Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Similar presentations


Presentation on theme: "Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc."— Presentation transcript:

1

2 Chapter 14 © 2004 Pearson Education, Inc.

3 Technology and Crime © 2004 Pearson Education, Inc.

4 Used by both crime fighters and lawbreakers Technology and Crime © 2004 Pearson Education, Inc.

5 Early use of telephones for scams Technology and Crime Getaway cars for escape © 2004 Pearson Education, Inc.

6 High tech criminals seek illegitimate access to computerized information and digital databases Technology and Crime © 2004 Pearson Education, Inc.

7 Direct access Office workers or corporate spies violate positions of trust, gain entry, and steal data during business hours Technology and Crime © 2004 Pearson Education, Inc.

8 Computer trespass Remote access to targeted machines to gain information and copy programs Technology and Crime © 2004 Pearson Education, Inc.

9 Hackers Computer viruses Software piracy Technology and Crime Computer trespass © 2004 Pearson Education, Inc.

10 Computer Crime Any violation of a federal or state computer crime statute Technology and Crime © 2004 Pearson Education, Inc.

11 Forms of Software Piracy Softlifting Internet piracy Software counterfeiting OEM unbundling Hard disk loading Renting Technology and Crime © 2004 Pearson Education, Inc.

12 Computer Crime and the Law All states and the federal government have developed computer-crime statutes specifically applicable to… © 2004 Pearson Education, Inc.

13 …invasive activities aimed at illegally accessing stored information Computer Crime and the Law © 2004 Pearson Education, Inc.

14 Computer Crime and the Law Ambiguities in existing computer-crime laws, complicated by rapid changes in technology,… © 2004 Pearson Education, Inc.

15 …can make it difficult even to tell that a crime has occurred Computer Crime and the Law © 2004 Pearson Education, Inc.

16 Computer Criminals Hacker Male, aged 16-25, lives in the United States Computer user, not programmer © 2004 Pearson Education, Inc.

17 Hacks with software written by others Computer Criminals Hacker © 2004 Pearson Education, Inc.

18 Primary motivation is to gain access to Web sites and computer networks, but… Computer Criminals Hacker © 2004 Pearson Education, Inc.

19 …not to profit financially Computer Criminals Hacker © 2004 Pearson Education, Inc.

20 Pioneers are fascinated by evolving technology and explore out of genuine curiosity Computer Criminals Hacker Classifications © 2004 Pearson Education, Inc.

21 Scamps hack with a sense of fun and typically intend no overt harm Computer Criminals Hacker Classifications © 2004 Pearson Education, Inc.

22 Explorers delight in the discoveries associated with breaking into new computer systems Computer Criminals Hacker Classifications © 2004 Pearson Education, Inc.

23 Game players enjoy defeating software or systemic protections against intrusion Computer Criminals Hacker Classifications © 2004 Pearson Education, Inc.

24 Vandals are malicious hackers who cause deliberate damage with no apparent personal gain Computer Criminals Hacker Classifications © 2004 Pearson Education, Inc.

25 Addicts are classic “nerds” addicted to hacking and computer technology Computer Criminals Hacker Classifications © 2004 Pearson Education, Inc.

26 Share common behavior- related issues and other similarities with computer criminals, including… Computer Criminals White-collar Criminals © 2004 Pearson Education, Inc.

27 Commonly use nonviolent means and employment- related knowledge or technical skills to commit their crimes Computer Criminals White-collar Criminals © 2004 Pearson Education, Inc.

28 Often m anipulate information to create profits or losses Can work alone, in groups, or in organizations Computer Criminals White-collar Criminals © 2004 Pearson Education, Inc.

29 Often commit crimes that are hard to detect, and that cause large losses of money and other resources Computer Criminals White-collar Criminals © 2004 Pearson Education, Inc.

30 Are often found out by accident, and tend to be viewed by the general public as having committed offenses that are less serious than violent offenses Computer Criminals White-collar Criminals © 2004 Pearson Education, Inc.

31 Information Superhighway Information is the lifeblood of today’s economy © 2004 Pearson Education, Inc.

32 Most valuable resource of the new age Of great strategic importance Information Superhighway © 2004 Pearson Education, Inc.

33 A new tool for wrongdoers to commit crimes Potential to reach vast audiences Information Superhighway © 2004 Pearson Education, Inc.

34 Technology and Crime Fight against Crime Traffic radar’s laser speed measuring apparatus 28 mph © 2004 Pearson Education, Inc.

35 Fight against Crime Computer databases of known offenders Public access to sex offender databases Technology and Crime © 2004 Pearson Education, Inc.

36 Technology and Crime Fight against Crime Cellular communications Electronic eavesdropping DNA analysis Less than lethal weapons © 2004 Pearson Education, Inc.

37 DNA (Deoxyribonucleic acid) The genetic code which is unique to each individual Technology and Crime © 2004 Pearson Education, Inc.

38 DNA Fingerprinting May be obtained from blood, hair, semen, saliva, or flakes of skin left at a crime scene © 2004 Pearson Education, Inc.

39 Long lasting Highly reliable forensic tool DNA Fingerprinting DNA © 2004 Pearson Education, Inc.

40 DNA Fingerprinting Many states and the federal government have begun building digitized forensic DNA databases DNA © 2004 Pearson Education, Inc.

41 Has been called the “most important technological breakthrough of 20 th century science” DNA Fingerprinting DNA © 2004 Pearson Education, Inc.

42 Technology and Crime Computer crime Threat (risk) analysis involves a complete and thorough assessment of the kinds of perils facing an organization © 2004 Pearson Education, Inc.

43 Allows identification of risks and development of plans to effectively deal with them Technology and Crime Threat Analysis © 2004 Pearson Education, Inc.

44 A powerful and useful tool Requires training of state and local police Technology and Crime Audit Trail © 2004 Pearson Education, Inc.

45 Three sanctions against computer criminals Technology and Crime © 2004 Pearson Education, Inc.

46 Confiscate equipment used to commit a computer crime Limit the offender’s use of computers Technology and Crime © 2004 Pearson Education, Inc.

47 Restrict the offender’s freedom to accept employment involving computers Technology and Crime © 2004 Pearson Education, Inc.

48


Download ppt "Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc."

Similar presentations


Ads by Google