The Future of Criminal Justice Chapter 18 Frank Schmalleger Criminal Justice Today 13 th Edition.

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

Victoria ISD Common Sense Media Grade 6: Scams and schemes
CRIMINAL JUSTICE TODAY, 10E© 2009 Pearson Education, Inc by Dr. Frank Schmalleger Pearson Prentice Hall Upper Saddle River, NJ Policing: Issues.
2 Language of Computer Crime Investigation
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
CRIMINAL JUSTICE TODAY, 10E© 2009 Pearson Education, Inc by Dr. Frank Schmalleger Pearson Prentice Hall Upper Saddle River, NJ Prisons and Jails.
CRIMINAL JUSTICE TODAY, 10E© 2009 Pearson Education, Inc by Dr. Frank Schmalleger Pearson Prentice Hall Upper Saddle River, NJ Criminal Law CHAPTER.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
CRIMINAL JUSTICE TODAY, 10E© 2009 Pearson Education, Inc by Dr. Frank Schmalleger Pearson Prentice Hall Upper Saddle River, NJ Policing: Purpose.
© 2003 Prentice-Hall, Inc. 1 Chapter 17 The Future of Criminal Justice.
Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.
14 Technology and Crime.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Forensic Science Application of science to those criminal and civil laws that are enforced by police agencies in a criminal justice system.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
CRIMINAL JUSTICE TODAY, 10E© 2009 Pearson Education, Inc by Dr. Frank Schmalleger Pearson Prentice Hall Upper Saddle River, NJ Pretrial Activities.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Probation, Parole, and Intermediate Sanctions Chapter 12 Frank Schmalleger Criminal Justice Today 13 th Edition.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
The Crime Picture Chapter 2 Frank Schmalleger Criminal Justice Today 13 th Edition.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
The Courts: Structure and Participants Chapter 9 Frank Schmalleger Criminal Justice Today 13 th Edition.
Cyber crime & Security Prepared by : Rughani Zarana.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Scams & Schemes Common Sense Media.
Policing: Purpose and Organization Chapter 6 Frank Schmalleger Criminal Justice Today 13 th Edition.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
The Future of Criminal Justice
Securing and Searching the Crime Scene Chapter 2: Forensics, Nanes
Criminal Investigation, 7 th Edition By James N. Gilbert PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ Computer Aided Investigations.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
CRIMINAL JUSTICE TODAY, 10E© 2009 Pearson Education, Inc by Dr. Frank Schmalleger Pearson Prentice Hall Upper Saddle River, NJ The Courts: Structure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Disciplines of Forensic Science Chapter 1. Disciplines of Forensic Science Criminalistics Digital & Multimedia Sciences Engineering Sciences Jurisprudence.
What Is Criminal Justice? Chapter 1 Frank Schmalleger Criminal Justice Today, 13th Edition.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Criminal Justice 2011 Class Name, Instructor Name Date, Semester Chapter 2: Investigation Basics.
Cybercrime What is it, what does it cost, & how is it regulated?
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Computer crimes.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
* Fingerprint Development* OUR ORGANIZATION PROVIDES THE SERVICES OF FINGERPRINT (INVISIBLE OR PARTIAL) DEVELOPMENT THROUGH VARIOUS TECHNIQUES I.E. POWDER.
Criminal Justice: A Brief Introduction Ninth Edition By Frank Schmalleger Pearson Education, Inc.
Criminal Justice: A Brief Introduction Ninth Edition By Frank Schmalleger Pearson Education, Inc.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Criminal Justice: A Brief Introduction Ninth Edition By Frank Schmalleger Pearson Education, Inc.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Criminal Justice: A Brief Introduction Ninth Edition By Frank Schmalleger Pearson Education, Inc.
IT Security  .
Network security threats
Lesson 2- Protecting Yourself Online
Criminal Justice Today
Lesson 2- Protecting Yourself Online
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

The Future of Criminal Justice Chapter 18 Frank Schmalleger Criminal Justice Today 13 th Edition

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved To your knowledge, have you or anyone you know been the victim of a cybercrime? 1.Yes 2.No 2

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 3 Correct Answer Survey Question Graph answers for class discussion

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved Tricking people into giving out passwords or breaking normal security is an example of: 1.Biocrime 2.Social engineering 3.Social hacking 4.Cyber-sleuthing 4

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 5 Correct Answer 2. Social engineering

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved Which of the following is a type of cybercrime? 1.Communications for conspiracy via the internet 2.Disseminating offensive materials via the internet 3.Electronic money-laundering 4.All of the above is cybercrime. 6

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 7 Correct Answer 4. All the above is cybercrime.

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved Programs designed to secretly invade a computer system in order to modify how it operates or alter stored information is: 1.A type of phishing 2.A virus 3.Spam 4.Software piracy 8

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 9 Correct Answer 2. A virus

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved In a phishing scheme, official-looking s are intended to elicit responses from victims, directing them to phony websites intended to steal valuable information like credit card numbers, social security numbers, user IDs, and passwords. 1.True 2.False 10

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 11 Correct Answer 1. True

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved A student changes her final grade in a class through unauthorized access into the college’s computer system. This is an example of what? 1.Malware 2.Software piracy 3.Hacking 4.Encrypting 12

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 13 Correct Answer 3. Hacking

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved I have downloaded software without authorization. 1.Yes, but I didn’t know it was against the law. 2.Yes, but I do not agree with the law. 3.No, I have not. 4.I am not sure. 14

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 15 Correct Answer Survey Question Graph answers for class discussion

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved A weapon of mass destruction (WMD) is a chemical, biological or nuclear weapon that has the potential to cause mass casualties. 1.True 2.False 16

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 17 Correct Answer 1. True

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved Which of the following best reflects your opinion? 1.I believe that an enemy of the U.S. has and will use a WMD. 2.I believe that the next terrorist attack against the U.S. will involve the use of viruses, bacteria, or deadly toxins. 3.I don’t believe we are in danger of WMDs or bioterrorism. 18

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 19 Correct Answer Survey Question Graph answers for class discussion

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved Which of the following best reflects your opinion regarding the use of “bait cars” by police? 1.I believe it is a form of entrapment. Police should not be allowed to bait people into stealing cars. 2.Bait cars are a great way to protect the public and get potential car thieves off the streets. 20

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 21 Correct Answer Survey Question Graph answers for class discussion

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved Which of the following would you like to know more about in terms of its use in law enforcement? 1.DNA fingerprinting 2.Night vision 3.Digital imaging devices 4.Thermography 22

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 23 Correct Answer Survey Question Graph answers for class discussion

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved The Bertillon System now replaces the use of fingerprints for identification. 1.True 2.False 24

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 25 Correct Answer 2. False

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved As a criminalist, I would be interested in ________________ as a career. 1.Ballistics (analyzing weapons, ammunition) 2.Medical pathology (determining the cause of death) 3.Forensic anthropology (reconstructing the likeness of decomposed dead bodies) 4.Crime lab technician 5.Crime scene technician 6.Crime scene photography 7.I don’t plan to go into forensics 26

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 27 Correct Answer Survey Question Graph answers for class discussion

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved DNA profiling uses biological residue from the crime scene to aid in identifying a suspect which might: 1.Demonstrate that a person of interest is guilty 2.Prove that a person of interest is innocent 3.Both 1 and 2 are possibilities once the DNA results are reviewed. 4.I don’t understand DNA profiling. 28

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 29 Correct Answer 3. Both 1 and 2 are possibilities once the DNA results are reviewed.

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved The developing field of artificial intelligence uses computers to make inferences based on available information and to draw conclusions or to make recommendations to the system’s operators. What are these computer models often called? 1.Expert systems 2.The CODIS 3.METAPOL 4.Assisted systems 30

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 31 Correct Answer 1. Expert systems

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved Which of the following is NOT predicted to be a capability that augmented reality will offer police officers? 1.Real-time language translation 2.Advanced optics and audio amplification 3.Automated weapon-firing 4.Facial, voiceprint, and other biometric recognition data of known criminals 32

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 33 Correct Answer 3. Automated weapon-firing

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved Which of the following best represents your view of technological advances in policing? 1.They are a good thing because they will better enable police to control crime. 2.I am skeptical because these advances will enable police to monitor so much that it will inevitably lead to violations of personal privacy. 34

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 35 Correct Answer Survey Question Graph answers for class discussion

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved What type of crime do you think poses the greatest threat to our society going forward? 1.Identity theft 2.Bank or credit card fraud 3.Cyberstalking 4.Terrorism 36

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 37 Correct Answer Survey Question Graph answers for class discussion

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved How might technological advances in investigative techniques threaten individual rights guaranteed by the Constitution? 1.Clear intrusion 2.Minimal 3.None 38

Criminal Justice Today, 13th Edition Frank Schmalleger © 2015 by Pearson Higher Education, Inc Upper Saddle River, New Jersey All Rights Reserved 39 Correct Answer Survey Question Graph answers for class discussion