Feb

  

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Glassberg, J. (2015). The ransomware threat. Law Enforcement Technology, 42(9), 33-35. Then, write a case study that answers the following questions:

· What was the problem? What were the effects of the problem?

· What is the profile of the hacker?

· What can be done to protect against the threat?

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

· What should be done if a computer is infected with ransomware?

· What type(s) of cybercrime was/were involved in this article? Does the identified offender fit the characteristics for this type of cybercrime?

Unit VIII Case Study

Log into the myCSU Student Portal, and navigate to the Criminal Justice database within the CSU Online Library in order to access the resource below: Glassberg, J. (2015). The ransomware threat. Law Enforcement Technology, 42(9), 33-35. Then, write a case study that answers the following questions:

· What was the problem? What were the effects of the problem?

· What is the profile of the hacker?

· What can be done to protect against the threat?

· What should be done if a computer is infected with ransomware?

· What type(s) of cybercrime was/were involved in this article? Does the identified offender fit the characteristics for this type of cybercrime?

Your assignment should be a minimum of two pages in length, not counting the title and reference pages, and you should use APA formatting. In addition, any references used should be properly cited.

Criminology
CHAPTER
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
THIRD EDITION

Technology and Crime—It’s a Double-Edged Sword
13

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Chapter Objectives
Explain cybercrime and describe how it is committed.
Describe the extent and forms of cybercrime.
Describe the legislation that has been enacted in an effort to curb cybercrime.
continued on next slide

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Chapter Objectives
Describe the typical profile of computer criminals.
Explain how technology arms criminals with new methods of crime commission while simultaneously providing criminal justice personnel with the tools to combat crime.
continued on next slide

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Chapter Objectives
Summarize the steps being taken to combat computer crime.
Identify freedom-of-speech issues that modern technology has introduced.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Learning Objective 13.1
Explain cybercrime and describe how it is committed.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Cybercrime
The 21st century has been termed the postindustrial information age.
Criminal perpetrators have been able to take advantage of this age.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Cybercrime
Hacker
A person who uses computers for exploration and exploitation
Cybercrime
Any violation of a federal or state computer-crime statute

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Cybercrime
Five Types of Cybercrime
Internal cybercrimes
Internet and telecommunication crimes
Support of criminal enterprises
Computer-manipulation
Hardware, software, and information theft

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Learning Objective 13.2
Describe the extent and forms of cybercrime.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Extent and Forms of Cybercrime
The Extent of Cybercrime
The annual cost of cybercrime in the United States at around $666 million.
Computer crime cost most companies an average of less than $100,000.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Extent and Forms of Cybercrime
Software Piracy
The unauthorized and illegal copying of software
Phishing
An internet-based scam used to steal valuable information such as credit card numbers, Social Security numbers, user IDs, and passwords

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Extent and Forms of Cybercrime
Computer Virus
A computer program that is designed to secretly invade computer systems to modify the way in which they operate or alter the information they store

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Learning Objective 13.3
Describe the legislation that has been enacted in an effort to curb cybercrime.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Anti-Cybercrime Legislation
Communications Decency Act (CDA) of 1996
The law sought to protect minors from harmful material on the Internet.
A portion of the CDA criminalized the knowing transmission of obscene or indecent messages to any recipient under 18 years of age.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Anti-Cybercrime Legislation
Reno v. ACLU (1997)
Found much of the CDA to be unconstitutional, ruling it contradicts the First Amendment free speech guarantees

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Anti-Cybercrime Legislation
No Electronic Theft Act (1997)
A federal law that criminalizes the willful infringement of copyrighted works, including by electronic means, even when the infringing party derives no direct financial benefit from the infringement

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Anti-Cybercrime Legislation
Digital Theft Deterrence and Copyright Damages Improvement Act (1999)
A federal law that attempted to combat software piracy by increasing the amount of damages that could be awarded in case of copyright infringement

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Anti-Cybercrime Legislation
Cyber Security Enhancement Act (2002)
Part of the Homeland Security Act of 2002
Directed the U.S. Sentencing Commission to take several factors into account in creating new sentencing guidelines for computer criminals

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Anti-Cybercrime Legislation
Computer-Related Crime
Any illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Anti-Cybercrime Legislation
Computer Abuse
An unlawful incident associated with computer technology in which a victim suffered or could have suffered loss and/or a perpetrator by intention made or could have made a gain

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Learning Objective 13.4
Describe the typical profile of computer criminals.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Typical Profile of Computer Criminals
A Profile of Computer Criminals
Male
Between 16–25 years of age
Lives in the United States
Computer user, not programmer
Hacks with software written by others
Primary motivation is to gain access to websites and networks, not profit financially

