CHAPTER 14.  What is White-Collar Crime?  Not an official category of criminal behavior  Covers a broad range of illegal acts including lying, cheating,

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

 The 5 th Amendment limits the national government, but the 14 th guarantees that states cannot deprive rights without “Due Process.”  Due process.
Homeland Security and the Future of Criminal Justice.
Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 15.  Focus on stopping illegal acts before they occur– not after the commission of crime  Cannot afford to allow the catastrophic acts of terrorism.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
CYBER CRIME AND SECURITY TRENDS
 The 5 th Amendment limits the national government, but the 14 th guarantees that states cannot deprive rights without “Due Process.”  Due process is.
Andrew, Lachlan and Han ONLINE PIRACY.  Copyright infringement, or ‘piracy’, is the unauthorized use of works under copyright, infringing the copyright.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Criminal Law and Procedure
Cyber Crimes.
Homework: 4 th amendment “research questions” for Monday FrontPage: Turn in your FP sheet to the back box.
CHAPTER 10 Technology Issues.
Crime & Malpractice AS Module Heathcote Ch. 10.
3Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART What Is a Crime? Section 3.1.
Unit 2 Human Rights Part 3 Civil and Human Rights.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 6 Criminal Law and Cyber Crimes.
Law and Justice: Chapter 1 What Is Law?. What is Law? Law and Values Law and Values Jurisprudence Jurisprudence Study of law and legal philosophy is devoted.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
© 2008 West Legal Studies in Business A Division of Thomson Learning 1 BUSINESS LAW TODAY Essentials 8 th Ed. Roger LeRoy Miller - Institute for University.
Homework: #5 due tomorrow FrontPage: Can anything be done to avoid tragedies like Newtown, the shooting in Colorado, or other incidents of gun violence?
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 22 Criminal Law and Procedure in Business.
Unit 1: Law, Justice, and You
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
 Organized crime has increased considerably while having a negative effect on the State and population.  The operation mode of organized crime is complex.
Handguns “Sawed-off” shotguns Tanks “Automatic” or “assault” rifles Grenades F-16 Fighter Jets Hi-Capacity magazines (hold up to 50 bullets in one “clip”)
Protecting Yourself from Fraud including Identity Theft Personal Finance.
3Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART What Is a Crime? Section 3.1.
The Nature of Crime Guns and the Law Victims of Crime
Gun Control Leading Debates in Gun Control Policy.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
Chapter 17: Foreign Policy and National Defense Section 2.
Gun Control Kimmy Watmuff Avery Rogusky Carliss Egan.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Unit 5 Law and You Laws are often created to ensure the rights and protections of individuals. Sets up a limited government The people have power The government.
Law for Business and Personal Use © Thomson South-Western CHAPTER 4 Criminal Law and Procedure 4-1 Criminal Law 4-2 Criminal Procedure.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
MONEY LAUNDERING “The Basics”.
Immigration, Cyber Crime, and White Collar Crime Chapter 17.
Chapter 16 Today’s Challenges: Security vs. Liberty, Cyber Crime, and White-Collar Crime.
Lesson 18: How Has the Due Process Clause of the Fourteenth Amendment Changed the Constitution?
MGMT 452 Corporate Social Responsibility
Chapter 7 Criminal Law and Cyber Crimes
Civics & Economics – Goals 5 & 6 Criminal Cases
Equal Justice under the Law
Lesson 18: How Has the Due Process Clause of the Fourteenth Amendment Changed the Constitution?
Chapter 8 Criminal Law and Cyber Crimes
Class Name, Instructor Name
UNIT NINE| LAW AND ORDER
Equal Justice under the Law
Thursday, September 8, 2016 Objective: We will go over the perspectives on the Second Amendment and evaluate the effectiveness of gun safety laws and.
Preventing Information Technology Crimes
Ethical Use of Computers
Electronic Surveillance, Post 9/11
Presentation transcript:

CHAPTER 14

 What is White-Collar Crime?  Not an official category of criminal behavior  Covers a broad range of illegal acts including lying, cheating, and stealing  Technically defined as financial activities characterized by deceit and concealment that do not involve physical force or violence  White-collar criminals usually  Have legal access to the place where the crime occurs  Are spatially separated from the victim (often unknown)  Behave in a manner that is legitimate White-Collar Crime

