Chapter14

324 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
324
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Chapter14

  1. 1. H omelandsecurity andcyber crime
  2. 2. Defining Homeland Security: A concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
  3. 3. Defining Terrorism: The unlawful use of force against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.
  4. 4.  The Changing Global Context of Terrorism Osama bin Laden and Al Qaeda Domestic Terrorism Evolving Threat Patterns ◦ The Diffusion of Al Qaeda ◦ The Internationalization of Domestic Terrorism
  5. 5.  Questions: ◦ How has the War on Terrorism changed the criminal justice system in the United States? ◦ Is terrorism something you worry about on a regular or semi-regular basis? Does this worry alter your behavior?
  6. 6.  Identify three important trends in international terrorism.
  7. 7.  Trends identified by homeland security expert Brian Jenkins: • Terrorists have developed more efficient means of managing their finances. • Terrorists have developed more efficient models of organization. • Terrorists have exploited new communication technology.
  8. 8.  Explain why the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA) is an important legal tool against terrorists.
  9. 9. The Antiterrorism and Effective DeathPenalty Act (AEDPA): Passed in 1995 in response to the OKC bombings Prohibits persons from providing material support to foreign terrorist organizations (FTOs)
  10. 10. The Patriot Act: Designed to “level the playing field.” Makes it easier for law enforcement to collect information about suspected terrorists and detain them. Enhances the ability of the government to keep non citizens suspected of terrorist activities out of the United States. Targets the fundraising activities of terrorist organizations.
  11. 11. The Patriot Act: Relaxes restrictions on information sharing between government agencies. Creates a crime of “knowingly harboring a terrorist.” Allows greater freedom in seizing email. Funds allow the tripling of border patrol agents, customs inspectors, and immigration agents. Non-citizens can be detained up to seven days without being informed of the charges against them. Eliminates the statute of limitations for terror-related offenses.
  12. 12.  Describe the primary goals of an intelligence agency and indicate how it differs from an agency that focuses solely on law enforcement.
  13. 13.  Intelligence agencies rely on the following strategies to collect information: ◦ Electronic surveillance ◦ Human-source collection ◦ Open-source collection ◦ Intelligence sharing ◦ Counterintelligence
  14. 14. Issues with the response to terrorism: Terror related investigations have strained local law enforcement resources and led to crime increases in some areas. Communication difficulties have led to dissatisfaction for many local agencies.
  15. 15.  Explain how American law enforcement agencies have used “preventive policing” to combat terrorism.
  16. 16.  Preventive Policing ◦ Prevent crimes before they occur The Criminal Justice model The Intelligence Model ◦ Local Intelligence ◦ The National Counterterrorism Center
  17. 17.  List the primary duties of first responders following a terrorist attack or other catastrophic event.
  18. 18.  Emergency Preparedness and Response ◦ Duties include:  Securing the scene  Rescuing and treating any injured civilians  Containing and suppressing fires or other hazardous conditions  Retrieving those who have been killed
  19. 19.  Border Security ◦ Regulated Ports of entry  88 millions foreign visitors arrive through America’s more than 100 international airports, with millions more crossing the borders with Mexico and Canada. ◦ Unregulated Ports of Entry  Millions of people illegally cross into the United States through the borders with Mexico and Canada each year.
  20. 20.  Explain how the Patriot Act has made it easier for federal agents to conduct searches during terrorism investigations.
  21. 21.  Terrorist Profiling Searches, Surveillance, and Security ◦ The Patriot Act and Searches  Allows the FBI or other federal agencies to obtain warrants for “terrorism” investigations, “chemical weapons” investigations, or “computer fraud and abuse” investigations as long as agents can prove that such actions have a “significant purpose” – no proof of criminal activity is required ◦ The Patriot Act and Surveillance
  22. 22.  Due Process and Indefinite Detention Military Justice • Enemy combatants tried by military tribunals rather than civilian courts • No right to trial by jury Changing Course Closing GTMO Accessing Criminal Courts Accessing Military Commissions
  23. 23.  Distinguish cyber crime from “traditional” crime.
  24. 24.  Cyber crime is a crime that occurs online as opposed to the physical world. ◦ Cyber Consumer Fraud ◦ Cyber Theft ◦ Identity Theft ◦ Phishing ◦ Cyber Aggression and the New Media  Cyberstalking  Cyberbullying
  25. 25.  Questions: ◦ Discuss the extent of identity theft? ◦ How can you prevent becoming a victim of identity theft?
  26. 26.  Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses.
  27. 27.  Botnet – a network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the internet. Worm – a computer program that can automatically replicate itself over a network such as the internet and interfere with the normal use of a computer. Virus – a computer program that can replicate itself over a network such as the internet and interfere with the normal use of a computer; cannot exist as a separate entity and must attach itself to another program to move through a network
  28. 28.  Cyber Crimes in the Business World ◦ Hackers ◦ The Spread of Spam ◦ Pirating Intellectual Property Online
  29. 29.  Cyber Crimes Against the Community Fighting Cyber Crime ◦ Challenges for Law Enforcement  Cyber Forensics  Jurisdictional Challenges ◦ Federal Law Enforcement and Cyber Crime ◦ Private Efforts to Combat Cyber Crime

×