatly through prison time – Corporations more “rational” than individuls?

Psycho Corporations Psychopaths: – Insensitive, Manipulative, Superficial charm, Above-average intelligence, Absence of psychotic symptoms, Absence of anxiety, Lack of remorse, Failure to learn from experience, Egocentric, Lack of emotional depth – Corporations are not supposed to be compassionate or think of long-term consequences