chapter 10

19
CRIMES AGAINST PROPERTY Chapter 10

Upload: barney

Post on 12-Feb-2016

44 views

Category:

Documents


0 download

DESCRIPTION

Chapter 10. Crimes Against Property. Crimes Against Property. Arson Willful and malicious burning of a person’s property Insurance fraud is a common example Not as easy to get away with as one would think Can be a part of a hate crime Burning of churches Vandalism AKA malicious mischief - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Chapter 10

CRIMES AGAINST PROPERTY

Chapter 10

Page 2: Chapter 10

Crimes Against Property

Arson Willful and malicious burning of a person’s

property Insurance fraud is a common example Not as easy to get away with as one would think Can be a part of a hate crime

Burning of churches Vandalism

AKA malicious mischief Willful destruction of, or damage to, a property Various crimes fit in this category Extent of damage determines if the crime is a

felony or misdemeanor

Page 3: Chapter 10

Larceny

Unlawful taking and carrying away of the property of another person Two types of larceny

Petty Theft of anything small in value (i.e. less than $100.00)

Grand Theft of anything greater than $100.00 in value

Also involves keeping something that does not belong to you that can be recovered with a reasonable amount of finding the owner Find a wallet with ID in it and you keep it Receiving property that was stolen You’re driving down the road and the back of a money truck opens up.

Dollar bills proceed to fly out the back door Shoplifting

Taking items from a store without paying for them or intending to pay for them Also includes

Skipping out on a restaurant bill Not having enough money to pay a restaurant bill Filling up your gas tank and leaving without paying

Concealment is the crime of attempted shoplifting

Page 4: Chapter 10

More crimes!!!!1

Embezzlement Unlawful taking of property by someone to whom

it was entrusted Examples. . .?

Robbery Unlawful taking of property from a person’s

immediate possession by force or intimidation Involves two harms

Theft of property Actual or potential harm to the victim

Extortion or blackmail is the use of threats to obtain property of another

Page 5: Chapter 10

Pyramid Schemes

In the classic "pyramid" scheme, participants attempt to make money solely by recruiting new participants into the program

The hallmark of these schemes is the promise of sky-high returns in a short period of time for doing nothing other than handing over your money and getting others to do the same.

The fraudsters behind a pyramid scheme may go to great lengths to make the program look like a legitimate multi-level marketing program.

But despite their claims to have legitimate products or services to sell, these fraudsters simply use money coming in from new recruits to pay off early stage investors.

Eventually the pyramid will collapse. At some point the schemes get too big, the promoter cannot raise

enough money from new investors to pay earlier investors, and many people lose their money.

Page 6: Chapter 10
Page 7: Chapter 10

Other crimes of interest Forgery

A crime in which a person falsely makes or alters a writing or document with intent to defraud

Uttering is when you offer a document as real when it is truly a fake

Receiving stolen property Receiving or buying property that you know or have

reason to believe is stolen Knowledge that the property is stolen may be implied by

the circumstances Wow this is cheap You bought it from Crazy Mary’s Trunkside Depot

Unauthorized Use of a Vehicle A person takes a motor vehicle without the owner’s

consent Joyriding Auto theft Carjacking

Federal offense with implications of life in prison

Page 8: Chapter 10
Page 9: Chapter 10

HackersHackers

A person who gains illegal access to a computer system when they have no authorization to do so

Why hack? Gain classified information Steal money from financial institutions Because they can

Three types of hackers White hat hackers work for computer security

companies (AVG, McAfee, Symantec) to detect vulnerabilities in systems and fix them before they become problems

Black hat hackers break into systems to defraud, steal, or destroy networks

Grey hat hackers do a little bit of both (think Thomas Anderson from the Matrix)

The most famous hacker is Kevin Mitnick

Page 10: Chapter 10

It’s like a cold. . .but for your PC

Viruses Computer viruses are small software programs that

are designed to spread from one computer to another and to interfere with computer operation.

A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.

Viruses are often spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail

attachments unless you know who it's from and you are expecting it.

Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.

Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.

Melissa virus was the most famous

Page 11: Chapter 10

Malware and worms and horsies

Malware is short for malicious software and is typically used as a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network, whether it's a virus, spyware, et al.

Worms are like viruses, except they can travel through networks without being activated by the user Conficker worm

Trojan horse The Trojan Horse, at first glance will appear to be

useful software but will actually do damage once installed or run on your computer. 

Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.

Sub7 is the most famous Trojan Horse

Page 12: Chapter 10

Adware and Spyware

Spyware A type of malware that is installed on computers

and collects information about users without their knowledge.

The presence of spyware is typically hidden from the user.

A keystroke logger is an example of thisAdware

Any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used

Midaddle was a good example of this

Page 13: Chapter 10

COOKKKKIIIIEEEEE!!!!!!!! HUMM NUM NUM NUM NUM NUM

Browser cookie A plain text file (.txt) that sits on your computer in a temporary folder that

stores data about a browsing session. If you log into a website it generally sets a cookie to temporarily store your

information so you don’t have to log in every time you change a page Tracking cookie

A tracking cookie is a cookie that tracks your browsing behaviors. Marketers use this data to understand how users use their partner

websites and optimize their networks for the average user that visits their networks.

Third party cookies Third-party cookies are cookies that are set by one site, but can be read

by another site. For example, when you visit site1.com, it might set a cookie that can be

read by site2.com. Some advertisers use these types of cookies to track your visits to the

various websites on which they advertise. By themselves, cookies might not necessarily be bad, but third-party

cookies can be a lot of trouble because you may not know what the source is.

Page 14: Chapter 10

Not just a gelatinous cube of mixed meat particles

Named after the Monty Python sketchSpam is the abuse of electronic messaging systems

(including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.

Phishing can come from Spam The act of sending an e-mail to a user falsely claiming to be

an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

You won the lottery You need to help a foreign minister from Nigeria Mr. Song Lee from Hang Seng International Bank

Page 15: Chapter 10

Kill them with fire!!!1!

How do we prevent this from happening Hardware

Unified Threat Management device (Astaro Security Gateway) Router with a built-in firewall

Software Anti-virus, spy-ware, and malware software suites (Kaspersky,

AVG, McAfee, Symantec, Microsoft Security Essentials) You!!!!

Don’t click on links or files in e-mails Keep your operating system software fully updated Disable third-party cookies in your favorite browser STOP USING INTERNET EXPLORER 6!!! Don’t ignore threats from your PC’s anti-bad stuff software Backup your important files on a regular basis

Online with Mozy or Carbonite Microsoft offers 25GB of storage for free on their Skydrive

service External hard drive with push-button backup

. . .or

Page 16: Chapter 10

BUY A MAC!!!!!

. . . or

Page 17: Chapter 10

USE LINUX!!!!!

Page 18: Chapter 10

What do you do if you are infected with. . .

Adware or spyware AdAware, SpySweeper, or some other program can

remove the threat pretty easilyViruses or worms

Depends on the virus Some virus removal programs will remove the

threat. . .but the bad news is more often than not there is irreparable harm to the PC

Which means you might have to. . .

Page 19: Chapter 10

NUKE IT!!!!!!!!1!!DBaN

Darik’s Boot and Nuke Program that writes random ones and zeros over a hard

drive Permanently wipes your hard drive