 Different techniques  Deception  Abuse of trust  Concealment and conspiracy  Victims of White-Collar Crimes  Often white-collar crime does not target individuals but rather large groups or more abstract concepts such as “society” or “the environment” White-Collar Crime

 Regulating and Policing White-Collar Crime  A corporation can be treated as a person capable of forming the intent necessary to commit a crime  Corporate violence is a result of policies or actions undertaken by a corporation  Parallel regulatory and criminal systems have evolved to prevent corporate violence and other forms of white-collar crimes White-Collar Crime

 The Regulatory Justice System and White-Collar Crime  The goal of regulation is not prevention or punishment as much as compliance  Law Enforcement and White-Collar Crime  Generally, when regulatory agencies find that criminal prosecution is needed to punish a particular violation, they will refer the matter to the U.S. Department of Justice  The FBI is usually the lead agency when it comes to white-collar crime White-Collar Crime

 White Collar Crime in the Early 2000s  There were two periods of financial scandal in the 2000s  2001 and 2002  Fraudulent accounting practices led to the demise of giant corporations (Enron and Worldcom)  End of the decade  Collapse of the subprime mortgage market  Caused millions of Americans to lose their homes to foreclosure  These scandals and economic downturns led to greater regulation and criminalization of white-collar crimes White-Collar Crime

 White collar crime (corporate crime) is different than violent or property crime.  Which crime category is depicted more in mainstream media?  News  Television  Movies  Music  Why do you think this is the case? Discussion Question #1:

 The same anonymity that makes online activity appealing also makes it vulnerable to deception  Computer Crime and the Internet  Every business relies on computers to conduct its daily affairs  500 million American household devices are now connected to the Internet  The Internet has become a place where large numbers of people socially and commercially interact  Wrongdoing has an opportunity to flourish  Cyber crime is described as criminal activity occurring via a computer in the virtual community of the Internet Cyber Crime

 Computer Crime and the Internet  Cyber Advantages  The advent of the Internet has made it easier to disseminate child pornography and commit other cyber crimes  Reasons include:  Speed  Security  Anonymity  The Incidence of Cyber Crime  Difficult to determine how much cyber crime actually takes place Cyber Crime

 Cyber Crimes Against Persons and Property  Most cyber crimes are not “new”  Existing crimes in which the Internet is now the instrument of wrongdoing  Types of cyber crimes  Cyber consumer fraud  Fraud committed over the Internet  Cyber Theft  Thieves steal data stored in a networked computer with network access from anywhere on the globe  Identity Theft  Phishing  Cyber Aggression and the New Media  Cyberstalking Cyber Crime

 Cyber Crimes in the Business World  Hackers are people who use one computer to illegally access another  Hackers use botnets (robot network)  Malware  Worms are computer programs that can automatically replicate itself and interfere with the normal use of a computer and does not need to be attached to an existing file to move  A virus is a computer program that can replicate itself and interfere with the normal use of a computer and cannot exist as a separate entity  The Spread of Spam  Businesses and individuals are targets of spam  About 970 million messages contain some form of malware  Spam is the preferred method of phishing Cyber Crime

 Pirating Intellectual Property Online  Intellectual property consists of the products that result from intellectual, creative processes  Intellectual property is vulnerable to “piracy”  Books  Films  Music  Software  Millions of copies can be produced with a click of a mouse, and the copies are just as good as the originals in most cases Cyber Crime

 Fighting Cyber Crime  Encryption is the process of encoding information stored in computers in such a way that only authorized parties have access to it  Regulating the Internet  Private industry needs government help to fight off cyber criminals  Many cyber criminals operate in foreign countries, beyond the reach of American authorities Cyber Crime

 Fighting Cyber Crime  Challenges for Law Enforcement  Difficulty in gathering evidence  Cyber Forensics  The application of computer technology to find and utilize evidence of cyber crimes  Digital evidence is information or data of value to a criminal investigation that are either stored or transmitted by electronic means  Cyber Sleuthing Cyber Crime

 Firearms in the United States  Gun ownership is widespread in the United States  1/3 of American households possess at least one firearm  310 million guns in the United States (not counting guns on military bases)  Most gun owners are law-abiding  Illegally obtained firearms are a constant concern for law enforcement  Half of Americans favor stricter measures by the government to control gun ownership Gun Control Policy

 Regulating Gun Ownership  The language in the Second Amendment is considered archaic and vague  The Supreme Court has attempted to clarify the amendment’s modern meaning  Recent rulings  Second Amendment provides individuals with a constitutional right to bear arms  This right must be recognized at all levels of government  Federal  State  Local Gun Control Policy

