SlideShare a Scribd company logo
1 of 33
H omeland
security and
cyber crime
Defining Homeland Security:

   A concerted national effort to prevent terrorist
    attacks within the United States, reduce America’s
    vulnerability to terrorism, and minimize the
    damage and recover from attacks that do occur.
Defining Terrorism:

   The unlawful use of force against persons or
    property to intimidate or coerce a government, the
    civilian population, or any segment thereof, in
    furtherance of political or social objectives.
   The Changing Global Context of Terrorism
   Osama bin Laden and Al Qaeda
   Domestic Terrorism
   Evolving Threat Patterns
    ◦ The Diffusion of Al Qaeda
    ◦ The Internationalization of Domestic Terrorism
   Questions:
    ◦ How has the War on Terrorism changed the criminal
      justice system in the United States?


    ◦ Is terrorism something you worry about on a regular or
      semi-regular basis? Does this worry alter your behavior?
   Identify three important trends in international
    terrorism.
       Trends identified by homeland security expert
        Brian Jenkins:
    •     Terrorists have developed more efficient means of
          managing their finances.
    •     Terrorists have developed more efficient models of
          organization.

    •     Terrorists have exploited new communication
          technology.
   Explain why the Antiterrorism and Effective Death
    Penalty Act of 1996 (AEDPA) is an important legal
    tool against terrorists.
The Antiterrorism and Effective Death
Penalty Act (AEDPA):
   Passed in 1995 in response to the OKC bombings
   Prohibits persons from providing material support
    to foreign terrorist organizations (FTOs)
The Patriot Act:
   Designed to “level the playing field.”
   Makes it easier for law enforcement to collect
    information about suspected terrorists and detain them.
   Enhances the ability of the government to keep non
    citizens suspected of terrorist activities out of the United
    States.
   Targets the fundraising activities of terrorist
    organizations.
The Patriot Act:
   Relaxes restrictions on information sharing between
    government agencies.
   Creates a crime of “knowingly harboring a terrorist.”
   Allows greater freedom in seizing email.
   Funds allow the tripling of border patrol agents, customs
    inspectors, and immigration agents.
   Non-citizens can be detained up to seven days without being
    informed of the charges against them.
   Eliminates the statute of limitations for terror-related offenses.
   Describe the primary goals of an intelligence
    agency and indicate how it differs from an agency
    that focuses solely on law enforcement.
   Intelligence agencies rely on the following
    strategies to collect information:
    ◦ Electronic surveillance
    ◦ Human-source collection
    ◦ Open-source collection
    ◦ Intelligence sharing
    ◦ Counterintelligence
Issues with the response to terrorism:

   Terror related investigations have strained local
    law enforcement resources and led to crime
    increases in some areas.

   Communication difficulties have led to
    dissatisfaction for many local agencies.
   Explain how American law enforcement agencies
    have used “preventive policing” to combat
    terrorism.
   Preventive Policing
    ◦ Prevent crimes before they occur

   The Criminal Justice model

   The Intelligence Model
    ◦ Local Intelligence
    ◦ The National Counterterrorism Center
   List the primary duties of first responders following
    a terrorist attack or other catastrophic event.
   Emergency Preparedness and Response
    ◦ Duties include:

      Securing the scene

      Rescuing and treating any injured civilians

      Containing and suppressing fires or other hazardous
       conditions

      Retrieving those who have been killed
   Border Security

    ◦ Regulated Ports of entry
      88 millions foreign visitors arrive through America’s more
       than 100 international airports, with millions more crossing
       the borders with Mexico and Canada.

