SlideShare a Scribd company logo
Criminology Today
An Integrated Introduction
CHAPTER
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Technology and
Crime
15
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Technology and Crime
• Technology and crime have always
been closely linked.
• Technology can be used by both crime
fighters and lawbreakers.
• As technology progresses, it facilitates
new forms of behavior, including new
crimes.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
High Technology and Criminal
Opportunity
• Routes to illegitimate access to
computerized information
 Direct access
 Computer trespass
• Cybercrime/computer crime
 Any violation of a federal or state
computer-crime statute
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
High Technology and Criminal
Opportunity
• FBI typology of cybercrimes
 Internal cybercrimes
 Internet/telecommunications crimes
 Support of criminal enterprises
 Computer-manipulation crimes
 Hardware, software, and information
theft
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
High Technology and Criminal
Opportunity
• Most financial transactions are
computerized.
 Money is information.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
The Extent of Cybercrime
• Annual cost of cybercrime in the U.S.
estimated at $666 million
• 2014 global report on cybercrime cost
 Cybercrimes and associated costs
continue to increase.
 Most costly cybercrimes caused by
malicious insiders
 Business disruption represents the
highest cost.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
The Extent of Cybercrime
• Software piracy
 Unauthorized and illegal copying of
software programs
• Phishing
 Scam using official-looking e-mails to
steal valuable information
 May threaten viability of e-commerce
• Not all cybercrime is committed for
financial gain.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime and the Law
• Communications Decency Act (1996)
 Reno v. ACLU
• No Electronic Theft Act (1997)
• Digital Theft Deterrence and Copyright
Damages Improvement Act (1999)
• Cyber Security Enhancement Act
(2002)
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime and the Law
• Computer-related crime
 Any illegal act for which knowledge of
computer technology is involved for its
investigation, perpetration, or
prosecution
• Computer abuse
 Any incident associated with computer
technology in which a victim suffered
loss and perpetrator intentionally gained
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
The History and Nature of Hacking
• Computer hacking began in late 1950s
with creation of interstate phone
system and direct distance dialing.
• Phone phreaks
 Used special telecommunications access
codes and other restricted information
to avoid paying long-distance charges
• DHS identified modern threats to
handheld devices like mobile phones.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
A Profile of Cybercriminals
• Cybercriminals tend to come from
hacker subculture.
• Average hacker
 Male between 16–25 who lives in the US
 Computer user but not programmer
 Hacks with software written by others
 Primary motivation is to gain access to
Web sites and computer networks.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
A Profile of Cybercriminals
• Hacker typology
 Pioneers
 Scamps
 Explorers
 Game players
 Vandals
 Addicts
• Some hackers are high-tech operators.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime as a Form of White-
Collar Crime
• Many similarities between computer
and white-collar crime
 Committed through nonviolent means
 Access to computers or storage media
often needed
 Involve information manipulations
creating profits or losses
 Can be committed by individuals or
organizations
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime as a Form of White-
Collar Crime
• Other similarities include:
 Crimes are difficult to detect.
 Public sees them as less serious than
violent crimes.
 Cost victims and society large amounts
of money and other resources
 Prevention requires a combination of
legal, technical, managerial, security,
and audit-monitoring controls.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Technology in the Fight against
Crime
• Technology is a double-edged sword.
 Provides criminals new weapons to
commit crimes
 Provides the criminal justice system
with new tools to fight crime
• Criminally useful or evasive
technologies and law enforcement
capabilities commonly leapfrog one
another.
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
DNA Technology
• DNA profiling
 The use of biological residue found at a
crime scene for genetic comparisons to
help identify suspects
 DNA evidence long-lasting
 Highly reliable but not infallible
• The greatest threat to reliable results is
human error in conducting the tests.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
DNA Technology
• Daubert standard
 Test to determine whether a form of
scientific evidence is reliable
 Key factors
• It has been subjected to testing.
• It has been subjected to peer review.
• It has known/potential rates of error.
• It has standards controlling application of
the techniques involved.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
DNA Technology
• Federal government, most states have
digitized forensic DNA databases
 National DNA Index System (NDIS)
• All states have legislation requiring
convicted offenders to provide samples
for DNA databases.
• DNA Identification Act of 1994
• CODIS/NDIS
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Computers as Crime-Fighting
Tools
• Computers connect people.
 Provide many law and law-enforcement
related resources
• Expert systems
 Computer systems that try to duplicate
decision-making processes used by
investigators in analyzing evidence and
recognizing patterns
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Combating Cybercrime
• Threat analysis (risk analysis)
 Complete and thorough assessment of
the kinds of perils facing an organization
• Once threats identified, can introduce
strategies to deal with:
 Audit trail traces/records computer
operator activities, lets auditors
examine sequence of events relating to
any transaction
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Police Investigation of Computer
Crime
• Many police departments lack
personnel skilled in the investigation of
computer crimes.
• May intentionally avoid computer-crime
investigations
• Many departments place a low priority
on computer crime.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Police Investigation of Computer
Crime
• FBI's National Computer Crime Squad
investigates violations of federal
computer crime laws.
• DCS-3000 network "sniffer" focuses on
intercepting suspect personal
communications delivered via wireless
services
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime and Internet Security
• Information is the lifeblood of the
modern age.
 Needs to be moved safely and securely
• Commission on Critical Infrastructure
Protection
• National Infrastructure Protection
Center (1998)
 Succeeded by the Office of
Infrastructure Protection (part of DHS)
continued on next slide
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Cybercrime and Internet Security
• President's Working Group on Unlawful
Conduct on the Internet (2000)
• U.S.-CERT (2003)
• Pres. Obama has identified
cybersecurity as one of the most
serious economic and national security
challenges facing the U.S.
• DHS Cyber Security Division
Copyright © 2017 by Pearson Education, Inc.
All Rights Reserved
Criminology Today: An Integrated Introduction, 8e
Frank Schmalleger
Policy Issues: Personal Freedoms
in the Information Age
• First Amendment
 Freedom of speech
 Are electronic communications
protected?
• Fourth Amendment
 Freedom from unreasonable searches
and seizures
 Does this include electronic information?

