schmall crim today8e_ppt_ch15
TRANSCRIPT
Criminology TodayAn Integrated Introduction
CHAPTER
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Technology and Crime
15
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Technology and Crime
• Technology and crime have always been closely linked.
• Technology can be used by both crime fighters and lawbreakers.
• As technology progresses, it facilitates new forms of behavior, including new crimes.
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
High Technology and Criminal Opportunity
• Routes to illegitimate access to computerized information Direct access Computer trespass
• Cybercrime/computer crime Any violation of a federal or state
computer-crime statute
continued on next slide
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
High Technology and Criminal Opportunity
• FBI typology of cybercrimes Internal cybercrimes Internet/telecommunications crimes Support of criminal enterprises Computer-manipulation crimes Hardware, software, and information
theft
continued on next slide
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
High Technology and Criminal Opportunity
• Most financial transactions are computerized. Money is information.
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
The Extent of Cybercrime
• Annual cost of cybercrime in the U.S. estimated at $666 million
• 2014 global report on cybercrime cost Cybercrimes and associated costs
continue to increase. Most costly cybercrimes caused by
malicious insiders Business disruption represents the
highest cost.continued on next slide
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
The Extent of Cybercrime
• Software piracy Unauthorized and illegal copying of
software programs• Phishing
Scam using official-looking e-mails to steal valuable information
May threaten viability of e-commerce• Not all cybercrime is committed for
financial gain.
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Cybercrime and the Law
• Communications Decency Act (1996) Reno v. ACLU
• No Electronic Theft Act (1997)• Digital Theft Deterrence and Copyright
Damages Improvement Act (1999)• Cyber Security Enhancement Act (2002)
continued on next slide
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Cybercrime and the Law
• Computer-related crime Any illegal act for which knowledge of
computer technology is involved for its investigation, perpetration, or prosecution
• Computer abuse Any incident associated with computer
technology in which a victim suffered loss and perpetrator intentionally gained
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
The History and Nature of Hacking
• Computer hacking began in late 1950s with creation of interstate phone system and direct distance dialing.
• Phone phreaks Used special telecommunications access
codes and other restricted information to avoid paying long-distance charges
• DHS identified modern threats to handheld devices like mobile phones.
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
A Profile of Cybercriminals
• Cybercriminals tend to come from hacker subculture.
• Average hacker Male between 16–25 who lives in the US Computer user but not programmer Hacks with software written by others Primary motivation is to gain access to
Web sites and computer networks.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
A Profile of Cybercriminals
• Hacker typology Pioneers Scamps Explorers Game players Vandals Addicts
• Some hackers are high-tech operators.
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Cybercrime as a Form of White-Collar Crime
• Many similarities between computer and white-collar crime Committed through nonviolent means Access to computers or storage media
often needed Involve information manipulations
creating profits or losses Can be committed by individuals or
organizationscontinued on next slide
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Cybercrime as a Form of White-Collar Crime
• Other similarities include: Crimes are difficult to detect. Public sees them as less serious than
violent crimes. Cost victims and society large amounts
of money and other resources Prevention requires a combination of
legal, technical, managerial, security, and audit-monitoring controls.
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Technology in the Fight against Crime
• Technology is a double-edged sword. Provides criminals new weapons to
commit crimes Provides the criminal justice system with
new tools to fight crime• Criminally useful or evasive
technologies and law enforcement capabilities commonly leapfrog one another.
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
DNA Technology
• DNA profiling The use of biological residue found at a
crime scene for genetic comparisons to help identify suspects
DNA evidence long-lasting Highly reliable but not infallible
• The greatest threat to reliable results is human error in conducting the tests.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
DNA Technology
• Daubert standard Test to determine whether a form of
scientific evidence is reliable Key factors• It has been subjected to testing.• It has been subjected to peer review.• It has known/potential rates of error.• It has standards controlling application of
the techniques involved.continued on next slide
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
DNA Technology
• Federal government, most states have digitized forensic DNA databases National DNA Index System (NDIS)
• All states have legislation requiring convicted offenders to provide samples for DNA databases.
• DNA Identification Act of 1994• CODIS/NDIS
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Computers as Crime-Fighting Tools
• Computers connect people. Provide many law and law-enforcement
related resources• Expert systems
Computer systems that try to duplicate decision-making processes used by investigators in analyzing evidence and recognizing patterns
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Combating Cybercrime
• Threat analysis (risk analysis) Complete and thorough assessment of
the kinds of perils facing an organization• Once threats identified, can introduce
strategies to deal with: Audit trail traces/records computer
operator activities, lets auditors examine sequence of events relating to any transaction
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Police Investigation of Computer Crime
• Many police departments lack personnel skilled in the investigation of computer crimes.
• May intentionally avoid computer-crime investigations
• Many departments place a low priority on computer crime.
continued on next slide
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Police Investigation of Computer Crime
• FBI's National Computer Crime Squad investigates violations of federal computer crime laws.
• DCS-3000 network "sniffer" focuses on intercepting suspect personal communications delivered via wireless services
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Cybercrime and Internet Security
• Information is the lifeblood of the modern age. Needs to be moved safely and securely
• Commission on Critical Infrastructure Protection
• National Infrastructure Protection Center (1998) Succeeded by the Office of
Infrastructure Protection (part of DHS)continued on next slide
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Cybercrime and Internet Security
• President's Working Group on Unlawful Conduct on the Internet (2000)
• U.S.-CERT (2003)• Pres. Obama has identified
cybersecurity as one of the most serious economic and national security challenges facing the U.S.
• DHS Cyber Security Division
Copyright © 2017 by Pearson Education, Inc.All Rights Reserved
Criminology Today: An Integrated Introduction, 8eFrank Schmalleger
Policy Issues: Personal Freedoms in the Information Age
• First Amendment Freedom of speech Are electronic communications
protected?• Fourth Amendment
Freedom from unreasonable searches and seizures
Does this include electronic information?