Presentation is loading. Please wait.

Presentation is loading. Please wait.

CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.

Similar presentations


Presentation on theme: "CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice."— Presentation transcript:

1 CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice

2 © 2011 Cengage Learning Learning Outcomes LO1: Distinguish cyber crime from “traditional crime”. LO2: Explain the differences between cyberstalking and cyberbullying. LO3: Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses. LO4: Explain how the Internet has contributed to the piracy of intellectual property. LO5: Outline the three major reasons why the Internet is conducive to the dissemination of child pornography.

3 1 LO © 2011 Cengage Learning Distinguish cyber crime from “traditional” crime.

4 © 2011 Cengage Learning Learning Outcome 1 Types of computer crime: The computer is the “object” of the crime. The computer is the “subject” of the crime. The computer is the “instrument” of the crime.

5 © 2011 Cengage Learning Learning Outcome 1 Cyber crime: Any activity occurring via a computer in the virtual community in the Internet Difficult to determine how much cyber crime actually takes place

6 © 2011 Cengage Learning Learning Outcome 1 Types of Cyber Crime: Cyber consumer fraud Online retail fraud Online auction fraud Cyber theft – Identity theft – Phishing

7 © 2011 Cengage Learning Source: National White Collar Crime Center and Federal Bureau of Investigation, Internet Crime Report: 2009 (Washington, D.C.: Internet Crime Complaint Center, March 2010), Figure 4, page 5.

8 2 LO © 2011 Cengage Learning Explain the differences between cyberstalking and cyberbullying.

9 © 2011 Cengage Learning Learning Outcome 2 Cyberstalking: harassing a person through the Internet, email, or some other form of electronic communication Cyberbullying: inflicting willful and repeated emotional harm using computers, cell phones, or other electronic devices

10 3 LO © 2011 Cengage Learning Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses.

11 © 2011 Cengage Learning Learning Outcome 3 Credit card crime on the web Hackers Botnets Malware – Worms – Viruses Cyberwarfare

12 © 2011 Cengage Learning Learning Outcome 3 Spam: Bulk emails sent without the consent of the recipient Controlling the Assault of Non- Solicited Pornography and Marketing Act (CAN_SPAM) of 2003

13 4 LO © 2011 Cengage Learning Explain how the Internet has contributed to piracy of intellectual property.

14 © 2011 Cengage Learning Learning Outcome 4 Pirating Intellectual Property: Intellectual property is the products that result from intellectual, creative processes. Includes piracy of books, films, music and software. An estimated 41% of all software is pirated.

15 © 2011 Cengage Learning Learning Outcome 4 Electronic Banking: Money laundering Digital currency

16 5 LO © 2011 Cengage Learning Outline the three major reasons why the Internet is conducive to the dissemination of child pornography.

17 © 2011 Cengage Learning Learning Outcome 5 Issues in online pornography Speed Security Anonymity

18 © 2011 Cengage Learning Learning Outcome 5 Issues in online gambling Can citizens in a state that does not allow gambling place bets to a Web site located in a state that does? Many Internet gambling sites are located in countries where Internet gambling is legal.

19 © 2011 Cengage Learning CAREERPREP Computer Forensic Specialist Job Description: Investigate misbehavior on computer systems by collecting and analyzing computer-related evidence. Retrieve data that have been encrypted or electronically stored on a commercial or personal computer. Work for a law enforcement or homeland security agency to investigate crimes or terrorists’ activities, or for a private company to protect commercial data and defend against worms, viruses, and other malware. What Kind of Training Is Required? An extensive knowledge of computers, computer programming, and data retrieval is essential. A number of colleges, universities, and online educational organizations offer computer forensic courses that provide the skills necessary for this career. A complete understanding of the rules of evidence in criminal courts and the ability to establish a proper chain of custody for all evidence retrieved from targeted computer databases. Annual Salary Range? $50,000–$85,000 For additional information, visit: computer-forensics.sans.org.

20 © 2011 Cengage Learning Learning Outcome 5 Cyber Forensics: Main goal – gather digital evidence Jurisdictional challenges – Domestic – International

21 © 2011 Cengage Learning Learning Outcome 5 Federal law enforcement and cyber crime: The Federal Bureau of Investigation – Cyber Division – Cyber Action Teams (CATs) The United States Secret Service

22 © 2011 Cengage Learning

23 Learning Outcome 5 Private Efforts to Combat Cyber Crime: The Conficker scare Encryption

24 © 2011 Cengage Learning Learning Outcome 5 Future trends: Changing demographics Technological advances Increasing diversity The globalization of crime


Download ppt "CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice."

Similar presentations


Ads by Google