    ◦ Unregulated Ports of Entry
      Millions of people illegally cross into the United States
       through the borders with Mexico and Canada each year.
   Explain how the Patriot Act has made it easier for
    federal agents to conduct searches during
    terrorism investigations.
   Terrorist Profiling
   Searches, Surveillance, and Security
    ◦ The Patriot Act and Searches
      Allows the FBI or other federal agencies to obtain warrants
       for “terrorism” investigations, “chemical weapons”
       investigations, or “computer fraud and abuse” investigations
       as long as agents can prove that such actions have a
       “significant purpose” – no proof of criminal activity is required
    ◦ The Patriot Act and Surveillance
 Due   Process and Indefinite Detention
 Military Justice
  • Enemy combatants tried by military tribunals rather than
    civilian courts
  • No right to trial by jury
 Changing Course
 Closing GTMO
 Accessing Criminal Courts
 Accessing Military Commissions
   Distinguish cyber crime from “traditional” crime.
   Cyber crime is a crime that occurs online as
    opposed to the physical world.
    ◦ Cyber Consumer Fraud
    ◦ Cyber Theft
    ◦ Identity Theft
    ◦ Phishing
    ◦ Cyber Aggression and the New Media
      Cyberstalking
      Cyberbullying
   Questions:

    ◦ Discuss the extent of identity theft?

    ◦ How can you prevent becoming a victim of identity theft?
   Describe the three following forms of malware: (a)
    botnets, (b) worms, and (c) viruses.
   Botnet – a network of computers that have been
    appropriated without the knowledge of their owners and
    used to spread harmful programs via the internet.
   Worm – a computer program that can automatically
    replicate itself over a network such as the internet and
    interfere with the normal use of a computer.
   Virus – a computer program that can replicate itself over a
    network such as the internet and interfere with the normal
    use of a computer; cannot exist as a separate entity and
    must attach itself to another program to move through a
    network
   Cyber Crimes in the Business World
    ◦ Hackers

    ◦ The Spread of Spam

    ◦ Pirating Intellectual Property Online
   Cyber Crimes Against the Community
   Fighting Cyber Crime
    ◦ Challenges for Law Enforcement
      Cyber Forensics

      Jurisdictional Challenges

    ◦ Federal Law Enforcement and Cyber Crime

    ◦ Private Efforts to Combat Cyber Crime

More Related Content

What's hot

White7e ppt ch17
White7e ppt ch17White7e ppt ch17
White7e ppt ch17difordham
 
Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)CSNP
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
 
Rachels Law Abmpegasus
Rachels Law AbmpegasusRachels Law Abmpegasus
Rachels Law AbmpegasusDawnStarling
 
The Great Firewall of China
The Great Firewall of ChinaThe Great Firewall of China
The Great Firewall of Chinaguest00df536
 
Stop Enabling Sex Traffickers Act of 2017
Stop Enabling Sex Traffickers Act of 2017Stop Enabling Sex Traffickers Act of 2017
Stop Enabling Sex Traffickers Act of 2017Internet Law Center
 
051409 doj holder statementbeforehor
051409   doj holder statementbeforehor051409   doj holder statementbeforehor
051409 doj holder statementbeforehorVogelDenise
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
Anti Money Laundering's regulation: current aspects and future forecasts
Anti Money Laundering's regulation: current aspects and future forecastsAnti Money Laundering's regulation: current aspects and future forecasts
Anti Money Laundering's regulation: current aspects and future forecastsclaudiotarulli3
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crimerharrisonaz
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international lawblogzilla
 
Countering the Financing of Terrorism-Law and Policy Conference
Countering the Financing of Terrorism-Law and Policy ConferenceCountering the Financing of Terrorism-Law and Policy Conference
Countering the Financing of Terrorism-Law and Policy ConferenceChicagoKent565
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacyblogzilla
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 

What's hot (20)

White7e ppt ch17
White7e ppt ch17White7e ppt ch17
White7e ppt ch17
 
Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
File000155
File000155File000155
File000155
 
File000159
File000159File000159
File000159
 
Riot
RiotRiot
Riot
 
Rachels Law Abmpegasus
Rachels Law AbmpegasusRachels Law Abmpegasus
Rachels Law Abmpegasus
 
The Great Firewall of China
The Great Firewall of ChinaThe Great Firewall of China
The Great Firewall of China
 