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Typical Profile of Computer Criminals
The History and Nature of Hacking
Early hacking involved the interstate phone system.
Phone phreak
Person who uses special telecommunications access codes and other restricted technical information to avoid charges or disrupt services.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Learning Objective 13.5
Explain how technology arms criminals with new methods of crime commission while simultaneously providing criminal justice personnel with the tools to combat crime.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Technology as a Tool for Criminals
and Criminal Justice Personnel
Technology in the Fight Against Crime
Technology is a double-edged sword.
On one hand, it arms potential criminals with potent new weapons of crime commission.
On the other hand, it provides criminal justice personnel with powerful tools useful in the battle against crime.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Technology as a Tool for Criminals
and Criminal Justice Personnel
DNA Technology
The use of biological residue found at the scene of a crime for genetic comparisons in aiding the identification of criminal suspects

Definition from glossary.
*

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Technology as a Tool for Criminals
and Criminal Justice Personnel
Computers as Crime-Fighting Tools
Expert Systems
Computer hardware and software that attempt to duplicate the decision-making processes used by skilled investigators in the analysis of evidence, and in the recognition of patterns that such evidence might represent

Definition from glossary
*

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Learning Objective 13.6
Summarize the steps being taken to combat computer crime.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Combating Computer Crime
Data Encryption
The process by which information is encoded, making it unreadable to all but its intended recipients
Threat Analysis
A complete and thorough assessment of the potential disasters facing an organization

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Combating Computer Crime
Audit Trail
A sequential record of system activities that enables auditors to reconstruct, review, and examine the sequence of states and activities surrounding each event in one or more related transactions from inception to output of final results back to inception

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Combating Computer Crime
DCS-1000
An FBI-developed network diagnostic tool intended to assist in criminal investigations by monitoring and capturing large amounts of Internet traffic

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Learning Objective 13.7
Identify freedom-of-speech issues that modern technology has introduced.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Freedom of Speech
The continued development of telecommunications resources has led not only to concerns about security and data integrity, but also to an expanding interest in privacy, free speech, and personal freedoms.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Freedom of Speech
First and Fourth Amendments to the U.S. Constitution
Guarantee each person freedom of speech and security in his or her “persons, houses, papers, and effects, against unreasonable searches and seizures”

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Freedom of Speech
Electronic Frontier Foundation (EFF)
A non-profit organization founded in July 1990 to ensure the principles embodies in the Constitution and Bill of Rights are protected as new communications technologies emerge

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Chapter Summary
Cybercrime is a violation of any federal or state computer-crime statute.
The sophistication of cybercriminals makes it difficult to quantify losses.
New laws have been developed at both state and federal levels to prosecute unauthorized computer access.
continued on next slide

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Chapter Summary
The typical computer hacker is a 25-year old white American male.
Technology is a double-edged sword. It arms potential criminals with potent new weapons of crime commission. It also provides criminal justice personnel with tools useful in the battle against crime.
continued on next slide

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Chapter Summary
Effective programs to fight cybercrime must use threat analysis.
Efforts to control high-tech crime through criminal investigation and prosecution impact issues of individual rights.

Criminology
CHAPTER
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
THIRD EDITION

Globalization and Terrorism—Our Small World
14

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Chapter Objectives
Define comparative criminology and explain what it can tell us about crime worldwide.
Explain globalization and show how it is making it more difficult to combat crime around the world.
continued on next slide

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Chapter Objectives
Define terrorism, identify its major characteristics, and describe the different kinds of terrorist organizations.
Describe the legislative policies that were created after the 9/11 attacks to prevent further incidents of terrorism.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Learning Objective 14.1
Define comparative criminology and explain what it can tell us about crime worldwide.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Comparative Criminology
The cross-national study of crime
When crime patterns in one country are compared with those in another country
A criminologist involved in the cross-national study of crime

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Comparative Criminology
Ethnocentrism
The phenomenon of “culture centeredness” by which one uses one’s own culture as a benchmark against which to judge all other patterns of behavior

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Comparative Criminology
The crime rates of different countries are difficult to compare because of:
Differences in the way crime is defined.
Diverse crime-reporting practices.
Political, social, economic, and other influences on the reporting of statistics to international agencies.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Comparative Criminology
Issues in Reporting
For cross-national comparisons of crime data to be meaningful, they must share conceptual similarities.
Unfortunately, this is not always the case.
Crime statistics reflect social and political contexts.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Learning Objective 14.2
Explain globalization and show how it is making it more difficult to combat crime around the world.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Globalization and Crime
Globalization
A process of social homogenization by which the experiences of everyday life, marked by the diffusion of commodities and ideas, can foster a standardization of cultural expressions around the world.

