Chapter 15.  Focus on stopping illegal acts before they occur– not after the commission of crime  Cannot afford to allow the catastrophic acts of terrorism.

Slides:



Advertisements
Similar presentations
Homeland Security and the Future of Criminal Justice.
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Lecturer: Miljen Matijašević Session 8, 7 May 2014.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
Chapter 14 Crime and Justice in the New Millennium
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Criminal Justice Process: the investigation – Chp 12 Arrest – Suspect taken into custody 4 th Amendment: The right of the people to be secure in their.
Security, Privacy, and Ethics Online Computer Crimes.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Lecturer: Miljen Matijašević G10, room 6, Tue 15:30-16:30 Session 9, 16 Dec 2014.
The Criminal Amendments: Rights of the Accused Trends Over Time
Criminal Justice Test Review. 5 th amendment Which amendment allows the accused due process (fair treatment), the right to a grand jury, and the right.
U.S. Government Chapter 15 Section 3
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lower Federal Courts Section 2 The Federal Courts and the Judicial Branch Chapter 8.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
ISSUES IN FBI LAW ENFORCEMENT RELATED TO COUNTER-TERRORISM INVESTIGATIONS Ranjana Natarajan National Security Clinic University of Texas School of Law.
Law and Terrorism “The laws will thus not be silent in time of war, but they will speak with a somewhat different voice.” Chief Justice Rehnquist.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Chapter 2 The criminal investigation process. In this chapter, you will look at the role of police and the courts in the criminal investigation process.
Chapter 28.2 “The Judicial Branch of Texas”. The Judicial Branch is made up of courts and judges throughout the state.
The Patriot Act Protecting the US or Violating People’s Freedoms.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Criminal and Juvenile Justice
Chapter 4 Sentencing and punishment. In this chapter, you will look at the purposes and process of sentencing and the different factors affecting a sentencing.
Unit 2 Human Rights Part 3 Civil and Human Rights.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Chapter 10 The Criminal Process. A.k.a. Procedural criminal law Two most essential elements of Canadian Criminal Process are: - Truth - Justice.
CJ © 2011 Cengage Learning Chapter 1 Criminal Justice Today.
Thinking Critically Questions Chapter Four. Self-Incrimination Should a person be allowed to take the “fifth?” Does a defendant have the right not to.
Computer crimes.
The Criminal Trial. Before the Trial Rights, Obligations and Procedure Chapter 8.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Unit One Topics What is Criminal Justice? Chapter One Reading.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Welcome C&E Students Grab your handout and settle in Roll Call Question: What would your “last meal” be? Bell Work: What are the steps in a criminal justice.
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
The Criminal Justice System. Arrest Procedure The Arrest: To arrest a person the police must have probable cause. (reason to believe that criminal activity.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
CRIMINAL JUSTICE PROCESS: THE INVESTIGATION Chapter 12.
Virginia RULES Teens Learn & Live the Law Virginia’s Judicial System.
Unit 2: Chapter 17.  Attacks on September 11, 2001 shook America to its core  Largest on U.S. soil since World War II  Feeling of vulnerability  Congress.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Civil Liberties: Protecting Individual Rights Chapter 20.
Chapter 6 Due Process and Other Protected Rights Section 1 The Rights of Criminal Defendants.
Criminal Justice Process: The Investigation
Intro to Virginia’s Judicial System
Law-Related Ch Notes The criminal justice process includes everything that happens from the arrest to the punishment of a defendant. I. Arrest:
Federal District Courts
Chapter 2 The criminal investigation process
Legal Implications.
U.S. Government Chapter 15 Section 3
DO NOW.
THE CRIMINAL JUSTICE PROCESS: THE INVESTIGATIVE PHASE
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Warm Up – April 2 Answer the following question on a post it:
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

Chapter 15

 Focus on stopping illegal acts before they occur– not after the commission of crime  Cannot afford to allow the catastrophic acts of terrorism to occur– too high a price  Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)– makes it a federal crime to “provide material support or resources to any group the U. S. has designated a ‘terrorist organization’”

 Have adopted a “criminal justice model” approach to dealing with terrorist acts, similar to other crimes  But, terrorism may not be amenable to the usual threats of punishment and deterrence, as they are often willing to commit suicide to carry out their crime  Punishment almost seems irrelevant in comparison with devastation caused

 FBI focus now firmly on terrorism since 9/11  Increased from 535 to 3,000 agents  Has become partially an intelligence agency– primarily interested in gathering information on potential criminals to prevent those crimes  Work on crimes “in the planning stages”  A police agency usually solves crimes which have already been committed

 Crime control model of addressing terrorism: ◦ Quick and efficient ◦ Nearly a “presumption of guilt” ◦ Monitoring of calls, internet, searches of persons and property at airports  Question: How many of these rights are we willing to surrender?

 Criminal justice system designed to err on side of defendant– Do not convict innocent person  Some rules do not apply in war  Our freedoms (speech, association, movement) make it much easier for terrorists to operation in U. S.  PATRIOT Act– strengthened law enforcement with additional tools to fight terrorism  Certain terrorist suspects labeled “enemy combatants”

 Easier for law enforcement to conduct searches and monitor communications.  FBI can now obtain warrants for searches for “terrorism investigations,” “chemical weapons” or “computer abuse and fraud” as long as they have a “significant purpose”.  Probable cause that a crime had occurred or was about to take place was no longer required.  Changes in 4 th amendment requirements.

 “Roving” surveillance authority in act for terrorist suspects– Can continue to monitor even if suspect goes into another jurisdiction (judicial district).  Person whose home has been searched and voice mails or computer records seized may not be informed of search until much later.  Some believe police may wrongly use the act to gather non-terrorist information about criminal activity.

 Detainees there were seized during military campaign, are non-citizens– 5 th amendment rights do not apply.  Some believe they should be considered POW’s and guaranteed a timely trial, or release.  “Unlawful combatants” may be held until end of war, according to government.

 Supreme Court has provided the detainees with a few more rights in past 3 years: ◦ Can file Federal Habeus Corpus petitions. ◦ Can dispute status as “enemy combatants” in U. S. civil court. ◦ But, those identified as al Qaeda combatants can be held indefinitely.

 Attorney-client privilege can be monitored if “reasonable suspicion” communication would be used to facilitate terrorist activities (No “probable cause” of a crime is necessary)  Presidential order– suspected terrorists tied in military tribunals, not civilian courts  Any evidence is admissible which would help decide the issue  Only 2/3 of panel must agree for person to be convicted  Divisive issue

 Information regarding energy infrastructure, water systems, uranium storage, and nuclear facilities may be available via the internet– targets for terrorism  Also, has facilitated the transmittal of pornography, solicitation of minors  Most illegal activity on internet is done for economic gain (computer crime)

 Do you believe we will have another terrorism attack the scale of 9/11?  Why or why not?  If we are likely to have one, what type of attack do you believe it will be?

 Fraud, embezzlement, theft of intellectual property  Difficult to assess the level of activity– Clearly is increasing  Most cyber crime is merely a new method of committing older crimes  Traditional laws safeguarded physical space and physical property

 Fraud: a knowing misrepresentation made to deceive another and which a reasonable person would and does rely on to their detriment  Cyber Fraud: fraud committed over the internet  Technology has led to creative ways to commit crimes

 Includes Identity Theft– where a criminal steals an identification (often social security number) document, and uses information to access victim’s financial resources  8.9 million cases in U. S. in 2005  “Phishing”– “fish” for your financial data and password posing as legitimate business  Then uses data to masquerade as victim and take money from accounts  has become favorite vehicle of theft

 Have you ever been the target of: ◦ Identity theft? ◦ Fraudulent schemes? ◦ Other cyber crime?

 Perpetrators use internet chat rooms, user groups and to locate and communicate with victims  45 states now make this illegal  “To harass or follow a person which puts them in reasonable fear for their safety or that of their family”

 Companies can reach larger number of customers, but they are left vulnerable to various types of cyber crime  Hacker: someone who uses one computer to break into another  Worm: software program capable of reproducing itself as it spreads from one computer to another  Virus: program which reproduces itself but must be attached to an “infected” host file to travel from one network to another

 6 states have banned internet gambling  Jurisdiction question– Where the crime is committed? State where the offender lives? Where transmission is received?  FBI has taken lead in fighting cyber crime, but other larger police departments have become involved as well– 3 rd highest priority  Need to protect critical infrastructure– airlines, communications, power grids, water, finance

 Technology will provide new opportunities for crime  Expanded use of DNA evidence  Community alternatives to prison will be emphasized  Juvenile offenders will be treated more like adults  Immigration laws used to fight drug trafficking, gangs, terrorism

 million aliens live in U. S.  Mexicans without proper documentation are ordered deported without a hearing  Those from other countries (“OTM’s”) are generally eligible for immigration hearing  Nearly 90% of OTM cases fail to appear for the hearing  Border Patrol now may match fingerprints of those detained for immigration violations with known samples  OTM’s can now be deported within 100 miles of Mexico without a hearing

 What is the best strategy for dealing with the illegal immigration problem (e.g., fence, more patrol, less amnesty, more amnesty, tougher laws, more lenient laws) and why?