Stop Enabling Sex Traffickers Act of 2017
Stop Enabling Sex Traffickers Act of 2017Stop Enabling Sex Traffickers Act of 2017
Stop Enabling Sex Traffickers Act of 2017
 
051409 doj holder statementbeforehor
051409   doj holder statementbeforehor051409   doj holder statementbeforehor
051409 doj holder statementbeforehor
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Anti Money Laundering's regulation: current aspects and future forecasts
Anti Money Laundering's regulation: current aspects and future forecastsAnti Money Laundering's regulation: current aspects and future forecasts
Anti Money Laundering's regulation: current aspects and future forecasts
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international law
 
Countering the Financing of Terrorism-Law and Policy Conference
Countering the Financing of Terrorism-Law and Policy ConferenceCountering the Financing of Terrorism-Law and Policy Conference
Countering the Financing of Terrorism-Law and Policy Conference
 
File000165
File000165File000165
File000165
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 

Viewers also liked

Capstone Capability Briefing
Capstone Capability BriefingCapstone Capability Briefing
Capstone Capability Briefingdgmcmillian
 
BIFM North "Counter Terrorism" Seminar
BIFM North "Counter Terrorism" SeminarBIFM North "Counter Terrorism" Seminar
BIFM North "Counter Terrorism" SeminarWhitbags
 
Antiterrorism Point of Instruction
Antiterrorism Point of InstructionAntiterrorism Point of Instruction
Antiterrorism Point of InstructionCaleb Lin, MBA
 
Terrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorismTerrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorismAnthony Veluz
 
"Terrorism Modeling & Risk Management" - Presented at the RAA's Cat Modeling ...
"Terrorism Modeling & Risk Management" - Presented at the RAA's Cat Modeling ..."Terrorism Modeling & Risk Management" - Presented at the RAA's Cat Modeling ...
"Terrorism Modeling & Risk Management" - Presented at the RAA's Cat Modeling ...RMS
 
MASTER THESIS PRESENTATION - THE ECONOMIC CONSEQUENCES OF TERRORISM - Thibaut...
MASTER THESIS PRESENTATION - THE ECONOMIC CONSEQUENCES OF TERRORISM - Thibaut...MASTER THESIS PRESENTATION - THE ECONOMIC CONSEQUENCES OF TERRORISM - Thibaut...
MASTER THESIS PRESENTATION - THE ECONOMIC CONSEQUENCES OF TERRORISM - Thibaut...Thibaut GRANCHER
 
Anti terrorism brief_
Anti terrorism brief_Anti terrorism brief_
Anti terrorism brief_zaffar abbasi
 
Week 3: Responses to terrorism
Week 3: Responses to terrorismWeek 3: Responses to terrorism
Week 3: Responses to terrorismkamila_fraser
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 
Terrorism presentation
Terrorism presentationTerrorism presentation
Terrorism presentationKamala Imanova
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and TypesShaan Yaduvanshi
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsSrun Sakada
 

Viewers also liked (15)

Capstone Capability Briefing
Capstone Capability BriefingCapstone Capability Briefing
Capstone Capability Briefing
 
BIFM North "Counter Terrorism" Seminar
BIFM North "Counter Terrorism" SeminarBIFM North "Counter Terrorism" Seminar
BIFM North "Counter Terrorism" Seminar
 
Antiterrorism Point of Instruction
Antiterrorism Point of InstructionAntiterrorism Point of Instruction
Antiterrorism Point of Instruction
 
Terrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorismTerrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorism
 
"Terrorism Modeling & Risk Management" - Presented at the RAA's Cat Modeling ...
"Terrorism Modeling & Risk Management" - Presented at the RAA's Cat Modeling ..."Terrorism Modeling & Risk Management" - Presented at the RAA's Cat Modeling ...
"Terrorism Modeling & Risk Management" - Presented at the RAA's Cat Modeling ...
 
