chapter 14 © 2004 pearson education, inc. technology and crime © 2004 pearson education, inc
TRANSCRIPT
![Page 1: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/1.jpg)
![Page 2: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/2.jpg)
Chapter 14
© 2004 Pearson Education, Inc.
![Page 3: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/3.jpg)
Technology and
Crime
© 2004 Pearson Education, Inc.
![Page 4: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/4.jpg)
Used by both crime fighters and lawbreakers
Technology and Crime
© 2004 Pearson Education, Inc.
![Page 5: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/5.jpg)
• Early use of telephones for scams
Technology and Crime
• Getaway cars for escape
© 2004 Pearson Education, Inc.
![Page 6: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/6.jpg)
High tech criminals seek illegitimate access to computerized information and digital databases
Technology and Crime
© 2004 Pearson Education, Inc.
![Page 7: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/7.jpg)
Direct accessDirect access
Office workers or corporate spies violate positions of trust, gain entry, and steal data during business hours
Technology and Crime
© 2004 Pearson Education, Inc.
![Page 8: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/8.jpg)
Computer trespassComputer trespass
Remote access to targeted machines to gain information and copy programs
Technology and Crime
© 2004 Pearson Education, Inc.
![Page 9: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/9.jpg)
• Hackers
• Computer viruses
• Software piracy
Technology and CrimeComputer trespassComputer trespass
© 2004 Pearson Education, Inc.
![Page 10: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/10.jpg)
Computer CrimeComputer Crime
Any violation of a federal or state computer crime statute
Technology and Crime
© 2004 Pearson Education, Inc.
![Page 11: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/11.jpg)
Forms of Software PiracyForms of Software Piracy
• Softlifting• Internet piracy• Software counterfeiting• OEM unbundling• Hard disk loading• Renting
Technology and Crime
© 2004 Pearson Education, Inc.
![Page 12: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/12.jpg)
Computer Crime and the Law
All states and the federal government have developed computer-crime statutes specifically applicable to…
© 2004 Pearson Education, Inc.
![Page 13: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/13.jpg)
…invasive activities aimed at illegally accessing stored information
Computer Crime and the Law
© 2004 Pearson Education, Inc.
![Page 14: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/14.jpg)
Computer Crime and the Law
Ambiguities in existing computer-crime
laws, complicated by rapid changes
in technology,…© 2004 Pearson Education, Inc.
![Page 15: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/15.jpg)
…can make it difficult even to tell that a crime has occurred
Computer Crime and the Law
© 2004 Pearson Education, Inc.
![Page 16: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/16.jpg)
Computer Criminals
HackerHacker
• Male, aged 16-25, lives in the United States
• Computer user, not programmer
© 2004 Pearson Education, Inc.
![Page 17: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/17.jpg)
Hacks with software written by others
Computer Criminals
HackerHacker
© 2004 Pearson Education, Inc.
![Page 18: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/18.jpg)
Primary motivation is togain access toWeb sites andcomputernetworks, but…
Computer Criminals
HackerHacker
© 2004 Pearson Education, Inc.
![Page 19: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/19.jpg)
…not to profit financially
Computer Criminals
HackerHacker
© 2004 Pearson Education, Inc.
![Page 20: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/20.jpg)
• Pioneers are fascinated by evolving technology and explore out of genuine curiosity
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
![Page 21: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/21.jpg)
• Scamps hack with a sense of fun and typically intend no overt harm
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
![Page 22: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/22.jpg)
• Explorers delight in the discoveries associated with breaking into new computer systems
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
![Page 23: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/23.jpg)
• Game players enjoy defeating software or systemic protections against intrusion
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
![Page 24: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/24.jpg)
• Vandals are malicious hackers who cause deliberate damage with no apparent personal gain
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
![Page 25: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/25.jpg)
• Addicts are classic “nerds” addicted to hacking and computer technology
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
![Page 26: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/26.jpg)
Share common behavior-related issues and other similarities with computer criminals, including…
Computer Criminals
White-collar CriminalsWhite-collar Criminals
© 2004 Pearson Education, Inc.
