Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 2:
Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011.
Lecture 1: The Discovery of White Collar Crime
Missing and Abducted Persons Chapter 12:
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 5: Interviews and Interrogations.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Criminal Justice 2011 Chapter 10: ROBBERY
Criminal Law and Cyber Crime
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Criminal Justice 2011 Chapter 2: The Crime Scene: Field Notes, Documenting, and Reporting Criminal Investigation The Art and the Science by Michael D.
Crimes Against Children: Child Abuse Chapter 13: and Child Fatalities
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Crimes Committed in the Presence of Children Proposed Methodology for 2008 Study.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Criminal Justice 2011 Chapter 8 Management of Informants and Undercover Operations Criminal Investigation The Art and the Science by Michael D. Lyman Copyright.
Chapter 4 The Law.
Criminal Law and Procedure
Cyber Crimes.
Crime Chapter 8 Section 2. Crime Prohibited by law Punishable by the government.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Chapter 6 Criminal Law and Cyber Crimes. 2  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
List as many school rules as you can think of
By Kelly Marken CIVIL LAW & LAWSUITS. WHEN YOU TURN 18 YOU CAN SUE AND BE SUED IN A CIVIL COURT.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 6 Criminal Law and Cyber Crimes.
© 2008 West Legal Studies in Business A Division of Thomson Learning 1 BUSINESS LAW TODAY Essentials 8 th Ed. Roger LeRoy Miller - Institute for University.
Criminal Law and Cyber Crimes Chapters 6 & 7. Civil and Criminal Law Compared.
Chapter 5 Crimes. Offenses Against Society When a crime occurs, society, acting through such employees as police and prosecutors, attempts to identify,
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
Money laundering. What is money laundering? It is a process of making dirty money clean. Money is moved around the financial system again and again in.
Chapter 2 Crime Scene Investigation and Evidence Collection By the end of this chapter you will be able to: summarize Locard’s exchange principle.
Criminal Justice 2011 Class Name, Instructor Name Date, Semester Chapter 2: Investigation Basics.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
8.2 Crime. Introduction Effects everybody in the United States  Some are victims, some are criminals, some are both  Majority that are effected are.
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 8: ROBBERY.
PRESENTATION NAME Arrest and Detention. Arrest and Detention Arrest and Detention Depending on the amount of physical evidence collected, the police may.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Law Enforcement and Coroners Working Together In Crime Scene Investigations.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Immigration, Cyber Crime, and White Collar Crime Chapter 17.
Bell Ringer What does the graph show? About how many people were in prison in the year 2000?
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter One Objectives
Criminal Offences Against Property
Criminal Evidence Chapter 3
Chapter 7 Criminal Law and Cyber Crimes
A Project on CYBER SECURITY
Crime scene investigation
8.1 Levels of Police in Canada/Starting a Police Investigation
Seminar On Cyber Crime Submitted To: Submitted By:
Chapter 8 Criminal Law and Cyber Crimes
Crimes against Property
Introduction to Computer Forensics
Crime Processing and Analysis
Class Name, Instructor Name
CHAPTER 7 SECTION 3 CRIME.
Chapter 5.
Ethical Use of Computers
Connections Abuse Prevention Plan 2018.
Crime in the United States
Authority of the Police
Criminal Law for the Criminal Justice Professional
Class Name, Instructor Name
Presentation transcript:

Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes

Summarize vice crimes and laws. Describe white-collar and corporate crime. : Summarize the crime of money laundering. Identify the different types of computer crime. Describe how computer crime investigations are conducted. CHAPTER SUMMARY 14.6 Describe hit-and-run crimes and how they are investigated.

Summarize vice crimes and laws. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.1

Vice Crimes 14.1 Generally speaking “vice crimes” involve conduct that is both illegal and immoral Picture of a prostitute working the streets

Vice Crimes 14.1 Prostitution and related crimes Illegal Gambling Pornography including child pornography Drugs

Vice and Sexual Morality Statutes 14.1 Many states have such laws… Photo placeholder

Vice and Sexual Morality Statutes 14.1 Specific crimes in Wisconsin: Photo placeholder

Describe white-collar and corporate crime. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.2

White Collar Crime 14.2 Non-violent Committed for financial gain Accomplished by means of deception

White Collar Crime 14.2 The statutes are quite complicated! “By virtue of his or her office, business or employment, or as trustee or bailee, having possession or custody of money or of a negotiable security, instrument, paper or other negotiable writing of another, intentionally uses, transfers, conceals, or retains possession of such money, security, instrument, paper or writing without the owner’s consent, contrary to his or her authority, and with intent to convert to his or her own use or to the use of any other person except the owner.” Wisconsin State Statute, (1)(b)

Corporate Crime 14.2 Concealing defects Environmental Crimes Environmental Crimes Cheating customers Misleading investors A form of White Collar crime…

Summarize the crime of money laundering. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.3

Money Laundering 14.3 Step Four: Obtain the $$$ back Step Four: Obtain the $$$ back Step Two: Hide $$$ from The Government Step Two: Hide $$$ from The Government Step One: Illegally earn $$$ Step One: Illegally earn $$$ Step Three: Use legitimate Businesses to “wash” the $$$ Step Three: Use legitimate Businesses to “wash” the $$$

Methods of Money Laundering 14.3 Double Invoicing Currency Exchanges Smurfing Bank Methods It is as varied as the businesses that exist in this country, both small and large Acquiring financial institutions Money orders

Identify the different types of computer crime. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.4

The introduction of fraudulent records or data Types of Computer Crime 14.4 Unauthorized use of computer- related facilities The alteration or destruction of information or files Stealing through use of the computer

Computer Crimes 14.4 Old Crimes in a new way Stalking Harassment Child pornography

Computer Crimes 14.4 New Crimes in a new era Hacking Scanning Masquerading Trojan horses, viruses, data diddling, piracy, etc…

Describe how computer crime investigations are conducted. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.5

Hardware Software Two Categories Computer Components 14.5 Computer

Investigating Computer Crime 14.5 Obtain computer evidence Examine computer evidence Preserve evidence for court purposes Interview the suspect

Investigating Computer Crime 14.5 Obtaining computer evidence… Computer media Computer data Evidence online Other computer evidence including peripherals Insert a picture of the inside of a computer here please Insert a picture of the inside of a computer here please

Investigating Computer Crime 14.5 Examining computer evidence… Computer media Computer data Evidence online Other computer evidence including peripherals Insert a picture of an online “history” Here please Insert a picture of an online “history” Here please

Describe hit-and-run crimes and how they are investigated. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 14.6

Hit and Run Crimes 14.6 Causing injury Or damage Leaving the Scene

Hit and Run Crime 14.6 Felony If death or an injury is the result of the accident The person who caused the accident knows that the accident occurs The suspect flees the scene without aiding the victim

Hit and Run Crime 14.6 Misdemeanor If damage is the result of the accident The person who caused the accident knows that the accident occurs The suspect flees the scene without notifying police or the owner of the property

Investigating Hit and Run 14.6 Step One Respond to the scene quickly Be on the alert for vehicles fleeing the scene with fresh damage Protect the scene when you arrive from further accidents

Investigating Hit and Run 14.6 Update dispatch Step Two Aid any victim that is injured Obtain statement regarding H&R vehicle

Investigating Hit and Run 14.6 Step Three Send out BOLO Process crime scene Return scene to normal

Investigating Hit and Run 14.6 Step Four Send out TTY to other jurisdictions Send evidence to Crime Lab for analysis Check garages for vehicle repairs that match suspect damage

Summarize vice crimes and laws. Describe white-collar and corporate crime. : Summarize the crime of money laundering. Identify the different types of computer crime. Describe how computer crime investigations are conducted. CHAPTER REVIEW 14.6 Describe hit-and-run crimes and how they are investigated.