MASTER THESIS PRESENTATION - THE ECONOMIC CONSEQUENCES OF TERRORISM - Thibaut...
MASTER THESIS PRESENTATION - THE ECONOMIC CONSEQUENCES OF TERRORISM - Thibaut...MASTER THESIS PRESENTATION - THE ECONOMIC CONSEQUENCES OF TERRORISM - Thibaut...
MASTER THESIS PRESENTATION - THE ECONOMIC CONSEQUENCES OF TERRORISM - Thibaut...
 
Anti terrorism brief_
Anti terrorism brief_Anti terrorism brief_
Anti terrorism brief_
 
Week 3: Responses to terrorism
Week 3: Responses to terrorismWeek 3: Responses to terrorism
Week 3: Responses to terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Terrorism presentation
Terrorism presentationTerrorism presentation
Terrorism presentation
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
Terrorism-what,why,where,how
Terrorism-what,why,where,howTerrorism-what,why,where,how
Terrorism-what,why,where,how
 
Introduction to strategic management
Introduction to strategic managementIntroduction to strategic management
Introduction to strategic management
 

Similar to Chapter14

Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Chapter 16
Chapter 16Chapter 16
Chapter 16glickauf
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityTracy Clark
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptxRoleenPearlPanal
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearNIST, berhampur
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01lbadeniji
 
Transnational organized crime
Transnational organized crimeTransnational organized crime
Transnational organized crimeAndrew Novak
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
The patriot act
The patriot actThe patriot act
The patriot actpalita Px
 
263presentation
263presentation263presentation
263presentationeminaker
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 

Similar to Chapter14 (20)

Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptx
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Crime And Prevention Trends 2006
Crime And Prevention Trends 2006Crime And Prevention Trends 2006
Crime And Prevention Trends 2006
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
 
Transnational organized crime
Transnational organized crimeTransnational organized crime
Transnational organized crime
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
The patriot act
The patriot actThe patriot act
The patriot act
 
263presentation
263presentation263presentation
263presentation
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 

More from SUNY Ulster

2020 microbiology viruses final
2020 microbiology viruses final2020 microbiology viruses final
2020 microbiology viruses finalSUNY Ulster
 
Anesthetic equipment
Anesthetic equipmentAnesthetic equipment
Anesthetic equipmentSUNY Ulster
 
Canine and feline anesthesia
Canine and feline anesthesiaCanine and feline anesthesia
Canine and feline anesthesiaSUNY Ulster
 
Anesthetic agents and adjuncts
Anesthetic agents and adjunctsAnesthetic agents and adjuncts
Anesthetic agents and adjunctsSUNY Ulster
 
Veterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy managementVeterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy managementSUNY Ulster
 
Patient preparation
Patient preparationPatient preparation
Patient preparationSUNY Ulster
 
Introduction to Anesthesia
Introduction to AnesthesiaIntroduction to Anesthesia
Introduction to AnesthesiaSUNY Ulster
 
Session 8 renal cancer cds
Session 8 renal cancer cds Session 8 renal cancer cds
Session 8 renal cancer cds SUNY Ulster
 
Session 7 gi lutd liver spring
Session 7 gi lutd liver spring Session 7 gi lutd liver spring
Session 7 gi lutd liver spring SUNY Ulster
 
Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9 Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9 SUNY Ulster
 
Session 5 therapeutic nutrition obesity diabetes
Session 5  therapeutic nutrition obesity diabetes Session 5  therapeutic nutrition obesity diabetes
Session 5 therapeutic nutrition obesity diabetes SUNY Ulster
 
Session 2 basic nutrients
Session 2 basic nutrientsSession 2 basic nutrients
Session 2 basic nutrientsSUNY Ulster
 
Nutrition for patients with cardiac disease
Nutrition for patients with cardiac diseaseNutrition for patients with cardiac disease
Nutrition for patients with cardiac diseaseSUNY Ulster
 
Small animal nutrition dogs and cats
Small animal nutrition dogs and catsSmall animal nutrition dogs and cats
Small animal nutrition dogs and catsSUNY Ulster
 