 Regulating Gun Ownership  Background Check  Criminals and mentally ill individuals are prohibited from legally purchasing firearms  Background checks are conducted by federally licensed gun dealers  Investigate the person’s history to determine whether that person should be allowed the ability to possess a firearm  The mechanics of background checks are regulated by the Brady Bill (1993) Gun Control Policy

 Regulating Gun Ownership  Mental Health Issues  Anyone involuntarily committed to a mental institution or adjudicated as mentally defective is also barred from purchasing or possessing a firearm  Relies on states to provide the federal government with mental health information  Recent Legislative Gun Control Efforts  Because of a lack of federal action, individual states are being tasked with passing stricter gun control measures Gun Control Policy

 Despite recent high profile shooting sprees, the federal government has failed to enact greater gun control measures.  What are the arguments made by advocates of stronger gun control measures?  What are the arguments made by advocates of limited gun control measures?  Do you ultimately think that there should be stronger laws increasing restrictions on gun ownership? Discussion Question #2

 Defining Terrorism:  Terrorism is the use or threat of violence in furtherance of political objectives  Modern terrorism is characterized by extreme levels of violence  The Global Context of Terrorism  Terror is the realm of nonstate actors  An entity that plays a role in international affairs but does not represent any established state or nation  Terrorism is a “supercrime” that incorporates many of the characteristics of international warfare The Terror Threat

 The Global Context of Terrorism  Al Qaeda and Jihad  Grew out of volunteers who migrated to Afghanistan in the 1980s to rid that country of foreign occupiers  Was led by Osama bin Laden to be a form of a jihad  The struggle against the evil in oneself  The struggle against the evil outside oneself  The struggle against nonbelievers  A Continuing Threat  Bin Laden was killed in 2011  Many of the group’s leaders have been killed but it remains a formidable organization  Now relies on a loose affiliation of franchises that operate in Iraq, Yemen, Somalia, Nigeria, and other nations  Self-radicalization  Have the ability to operate under law enforcement’s radar up until the moment they strike The Terror Threat

 Terrorism Trends For the Future:  Terrorists have developed more efficient methods of financing their operations  Terrorists have developed more efficient organizations  Terrorists have exploited new communication technology to mount global campaigns The Terror Threat

 One noted terrorism trend includes smaller operations involving American-born terrorists influenced by international sources.  What strategies would you develop to curtail and limit this identified trend?  In addition to the criminal justice system, what other entities should be involved in the efforts to ensure Americans are not influenced by terrorist sources? Discussion Question #3:

 Counterterrorism Strategies  The Criminal Justice Model  Under the criminal justice model of homeland security terrorism is treated like any other crime  Law enforcement, court, corrections systems work together to deter terrorist activity through the threat of arrest and punishment  Material Support  The Antiterrorism and Effective Death Penalty Act (AEDPA) is one of the most important counterterrorism criminal laws passed  Hampers terrorist organizations by cutting off their material support which covers financial support but also logistical support such as expert advice or assistance  Terrorism Convictions  From 2001 to 2014, federal prosecutors have successfully tried more than 400 defendants on terrorism –related charges in criminal court The Terror Threat

 Counterterrorism Strategies  Military Model  Parallel response to the terrorist threat  Department of Defense designates certain terrorist suspects detained during the course of military operations as enemy combatants  Foreign national who has supported foreign terrorist organizations such as al Qaeda that are engaged in hostilities against the military operations of the United States  Since the 9-11 attacks about 800 enemy combatants were transferred to Guantanamo Bay  As a result of the treatment here, the U.S. has come under international criticism  Political Issues  Security Issues The Terror Threat

 Counterterrorism Strategies  Military Tribunals  Held at the naval base and known as military commissions  Offer more limited protections than those afforded to defendants in civilian courts  Does not have a right to trial by jury  Panel of five military commissioners who act as the judge and jury  2/3 must vote for a conviction  Tribunal Troubles  Convictions occur less often than in civilian court  Many delays The Terror Threat

 As discussed earlier, there are problems associated with military tribunals.  Relatively few convictions have been obtained  Delay of the proceedings  How do these problems make the U.S. appear to the international community?  Should the U.S. abandon the military model as a counterterrorism strategy and rely solely on the criminal justice model? Explain. Discussion Question #4: