Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.

Similar presentations


Presentation on theme: "© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice."— Presentation transcript:

1 © 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice

2 Learning Outcomes LO1: How has the Supreme Court interpreted the Second Amendment’s right to “bear arms?” LO2: Identify three important trends in international terrorism. LO3: Distinguish cyber crime from “traditional crime”. LO4: Outline the three major reasons why the Internet is conducive to the dissemination of child pornography. LO5: Indicate some of the ways that white-collar crime is different from violent or property crime. © 2015 Cengage Learning

3 LO1 How has the Supreme Court interpreted the Second Amendment’s right to “bear arms?” © 2015 Cengage Learning

4 Gun Control Gun control = policies that the government implements to regulate firearm ownership. 310 million firearms in the US not counting military bases. © 2015 Cengage Learning

5 Gun Control 68% of all murders involve guns. 41% of all robberies involve guns. 2 nd Amendment to the U.S. Constitution focuses on a right to bear arms. © 2015 Cengage Learning

6 Gun Control Background checks –Identify felons –Mental defect –Illegal drug addiction evidence Brady Handgun Violence Prevention Act Joe Raedle/Getty Images © 2015 Cengage Learning

7 LO2 Identify three important trends in international terrorism. © 2015 Cengage Learning

8 Terrorism Terror is a realm of nonstate actors, free of control by or allegiance to any nation who use violence to further their own goals. Al Qaeda v. US A. Majeed/AFP/Getty Images © 2015 Cengage Learning

9 Terrorism Jihad = struggle required by Muslim faith including: –Struggle against the evil in oneself –Struggle against the evil outside oneself –Struggle against nonbelievers © 2015 Cengage Learning

10 Terrorism Terrorists have developed more efficient methods of financing their operations. Terrorists have developed more efficient organizations. Terrorists have exploited new communications technology to mount global campaigns. © 2015 Cengage Learning

11 Figure 14.1 Al Qaeda’s Global Partners © Cengage Learning. All Rights Reserved. © 2015 Cengage Learning

12 Terrorism Criminal justice model of homeland security treats terrorism like any other crime. Law enforcement, courts and corrections works together to deter terrorist activity through threat of arrest and punishment. WMD © 2015 Cengage Learning

13 Terrorism Military Model –Enemy combatants –Guantanamo Bay (GTMO) –Military tribunals –Cyber attack –Infrastructure security © 2015 Cengage Learning

14 LO3 Distinguish cyber crime from “traditional” crime. © 2015 Cengage Learning

15 Computer crimes What is Computer Crime? –Cyber crime Any activity occurring via a computer in the virtual community in the Internet. –Opportunity and anonymity © 2015 Cengage Learning

16 Computer crimes What are the Most Common Cyber Crimes Against Persons or Property? –Cyber consumer fraud –Cyber theft Identity theft Phishing © 2015 Cengage Learning

17 Figure 14.2 Protecting Online Passwords © 2015 Cengage Learning

18 Computer crimes What are the Most Common Cyber Crimes in the Business World? Cyber stalking –Credit card crime on the web Hackers –Botnet, worm, virus Spam © 2015 Cengage Learning

19 Computer crimes Intellectual property – products that result from intellectual, creative processes Cyber crimes against the community: –Online pornography –Gambling Nathan Alliard/Getty Images © 2015 Cengage Learning

20 LO4 Outline the three major reasons why the Internet is conducive to the dissemination of child pornography. © 2015 Cengage Learning

21 Internet How Does the Internet Promote Pornography and Gambling? –Online pornography Speed Security Anonymity © 2015 Cengage Learning

22 LO5 Indicate some of the ways that white-collar crime is different from violent or property crime. © 2015 Cengage Learning

23 White-collar Crime Techniques to carry out white-collar crime: –Deception –Abuse of trust –Concealment and conspiracy AP Photo/Sauk Valley Media, Alex T. Paschal, File © 2015 Cengage Learning

24 White-collar Crime What are the Best Strategies for Fighting Cybercrime? –On the cyber beat: challenges for law enforcement Cyber Forensics Jurisdictional challenges –Domestic jurisdiction –International jurisdiction © 2015 Cengage Learning

25 White-collar Crime What are the Best Strategies for Fighting Cybercrime? –Federal law enforcement and cyber crime The Federal Bureau of Investigation –Cyber Division –Cyber Action Teams (CATs) The United States Secret Service © 2015 Cengage Learning


Download ppt "© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice."

Similar presentations


Ads by Google