Veterinary Instruments
Veterinary InstrumentsVeterinary Instruments
Veterinary InstrumentsSUNY Ulster
 
Session 1 intro and digestive systems 2018(1)
Session 1  intro and digestive systems 2018(1)Session 1  intro and digestive systems 2018(1)
Session 1 intro and digestive systems 2018(1)SUNY Ulster
 
213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014SUNY Ulster
 
"Refashioned" Art212
"Refashioned" Art212"Refashioned" Art212
"Refashioned" Art212SUNY Ulster
 

More from SUNY Ulster (20)

2020 microbiology viruses final
2020 microbiology viruses final2020 microbiology viruses final
2020 microbiology viruses final
 
Analgesia
AnalgesiaAnalgesia
Analgesia
 
Anesthetic equipment
Anesthetic equipmentAnesthetic equipment
Anesthetic equipment
 
Canine and feline anesthesia
Canine and feline anesthesiaCanine and feline anesthesia
Canine and feline anesthesia
 
Anesthetic agents and adjuncts
Anesthetic agents and adjunctsAnesthetic agents and adjuncts
Anesthetic agents and adjuncts
 
Veterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy managementVeterinary drug use, prescribing, acquisition and pharmacy management
Veterinary drug use, prescribing, acquisition and pharmacy management
 
Patient preparation
Patient preparationPatient preparation
Patient preparation
 
Introduction to Anesthesia
Introduction to AnesthesiaIntroduction to Anesthesia
Introduction to Anesthesia
 
Session 8 renal cancer cds
Session 8 renal cancer cds Session 8 renal cancer cds
Session 8 renal cancer cds
 
Session 7 gi lutd liver spring
Session 7 gi lutd liver spring Session 7 gi lutd liver spring
Session 7 gi lutd liver spring
 
Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9 Session 6 therapy adv rxns recovery k9
Session 6 therapy adv rxns recovery k9
 
Session 5 therapeutic nutrition obesity diabetes
Session 5  therapeutic nutrition obesity diabetes Session 5  therapeutic nutrition obesity diabetes
Session 5 therapeutic nutrition obesity diabetes
 
Session 2 basic nutrients
Session 2 basic nutrientsSession 2 basic nutrients
Session 2 basic nutrients
 
Nutrition for patients with cardiac disease
Nutrition for patients with cardiac diseaseNutrition for patients with cardiac disease
Nutrition for patients with cardiac disease
 
Small animal nutrition dogs and cats
Small animal nutrition dogs and catsSmall animal nutrition dogs and cats
Small animal nutrition dogs and cats
 
Veterinary Instruments
Veterinary InstrumentsVeterinary Instruments
Veterinary Instruments
 
Sutures
SuturesSutures
Sutures
 
Session 1 intro and digestive systems 2018(1)
Session 1  intro and digestive systems 2018(1)Session 1  intro and digestive systems 2018(1)
Session 1 intro and digestive systems 2018(1)
 
213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014213 suny lecture 01 intro, etruscans, myths fall 2014
213 suny lecture 01 intro, etruscans, myths fall 2014
 
"Refashioned" Art212
"Refashioned" Art212"Refashioned" Art212
"Refashioned" Art212
 