More Related Content

What's hot

Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9
Rappahannock Community College
 
Schmall crim today8e_ppt_ch8
Schmall crim today8e_ppt_ch8Schmall crim today8e_ppt_ch8
Schmall crim today8e_ppt_ch8
Rappahannock Community College
 
Schmall crim today8e_ppt_ch13
Schmall crim today8e_ppt_ch13Schmall crim today8e_ppt_ch13
Schmall crim today8e_ppt_ch13
Rappahannock Community College
 
Schmall crim today8e_ppt_ch2
Schmall crim today8e_ppt_ch2Schmall crim today8e_ppt_ch2
Schmall crim today8e_ppt_ch2
Rappahannock Community College
 
Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3
Rappahannock Community College
 
Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4
Rappahannock Community College
 
Schmall crim today8e_ppt_ch6
Schmall crim today8e_ppt_ch6Schmall crim today8e_ppt_ch6
Schmall crim today8e_ppt_ch6
Rappahannock Community College
 
Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5
Rappahannock Community College
 
ADMJ2 - Intro to ADMJ - Chapter 2
ADMJ2 - Intro to ADMJ - Chapter 2ADMJ2 - Intro to ADMJ - Chapter 2
ADMJ2 - Intro to ADMJ - Chapter 2
Monterey Peninsula College
 
Chapter 4 - Updated
Chapter 4 - UpdatedChapter 4 - Updated
Chapter 4 - Updated
glickauf
 
Crime Prevention Basics
Crime Prevention BasicsCrime Prevention Basics
Crime Prevention Basics
PoliceCareer88
 
Dept. of justice[1]
Dept. of justice[1]Dept. of justice[1]
Dept. of justice[1]ialexgreene
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
Francis Postrado
 
ADMJ2 - Intro to ADMJ - Chapter 4
ADMJ2 - Intro to ADMJ - Chapter 4ADMJ2 - Intro to ADMJ - Chapter 4
ADMJ2 - Intro to ADMJ - Chapter 4
Monterey Peninsula College
 
