Chapter 16 Today’s Challenges: Security vs. Liberty, Cyber Crime, and White-Collar Crime.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Chapter 17 Law and Terrorism.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
JCSD-aw Citizenship in an e-World Johnston Community School District.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
CYBER CRIME AND SECURITY TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Federal Bureau of Investigation
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Digital Citizenship Project By Allen Naylor Ed 505.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Chapter 7 Judicial Branch. Review ???? 1.What is any behavior that is illegal called? 2.What laws are passed by lawmaking bodies? 3.What is an appeal?
CRIMES Used by permission. For Educational purposes only.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
CHAPTER 14.  What is White-Collar Crime?  Not an official category of criminal behavior  Covers a broad range of illegal acts including lying, cheating,
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
Immigration, Cyber Crime, and White Collar Crime Chapter 17.
ETHICS Internet And Online Community Week 10.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Criminal Justice Process: The Investigation
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Courts System Search Warrants.
DIGITAL CITIZENSHIP What You Should Know!.
Legal Implications.
Ethical, Social, and Political Issues in E-commerce
Chapter 10 Cyberlaw, Social Media, and Privacy
A Project on CYBER SECURITY
Student Discipline, Bullying & Cyber-Bullying
Chapter 5 Civil Liberties
GOSSIP and CYBERBULLYING
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Internet And Online Community Week 10
COMPUTER CRIME.
Securing Information Systems
Knowing the facts and consequences of cyber bullying
Video: Digital citizenship is defined as the norms of appropriate,
Should Schools Be Allowed to Limit Students’ Online Speech?
Class Name, Instructor Name
GOSSIP and CYBERBULLYING
DO NOW.
Section 3.1.
THE CRIMINAL JUSTICE PROCESS: THE INVESTIGATIVE PHASE
Chapter 5 Civil Liberties
IA455 Chris Danieli and Zachary gibson
Electronic Surveillance, Post 9/11
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Lesson 6-1 Civil Law (Tort Law).
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Crime in the United States
Entering the World of Cybercrime
Chapter 7 The Judicial Branch
The Right to Privacy vs. National Security
Presentation transcript:

Chapter 16 Today’s Challenges: Security vs. Liberty, Cyber Crime, and White-Collar Crime

Learning Objective 1 Summarize the three federal laws that have been particularly influential on our nation’s counterterrorism strategies. In 2015, a white rose is placed on the name of one of the victims of the September 11, 2001, terrorist attacks at a memorial in New York City. Why does large scale terrorist activity often make citizens of the targeted country more willing to trade certain freedoms for greater security against future attacks? Jewel Samad/AFP/Getty Images Jewel Samad/AFP/Getty Images

Security vs. Liberty National security and privacy Congress passed the Foreign Intelligence Surveillance Act (FISA) in 1978. The Antiterrorism and Effective Death Penalty Act (AEDPA) hampers terrorist organizations by cutting off their funding. The Patriot Act

Security vs. Liberty Figure 16.1 The Patriot Act and Electronic Surveillance Under Title II of the Patriot Act, the following sections greatly expanded the ability of federal intelligence operatives and law enforcement agents to conduct electronic surveillance operations on suspected terrorists. * In 2012, this rule was revised to require notice within thirty days of the search in most circumstances.

Learning Objective 2 Explain why private expectations are so important to the federal government’s metadata surveillance operations. Protesting outside the Justice Department in Washington, D.C., this woman believes that the federal government should not be allowed to collect information about the telephone habits of U.S. citizens without first obtaining permission from a court. Do you agree with her? Why or why not? Win McNamee/Getty Images Win McNamee/Getty Images

Security vs. Liberty Revelation that NSA had been monitoring cell phone and Internet activity of about 113 Americans without probable cause or a warrant from the FISA court Government agents can search and seize, without a warrant, information voluntarily disclosed to third parties. Smith v. Maryland (1979) held that a defendant had no expectation of privacy when he voluntarily turned over phone numbers to a third party.

