SlideShare a Scribd company logo
1 of 28
Chapter 
16 
Criminal 
Justice in 
the New 
Millennium
Globalization and Justice 
Globalization 
 The process of creating a global economy 
through transnational markets and 
political and legal systems 
Two element of globalization 
have the potential to 
encourage criminality: 
① Technological advances 
② Free markets and fair trade
Corporate Enterprise 
Crime 
 “White collar crime” 
 Late 1930s became the term to describe 
the criminal activities of the rich and 
powerful 
Corporate enterprise crime 
 Involves illegal activities of people and 
organizations whose acknowledged 
purpose is to profit through illegitimate 
business enterprise
Global Enterprise Crime 
The creation of the global capital 
markets has created unprecedented 
opportunities for business to access 
capital, and for investors to diversify 
their portfolios 
 Types of Wall Street Fraud schemes: 
 Market manipulation 
 High yield investment fraud 
 Advance fee fraud 
 Hedge fund fraud 
 Commodities fraud 
 Foreign exchange fraud 
 Broker embezzlement 
 Late-day trading
Corporate Enterprise 
Crime 
The Subprime Mortgage Scandal 
 Failure of banks 
 Government bailout 
 Loans to borrowers who normally would 
not qualify for bank loans 
 Securitization 
 Help first time borrowers, 
also source of fraud
Video: Bernard Madoff 
and the SEC
Corporate Enterprise 
Crime 
The Subprime Mortgage Scandal 
 Foreclosure rescue scams 
Phantom help 
 Bailout 
 Bait and switch 
 Builder-bailout schemes
Corporate Enterprise 
Crime 
Management fraud 
 Typically involves falsifying financial 
information for their own financial benefit
Video: Enron
Corporate Enterprise 
Crime 
Strategies to Control Corporate Crime 
 Civil Law Strategies 
Economic sanctions 
 Civil penalties 
 Criminal Law Strategies 
 Deterrence
Corporate Enterprise 
Crime 
The detention and enforcement of 
corporate crime 
 Primarily in the hands of administrative 
departments and agencies 
 The decision to pursue criminal rather 
than civil violations usually is based on: 
The seriousness of the case 
 The perpetrator’s intent, actions to conceal 
the violation, and prior record
Video: U.S. Oil Spill
Cyber Crime 
The theft and/or destruction of 
information, resources, or funds via 
computers, computer networks, or the 
Internet
Video: Cyber Crime
Cyber Crime 
Cyber theft involves the use of 
computer networks for criminal 
profits 
 Some of the most common methods of 
cyber theft are: 
Computer fraud 
Copyright infringement 
 Internet securities fraud 
 Identity theft 
E-tailing fraud
Cyber Crime 
Pornography and Prostitution 
 The internet is an ideal venue for selling 
and distributing adult material 
 The First Amendment 
Makes legal control of 
pornography quite 
difficult
Cyber Crime 
Cyber vandalism 
 Involves malicious attacks aimed at 
disrupting, defacing, and destroying 
technology 
 Includes: 
Viruses and worms 
Trojan horses 
 Denial-of-service attack 
Web defacement 
Cyber stalking
Cyber Crime 
Cyber Bullying 
 The willful and repeated harm inflicted 
through the medium of electronic text 
 Includes: 
 Harassing emails or instant messages 
Obscene, insulting, and slanderous 
messages to online bulletin boards 
Websites promoting and disseminating 
defamatory content 
 Harassing text messages
Cyber Crime 
Cyber Warfare 
 Politically motivated attacks designed to 
compromise the electronic infrastructure 
of an enemy nation and disrupt its 
economy 
 One type is cyber espionage
Cyber Crime 
The Extent and Costs of Cyber Crime 
 Thousand of breaches each year 
 The internet has become a major source 
of illegal profits 
 Billions of dollars 
 Most is not reported to authorities
Cyber Crime 
Controlling Cyber Crime 
 New legislative initiatives include: 
 Software piracy 
Copyright infringement 
 Identity theft 
 Internet pornography 
Computer crimes
Cyber Crime 
Enforcing Cyber Laws 
 Federal level is where most efforts occur 
 Other specialized enforcement agencies 
 Internet Fraud Complaint Center 
 the National White Collar Crime Center
Terrorism 
Premeditated, politically motivated 
violence 
 Perpetrated by subnational groups or 
clandestine agents against noncombatant 
targets, usually intended to influence an 
audience 
 Act must be aimed at a goal that sets it 
apart from a common law crime committed 
for greed or egotism
Terrorism 
Types of terror groups: 
 Revolutionary terrorism 
 Political terrorism 
 Eco-terrorism 
 Nationalist terrorism 
 Retributive terrorism 
 State-sponsored terrorism 
 cult terrorism 
 Criminal terrorism
Terrorism 
There is no single personality trait or 
behavior pattern that distinguishes 
the majority of terrorists 
 Views on why terrorists engage in criminal 
activities: 
Psychological view 
 Socialization view 
 Ideological view 
 Alienation view
Terrorism 
Numerous laws have been passed in 
an effort to catch terrorists and 
prevent acts of terrorism 
 Federal courts are typically the venue of 
choice 
 Patriot Act
Terrorism 
The government has sometimes taken 
drastic measures to curtail the rights 
of its enemies 
 In the wake of 9/11, the Supreme Court 
handed down decisions in several 
important cases
The Future of Criminal 
Justice 
A number of changes in the future 
include: 
 Demographic shifts 
 Technological advances 
 Increased diversity 
 Focus on what works 
 Doing more with less 
 Globalization 
 Green crime 
 Illegal immigration

More Related Content

What's hot

ETHICS04 - White Collar Crime
ETHICS04 - White Collar CrimeETHICS04 - White Collar Crime
ETHICS04 - White Collar CrimeMichael Heron
 
Occupational crime
Occupational crimeOccupational crime
Occupational crimeSKS
 
Corruption on Business and Administration
Corruption on Business and AdministrationCorruption on Business and Administration
Corruption on Business and Administrationshweta mukherjee
 
Fraud Seminar Presentation Feb 2009 (2)
Fraud Seminar Presentation Feb 2009 (2)Fraud Seminar Presentation Feb 2009 (2)
Fraud Seminar Presentation Feb 2009 (2)andrewrmarshall
 
Mick Moore - The practical political economy of illicit capital flows
Mick Moore - The practical political economy of illicit capital flowsMick Moore - The practical political economy of illicit capital flows
Mick Moore - The practical political economy of illicit capital flowsInstitute of Development Studies
 
A 1-white collar crime. for nab i os-gs ghulam farooq
A 1-white collar crime. for nab i os-gs ghulam farooqA 1-white collar crime. for nab i os-gs ghulam farooq
A 1-white collar crime. for nab i os-gs ghulam farooqHaroon Javed
 
privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)Chaitanya Limbachiya
 
White collar-crimes-in-india
White collar-crimes-in-indiaWhite collar-crimes-in-india
White collar-crimes-in-indiaRicky Chopra
 
Governance and corruption
Governance and corruptionGovernance and corruption
Governance and corruptionGreen Minds
 
Bribery ppt (1) our presentation
Bribery ppt (1) our presentationBribery ppt (1) our presentation
Bribery ppt (1) our presentationJamiLa Khan
 

What's hot (17)

ETHICS04 - White Collar Crime
ETHICS04 - White Collar CrimeETHICS04 - White Collar Crime
ETHICS04 - White Collar Crime
 
Types of Criminal Offenses
Types of Criminal OffensesTypes of Criminal Offenses
Types of Criminal Offenses
 
Occupational crime
Occupational crimeOccupational crime
Occupational crime
 
Corruption
CorruptionCorruption
Corruption
 
Corruption on Business and Administration
Corruption on Business and AdministrationCorruption on Business and Administration
Corruption on Business and Administration
 