Law in Action
Law in ActionLaw in Action
Law in Action
Mr Shipp
 
Ethics, Privacy & Access to Information: PPAL 6120 3.0
Ethics, Privacy & Access to Information: PPAL 6120 3.0Ethics, Privacy & Access to Information: PPAL 6120 3.0
Ethics, Privacy & Access to Information: PPAL 6120 3.0
GeorgeBekatoros2
 

What's hot (16)

Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9
 
Schmall crim today8e_ppt_ch8
Schmall crim today8e_ppt_ch8Schmall crim today8e_ppt_ch8
Schmall crim today8e_ppt_ch8
 
Schmall crim today8e_ppt_ch13
Schmall crim today8e_ppt_ch13Schmall crim today8e_ppt_ch13
Schmall crim today8e_ppt_ch13
 
Schmall crim today8e_ppt_ch2
Schmall crim today8e_ppt_ch2Schmall crim today8e_ppt_ch2
Schmall crim today8e_ppt_ch2
 
Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3
 
Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4
 
Schmall crim today8e_ppt_ch6
Schmall crim today8e_ppt_ch6Schmall crim today8e_ppt_ch6
Schmall crim today8e_ppt_ch6
 
Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5
 
ADMJ2 - Intro to ADMJ - Chapter 2
ADMJ2 - Intro to ADMJ - Chapter 2ADMJ2 - Intro to ADMJ - Chapter 2
ADMJ2 - Intro to ADMJ - Chapter 2
 
Chapter 4 - Updated
Chapter 4 - UpdatedChapter 4 - Updated
Chapter 4 - Updated
 
Crime Prevention Basics
Crime Prevention BasicsCrime Prevention Basics
Crime Prevention Basics
 
Dept. of justice[1]
Dept. of justice[1]Dept. of justice[1]
Dept. of justice[1]
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
 
ADMJ2 - Intro to ADMJ - Chapter 4
ADMJ2 - Intro to ADMJ - Chapter 4ADMJ2 - Intro to ADMJ - Chapter 4
ADMJ2 - Intro to ADMJ - Chapter 4
 
Law in Action
Law in ActionLaw in Action
Law in Action
 
Ethics, Privacy & Access to Information: PPAL 6120 3.0
Ethics, Privacy & Access to Information: PPAL 6120 3.0Ethics, Privacy & Access to Information: PPAL 6120 3.0
Ethics, Privacy & Access to Information: PPAL 6120 3.0
 

Viewers also liked

Manual impactos ambientais ( bnb )
Manual impactos ambientais ( bnb )Manual impactos ambientais ( bnb )
Manual impactos ambientais ( bnb )
Ricardo Akerman
 
Monografia Impacto del Servicio de Parqueadero en los Centros Comerciales Uni...
Monografia Impacto del Servicio de Parqueadero en los Centros Comerciales Uni...Monografia Impacto del Servicio de Parqueadero en los Centros Comerciales Uni...
Monografia Impacto del Servicio de Parqueadero en los Centros Comerciales Uni...
Angélica Ruiz Armero
 
Order striking statement of facts
Order striking statement of factsOrder striking statement of facts
Order striking statement of factsCocoselul Inaripat
 
Fabricação de células solares
Fabricação de células solaresFabricação de células solares
Fabricação de células solares
Ricardo Akerman
 
Métodos anticonceptivos y enfermedades de trasmisión sexual
Métodos anticonceptivos y enfermedades de trasmisión sexualMétodos anticonceptivos y enfermedades de trasmisión sexual
Métodos anticonceptivos y enfermedades de trasmisión sexual
jeremy poveda
 
252924232 ay-cuanto-me-quiero
252924232 ay-cuanto-me-quiero252924232 ay-cuanto-me-quiero
252924232 ay-cuanto-me-quiero
Elizabeth Novoa
 
Practica 1 letra d
Practica 1 letra dPractica 1 letra d
Practica 1 letra dcesar1997ju
 
La Fisica delle Particelle Elementari
La Fisica delle Particelle ElementariLa Fisica delle Particelle Elementari
La Fisica delle Particelle Elementari
Giovanni Mazzitelli
 
Schmall crim today8e_ppt_ch16
Schmall crim today8e_ppt_ch16Schmall crim today8e_ppt_ch16
Schmall crim today8e_ppt_ch16
Rappahannock Community College
 
Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4
Rappahannock Community College
 
Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3
Rappahannock Community College
 

Viewers also liked (19)

Manual impactos ambientais ( bnb )
Manual impactos ambientais ( bnb )Manual impactos ambientais ( bnb )
Manual impactos ambientais ( bnb )
 
Monografia Impacto del Servicio de Parqueadero en los Centros Comerciales Uni...
Monografia Impacto del Servicio de Parqueadero en los Centros Comerciales Uni...Monografia Impacto del Servicio de Parqueadero en los Centros Comerciales Uni...
Monografia Impacto del Servicio de Parqueadero en los Centros Comerciales Uni...
 
Eva Zaar
Eva ZaarEva Zaar
Eva Zaar
 
Order striking statement of facts
Order striking statement of factsOrder striking statement of facts
Order striking statement of facts
 
Fabricação de células solares
Fabricação de células solaresFabricação de células solares
Fabricação de células solares
 
Métodos anticonceptivos y enfermedades de trasmisión sexual
Métodos anticonceptivos y enfermedades de trasmisión sexualMétodos anticonceptivos y enfermedades de trasmisión sexual
Métodos anticonceptivos y enfermedades de trasmisión sexual
 
Document 291
Document 291Document 291
Document 291
 
Mapa tecnologia
Mapa tecnologiaMapa tecnologia
Mapa tecnologia
 
252924232 ay-cuanto-me-quiero
252924232 ay-cuanto-me-quiero252924232 ay-cuanto-me-quiero
252924232 ay-cuanto-me-quiero
 
Omega Ref Ltrs (1)
Omega Ref Ltrs (1)Omega Ref Ltrs (1)
Omega Ref Ltrs (1)
 
Practica 1 letra d
Practica 1 letra dPractica 1 letra d
Practica 1 letra d
 
Test
TestTest
Test
 
Test
TestTest
Test
 
Transfondo flores-2
Transfondo flores-2Transfondo flores-2
Transfondo flores-2
 
20160518091918
2016051809191820160518091918
20160518091918
 
La Fisica delle Particelle Elementari
La Fisica delle Particelle ElementariLa Fisica delle Particelle Elementari
La Fisica delle Particelle Elementari
 
Schmall crim today8e_ppt_ch16
Schmall crim today8e_ppt_ch16Schmall crim today8e_ppt_ch16
Schmall crim today8e_ppt_ch16
 
Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4
 
Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3Schmall crim today8e_ppt_ch3
Schmall crim today8e_ppt_ch3
 

Similar to Schmall crim today8e_ppt_ch15

CRJ270-Chapter14.ppt
CRJ270-Chapter14.pptCRJ270-Chapter14.ppt
CRJ270-Chapter14.ppt
itspianoadi
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
Dr. C.V. Suresh Babu
 
Mis chapter 9
Mis chapter 9Mis chapter 9
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrime
Roel Palmaers
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
Kathirvel Ayyaswamy
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
sabrangsabrang
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
harrisonhoward80223
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
JiaJunWang17
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Lars Hilse Global Thought Leader in #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
Ritik Kumar
 
Schmall crim today8e_ppt_ch10
Schmall crim today8e_ppt_ch10Schmall crim today8e_ppt_ch10
Schmall crim today8e_ppt_ch10
Rappahannock Community College
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
Mehedi Hasan
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan projectSyed Bokhari
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan projectSyed Bokhari
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentationsvito
 

Similar to Schmall crim today8e_ppt_ch15 (20)

CRJ270-Chapter14.ppt
CRJ270-Chapter14.pptCRJ270-Chapter14.ppt
CRJ270-Chapter14.ppt
 
Forensics
ForensicsForensics
Forensics
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
The effectiveness of policing cybercrime
The effectiveness of policing cybercrimeThe effectiveness of policing cybercrime
The effectiveness of policing cybercrime
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Schmall crim today8e_ppt_ch10
Schmall crim today8e_ppt_ch10Schmall crim today8e_ppt_ch10
Schmall crim today8e_ppt_ch10
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 

More from Rappahannock Community College

1.2.3 schedule upload assignment
1.2.3 schedule upload assignment1.2.3 schedule upload assignment
1.2.3 schedule upload assignment
Rappahannock Community College
 
Where to go for what service at rcc
Where to go for what service at rccWhere to go for what service at rcc
Where to go for what service at rcc
Rappahannock Community College
 
Robert Griffin instructor introduction
Robert Griffin instructor introductionRobert Griffin instructor introduction
Robert Griffin instructor introduction
Rappahannock Community College
 
Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9
Rappahannock Community College
 
Schmall crim today8e_ppt_ch8
Schmall crim today8e_ppt_ch8Schmall crim today8e_ppt_ch8
Schmall crim today8e_ppt_ch8
Rappahannock Community College
 
Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5
Rappahannock Community College
 
Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4
Rappahannock Community College
 
Developing and academic plan
Developing and academic planDeveloping and academic plan
Developing and academic plan
Rappahannock Community College
 
3.2 college reading
3.2 college reading3.2 college reading
3.2 college reading
Rappahannock Community College
 
ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)
Rappahannock Community College
 

More from Rappahannock Community College (10)

1.2.3 schedule upload assignment
1.2.3 schedule upload assignment1.2.3 schedule upload assignment
1.2.3 schedule upload assignment
 
Where to go for what service at rcc
Where to go for what service at rccWhere to go for what service at rcc
Where to go for what service at rcc
 
Robert Griffin instructor introduction
Robert Griffin instructor introductionRobert Griffin instructor introduction
Robert Griffin instructor introduction
 
Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9Schmall crim today8e_ppt_ch9
Schmall crim today8e_ppt_ch9
 
Schmall crim today8e_ppt_ch8
Schmall crim today8e_ppt_ch8Schmall crim today8e_ppt_ch8
Schmall crim today8e_ppt_ch8
 
Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5Schmall crim today8e_ppt_ch5
Schmall crim today8e_ppt_ch5
 
Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4Schmall crim today8e_ppt_ch4
Schmall crim today8e_ppt_ch4
 
Developing and academic plan
Developing and academic planDeveloping and academic plan
Developing and academic plan
 
3.2 college reading
3.2 college reading3.2 college reading
3.2 college reading
 
ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)ADJ 201-63 Crime statistics (2)
ADJ 201-63 Crime statistics (2)
 

Recently uploaded

STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 

Recently uploaded (20)

STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

Schmall crim today8e_ppt_ch15

  • 1. Criminology Today An Integrated Introduction CHAPTER Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Technology and Crime 15
  • 2. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Technology and Crime • Technology and crime have always been closely linked. • Technology can be used by both crime fighters and lawbreakers. • As technology progresses, it facilitates new forms of behavior, including new crimes.
  • 3. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger High Technology and Criminal Opportunity • Routes to illegitimate access to computerized information  Direct access  Computer trespass • Cybercrime/computer crime  Any violation of a federal or state computer-crime statute continued on next slide
  • 4. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger High Technology and Criminal Opportunity • FBI typology of cybercrimes  Internal cybercrimes  Internet/telecommunications crimes  Support of criminal enterprises  Computer-manipulation crimes  Hardware, software, and information theft continued on next slide
  • 5. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger High Technology and Criminal Opportunity • Most financial transactions are computerized.  Money is information.
  • 6. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger The Extent of Cybercrime • Annual cost of cybercrime in the U.S. estimated at $666 million • 2014 global report on cybercrime cost  Cybercrimes and associated costs continue to increase.  Most costly cybercrimes caused by malicious insiders  Business disruption represents the highest cost. continued on next slide
  • 7. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger The Extent of Cybercrime • Software piracy  Unauthorized and illegal copying of software programs • Phishing  Scam using official-looking e-mails to steal valuable information  May threaten viability of e-commerce • Not all cybercrime is committed for financial gain.
  • 8. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime and the Law • Communications Decency Act (1996)  Reno v. ACLU • No Electronic Theft Act (1997) • Digital Theft Deterrence and Copyright Damages Improvement Act (1999) • Cyber Security Enhancement Act (2002) continued on next slide
  • 9. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime and the Law • Computer-related crime  Any illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution • Computer abuse  Any incident associated with computer technology in which a victim suffered loss and perpetrator intentionally gained
  • 10. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger The History and Nature of Hacking • Computer hacking began in late 1950s with creation of interstate phone system and direct distance dialing. • Phone phreaks  Used special telecommunications access codes and other restricted information to avoid paying long-distance charges • DHS identified modern threats to handheld devices like mobile phones.
  • 11. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger A Profile of Cybercriminals • Cybercriminals tend to come from hacker subculture. • Average hacker  Male between 16–25 who lives in the US  Computer user but not programmer  Hacks with software written by others  Primary motivation is to gain access to Web sites and computer networks. continued on next slide
  • 12. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger A Profile of Cybercriminals • Hacker typology  Pioneers  Scamps  Explorers  Game players  Vandals  Addicts • Some hackers are high-tech operators.
  • 13. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime as a Form of White- Collar Crime • Many similarities between computer and white-collar crime  Committed through nonviolent means  Access to computers or storage media often needed  Involve information manipulations creating profits or losses  Can be committed by individuals or organizations continued on next slide
  • 14. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime as a Form of White- Collar Crime • Other similarities include:  Crimes are difficult to detect.  Public sees them as less serious than violent crimes.  Cost victims and society large amounts of money and other resources  Prevention requires a combination of legal, technical, managerial, security, and audit-monitoring controls.
  • 15. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Technology in the Fight against Crime • Technology is a double-edged sword.  Provides criminals new weapons to commit crimes  Provides the criminal justice system with new tools to fight crime • Criminally useful or evasive technologies and law enforcement capabilities commonly leapfrog one another.
  • 16. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger DNA Technology • DNA profiling  The use of biological residue found at a crime scene for genetic comparisons to help identify suspects  DNA evidence long-lasting  Highly reliable but not infallible • The greatest threat to reliable results is human error in conducting the tests. continued on next slide
  • 17. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger DNA Technology • Daubert standard  Test to determine whether a form of scientific evidence is reliable  Key factors • It has been subjected to testing. • It has been subjected to peer review. • It has known/potential rates of error. • It has standards controlling application of the techniques involved. continued on next slide
  • 18. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger DNA Technology • Federal government, most states have digitized forensic DNA databases  National DNA Index System (NDIS) • All states have legislation requiring convicted offenders to provide samples for DNA databases. • DNA Identification Act of 1994 • CODIS/NDIS
  • 19. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Computers as Crime-Fighting Tools • Computers connect people.  Provide many law and law-enforcement related resources • Expert systems  Computer systems that try to duplicate decision-making processes used by investigators in analyzing evidence and recognizing patterns
  • 20. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Combating Cybercrime • Threat analysis (risk analysis)  Complete and thorough assessment of the kinds of perils facing an organization • Once threats identified, can introduce strategies to deal with:  Audit trail traces/records computer operator activities, lets auditors examine sequence of events relating to any transaction
  • 21. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Police Investigation of Computer Crime • Many police departments lack personnel skilled in the investigation of computer crimes. • May intentionally avoid computer-crime investigations • Many departments place a low priority on computer crime. continued on next slide
  • 22. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Police Investigation of Computer Crime • FBI's National Computer Crime Squad investigates violations of federal computer crime laws. • DCS-3000 network "sniffer" focuses on intercepting suspect personal communications delivered via wireless services
  • 23. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime and Internet Security • Information is the lifeblood of the modern age.  Needs to be moved safely and securely • Commission on Critical Infrastructure Protection • National Infrastructure Protection Center (1998)  Succeeded by the Office of Infrastructure Protection (part of DHS) continued on next slide
  • 24. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Cybercrime and Internet Security • President's Working Group on Unlawful Conduct on the Internet (2000) • U.S.-CERT (2003) • Pres. Obama has identified cybersecurity as one of the most serious economic and national security challenges facing the U.S. • DHS Cyber Security Division
  • 25. Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Policy Issues: Personal Freedoms in the Information Age • First Amendment  Freedom of speech  Are electronic communications protected? • Fourth Amendment  Freedom from unreasonable searches and seizures  Does this include electronic information?