Download presentation
Presentation is loading. Please wait.
Published byEdith Showman Modified over 10 years ago
1
Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011
2
17.1 Understand the various types of white-collar crime. 17.2 Understand the problem of money-laundering investigations. 17.3 List the various techniques used by organized crime to hide or launder illicit financial proceeds. 17.4 Learn the different types of confidence games and how they work. 17.5 Describe the nature of computer crimes and the various types of computer offenses known today. 17.6 Know what evidence to look for in the investigation of computer crimes. 17.7 Understand the profile of the computer crime suspect. CHAPTER SUMMARY
3
Understand the various types of white-collar crime. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.1
4
White Collar Crime 17.1 Non-violent Committed for financial gain Accomplished by means of deception
5
White Collar Crime 17.1 The statutes are quite complicated! By virtue of his or her office, business or employment, or as trustee or bailee, having possession or custody of money or of a negotiable security, instrument, paper or other negotiable writing of another, intentionally uses, transfers, conceals, or retains possession of such money, security, instrument, paper or writing without the owners consent, contrary to his or her authority, and with intent to convert to his or her own use or to the use of any other person except the owner. Wisconsin State Statute, 943.20(1)(b)
6
Corporate Crime 17.1 Concealing defects Environmental Crimes Environmental Crimes Cheating customers Misleading investors A form of White Collar crime…
7
Understand the problem of money- laundering investigations. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.2
8
Money Laundering 17.2 Step Four: Obtain the $$$ back Step Four: Obtain the $$$ back Step Two: Hide $$$ from The Government Step Two: Hide $$$ from The Government Step One: Illegally earn $$$ Step One: Illegally earn $$$ Step Three: Use legitimate Businesses to wash the $$$ Step Three: Use legitimate Businesses to wash the $$$
9
List the various techniques used by organized crime to hide or launder illicit financial proceeds. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.3
10
Methods of Money Laundering 17.3 Double Invoicing Currency Exchanges Smurfing Bank Methods It is as varied as the businesses that exist in this country, both small and large Acquiring financial institutions Money orders
11
Learn the different types of confidence games and how they work. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.4
12
Confidence Games 17.4 Travel Scams The Pyramid Get Rich Quick Scheme The Bank Examiner Scheme The Pigeon Drop The spectrum of white-collar crime also extends to the timeless scam of the confidence game (or con). Home Repair Scams Contest Cons
13
Describe the nature of computer crimes and the various types of computer offenses known today. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.5
14
The introduction of fraudulent records or data Types of Computer Crime 17.5 Unauthorized use of computer- related facilities The alteration or destruction of information or files Stealing through use of the computer
15
Computer Crimes 17.5 Old Crimes in a new way Stalking Harassment Child pornography
16
Computer Crimes 17.5 New Crimes in a new era Hacking Scanning Masquerading Trojan horses, viruses, data diddling, piracy, etc…
17
Hardware Software Two Categories Computer Components 17.5 Computer
18
Know what evidence to look for in the investigation of computer crimes. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.6
19
Investigating Computer Crime 17.6 Obtain computer evidence Examine computer evidence Preserve evidence for court purposes Interview the suspect
20
Investigating Computer Crime 17.6 Obtaining computer evidence… Computer media Computer data Evidence online Other computer evidence including peripherals Insert a picture of the inside of a computer here please Insert a picture of the inside of a computer here please
21
Investigating Computer Crime 17.6 Examining computer evidence… Computer media Computer data Evidence online Other computer evidence including peripherals Insert a picture of an online history Here please Insert a picture of an online history Here please
22
Understand the profile of the computer crime suspect. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome 17.7
23
Most perpetrators are young and were educated in colleges and universities where computer attacks are common and sometimes condoned as educational activity. The Profile! 17.7 Age
24
Most suspects are among the most skilled and higher-performing technologists. This is seen, in particular, in organizations in which a worker is overqualified for the work he or she is doing. The Profile! 17.7 Skills and knowledge
25
In most cases, perpetrators perform their acts while working at their jobs. Investigators should anticipate that vulnerabilities identified will usually result in the most qualified person taking advantage of them. The Profile! 17.7 Positions of trust
26
Perpetrators in many types of computer crime have been known to need assistance. This is because computer crimes require more knowledge and access than one person usually possesses. The Profile! 17.7 Assistance
27
Frequently, people working together may encourage each other to engage in unauthorized acts that escalate into serious crimes. The Profile! 17.7 Differential association
28
Most computer crime perpetrators interviewed in the study differentiated between harming people and organizations, the latter of which was easily condoned. In addition, they rationalized that they were only harming a computer and not causing any loss to people or organizations. The Profile! 17.7 Robin Hood syndrome
29
17.1 Understand the various types of white-collar crime. 17.2 Understand the problem of money-laundering investigations. 17.3 List the various techniques used by organized crime to hide or launder illicit financial proceeds. 17.4 Learn the different types of confidence games and how they work. 17.5 Describe the nature of computer crimes and the various types of computer offenses known today. 17.6 Know what evidence to look for in the investigation of computer crimes. 17.7 Understand the profile of the computer crime suspect. CHAPTER REVIEW
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.