![Page 27: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/27.jpg)
• Commonly use nonviolent means and employment- related knowledge or technical skills to commit their crimes
Computer Criminals
White-collar CriminalsWhite-collar Criminals
© 2004 Pearson Education, Inc.
![Page 28: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/28.jpg)
• Often manipulate information to create profits or losses
• Can work alone, in groups, or in organizations
Computer Criminals
White-collar CriminalsWhite-collar Criminals
© 2004 Pearson Education, Inc.
![Page 29: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/29.jpg)
• Often commit crimes that
are hard to detect, and that
cause large losses of
money and other resources
Computer Criminals
White-collar CriminalsWhite-collar Criminals
© 2004 Pearson Education, Inc.
![Page 30: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/30.jpg)
• Are often found out by accident, and tend to be viewed by the general public as having committed offenses that are less serious than violent offenses
Computer Criminals
White-collar CriminalsWhite-collar Criminals
© 2004 Pearson Education, Inc.
![Page 31: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/31.jpg)
Information Superhighway
Information is the lifeblood of today’s economy© 2004 Pearson Education, Inc.
![Page 32: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/32.jpg)
• Most valuable resource of the new age
• Of great strategic importance
Information Superhighway
© 2004 Pearson Education, Inc.
![Page 33: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/33.jpg)
• A new tool for wrongdoers to commit crimes
• Potential to reach vast audiences
Information Superhighway
© 2004 Pearson Education, Inc.
![Page 34: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/34.jpg)
Technology and Crime
Fight against CrimeFight against Crime
Traffic radar’s laser speed measuring apparatus
28 mph
© 2004 Pearson Education, Inc.
![Page 35: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/35.jpg)
Fight against CrimeFight against Crime
• Computer databases of known offenders
• Public access to sex offender databases
Technology and Crime
© 2004 Pearson Education, Inc.
![Page 36: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/36.jpg)
Technology and Crime
Fight against CrimeFight against Crime
• Cellular communications
• Electronic eavesdropping
• DNA analysis
• Less than lethal weapons© 2004 Pearson Education, Inc.
![Page 37: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/37.jpg)
DNA (Deoxyribonucleic acid)DNA (Deoxyribonucleic acid)
The genetic code which is unique to each individual
Technology and Crime
© 2004 Pearson Education, Inc.
![Page 38: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/38.jpg)
DNA Fingerprinting
May be obtained from blood, hair, semen, saliva, or flakes of skin left at a crime scene
© 2004 Pearson Education, Inc.
![Page 39: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/39.jpg)
• Long lasting
• Highly reliable forensic tool
DNA FingerprintingDNADNA
© 2004 Pearson Education, Inc.
![Page 40: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/40.jpg)
DNA Fingerprinting
Many states and the federal government have begun building digitized forensic DNA databases
DNADNA
© 2004 Pearson Education, Inc.
![Page 41: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/41.jpg)
Has been called the “most important technological breakthrough of 20th century science”
DNA FingerprintingDNADNA
© 2004 Pearson Education, Inc.
![Page 42: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/42.jpg)
Technology and Crime
Computer crimeComputer crime
Threat (risk) analysis involves a complete and thorough assessment of the kinds of perils facing an organization
© 2004 Pearson Education, Inc.
![Page 43: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/43.jpg)
Allows identification of risks and development of plans to effectively deal with them
Technology and Crime
Threat AnalysisThreat Analysis
© 2004 Pearson Education, Inc.
![Page 44: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/44.jpg)
• A powerful and useful tool
• Requires training of state and local police
Technology and Crime
Audit TrailAudit Trail
© 2004 Pearson Education, Inc.
![Page 45: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/45.jpg)
Three sanctions against computer criminals
Technology and Crime
© 2004 Pearson Education, Inc.
![Page 46: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/46.jpg)
• Confiscate equipment used to commit a computer crime
• Limit the offender’s use of computers
Technology and Crime
© 2004 Pearson Education, Inc.
![Page 47: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/47.jpg)
Restrict the offender’s
freedom to accept employment
involving computers
Technology and Crime
© 2004 Pearson Education, Inc.
![Page 48: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc](https://reader036.vdocuments.us/reader036/viewer/2022062300/56649d215503460f949f638f/html5/thumbnails/48.jpg)