CRJ270 - Chapter 14

Download Report

Transcript CRJ270 - Chapter 14

Criminology Today
AN INTEGRATIVE INTRODUCTION
SEVENTH EDITION
CHAPTER
14
Technology and
Crime
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
The Advance of Technology
• Technology and criminology have
always been closely linked
• Technology can be used by crime
fighters and lawbreakers
• As technology progresses, it facilitates
new forms of behavior, including new
crimes
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
High Technology and Criminal
Opportunity
• Routes to illegitimate access to
computerized information
 Direct access
 Computer trespass
• Cybercrime
 any violation of a federal or state
computer-crime statute
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
High Technology and Criminal
Opportunity
• Types of cybercrime





Internal cybercrimes
Internet/telecommunications crimes
Support of criminal enterprises
Computer-manipulation crimes
Hardware, software, and information
theft
• Money today is information
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
The Extent of Cybercrime
• Software piracy
 The unauthorized and illegal copying of
software programs
• Phishing
 An Internet-based scam that uses
official-looking e-mail messages to steal
valuable information
 May threaten the viability of
e-commerce
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
The Extent of Cybercrime
• Not all cybercrime is committed for
financial gain
 Criminal mischief
• creating/transmitting malicious forms of
programming code
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Cybercrime and the Law
• Communications Decency Act (1996)
 Reno v. ACLU
• No Electronic Theft Act (1997)
• Digital Theft Deterrence and Copyright
Damages Improvement Act (1999)
• Cyber Security Enhancement Act
(2002)
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Cybercrime and the Law
• Computer-related crime
 Any illegal act for which knowledge of
computer technology is involved for its
investigation, perpetration, or
prosecution
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Cybercrime and the Law
• Computer abuse
 Any incident associated with computer
technology in which a victim suffered or
could have suffered loss and perpetrator
intentionally gained or could have
gained
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
The History and Nature of Hacking
• Computer hacking may have started in
the late 1950s with the creation of the
interstate phone system and direct
distance dialing
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
The History and Nature of Hacking
• Phone phreaks
 Used special telecommunications access
codes and other restricted technical
information to avoid paying longdistance charges
 Modern version involves electronic theft
of cell phone numbers and access codes
• Voice mail hacking and voice mail fraud
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
A Profile of Cybercriminals
• Cybercriminals tend to come from
hacker subculture because hackers and
hacker identities are a product of
cyberspace
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
A Profile of Cybercriminals
• Average hacker




Male between 16-25 who lives in the US
Computer user but not programmer
Hacks with software written by others
Primary motivation is to gain access to
Web sites and computer networks
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
A Profile of Cybercriminals
• Hacker typology based on psychological
characteristics






Pioneers
Scamps
Explorers
Game players
Vandals
Addicts
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
A Profile of Cybercriminals
• Not all hackers are kids - some are
high-tech computer operators
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Cybercrime as a Form of WhiteCollar Crime
• Some see computer crime as a new
form of white-collar crime. There are
many similarities between the two:
 Both often committed through
nonviolent means
 Access to computers or storage media
often needed
 Involve information manipulations
creating profits or losses
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Cybercrime as a Form of WhiteCollar Crime
• Some see computer crime as a new
form of white-collar crime. There are
many similarities between the two:
 Both can be committed by individuals or
organizations
 Both are difficult to detect
 Viewed them as less serious than
violent crimes
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Cybercrime as a Form of WhiteCollar Crime
• Some see computer crime as a new
form of white-collar crime. There are
many similarities between the two:
 Both cost individuals, organizations, and
society large amounts of money and
other resources
 Prevention requires a combination of
legal, technical, managerial, security,
and audit-monitoring controls
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Technology in the Fight Against
Crime
• Technology is a double-edged sword
 Provides criminals new weapons to
commit crimes
 Provides the criminal justice system
with new tools to fight crime
• Criminally useful or evasive
technologies and law enforcement
capabilities commonly leapfrog one
another
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
DNA Technology
• DNA profiling
 The use of biological residue found at a
crime scene for genetic comparisons to
help identify suspects
 DNA evidence long-lasting
 Highly reliable but not infallible
• The greatest threat to reliable results is
human error in conducting the tests
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
DNA Technology
• Daubert standard
 Test to determine whether a form of
scientific evidence is reliable
 Key factors:
•
•
•
•
It has been subjected to testing
It has been subjected to peer review
It has known/potential rates of error
It has standards controlling application of
the techniques involved
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
DNA Technology
• Most states and the federal
government have digitized forensic
DNA databases
 FBI’s National DNA Index System
(NDIS)
• All states have legislation requiring
convicted offenders to provide samples
for DNA databases
• DNA Identification Act of 1994
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Computers and Crime-Fighting
Tools
• Computers used to keep records
• Computers help design new technology
and assign resources to problem areas
• Computers connect people
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Computers and Crime-Fighting
Tools
• Expert systems
 Computer hardware and software
system that tries to duplicate the
decision-making processes used by
investigators in analyzing evidence and
recognizing patterns
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Combating Cybercrime
• Threat analysis (risk analysis)
 a complete and thorough assessment of
the kinds of perils facing an organization
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Combating Cybercrime
• Once threats are identified, strategies
to deal with them can be introduced
 An audit trail traces/records activities of
computer operators and allows auditors
to examine the sequence of events
relating to any transaction
 A powerful tool for identifying instances
of computer crime
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Police Investigation of Computer
Crime
• Many police departments lack
personnel skilled in the investigation of
computer crimes
• May intentionally avoid computer-crime
investigations
• Many departments place a low priority
on computer crime
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Police Investigation of Computer
Crime
• FBI’s National Computer Crime Squad
investigates violations of federal
computer crime laws
• DCS-3000 network “sniffer” focuses on
intercepting suspect personal
communications delivered via wireless
services
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Cybercrime and Internet Security
• Information is the lifeblood of the
modern age – needs to be moved
safely and securely
• Commission on Critical Infrastructure
Protection
• National Infrastructure Protection
Center (1998)
 Succeeded by the Office of
Infrastructure Protection (part of DHS)
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Cybercrime and Internet Security
• U.S. Computer Emergency Readiness
Team (2003)
• Pres. Obama has identified
cybersecurity as one of the most
serious economic and national security
challenges facing the U.S.
continued on next slide
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Cybercrime and Internet Security
• In 2009, announcement appoint of first
White House Cybersecurity Coordinator
 Responsible for coordinating
cybersecurity activities across the
federal government
 Howard A. Schmidt
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Policy Issues: Personal Freedoms
in the Information Age
• First Amendment
 Freedom of speech
 Are electronic communications
protected?
• Fourth Amendment
 Freedom from unreasonable searches
and seizures
 Does this include electronic information?
Criminology Today, 7th Edition
Frank Schmalleger
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved