schmall crim today8e_ppt_ch15

25
Criminology Today An Integrated Introduction CHAPTER Criminology Today: An Integrated Introduction, 8e Frank Schmalleger Copyright © 2017 by Pearson Education, Inc. All Rights Reserved Technology and Crime 15

Upload: rappahannock-community-college

Post on 10-Jan-2017

23 views

Category:

Education


2 download

TRANSCRIPT

Page 1: Schmall crim today8e_ppt_ch15

Criminology TodayAn Integrated Introduction

CHAPTER

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Technology and Crime

15

Page 2: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Technology and Crime

• Technology and crime have always been closely linked.

• Technology can be used by both crime fighters and lawbreakers.

• As technology progresses, it facilitates new forms of behavior, including new crimes.

Page 3: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

High Technology and Criminal Opportunity

• Routes to illegitimate access to computerized information Direct access Computer trespass

• Cybercrime/computer crime Any violation of a federal or state

computer-crime statute

continued on next slide

Page 4: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

High Technology and Criminal Opportunity

• FBI typology of cybercrimes Internal cybercrimes Internet/telecommunications crimes Support of criminal enterprises Computer-manipulation crimes Hardware, software, and information

theft

continued on next slide

Page 5: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

High Technology and Criminal Opportunity

• Most financial transactions are computerized. Money is information.

Page 6: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

The Extent of Cybercrime

• Annual cost of cybercrime in the U.S. estimated at $666 million

• 2014 global report on cybercrime cost Cybercrimes and associated costs

continue to increase. Most costly cybercrimes caused by

malicious insiders Business disruption represents the

highest cost.continued on next slide

Page 7: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

The Extent of Cybercrime

• Software piracy Unauthorized and illegal copying of

software programs• Phishing

Scam using official-looking e-mails to steal valuable information

May threaten viability of e-commerce• Not all cybercrime is committed for

financial gain.

Page 8: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Cybercrime and the Law

• Communications Decency Act (1996) Reno v. ACLU

• No Electronic Theft Act (1997)• Digital Theft Deterrence and Copyright

Damages Improvement Act (1999)• Cyber Security Enhancement Act (2002)

continued on next slide

Page 9: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Cybercrime and the Law

• Computer-related crime Any illegal act for which knowledge of

computer technology is involved for its investigation, perpetration, or prosecution

• Computer abuse Any incident associated with computer

technology in which a victim suffered loss and perpetrator intentionally gained

Page 10: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

The History and Nature of Hacking

• Computer hacking began in late 1950s with creation of interstate phone system and direct distance dialing.

• Phone phreaks Used special telecommunications access

codes and other restricted information to avoid paying long-distance charges

• DHS identified modern threats to handheld devices like mobile phones.

Page 11: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

A Profile of Cybercriminals

• Cybercriminals tend to come from hacker subculture.

• Average hacker Male between 16–25 who lives in the US Computer user but not programmer Hacks with software written by others Primary motivation is to gain access to

Web sites and computer networks.

continued on next slide

Page 12: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

A Profile of Cybercriminals

• Hacker typology Pioneers Scamps Explorers Game players Vandals Addicts

• Some hackers are high-tech operators.

Page 13: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Cybercrime as a Form of White-Collar Crime

• Many similarities between computer and white-collar crime Committed through nonviolent means Access to computers or storage media

often needed Involve information manipulations

creating profits or losses Can be committed by individuals or

organizationscontinued on next slide

Page 14: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Cybercrime as a Form of White-Collar Crime

• Other similarities include: Crimes are difficult to detect. Public sees them as less serious than

violent crimes. Cost victims and society large amounts

of money and other resources Prevention requires a combination of

legal, technical, managerial, security, and audit-monitoring controls.

Page 15: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Technology in the Fight against Crime

• Technology is a double-edged sword. Provides criminals new weapons to

commit crimes Provides the criminal justice system with

new tools to fight crime• Criminally useful or evasive

technologies and law enforcement capabilities commonly leapfrog one another.

Page 16: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

DNA Technology

• DNA profiling The use of biological residue found at a

crime scene for genetic comparisons to help identify suspects

DNA evidence long-lasting Highly reliable but not infallible

• The greatest threat to reliable results is human error in conducting the tests.

continued on next slide

Page 17: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

DNA Technology

• Daubert standard Test to determine whether a form of

scientific evidence is reliable Key factors• It has been subjected to testing.• It has been subjected to peer review.• It has known/potential rates of error.• It has standards controlling application of

the techniques involved.continued on next slide

Page 18: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

DNA Technology

• Federal government, most states have digitized forensic DNA databases National DNA Index System (NDIS)

• All states have legislation requiring convicted offenders to provide samples for DNA databases.

• DNA Identification Act of 1994• CODIS/NDIS

Page 19: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Computers as Crime-Fighting Tools

• Computers connect people. Provide many law and law-enforcement

related resources• Expert systems

Computer systems that try to duplicate decision-making processes used by investigators in analyzing evidence and recognizing patterns

Page 20: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Combating Cybercrime

• Threat analysis (risk analysis) Complete and thorough assessment of

the kinds of perils facing an organization• Once threats identified, can introduce

strategies to deal with: Audit trail traces/records computer

operator activities, lets auditors examine sequence of events relating to any transaction

Page 21: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Police Investigation of Computer Crime

• Many police departments lack personnel skilled in the investigation of computer crimes.

• May intentionally avoid computer-crime investigations

• Many departments place a low priority on computer crime.

continued on next slide

Page 22: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Police Investigation of Computer Crime

• FBI's National Computer Crime Squad investigates violations of federal computer crime laws.

• DCS-3000 network "sniffer" focuses on intercepting suspect personal communications delivered via wireless services

Page 23: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Cybercrime and Internet Security

• Information is the lifeblood of the modern age. Needs to be moved safely and securely

• Commission on Critical Infrastructure Protection

• National Infrastructure Protection Center (1998) Succeeded by the Office of

Infrastructure Protection (part of DHS)continued on next slide

Page 24: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Cybercrime and Internet Security

• President's Working Group on Unlawful Conduct on the Internet (2000)

• U.S.-CERT (2003)• Pres. Obama has identified

cybersecurity as one of the most serious economic and national security challenges facing the U.S.

• DHS Cyber Security Division

Page 25: Schmall crim today8e_ppt_ch15

Copyright © 2017 by Pearson Education, Inc.All Rights Reserved

Criminology Today: An Integrated Introduction, 8eFrank Schmalleger

Policy Issues: Personal Freedoms in the Information Age

• First Amendment Freedom of speech Are electronic communications

protected?• Fourth Amendment

Freedom from unreasonable searches and seizures

Does this include electronic information?