Learning Objective 3 Distinguish verbal threats that are protected by the Constitution from verbal threats that can be prosecuted as “true threats.” Thomas Durkin, attorney for Mohammed Hamzah Khan, addresses the media on October 9, 2014, in Chicago. Khan was arrested by federal agents while boarding a flight to the Middle East, where he allegedly planned to join an extremist terrorist organization. If you were Khan’s attorney, how would you argue that the act of boarding an airplane should never be a crime? What is your opinion of such an argument? Brian Kersey/Getty Images Brian Kersey/Getty Images

Security vs. Liberty True threat law In Virginia v. Black (2003), the Supreme Court held that the act of burning a cross was not enough to constitute a crime, and that the state must also prove that the act was done to place a specific victim “in fear of bodily harm or death.” Finding and capturing “known wolves”

Learning Objective 4 Outline the three major reasons why the Internet is conducive to the dissemination of child pornography. P. C. Vey/The New Yorker Collection/Cartoonbank.com

Cyber Crime Cyber crime is any criminal activity occurring via a computer in the virtual community of the Internet. Child pornography Speed Security Anonymity

Cyber Crime Cyberattack: attempt to damage or disrupt computer systems or electronic networks operated by computers Infrastructure security

Cyber Crime Cyber fraud Cyber theft Theft of personal information Identity theft Phishing

Cyber Crime FIGURE 16.2 The Costs of Cyber Crime After polling adults in twenty-four countries, including the United States, researchers associated with the American security software company Symantec estimated that more than 1.5 million computer users worldwide are victims of cyber crime each day. As the graph below shows, 83 percent of the financial costs associated with cyber crime are the result of fraud, theft, or computer repairs made necessary by the wrongdoing. Source: 2013 Norton Report (Mountain View, Calif.: Symantec, 2014), 8.

Cyber Crime Cyberstalking Cyberbullying Harassing a person through the Internet and putting that person in reasonable fear for his or her safety Cyberbullying Willful and repeated emotional harm inflicted through electronic devices

Learning Objective 5 Describe the three following forms of malware: a) botnets b) worms and (c) viruses. Nathan Alliard/Getty Images

Cyber Crime Hacker Malware Botnets Worms Viruses Person who breaks into another person’s computer Malware Any program that is harmful to a computer or computer user Botnets Networks of computers that have been appropriated by hackers without the knowledge of their owners Worms A program that is capable of reproducing itself as it spreads from one computer to the next Viruses Able to reproduce itself, but must be attached to an infested host file in order to travel

Learning Objective 6 Explain how the Internet has contributed to piracy of intellectual property. Target Corp. executive vice president John Mulligan, right, testifies before the U.S. Congress following a security breach that allowed hackers to steal financial and personal data from tens of millions of consumers. Why does this type of cyber crime fall into the category of identity theft, as described earlier in the section? Bloomberg via Getty Bloomberg via Getty

Cyber Crime Pirating intellectual property Intellectual property is the products that result from intellectual, creative processes Includes piracy of books, films, music, and software An estimated 43% of all software is pirated

Cyber Crime Cyber forensics Cyber sleuthing Officers cannot put yellow tape around the computer screen or dust the Web site. Digital evidence is stored or transmitted by an electronic device. Cyber sleuthing Tools to bypass technology employed by cyber criminals Jurisdictional challenges

Learning Objective 7 Indicate some of the ways that white-collar crime is different from violent or property crime. FIGURE 16.4 White-Collar Crimes

White-Collar Crime What is white-collar crime? Different techniques Covers a broad range of illegal acts involving “lying, cheating, or stealing” Not an official category of criminal behavior Different techniques Have legal access to the place the crime occurs Are spatially separated from the victim Behave in a manner that is superficially legitimate

White-Collar Crime Three main techniques of white-collar criminals to commit crime Deception Abuse of trust Concealment and conspiracy Victims of white-collar crime: Sometimes the victims are obvious; in other instances however, they are a little more difficult to define. Can be one person, multiple people, society, or the environment

Learning Objective 8 Explain the concept of corporate violence. I took this photo from page 351 of Siegel. Fraud may occur in both public and private organizations. Here Federal agents load a van with boxes of evidence taken from the headquarters of the Confederation of North, Central American and Caribbean Association Football (CONCACAF) in Miami Beach, Florida. Swiss prosecutors opened criminal proceedings into FIFA’s awarding of the 2018 and 2022 World Cups, after seven soccer officials were arrested after probe of “rampant, systemic, and deep-rooted” corruption in the organization.

Corporate Violence Corporate violence Physical harm to individuals or the environment that occurs as the result of corporate policies or decision making Administrative laws attempt to control the actions of these corporations. The U.S. Department of Justice is often given responsibility for prosecution.