CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
4-1. Business in a Changing World McGraw-Hill/Irwin Copyright © 2009 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Managing Information.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Chapter 14 Crime and Justice in the New Millennium
Mohd Taufik Abdullah Department of Computer Science
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Computer Forensics BACS 371
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
LEFIS General Assembly, Wrocław Sept Continuing education Andrzej Adamski, Nicolaus Copernicus University, Poland.
4-1 Technology – Impact on Our Lives Information technology– processes and applications that create new methods to solve problems, perform tasks, and manage.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CJ © 2011 Cengage Learning Chapter 5 Law Enforcement Today.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
Privacy, Security and Ethics
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Immigration, Cyber Crime, and White Collar Crime Chapter 17.
Cyber Crime and Jurisdiction By Zach Archer COCS 380.
Chapter 16 Today’s Challenges: Security vs. Liberty, Cyber Crime, and White-Collar Crime.
Securing Information Systems
MGMT 452 Corporate Social Responsibility
A Project on CYBER SECURITY
Computer Crime CJ 520 / CJ October 27, 2010.
Seminar On Cyber Crime Submitted To: Submitted By:
Lesson # 1 A Practical Guide to Computer Forensics Investigations
Securing Information Systems
E-Commerce: Regulatory, Ethical, and Social Environments
Why do you want this grant?
Entering the World of Cybercrime
Presentation transcript:

CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice

© 2011 Cengage Learning Learning Outcomes LO1: Distinguish cyber crime from “traditional crime”. LO2: Explain the differences between cyberstalking and cyberbullying. LO3: Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses. LO4: Explain how the Internet has contributed to the piracy of intellectual property. LO5: Outline the three major reasons why the Internet is conducive to the dissemination of child pornography.

1 LO © 2011 Cengage Learning Distinguish cyber crime from “traditional” crime.

© 2011 Cengage Learning Learning Outcome 1 Types of computer crime: The computer is the “object” of the crime. The computer is the “subject” of the crime. The computer is the “instrument” of the crime.

© 2011 Cengage Learning Learning Outcome 1 Cyber crime: Any activity occurring via a computer in the virtual community in the Internet Difficult to determine how much cyber crime actually takes place

© 2011 Cengage Learning Learning Outcome 1 Types of Cyber Crime: Cyber consumer fraud Online retail fraud Online auction fraud Cyber theft – Identity theft – Phishing

© 2011 Cengage Learning Source: National White Collar Crime Center and Federal Bureau of Investigation, Internet Crime Report: 2009 (Washington, D.C.: Internet Crime Complaint Center, March 2010), Figure 4, page 5.

2 LO © 2011 Cengage Learning Explain the differences between cyberstalking and cyberbullying.

© 2011 Cengage Learning Learning Outcome 2 Cyberstalking: harassing a person through the Internet, , or some other form of electronic communication Cyberbullying: inflicting willful and repeated emotional harm using computers, cell phones, or other electronic devices

3 LO © 2011 Cengage Learning Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses.

© 2011 Cengage Learning Learning Outcome 3 Credit card crime on the web Hackers Botnets Malware – Worms – Viruses Cyberwarfare

© 2011 Cengage Learning Learning Outcome 3 Spam: Bulk s sent without the consent of the recipient Controlling the Assault of Non- Solicited Pornography and Marketing Act (CAN_SPAM) of 2003

4 LO © 2011 Cengage Learning Explain how the Internet has contributed to piracy of intellectual property.

© 2011 Cengage Learning Learning Outcome 4 Pirating Intellectual Property: Intellectual property is the products that result from intellectual, creative processes. Includes piracy of books, films, music and software. An estimated 41% of all software is pirated.

© 2011 Cengage Learning Learning Outcome 4 Electronic Banking: Money laundering Digital currency

5 LO © 2011 Cengage Learning Outline the three major reasons why the Internet is conducive to the dissemination of child pornography.

© 2011 Cengage Learning Learning Outcome 5 Issues in online pornography Speed Security Anonymity

© 2011 Cengage Learning Learning Outcome 5 Issues in online gambling Can citizens in a state that does not allow gambling place bets to a Web site located in a state that does? Many Internet gambling sites are located in countries where Internet gambling is legal.

© 2011 Cengage Learning CAREERPREP Computer Forensic Specialist Job Description: Investigate misbehavior on computer systems by collecting and analyzing computer-related evidence. Retrieve data that have been encrypted or electronically stored on a commercial or personal computer. Work for a law enforcement or homeland security agency to investigate crimes or terrorists’ activities, or for a private company to protect commercial data and defend against worms, viruses, and other malware. What Kind of Training Is Required? An extensive knowledge of computers, computer programming, and data retrieval is essential. A number of colleges, universities, and online educational organizations offer computer forensic courses that provide the skills necessary for this career. A complete understanding of the rules of evidence in criminal courts and the ability to establish a proper chain of custody for all evidence retrieved from targeted computer databases. Annual Salary Range? $50,000–$85,000 For additional information, visit: computer-forensics.sans.org.

© 2011 Cengage Learning Learning Outcome 5 Cyber Forensics: Main goal – gather digital evidence Jurisdictional challenges – Domestic – International

© 2011 Cengage Learning Learning Outcome 5 Federal law enforcement and cyber crime: The Federal Bureau of Investigation – Cyber Division – Cyber Action Teams (CATs) The United States Secret Service

© 2011 Cengage Learning

Learning Outcome 5 Private Efforts to Combat Cyber Crime: The Conficker scare Encryption

© 2011 Cengage Learning Learning Outcome 5 Future trends: Changing demographics Technological advances Increasing diversity The globalization of crime