Photo from text page 274
*

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

What are the positive and negative effects of globalization? How does globalization impact crime in the United States? How does it affect terrorism?

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Globalization and Crime
Human Smuggling
Illegal immigration in which an agent is involved for payment to help a person cross a border clandestinely
Human smuggling generally occurs with the consent of people being smuggled, who often pay for the service.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Globalization and Crime
Trafficking in Persons (TIP)
The exploitation of unwilling people through force, coercion, threat, or deception
Can be compared to a modern-day form of slavery
Some trafficking victims may believe they are being smuggled when they are really being trafficked.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Globalization and Crime
Human Trafficking
U.S. government officials estimate that 800,000 to 900,000 victims are trafficked globally each year.
Women and children comprise the largest group of victims.

Figure 14-4, Profile of Worldwide Trafficking Victims
Text page 276
*

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

FIGURE 14-4 Profile of Worldwide Trafficking Victims.
Source: United Nations Office on Drugs and Crime (UNDOC), Global Report on Trafficking in Persons (New York: United Nations, 2009), p. 11. Copyright © 2009. Used by permission of United Nations Office on Drugs and Crime.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Globalization and Crime
Federal Immigration and Trafficking Legislation
Recognizing human smuggling and TIP were serious social issues, Congress passed the Trafficking Victims Protection Act (TVPA) of 2000.
Under the TVPA, trafficking does not require the crossing of an international border.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Globalization and Crime
The Trafficking Victims Protection Reauthorization Act (TVPRA) of 2003 added new initiatives.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Learning Objective 14.3
Define terrorism, identify its major characteristics, and describe the different kinds of terrorist organizations.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Terrorism
The U.S. Department of State defines terrorism as:
Premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Terrorism
Terrorism acts are criminal because they:
Violate criminal law.
Involve criminal activity.
Produce criminal results.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Terrorism
The primary distinction between violent criminal acts and acts of terrorism, however, has to do with the political motivation or social ideology of the offender.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Terrorism
Terrorist organizations vary in their goals and can be categorized as follows:
National Terrorists
Religious Terrorists
State-sponsored Terrorists
Left-Wing Terrorists
Right-Wing Terrorists
Anarchist Terrorists

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Terrorism
Two major types of terrorism:
Domestic Terrorism
International Terrorism

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Terrorism
Domestic Terrorism
Unlawful force or violence by a group or an individual who is based and operates entirely within the Untied States and its territories without foreign direction and whose acts are directed at elements of the U.S. government or population

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Terrorism
International Terrorism
Unlawful force or violence by a group or an individual who has a connection to a foreign power or whose activities transcend national boundaries against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Learning Objective 14.4
Describe the legislative policies that were created after the 9/11 attacks to prevent future incidents of terrorism.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Post-9/11 Legislation
The War on Terror
During the first few years after the 9/11 attacks, three important legislative initiatives resulted.
The USA PATRIOT Act
The Sarbanes-Oxley Act
The Homeland Security Act

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Post-9/11 Legislation
The USA PATRIOT Act
A post-9/11 federal law designed to fight terrorism
The name of the statute is an acronym for United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
continued on next slide

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Post-9/11 Legislation
The USA PATRIOT Act
The USA PATRIOT Act led some to question whether the government threatened powers at the expense of individual rights and civil liberties.

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Post-9/11 Legislation
The Department of Homeland Security (DHS)
A federal agency established by the Homeland Security Act of 2002 that is responsible for protecting America against acts of terrorism

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Post-9/11 Legislation
Infrastructure
The basic facilities, services, and installations needed for the functioning of a community or society, such as transportation and communication systems, water and power lines, and public institutions, including schools, post offices, and prisons

Definition from text glossary
*

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Post-9/11 Legislation
Terrorism Commission and Reports
The report of the 9/11 Commission said that the September 11, 2001 attacks should have come as no surprise because the U.S. government had received clear warnings that Islamic terrorists were planning to strike targets within the United States

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Chapter Summary
Comparative criminology is the study of crime on a cross national level.
Globalization refers to the increasingly interconnectedness of people, ideas, and things on a worldwide scale.
continued on next slide

Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger

Chapter Summary
Terrorism is the use of criminal acts of violence as a tactic for attaining political goals.
The U.S. declared a worldwide war on international terrorism following the attacks of September 11, 2001.

Still stressed with your coursework?
Get quality coursework help from an expert!