CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
-
Upload
hilary-gaines -
Category
Documents
-
view
214 -
download
1
Transcript of CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
CJ
© 2011 Cengage Learning
Chapter 17Chapter 17
Cyber Crime andCyber Crime andThe Future of The Future of
Criminal JusticeCriminal Justice
© 2011 Cengage Learning
Learning Outcomes
LO1: Distinguish cyber crime from “traditional crime”.
LO2: Explain the differences between cyberstalking and cyberbullying.
LO3: Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses.
LO4: Explain how the Internet has contributed to the piracy of intellectual property.
LO5: Outline the three major reasons why the Internet is conducive to the dissemination of child pornography.
© 2011 Cengage Learning
Learning Outcome 1
Types of computer crime:• The computer is the “object” of the
crime.• The computer is the “subject” of the
crime.• The computer is the “instrument” of
the crime.
© 2011 Cengage Learning
Learning Outcome 1
Cyber crime: • Any activity occurring via a
computer in the virtual community in the Internet
• Difficult to determine how much cyber crime actually takes place
© 2011 Cengage Learning
Learning Outcome 1Types of Cyber Crime:• Cyber consumer fraud• Online retail fraud• Online auction fraud• Cyber theft
– Identity theft– Phishing
© 2011 Cengage Learning
Source: National White Collar Crime Center and Federal Bureau of Investigation, Internet Crime Report: 2009 (Washington, D.C.: Internet Crime Complaint Center, March 2010), Figure 4, page 5.
© 2011 Cengage Learning
Learning Outcome 2• Cyberstalking: harassing a person
through the Internet, email, or some other form of electronic communication
• Cyberbullying: inflicting willful and repeated emotional harm using computers, cell phones, or other electronic devices
3LO
© 2011 Cengage Learning
Describe the three following forms of
malware: (a) botnets, (b) worms, and (c) viruses.
© 2011 Cengage Learning
Learning Outcome 3
• Credit card crime on the web• Hackers• Botnets• Malware
– Worms– Viruses
• Cyberwarfare
© 2011 Cengage Learning
Learning Outcome 3
Spam:• Bulk emails sent without the
consent of the recipient• Controlling the Assault of Non-
Solicited Pornography and Marketing Act (CAN_SPAM) of 2003
4LO
© 2011 Cengage Learning
Explain how the Internet has contributed to piracy of intellectual property.
© 2011 Cengage Learning
Learning Outcome 4Pirating Intellectual Property:• Intellectual property is the products that
result from intellectual, creative processes.
• Includes piracy of books, films, music and software.
• An estimated 41% of all software is pirated.
5LO
© 2011 Cengage Learning
Outline the three major reasons why the Internet
is conducive to the dissemination of child
pornography.
© 2011 Cengage Learning
Learning Outcome 5Issues in online gambling• Can citizens in a state that does not
allow gambling place bets to a Web site located in a state that does?
• Many Internet gambling sites are located in countries where Internet gambling is legal.
© 2011 Cengage Learning
CAREERPREPComputer Forensic Specialist
Job Description:• Investigate misbehavior on computer systems by collecting and
analyzing computer-related evidence. Retrieve data that have been encrypted or electronically stored on a commercial or personal computer.
• Work for a law enforcement or homeland security agency to investigate crimes or terrorists’ activities, or for a private company to protect commercial data and defend against worms, viruses, and other malware.
What Kind of Training Is Required?• An extensive knowledge of computers, computer programming, and
data retrieval is essential. A number of colleges, universities, and online educational organizations offer computer forensic courses that provide the skills necessary for this career.
• A complete understanding of the rules of evidence in criminal courts and the ability to establish a proper chain of custody for all evidence retrieved from targeted computer databases.
Annual Salary Range?$50,000–$85,000
For additional information, visit: computer-forensics.sans.org.
© 2011 Cengage Learning
Learning Outcome 5
Cyber Forensics: • Main goal – gather digital evidence
• Jurisdictional challenges– Domestic – International
© 2011 Cengage Learning
Learning Outcome 5Federal law enforcement and cyber
crime: • The Federal Bureau of Investigation
– Cyber Division– Cyber Action Teams (CATs)
• The United States Secret Service
© 2011 Cengage Learning
Learning Outcome 5
Private Efforts to Combat Cyber Crime:
• The Conficker scare• Encryption