Fraud Seminar Presentation Feb 2009 (2)
Fraud Seminar Presentation Feb 2009 (2)Fraud Seminar Presentation Feb 2009 (2)
Fraud Seminar Presentation Feb 2009 (2)
 
corruption in India
corruption in Indiacorruption in India
corruption in India
 
Mick Moore - The practical political economy of illicit capital flows
Mick Moore - The practical political economy of illicit capital flowsMick Moore - The practical political economy of illicit capital flows
Mick Moore - The practical political economy of illicit capital flows
 
A 1-white collar crime. for nab i os-gs ghulam farooq
A 1-white collar crime. for nab i os-gs ghulam farooqA 1-white collar crime. for nab i os-gs ghulam farooq
A 1-white collar crime. for nab i os-gs ghulam farooq
 
White collar crime
White collar crimeWhite collar crime
White collar crime
 
privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)
 
White collar crime watch
White collar crime watchWhite collar crime watch
White collar crime watch
 
Crime in the Business World
Crime in the Business WorldCrime in the Business World
Crime in the Business World
 
White collar-crimes-in-india
White collar-crimes-in-indiaWhite collar-crimes-in-india
White collar-crimes-in-india
 
Corruption
CorruptionCorruption
Corruption
 
Governance and corruption
Governance and corruptionGovernance and corruption
Governance and corruption
 
Bribery ppt (1) our presentation
Bribery ppt (1) our presentationBribery ppt (1) our presentation
Bribery ppt (1) our presentation
 

Viewers also liked

Pollock ethics 8e_ch06
Pollock ethics 8e_ch06Pollock ethics 8e_ch06
Pollock ethics 8e_ch06windleh
 
Energy crisis – climate change
Energy crisis – climate changeEnergy crisis – climate change
Energy crisis – climate changeCik Mira
 
The mind of terrorist
The mind of terroristThe mind of terrorist
The mind of terroristsreejeethaa
 
Internet Addiction
Internet AddictionInternet Addiction
Internet AddictionCLine2002
 
Electricity CIRSES IN PAKISTAN
Electricity CIRSES IN PAKISTANElectricity CIRSES IN PAKISTAN
Electricity CIRSES IN PAKISTANTOHEED AHMAD
 
Global terrorism
Global terrorism Global terrorism
Global terrorism namaniitian
 
Internet Addiction Powerpoint
Internet Addiction PowerpointInternet Addiction Powerpoint
Internet Addiction PowerpointDaria Levin
 
Internet Addiction Presentation
Internet Addiction  PresentationInternet Addiction  Presentation
Internet Addiction Presentationguestb628c5
 
Internet Addiction
Internet AddictionInternet Addiction
Internet AddictionHayatB
 
Terrorism
TerrorismTerrorism
Terrorismu439
 
Presentation OnTerrorism
Presentation OnTerrorismPresentation OnTerrorism
Presentation OnTerrorismtariqmehsud
 
Money: Definition, Origin, Functions, Inflation, Deflation, Value of Money, M...
Money: Definition, Origin, Functions, Inflation, Deflation, Value of Money, M...Money: Definition, Origin, Functions, Inflation, Deflation, Value of Money, M...
Money: Definition, Origin, Functions, Inflation, Deflation, Value of Money, M...flowerpower_1324
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and TypesShaan Yaduvanshi
 

Viewers also liked (18)

Chapter 11a
Chapter 11aChapter 11a
Chapter 11a
 
Pollock ethics 8e_ch06
Pollock ethics 8e_ch06Pollock ethics 8e_ch06
Pollock ethics 8e_ch06
 
Energy crisis – climate change
Energy crisis – climate changeEnergy crisis – climate change
Energy crisis – climate change
 
M phil sem-ii cprt-altaf
M phil sem-ii cprt-altafM phil sem-ii cprt-altaf
M phil sem-ii cprt-altaf
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
The mind of terrorist
The mind of terroristThe mind of terrorist
The mind of terrorist
 
