SlideShare a Scribd company logo
Criminology Today
An Integrated Introduction
CHAPTER
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Technology and
Crime
15
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Technology and Crime
• Technology and crime have always
been closely linked.
• Technology can be used by both crime
fighters and lawbreakers.
• As technology progresses, it facilitates
new forms of behavior, including new
crimes.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
High Technology and Criminal
Opportunity
• Routes to illegitimate access to
computerized information
 Direct access
 Computer trespass
• Cybercrime/computer crime
 Any violation of a federal or state
computer-crime statute
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
High Technology and Criminal
Opportunity
• FBI typology of cybercrimes
 Internal cybercrimes
 Internet/telecommunications crimes
 Support of criminal enterprises
 Computer-manipulation crimes
 Hardware, software, and information
theft
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
High Technology and Criminal
Opportunity
• Most financial transactions are
computerized.
 Money is information.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
The Extent of Cybercrime
• Annual cost of cybercrime in the U.S.
estimated at $666 million
• 2014 global report on cybercrime cost
 Cybercrimes and associated costs
continue to increase.
 Most costly cybercrimes caused by
malicious insiders
 Business disruption represents the
highest cost.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
The Extent of Cybercrime
• Software piracy
 Unauthorized and illegal copying of
software programs
• Phishing
 Scam using official-looking e-mails to
steal valuable information
 May threaten viability of e-commerce
• Not all cybercrime is committed for
financial gain.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime and the Law
• Communications Decency Act (1996)
 Reno v. ACLU
• No Electronic Theft Act (1997)
• Digital Theft Deterrence and Copyright
Damages Improvement Act (1999)
• Cyber Security Enhancement Act
(2002)
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime and the Law
• Computer-related crime
 Any illegal act for which knowledge of
computer technology is involved for its
investigation, perpetration, or
prosecution
• Computer abuse
 Any incident associated with computer
technology in which a victim suffered
loss and perpetrator intentionally gained
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
The History and Nature of Hacking
• Computer hacking began in late 1950s
with creation of interstate phone
system and direct distance dialing.
• Phone phreaks
 Used special telecommunications access
codes and other restricted information
to avoid paying long-distance charges
• DHS identified modern threats to
handheld devices like mobile phones.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
A Profile of Cybercriminals
• Cybercriminals tend to come from
hacker subculture.
• Average hacker
 Male between 16–25 who lives in the US
 Computer user but not programmer
 Hacks with software written by others
 Primary motivation is to gain access to
Web sites and computer networks.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
A Profile of Cybercriminals
• Hacker typology
 Pioneers
 Scamps
 Explorers
 Game players
 Vandals
 Addicts
• Some hackers are high-tech operators.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime as a Form of White-
Collar Crime
• Many similarities between computer
and white-collar crime
 Committed through nonviolent means
 Access to computers or storage media
often needed
 Involve information manipulations
creating profits or losses
 Can be committed by individuals or
organizations
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime as a Form of White-
Collar Crime
• Other similarities include:
 Crimes are difficult to detect.
 Public sees them as less serious than
violent crimes.
 Cost victims and society large amounts
of money and other resources
 Prevention requires a combination of
legal, technical, managerial, security,
and audit-monitoring controls.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Technology in the Fight against
Crime
• Technology is a double-edged sword.
 Provides criminals new weapons to
commit crimes
 Provides the criminal justice system
with new tools to fight crime
• Criminally useful or evasive
technologies and law enforcement
capabilities commonly leapfrog one
another.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
DNA Technology
• DNA profiling
 The use of biological residue found at a
crime scene for genetic comparisons to
help identify suspects
 DNA evidence long-lasting
 Highly reliable but not infallible
• The greatest threat to reliable results is
human error in conducting the tests.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
DNA Technology
• Daubert standard
 Test to determine whether a form of
scientific evidence is reliable
 Key factors
• It has been subjected to testing.
• It has been subjected to peer review.
• It has known/potential rates of error.
• It has standards controlling application of
the techniques involved.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
DNA Technology
• Federal government, most states have
digitized forensic DNA databases
 National DNA Index System (NDIS)
• All states have legislation requiring
convicted offenders to provide samples
for DNA databases.
• DNA Identification Act of 1994
• CODIS/NDIS
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Computers as Crime-Fighting
Tools
• Computers connect people.
 Provide many law and law-enforcement
related resources
• Expert systems
 Computer systems that try to duplicate
decision-making processes used by
investigators in analyzing evidence and
recognizing patterns
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Combating Cybercrime
• Threat analysis (risk analysis)
 Complete and thorough assessment of
the kinds of perils facing an organization
• Once threats identified, can introduce
strategies to deal with:
 Audit trail traces/records computer
operator activities, lets auditors
examine sequence of events relating to
any transaction
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Police Investigation of Computer
Crime
• Many police departments lack
personnel skilled in the investigation of
computer crimes.
• May intentionally avoid computer-crime
investigations
• Many departments place a low priority
on computer crime.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Police Investigation of Computer
Crime
• FBI's National Computer Crime Squad
investigates violations of federal
computer crime laws.
• DCS-3000 network "sniffer" focuses on
intercepting suspect personal
communications delivered via wireless
services
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime and Internet Security
• Information is the lifeblood of the
modern age.
 Needs to be moved safely and securely
• Commission on Critical Infrastructure
Protection
• National Infrastructure Protection
Center (1998)
 Succeeded by the Office of
Infrastructure Protection (part of DHS)
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime and Internet Security
• President's Working Group on Unlawful
Conduct on the Internet (2000)
• U.S.-CERT (2003)
• Pres. Obama has identified
cybersecurity as one of the most
serious economic and national security
challenges facing the U.S.
• DHS Cyber Security Division
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Policy Issues: Personal Freedoms
in the Information Age
• First Amendment
 Freedom of speech
 Are electronic communications
protected?
• Fourth Amendment
 Freedom from unreasonable searches
and seizures
 Does this include electronic information?

More Related Content

What's hot

What's hot (11)

Schmall crim today8e_ppt_ch1
Schmall crim today8e_ppt_ch1Schmall crim today8e_ppt_ch1
Schmall crim today8e_ppt_ch1
 
Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9
 
Schmall crim today8e_ppt_ch10
Schmall crim today8e_ppt_ch10Schmall crim today8e_ppt_ch10
Schmall crim today8e_ppt_ch10
 
Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3
 
Schmall crim today8e_ppt_ch6
Schmall crim today8e_ppt_ch6Schmall crim today8e_ppt_ch6
Schmall crim today8e_ppt_ch6
 
Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4
 
Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5
 
CSS Criminology Notes
CSS Criminology NotesCSS Criminology Notes
CSS Criminology Notes
 
Law in Action
Law in ActionLaw in Action
Law in Action
 
Neighborhood Watch Pt2
Neighborhood Watch Pt2Neighborhood Watch Pt2
Neighborhood Watch Pt2
 
Mechanism for whistle blowing
Mechanism for whistle blowingMechanism for whistle blowing
Mechanism for whistle blowing
 

Viewers also liked

Viewers also liked (13)

Global Economic Crime Survey
Global Economic Crime SurveyGlobal Economic Crime Survey
Global Economic Crime Survey
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
Criminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legiiCriminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legii
 
Criminologie generala
Criminologie generalaCriminologie generala
Criminologie generala
 
What Worries the World in February 2017?
What Worries the World in February 2017?What Worries the World in February 2017?
What Worries the World in February 2017?
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Criminologia
Criminologia Criminologia
Criminologia
 
48811746 criminologie
48811746 criminologie 48811746 criminologie
48811746 criminologie
 
Pop criminologie generala
Pop criminologie generala Pop criminologie generala
Pop criminologie generala
 
49318825 criminologie-generala
49318825 criminologie-generala 49318825 criminologie-generala
49318825 criminologie-generala
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Schmall crim today8e_ppt_ch15

L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
harrisonhoward80223
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
Syed Bokhari
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
Syed Bokhari
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
svito
 

Similar to Schmall crim today8e_ppt_ch15 (20)

CRJ270-Chapter14.ppt
CRJ270-Chapter14.pptCRJ270-Chapter14.ppt
CRJ270-Chapter14.ppt
 
Forensics
ForensicsForensics
Forensics
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrime
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Schmall crim today8e_ppt_ch10
Schmall crim today8e_ppt_ch10Schmall crim today8e_ppt_ch10
Schmall crim today8e_ppt_ch10
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 

More from Rappahannock Community College

More from Rappahannock Community College (14)

1.2.3 schedule upload assignment
1.2.3 schedule upload assignment1.2.3 schedule upload assignment
1.2.3 schedule upload assignment
 
Where to go for what service at rcc
Where to go for what service at rccWhere to go for what service at rcc
Where to go for what service at rcc
 
Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4
 
Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3
 
Robert Griffin instructor introduction
Robert Griffin instructor introductionRobert Griffin instructor introduction
Robert Griffin instructor introduction
 
Schmall crim today8e_ppt_ch16
Schmall crim today8e_ppt_ch16Schmall crim today8e_ppt_ch16
Schmall crim today8e_ppt_ch16
 
Schmall crim today8e_ppt_ch15
Schmall crim today8e_ppt_ch15Schmall crim today8e_ppt_ch15
Schmall crim today8e_ppt_ch15
 
Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9
 
Schmall crim today8e_ppt_ch8
Schmall crim today8e_ppt_ch8Schmall crim today8e_ppt_ch8
Schmall crim today8e_ppt_ch8
 
Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5
 
Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4
 
Developing and academic plan
Developing and academic planDeveloping and academic plan
Developing and academic plan
 
3.2 college reading
3.2 college reading3.2 college reading
3.2 college reading
 
ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDF
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 

Schmall crim today8e_ppt_ch15

  • 1. Criminology Today An Integrated Introduction CHAPTER Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Technology and Crime 15
  • 2. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Technology and Crime • Technology and crime have always been closely linked. • Technology can be used by both crime fighters and lawbreakers. • As technology progresses, it facilitates new forms of behavior, including new crimes.
  • 3. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger High Technology and Criminal Opportunity • Routes to illegitimate access to computerized information  Direct access  Computer trespass • Cybercrime/computer crime  Any violation of a federal or state computer-crime statute continued on next slide
  • 4. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger High Technology and Criminal Opportunity • FBI typology of cybercrimes  Internal cybercrimes  Internet/telecommunications crimes  Support of criminal enterprises  Computer-manipulation crimes  Hardware, software, and information theft continued on next slide
  • 5. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger High Technology and Criminal Opportunity • Most financial transactions are computerized.  Money is information.
  • 6. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger The Extent of Cybercrime • Annual cost of cybercrime in the U.S. estimated at $666 million • 2014 global report on cybercrime cost  Cybercrimes and associated costs continue to increase.  Most costly cybercrimes caused by malicious insiders  Business disruption represents the highest cost. continued on next slide
  • 7. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger The Extent of Cybercrime • Software piracy  Unauthorized and illegal copying of software programs • Phishing  Scam using official-looking e-mails to steal valuable information  May threaten viability of e-commerce • Not all cybercrime is committed for financial gain.
  • 8. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime and the Law • Communications Decency Act (1996)  Reno v. ACLU • No Electronic Theft Act (1997) • Digital Theft Deterrence and Copyright Damages Improvement Act (1999) • Cyber Security Enhancement Act (2002) continued on next slide
  • 9. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime and the Law • Computer-related crime  Any illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution • Computer abuse  Any incident associated with computer technology in which a victim suffered loss and perpetrator intentionally gained
  • 10. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger The History and Nature of Hacking • Computer hacking began in late 1950s with creation of interstate phone system and direct distance dialing. • Phone phreaks  Used special telecommunications access codes and other restricted information to avoid paying long-distance charges • DHS identified modern threats to handheld devices like mobile phones.
  • 11. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger A Profile of Cybercriminals • Cybercriminals tend to come from hacker subculture. • Average hacker  Male between 16–25 who lives in the US  Computer user but not programmer  Hacks with software written by others  Primary motivation is to gain access to Web sites and computer networks. continued on next slide
  • 12. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger A Profile of Cybercriminals • Hacker typology  Pioneers  Scamps  Explorers  Game players  Vandals  Addicts • Some hackers are high-tech operators.
  • 13. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime as a Form of White- Collar Crime • Many similarities between computer and white-collar crime  Committed through nonviolent means  Access to computers or storage media often needed  Involve information manipulations creating profits or losses  Can be committed by individuals or organizations continued on next slide
  • 14. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime as a Form of White- Collar Crime • Other similarities include:  Crimes are difficult to detect.  Public sees them as less serious than violent crimes.  Cost victims and society large amounts of money and other resources  Prevention requires a combination of legal, technical, managerial, security, and audit-monitoring controls.
  • 15. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Technology in the Fight against Crime • Technology is a double-edged sword.  Provides criminals new weapons to commit crimes  Provides the criminal justice system with new tools to fight crime • Criminally useful or evasive technologies and law enforcement capabilities commonly leapfrog one another.
  • 16. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger DNA Technology • DNA profiling  The use of biological residue found at a crime scene for genetic comparisons to help identify suspects  DNA evidence long-lasting  Highly reliable but not infallible • The greatest threat to reliable results is human error in conducting the tests. continued on next slide
  • 17. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger DNA Technology • Daubert standard  Test to determine whether a form of scientific evidence is reliable  Key factors • It has been subjected to testing. • It has been subjected to peer review. • It has known/potential rates of error. • It has standards controlling application of the techniques involved. continued on next slide
  • 18. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger DNA Technology • Federal government, most states have digitized forensic DNA databases  National DNA Index System (NDIS) • All states have legislation requiring convicted offenders to provide samples for DNA databases. • DNA Identification Act of 1994 • CODIS/NDIS
  • 19. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Computers as Crime-Fighting Tools • Computers connect people.  Provide many law and law-enforcement related resources • Expert systems  Computer systems that try to duplicate decision-making processes used by investigators in analyzing evidence and recognizing patterns
  • 20. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Combating Cybercrime • Threat analysis (risk analysis)  Complete and thorough assessment of the kinds of perils facing an organization • Once threats identified, can introduce strategies to deal with:  Audit trail traces/records computer operator activities, lets auditors examine sequence of events relating to any transaction
  • 21. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Police Investigation of Computer Crime • Many police departments lack personnel skilled in the investigation of computer crimes. • May intentionally avoid computer-crime investigations • Many departments place a low priority on computer crime. continued on next slide
  • 22. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Police Investigation of Computer Crime • FBI's National Computer Crime Squad investigates violations of federal computer crime laws. • DCS-3000 network "sniffer" focuses on intercepting suspect personal communications delivered via wireless services
  • 23. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime and Internet Security • Information is the lifeblood of the modern age.  Needs to be moved safely and securely • Commission on Critical Infrastructure Protection • National Infrastructure Protection Center (1998)  Succeeded by the Office of Infrastructure Protection (part of DHS) continued on next slide
  • 24. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime and Internet Security • President's Working Group on Unlawful Conduct on the Internet (2000) • U.S.-CERT (2003) • Pres. Obama has identified cybersecurity as one of the most serious economic and national security challenges facing the U.S. • DHS Cyber Security Division
  • 25. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Policy Issues: Personal Freedoms in the Information Age • First Amendment  Freedom of speech  Are electronic communications protected? • Fourth Amendment  Freedom from unreasonable searches and seizures  Does this include electronic information?