cj © 2011 cengage learning chapter 17 cyber crime and the future of criminal justice

24
CJ © 2011 Cengage Learning Chapter 17 Chapter 17 Cyber Crime and Cyber Crime and The Future of The Future of Criminal Justice Criminal Justice

Upload: hilary-gaines

Post on 24-Dec-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

CJ

© 2011 Cengage Learning

Chapter 17Chapter 17

Cyber Crime andCyber Crime andThe Future of The Future of

Criminal JusticeCriminal Justice

© 2011 Cengage Learning

Learning Outcomes

LO1: Distinguish cyber crime from “traditional crime”.

LO2: Explain the differences between cyberstalking and cyberbullying.

LO3: Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses.

LO4: Explain how the Internet has contributed to the piracy of intellectual property.

LO5: Outline the three major reasons why the Internet is conducive to the dissemination of child pornography.

1LO

© 2011 Cengage Learning

Distinguish cyber crime from “traditional” crime.

© 2011 Cengage Learning

Learning Outcome 1

Types of computer crime:• The computer is the “object” of the

crime.• The computer is the “subject” of the

crime.• The computer is the “instrument” of

the crime.

© 2011 Cengage Learning

Learning Outcome 1

Cyber crime: • Any activity occurring via a

computer in the virtual community in the Internet

• Difficult to determine how much cyber crime actually takes place

© 2011 Cengage Learning

Learning Outcome 1Types of Cyber Crime:• Cyber consumer fraud• Online retail fraud• Online auction fraud• Cyber theft

– Identity theft– Phishing

© 2011 Cengage Learning

Source: National White Collar Crime Center and Federal Bureau of Investigation, Internet Crime Report: 2009 (Washington, D.C.: Internet Crime Complaint Center, March 2010), Figure 4, page 5.

2LO

© 2011 Cengage Learning

Explain the differences between cyberstalking

and cyberbullying.

© 2011 Cengage Learning

Learning Outcome 2• Cyberstalking: harassing a person

through the Internet, email, or some other form of electronic communication

• Cyberbullying: inflicting willful and repeated emotional harm using computers, cell phones, or other electronic devices

3LO

© 2011 Cengage Learning

Describe the three following forms of

malware: (a) botnets, (b) worms, and (c) viruses.

© 2011 Cengage Learning

Learning Outcome 3

• Credit card crime on the web• Hackers• Botnets• Malware

– Worms– Viruses

• Cyberwarfare

© 2011 Cengage Learning

Learning Outcome 3

Spam:• Bulk emails sent without the

consent of the recipient• Controlling the Assault of Non-

Solicited Pornography and Marketing Act (CAN_SPAM) of 2003

4LO

© 2011 Cengage Learning

Explain how the Internet has contributed to piracy of intellectual property.

© 2011 Cengage Learning

Learning Outcome 4Pirating Intellectual Property:• Intellectual property is the products that

result from intellectual, creative processes.

• Includes piracy of books, films, music and software.

• An estimated 41% of all software is pirated.

© 2011 Cengage Learning

Learning Outcome 4

Electronic Banking:• Money laundering• Digital currency

5LO

© 2011 Cengage Learning

Outline the three major reasons why the Internet

is conducive to the dissemination of child

pornography.

© 2011 Cengage Learning

Learning Outcome 5Issues in online pornography• Speed• Security• Anonymity

© 2011 Cengage Learning

Learning Outcome 5Issues in online gambling• Can citizens in a state that does not

allow gambling place bets to a Web site located in a state that does?

• Many Internet gambling sites are located in countries where Internet gambling is legal.

© 2011 Cengage Learning

CAREERPREPComputer Forensic Specialist

Job Description:• Investigate misbehavior on computer systems by collecting and

analyzing computer-related evidence. Retrieve data that have been encrypted or electronically stored on a commercial or personal computer.

• Work for a law enforcement or homeland security agency to investigate crimes or terrorists’ activities, or for a private company to protect commercial data and defend against worms, viruses, and other malware.

What Kind of Training Is Required?• An extensive knowledge of computers, computer programming, and

data retrieval is essential. A number of colleges, universities, and online educational organizations offer computer forensic courses that provide the skills necessary for this career.

• A complete understanding of the rules of evidence in criminal courts and the ability to establish a proper chain of custody for all evidence retrieved from targeted computer databases.

Annual Salary Range?$50,000–$85,000

For additional information, visit: computer-forensics.sans.org.

© 2011 Cengage Learning

Learning Outcome 5

Cyber Forensics: • Main goal – gather digital evidence

• Jurisdictional challenges– Domestic – International

© 2011 Cengage Learning

Learning Outcome 5Federal law enforcement and cyber

crime: • The Federal Bureau of Investigation

– Cyber Division– Cyber Action Teams (CATs)

• The United States Secret Service

© 2011 Cengage Learning

© 2011 Cengage Learning

Learning Outcome 5

Private Efforts to Combat Cyber Crime:

• The Conficker scare• Encryption

© 2011 Cengage Learning

Learning Outcome 5

Future trends:• Changing demographics • Technological advances• Increasing diversity• The globalization of crime