Internet Addiction
Internet AddictionInternet Addiction
Internet Addiction
 
Electricity CIRSES IN PAKISTAN
Electricity CIRSES IN PAKISTANElectricity CIRSES IN PAKISTAN
Electricity CIRSES IN PAKISTAN
 
Global terrorism
Global terrorism Global terrorism
Global terrorism
 
Internet Addiction Powerpoint
Internet Addiction PowerpointInternet Addiction Powerpoint
Internet Addiction Powerpoint
 
Internet Addiction Presentation
Internet Addiction  PresentationInternet Addiction  Presentation
Internet Addiction Presentation
 
Internet Addiction
Internet AddictionInternet Addiction
Internet Addiction
 
Terrorism
TerrorismTerrorism
Terrorism
 
Presentation OnTerrorism
Presentation OnTerrorismPresentation OnTerrorism
Presentation OnTerrorism
 
internet addiction
internet addictioninternet addiction
internet addiction
 
Terrorism
TerrorismTerrorism
Terrorism
 
Money: Definition, Origin, Functions, Inflation, Deflation, Value of Money, M...
Money: Definition, Origin, Functions, Inflation, Deflation, Value of Money, M...Money: Definition, Origin, Functions, Inflation, Deflation, Value of Money, M...
Money: Definition, Origin, Functions, Inflation, Deflation, Value of Money, M...
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 

Similar to Chapter 16

Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Corporate Crimes and money Laundering
Corporate Crimes and money LaunderingCorporate Crimes and money Laundering
Corporate Crimes and money LaunderingHusnainAhmed43
 
Transnational crimes in relation to economic crimes
Transnational crimes  in relation to economic crimesTransnational crimes  in relation to economic crimes
Transnational crimes in relation to economic crimesjanettesarmiento
 
Crimes and their effect on economy
Crimes and their effect on economyCrimes and their effect on economy
Crimes and their effect on economyMuhammad Saad
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Where we are now: economic crime, corruption and money laundering in the new ...
Where we are now: economic crime, corruption and money laundering in the new ...Where we are now: economic crime, corruption and money laundering in the new ...
Where we are now: economic crime, corruption and money laundering in the new ...Peter Lilley
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Fahad Saleem
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearNIST, berhampur
 

Similar to Chapter 16 (20)

Chapter14
Chapter14Chapter14
Chapter14
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Corporate Crimes and money Laundering
Corporate Crimes and money LaunderingCorporate Crimes and money Laundering
Corporate Crimes and money Laundering
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Transnational crimes in relation to economic crimes
Transnational crimes  in relation to economic crimesTransnational crimes  in relation to economic crimes
Transnational crimes in relation to economic crimes
 
Crimes and their effect on economy
Crimes and their effect on economyCrimes and their effect on economy
Crimes and their effect on economy
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Where we are now: economic crime, corruption and money laundering in the new ...
Where we are now: economic crime, corruption and money laundering in the new ...Where we are now: economic crime, corruption and money laundering in the new ...
Where we are now: economic crime, corruption and money laundering in the new ...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
 

More from glickauf

More from glickauf (20)

Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 1 pp
Chapter 1 ppChapter 1 pp
Chapter 1 pp
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

