Glassberg, J. (2015). The ransomware threat. Law Enforcement Technology, 42(9), 33-35. Then, write a case study that answers the following questions:
· What was the problem? What were the effects of the problem?
· What is the profile of the hacker?
· What can be done to protect against the threat?
· What should be done if a computer is infected with ransomware?
· What type(s) of cybercrime was/were involved in this article? Does the identified offender fit the characteristics for this type of cybercrime?
Unit VIII Case Study
Log into the myCSU Student Portal, and navigate to the Criminal Justice database within the CSU Online Library in order to access the resource below: Glassberg, J. (2015). The ransomware threat. Law Enforcement Technology, 42(9), 33-35. Then, write a case study that answers the following questions:
· What was the problem? What were the effects of the problem?
· What is the profile of the hacker?
· What can be done to protect against the threat?
· What should be done if a computer is infected with ransomware?
· What type(s) of cybercrime was/were involved in this article? Does the identified offender fit the characteristics for this type of cybercrime?
Your assignment should be a minimum of two pages in length, not counting the title and reference pages, and you should use APA formatting. In addition, any references used should be properly cited.
Criminology
CHAPTER
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
THIRD EDITION
Technology and Crime—It’s a Double-Edged Sword
13
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter Objectives
	Explain cybercrime and describe how it is committed.
	Describe the extent and forms of cybercrime.
	Describe the legislation that has been enacted in an effort to curb cybercrime.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter Objectives
	Describe the typical profile of computer criminals.
	Explain how technology arms criminals with new methods of crime commission while simultaneously providing criminal justice personnel with the tools to combat crime.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter Objectives
	Summarize the steps being taken to combat computer crime.
	Identify freedom-of-speech issues that modern technology has introduced.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.1
Explain cybercrime and describe how it is committed.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Cybercrime
	The 21st century has been termed the postindustrial information age.
	Criminal perpetrators have been able to take advantage of this age.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Cybercrime
	Hacker
	A person who uses computers for exploration and exploitation
	Cybercrime
	Any violation of a federal or state computer-crime statute
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Cybercrime
	Five Types of Cybercrime
	Internal cybercrimes
	Internet and telecommunication crimes
	Support of criminal enterprises
	Computer-manipulation
	Hardware, software, and information theft
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.2
Describe the extent and forms of cybercrime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Extent and Forms of Cybercrime
	The Extent of Cybercrime
	The annual cost of cybercrime in the United States at around $666 million.
	Computer crime cost most companies an average of less than $100,000.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Extent and Forms of Cybercrime
	Software Piracy
	The unauthorized and illegal copying of software
	Phishing
	An internet-based scam used to steal valuable information such as credit card numbers, Social Security numbers, user IDs, and passwords
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Extent and Forms of Cybercrime
	Computer Virus
	A computer program that is designed to secretly invade computer systems to modify the way in which they operate or alter the information they store
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.3
Describe the legislation that has been enacted in an effort to curb cybercrime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime Legislation
	Communications Decency Act (CDA) of 1996
	The law sought to protect minors from harmful material on the Internet.
	A portion of the CDA criminalized the knowing transmission of obscene or indecent messages to any recipient under 18 years of age.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime Legislation
	Reno v. ACLU (1997)
	Found much of the CDA to be unconstitutional, ruling it contradicts the First Amendment free speech guarantees
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime Legislation
	No Electronic Theft Act (1997)
	A federal law that criminalizes the willful infringement of copyrighted works, including by electronic means, even when the infringing party derives no direct financial benefit from the infringement
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime Legislation
	Digital Theft Deterrence and Copyright Damages Improvement Act (1999)
	A federal law that attempted to combat software piracy by increasing the amount of damages that could be awarded in case of copyright infringement
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime Legislation
	Cyber Security Enhancement Act (2002)
	Part of the Homeland Security Act of 2002
	Directed the U.S. Sentencing Commission to take several factors into account in creating new sentencing guidelines for computer criminals
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime Legislation
	Computer-Related Crime
	Any illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime Legislation
	Computer Abuse
	An unlawful incident associated with computer technology in which a victim suffered or could have suffered loss and/or a perpetrator by intention made or could have made a gain
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.4
Describe the typical profile of computer criminals.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Typical Profile of Computer Criminals
	A Profile of Computer Criminals
	Male
	Between 16–25 years of age
	Lives in the United States
	Computer user, not programmer
	Hacks with software written by others
	Primary motivation is to gain access to websites and networks, not profit financially
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Typical Profile of Computer Criminals
	The History and Nature of Hacking
	Early hacking involved the interstate phone system.
