What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.

Slides:



Advertisements
Similar presentations
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Advertisements

Chapter 25 Other Creditors’ Remedies and Suretyship
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Forensics BACS 371
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter 23 Checks and Banking In the Digital Age
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
CYBER CRIME AND SECURITY TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
1 © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
 Major Differences Between Civil and Criminal Law.  Burden of Proof. Civil is preponderance of the evidence. Criminal is proof beyond a reasonable doubt.
Chapter 1: Legal Ethics 1. © 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use.
© 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
Under what common law theories can polluters be held liable? Under what common law theories can polluters be held liable? What is an environmental impact.
 Nuisance.  Person liable if they use their property in a manner that unreasonably interferes with others’ rights to use or enjoy their own property.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Zimbelman, Albrecht, Albrecht, Albrecht © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter 27 International Law in a Global Economy
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Does a minor have the capacity to enter into an enforceable contract? What does it mean to disaffirm a contract? Does a minor have the capacity to enter.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
World Trade Equilibrium CHAPTER 20 © 2016 CENGAGE LEARNING. ALL RIGHTS RESERVED. MAY NOT BE COPIED, SCANNED, OR DUPLICATED, IN WHOLE OR IN PART, EXCEPT.
© 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Under what common law theories may professionals be liable to clients? Under what common law theories may professionals be liable to clients? What are.
Elasticity: Demand and Supply CHAPTER 6 © 2016 CENGAGE LEARNING. ALL RIGHTS RESERVED. MAY NOT BE COPIED, SCANNED, OR DUPLICATED, IN WHOLE OR IN PART, EXCEPT.
Cybercrime What is it, what does it cost, & how is it regulated?
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
© 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Computer crimes.
The Wealth of Nations : Ownership and Economic Freedom CHAPTER 1 © 2016 CENGAGE LEARNING. ALL RIGHTS RESERVED. MAY NOT BE COPIED, SCANNED, OR DUPLICATED,
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Zimbelman, Albrecht, Albrecht, Albrecht © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Managing Windows Security
ESSENTIALS OF THE LEGAL ENVIRONMENT today, 5e
Fundamentals of business law, 10e
Seminar On Cyber Crime Submitted To: Submitted By:
Forensic and Investigative Accounting
Essentials of the legal environment today, 5e
Putting it All Together
Essentials of the legal environment today, 5e
CHAPTER 1 Introduction to International Macroeconomics
Monetary Aggregates: Measuring Money
CHAPTER 7 Financial Intermediation, Markets and Intermediaries
Forensic Accounting Chapter 16
Presentation transcript:

What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities for identity theft? How has the Internet expanded opportunities for identity theft? What are three reasons that cyberstalking may be more commonplace than physical stalking?  What are three reasons that cyberstalking may be more commonplace than physical stalking?  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 2

What are three major reasons that the Internet is conducive to juvenile cyber crime? What are three major reasons that the Internet is conducive to juvenile cyber crime? How do encryption programs protect digital data from unauthorized access? How do encryption programs protect digital data from unauthorized access? © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 3

Computer crime: “any violation of criminal law that involves knowledge of computer technology for [its] perpetration, investigation, or prosecution.” Three categories: Computer crime: “any violation of criminal law that involves knowledge of computer technology for [its] perpetration, investigation, or prosecution.” Three categories: – Computer is the object of a crime. – Computer is the subject of a crime. – Computer is the instrument of a crime. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 4

Cyber Consumer Fraud: Any act directed against computers or that uses computers as an instrumentality of a crime. Cyber Consumer Fraud: Any act directed against computers or that uses computers as an instrumentality of a crime. – Online Auction Fraud. – Online Retail Fraud.  © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 5

Cyber Consumer Fraud (cont’d). Cyber Consumer Fraud (cont’d). – Cyber Theft. Identity Theft. Phishing. Vishing. Employment Fraud. – Cyberstalking. Threat of Cyberstalking. An Easier Alternative? © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 6

Cyber Consumer Fraud (cont’d). Cyber Consumer Fraud (cont’d). – Cyberstalking (cont’d). Cyberstalking on Social Networks. State v. Cline CASE 7.1 State v. Cline (2008). What were the court’s reasons for venue? © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7

Credit-Card Crime. Credit-Card Crime. Hackers. Hackers. – The Scope of the Problem. – Juvenile Cybercrime. New Service-Based Hacking at Low Cost. New Service-Based Hacking at Low Cost. Cyberterrorism. Cyberterrorism. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8

Pirating Intellectual Property Online. Pirating Intellectual Property Online. – Business Software Alliance estimates 35% of software is pirated, with losses exceeding $5 billion/year. – The Grokster case. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9

State Regulation of Spam. State Regulation of Spam. The Federal CAN-SPAM Act. The Federal CAN-SPAM Act. The U.S. Safe Web Act. The U.S. Safe Web Act. – Allows the FTC to share information with foreign governments, and to jointly investigate and prosecute internet fraud. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 10

Generally, gambling is illegal and assets from gambling can be seized. Generally, gambling is illegal and assets from gambling can be seized. – CASE 7.2 United States v. $6,976,934.65, Plus Interest, Deposited into Royal Bank of Scotland International (2009). What right does the United States have to forfeit funds located in another country? In 2006, Congress passed the Unlawful Internet Gambling Enforcement Act. In 2006, Congress passed the Unlawful Internet Gambling Enforcement Act. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 11

Prosecution of Cyber Crime. Prosecution of Cyber Crime. – “Location” of crime is an issue. – Jurisdiction of courts is an issue. Computer Fraud and Abuse Act. Computer Fraud and Abuse Act. – Person is liable if he accesses a computer online, without authority, to obtain classified, private, or protected information. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 12

Private Efforts to Combat Cyber Crime. Private Efforts to Combat Cyber Crime. – Firewalls and Antivirus software. – Encryption is another means to secure data. © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 13