Chapter 16

  • 1. Chapter 16 Criminal Justice in the New Millennium
  • 2. Globalization and Justice Globalization  The process of creating a global economy through transnational markets and political and legal systems Two element of globalization have the potential to encourage criminality: ① Technological advances ② Free markets and fair trade
  • 3. Corporate Enterprise Crime  “White collar crime”  Late 1930s became the term to describe the criminal activities of the rich and powerful Corporate enterprise crime  Involves illegal activities of people and organizations whose acknowledged purpose is to profit through illegitimate business enterprise
  • 4. Global Enterprise Crime The creation of the global capital markets has created unprecedented opportunities for business to access capital, and for investors to diversify their portfolios  Types of Wall Street Fraud schemes:  Market manipulation  High yield investment fraud  Advance fee fraud  Hedge fund fraud  Commodities fraud  Foreign exchange fraud  Broker embezzlement  Late-day trading
  • 5. Corporate Enterprise Crime The Subprime Mortgage Scandal  Failure of banks  Government bailout  Loans to borrowers who normally would not qualify for bank loans  Securitization  Help first time borrowers, also source of fraud
  • 6. Video: Bernard Madoff and the SEC
  • 7. Corporate Enterprise Crime The Subprime Mortgage Scandal  Foreclosure rescue scams Phantom help  Bailout  Bait and switch  Builder-bailout schemes
  • 8. Corporate Enterprise Crime Management fraud  Typically involves falsifying financial information for their own financial benefit
  • 10. Corporate Enterprise Crime Strategies to Control Corporate Crime  Civil Law Strategies Economic sanctions  Civil penalties  Criminal Law Strategies  Deterrence
  • 11. Corporate Enterprise Crime The detention and enforcement of corporate crime  Primarily in the hands of administrative departments and agencies  The decision to pursue criminal rather than civil violations usually is based on: The seriousness of the case  The perpetrator’s intent, actions to conceal the violation, and prior record
  • 13. Cyber Crime The theft and/or destruction of information, resources, or funds via computers, computer networks, or the Internet
  • 15. Cyber Crime Cyber theft involves the use of computer networks for criminal profits  Some of the most common methods of cyber theft are: Computer fraud Copyright infringement  Internet securities fraud  Identity theft E-tailing fraud
  • 16. Cyber Crime Pornography and Prostitution  The internet is an ideal venue for selling and distributing adult material  The First Amendment Makes legal control of pornography quite difficult
  • 17. Cyber Crime Cyber vandalism  Involves malicious attacks aimed at disrupting, defacing, and destroying technology  Includes: Viruses and worms Trojan horses  Denial-of-service attack Web defacement Cyber stalking
  • 18. Cyber Crime Cyber Bullying  The willful and repeated harm inflicted through the medium of electronic text  Includes:  Harassing emails or instant messages Obscene, insulting, and slanderous messages to online bulletin boards Websites promoting and disseminating defamatory content  Harassing text messages
  • 19. Cyber Crime Cyber Warfare  Politically motivated attacks designed to compromise the electronic infrastructure of an enemy nation and disrupt its economy  One type is cyber espionage
  • 20. Cyber Crime The Extent and Costs of Cyber Crime  Thousand of breaches each year  The internet has become a major source of illegal profits  Billions of dollars  Most is not reported to authorities
  • 21. Cyber Crime Controlling Cyber Crime  New legislative initiatives include:  Software piracy Copyright infringement  Identity theft  Internet pornography Computer crimes
  • 22. Cyber Crime Enforcing Cyber Laws  Federal level is where most efforts occur  Other specialized enforcement agencies  Internet Fraud Complaint Center  the National White Collar Crime Center
  • 23. Terrorism Premeditated, politically motivated violence  Perpetrated by subnational groups or clandestine agents against noncombatant targets, usually intended to influence an audience  Act must be aimed at a goal that sets it apart from a common law crime committed for greed or egotism
  • 24. Terrorism Types of terror groups:  Revolutionary terrorism  Political terrorism  Eco-terrorism  Nationalist terrorism  Retributive terrorism  State-sponsored terrorism  cult terrorism  Criminal terrorism
  • 25. Terrorism There is no single personality trait or behavior pattern that distinguishes the majority of terrorists  Views on why terrorists engage in criminal activities: Psychological view  Socialization view  Ideological view  Alienation view
  • 26. Terrorism Numerous laws have been passed in an effort to catch terrorists and prevent acts of terrorism  Federal courts are typically the venue of choice  Patriot Act
  • 27. Terrorism The government has sometimes taken drastic measures to curtail the rights of its enemies  In the wake of 9/11, the Supreme Court handed down decisions in several important cases
  • 28. The Future of Criminal Justice A number of changes in the future include:  Demographic shifts  Technological advances  Increased diversity  Focus on what works  Doing more with less  Globalization  Green crime  Illegal immigration