	Phone phreak
	Person who uses special telecommunications access codes and other restricted technical information to avoid charges or disrupt services.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.5
Explain how technology arms criminals with new methods of crime commission while simultaneously providing criminal justice personnel with the tools to combat crime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Technology as a Tool for Criminals
and Criminal Justice Personnel
	Technology in the Fight Against Crime
	Technology is a double-edged sword.
	On one hand, it arms potential criminals with potent new weapons of crime commission.
	On the other hand, it provides criminal justice personnel with powerful tools useful in the battle against crime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Technology as a Tool for Criminals
and Criminal Justice Personnel
	DNA Technology
	The use of biological residue found at the scene of a crime for genetic comparisons in aiding the identification of criminal suspects
Definition from glossary.
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Technology as a Tool for Criminals
and Criminal Justice Personnel
	Computers as Crime-Fighting Tools
	Expert Systems
	Computer hardware and software that attempt to duplicate the decision-making processes used by skilled investigators in the analysis of evidence, and in the recognition of patterns that such evidence might represent
Definition from glossary
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.6
Summarize the steps being taken to combat computer crime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Combating Computer Crime
	Data Encryption
	The process by which information is encoded, making it unreadable to all but its intended recipients
	Threat Analysis
	A complete and thorough assessment of the potential disasters facing an organization
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Combating Computer Crime
	Audit Trail
	A sequential record of system activities that enables auditors to reconstruct, review, and examine the sequence of states and activities surrounding each event in one or more related transactions from inception to output of final results back to inception
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Combating Computer Crime
	DCS-1000
	An FBI-developed network diagnostic tool intended to assist in criminal investigations by monitoring and capturing large amounts of Internet traffic
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.7
Identify freedom-of-speech issues that modern technology has introduced.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Freedom of Speech
	The continued development of telecommunications resources has led not only to concerns about security and data integrity, but also to an expanding interest in privacy, free speech, and personal freedoms.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Freedom of Speech
	First and Fourth Amendments to the U.S. Constitution
	Guarantee each person freedom of speech and security in his or her “persons, houses, papers, and effects, against unreasonable searches and seizures”
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Freedom of Speech
	Electronic Frontier Foundation (EFF)
	A non-profit organization founded in July 1990 to ensure the principles embodies in the Constitution and Bill of Rights are protected as new communications technologies emerge
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter Summary
	Cybercrime is a violation of any federal or state computer-crime statute.
	The sophistication of cybercriminals makes it difficult to quantify losses.
	New laws have been developed at both state and federal levels to prosecute unauthorized computer access.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter Summary
	The typical computer hacker is a 25-year old white American male.
	Technology is a double-edged sword. It arms potential criminals with potent new weapons of crime commission. It also provides criminal justice personnel with tools useful in the battle against crime.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter Summary
	Effective programs to fight cybercrime must use threat analysis.
	Efforts to control high-tech crime through criminal investigation and prosecution impact issues of individual rights.
Criminology
CHAPTER
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
THIRD EDITION
Globalization and Terrorism—Our Small World
14
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter Objectives
	Define comparative criminology and explain what it can tell us about crime worldwide.
	Explain globalization and show how it is making it more difficult to combat crime around the world.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter Objectives
	Define terrorism, identify its major characteristics, and describe the different kinds of terrorist organizations.
	Describe the legislative policies that were created after the 9/11 attacks to prevent further incidents of terrorism.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.1
Define comparative criminology and explain what it can tell us about crime worldwide.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative Criminology
	The cross-national study of crime
	When crime patterns in one country are compared with those in another country
	A criminologist involved in the cross-national study of crime
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative Criminology
	Ethnocentrism
	The phenomenon of “culture centeredness” by which one uses one’s own culture as a benchmark against which to judge all other patterns of behavior
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative Criminology
	The crime rates of different countries are difficult to compare because of:
	Differences in the way crime is defined.
	Diverse crime-reporting practices.
	Political, social, economic, and other influences on the reporting of statistics to international agencies.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative Criminology
	Issues in Reporting
	For cross-national comparisons of crime data to be meaningful, they must share conceptual similarities.
	Unfortunately, this is not always the case.
	Crime statistics reflect social and political contexts.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.2
Explain globalization and show how it is making it more difficult to combat crime around the world.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and Crime
	Globalization
	A process of social homogenization by which the experiences of everyday life, marked by the diffusion of commodities and ideas, can foster a standardization of cultural expressions around the world.
Photo from text page 274
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
What are the positive and negative effects of globalization? How does globalization impact crime in the United States? How does it affect terrorism?
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and Crime
	Human Smuggling
	Illegal immigration in which an agent is involved for payment to help a person cross a border clandestinely
	Human smuggling generally occurs with the consent of people being smuggled, who often pay for the service.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and Crime
	Trafficking in Persons (TIP)
	The exploitation of unwilling people through force, coercion, threat, or deception
	Can be compared to a modern-day form of slavery
	Some trafficking victims may believe they are being smuggled when they are really being trafficked.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and Crime
	Human Trafficking
	U.S. government officials estimate that 800,000 to 900,000 victims are trafficked globally each year.
	Women and children comprise the largest group of victims.
Figure 14-4, Profile of Worldwide Trafficking Victims
Text page 276
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
FIGURE 14-4   Profile of Worldwide Trafficking Victims.
Source: United Nations Office on Drugs and Crime (UNDOC), Global Report on Trafficking in Persons (New York: United Nations, 2009), p. 11. Copyright © 2009. Used by permission of United Nations Office on Drugs and Crime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and Crime
	Federal Immigration and Trafficking Legislation
	Recognizing human smuggling and TIP were serious social issues, Congress passed the Trafficking Victims Protection Act (TVPA) of 2000.
	Under the TVPA, trafficking does not require the crossing of an international border.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and Crime
	The Trafficking Victims Protection Reauthorization Act (TVPRA) of 2003 added new initiatives.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.3
Define terrorism, identify its major characteristics, and describe the different kinds of terrorist organizations.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Terrorism
	The U.S. Department of State defines terrorism as:
	Premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Terrorism
	Terrorism acts are criminal because they:
	Violate criminal law.
	Involve criminal activity.
	Produce criminal results.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Terrorism
	The primary distinction between violent criminal acts and acts of terrorism, however, has to do with the political motivation or social ideology of the offender.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Terrorism
	Terrorist organizations vary in their goals and can be categorized as follows:
	National Terrorists
	Religious Terrorists
	State-sponsored Terrorists
	Left-Wing Terrorists
	Right-Wing Terrorists
	Anarchist Terrorists
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Terrorism
	Two major types of terrorism:
	Domestic Terrorism
	International Terrorism
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Terrorism
	Domestic Terrorism
	Unlawful force or violence by a group or an individual who is based and operates entirely within the Untied States and its territories without foreign direction and whose acts are directed at elements of the U.S. government or population
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Terrorism
	International Terrorism
	Unlawful force or violence by a group or an individual who has a connection to a foreign power or whose activities transcend national boundaries against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.4
Describe the legislative policies that were created after the 9/11 attacks to prevent future incidents of terrorism.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 Legislation
	The War on Terror
	During the first few years after the 9/11 attacks, three important legislative initiatives resulted.
	The USA PATRIOT Act
	The Sarbanes-Oxley Act
	The Homeland Security Act
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 Legislation
	The USA PATRIOT Act
	A post-9/11 federal law designed to fight terrorism
	The name of the statute is an acronym for United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 Legislation
	The USA PATRIOT Act
	The USA PATRIOT Act led some to question whether the government threatened powers at the expense of individual rights and civil liberties.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 Legislation
	The Department of Homeland Security (DHS)
	A federal agency established by the Homeland Security Act of 2002 that is responsible for protecting America against acts of terrorism
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 Legislation
	Infrastructure
	The basic facilities, services, and installations needed for the functioning of a community or society, such as transportation and communication systems, water and power lines, and public institutions, including schools, post offices, and prisons
Definition from text glossary
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 Legislation
	Terrorism Commission and Reports
	The report of the 9/11 Commission said that the September 11, 2001 attacks should have come as no surprise because the U.S. government had received clear warnings that Islamic terrorists were planning to strike targets within the United States
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter Summary
	Comparative criminology is the study of crime on a cross national level.
	Globalization refers to the increasingly interconnectedness of people, ideas, and things on a worldwide scale.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter Summary
	Terrorism is the use of criminal acts of violence as a tactic for attaining political goals.
	The U.S. declared a worldwide war on international terrorism following the attacks of September 11, 2001.