Chapter14

  • 2. Defining Homeland Security:  A concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.
  • 3. Defining Terrorism:  The unlawful use of force against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.
  • 4.
  • 5. The Changing Global Context of Terrorism  Osama bin Laden and Al Qaeda  Domestic Terrorism  Evolving Threat Patterns ◦ The Diffusion of Al Qaeda ◦ The Internationalization of Domestic Terrorism
  • 6.
  • 7. Questions: ◦ How has the War on Terrorism changed the criminal justice system in the United States? ◦ Is terrorism something you worry about on a regular or semi-regular basis? Does this worry alter your behavior?
  • 8. Identify three important trends in international terrorism.
  • 9. Trends identified by homeland security expert Brian Jenkins: • Terrorists have developed more efficient means of managing their finances. • Terrorists have developed more efficient models of organization. • Terrorists have exploited new communication technology.
  • 10. Explain why the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA) is an important legal tool against terrorists.
  • 11. The Antiterrorism and Effective Death Penalty Act (AEDPA):  Passed in 1995 in response to the OKC bombings  Prohibits persons from providing material support to foreign terrorist organizations (FTOs)
  • 12. The Patriot Act:  Designed to “level the playing field.”  Makes it easier for law enforcement to collect information about suspected terrorists and detain them.  Enhances the ability of the government to keep non citizens suspected of terrorist activities out of the United States.  Targets the fundraising activities of terrorist organizations.
  • 13. The Patriot Act:  Relaxes restrictions on information sharing between government agencies.  Creates a crime of “knowingly harboring a terrorist.”  Allows greater freedom in seizing email.  Funds allow the tripling of border patrol agents, customs inspectors, and immigration agents.  Non-citizens can be detained up to seven days without being informed of the charges against them.  Eliminates the statute of limitations for terror-related offenses.
  • 14. Describe the primary goals of an intelligence agency and indicate how it differs from an agency that focuses solely on law enforcement.
  • 15. Intelligence agencies rely on the following strategies to collect information: ◦ Electronic surveillance ◦ Human-source collection ◦ Open-source collection ◦ Intelligence sharing ◦ Counterintelligence
  • 16. Issues with the response to terrorism:  Terror related investigations have strained local law enforcement resources and led to crime increases in some areas.  Communication difficulties have led to dissatisfaction for many local agencies.
  • 17. Explain how American law enforcement agencies have used “preventive policing” to combat terrorism.
  • 18. Preventive Policing ◦ Prevent crimes before they occur  The Criminal Justice model  The Intelligence Model ◦ Local Intelligence ◦ The National Counterterrorism Center
  • 19. List the primary duties of first responders following a terrorist attack or other catastrophic event.
  • 20. Emergency Preparedness and Response ◦ Duties include:  Securing the scene  Rescuing and treating any injured civilians  Containing and suppressing fires or other hazardous conditions  Retrieving those who have been killed
  • 21. Border Security ◦ Regulated Ports of entry  88 millions foreign visitors arrive through America’s more than 100 international airports, with millions more crossing the borders with Mexico and Canada. ◦ Unregulated Ports of Entry  Millions of people illegally cross into the United States through the borders with Mexico and Canada each year.
  • 22. Explain how the Patriot Act has made it easier for federal agents to conduct searches during terrorism investigations.
  • 23. Terrorist Profiling  Searches, Surveillance, and Security ◦ The Patriot Act and Searches  Allows the FBI or other federal agencies to obtain warrants for “terrorism” investigations, “chemical weapons” investigations, or “computer fraud and abuse” investigations as long as agents can prove that such actions have a “significant purpose” – no proof of criminal activity is required ◦ The Patriot Act and Surveillance
  • 24.  Due Process and Indefinite Detention Military Justice • Enemy combatants tried by military tribunals rather than civilian courts • No right to trial by jury Changing Course Closing GTMO Accessing Criminal Courts Accessing Military Commissions
  • 25. Distinguish cyber crime from “traditional” crime.
  • 26.
  • 27. Cyber crime is a crime that occurs online as opposed to the physical world. ◦ Cyber Consumer Fraud ◦ Cyber Theft ◦ Identity Theft ◦ Phishing ◦ Cyber Aggression and the New Media  Cyberstalking  Cyberbullying
  • 28.
  • 29. Questions: ◦ Discuss the extent of identity theft? ◦ How can you prevent becoming a victim of identity theft?
  • 30. Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses.
  • 31. Botnet – a network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the internet.  Worm – a computer program that can automatically replicate itself over a network such as the internet and interfere with the normal use of a computer.  Virus – a computer program that can replicate itself over a network such as the internet and interfere with the normal use of a computer; cannot exist as a separate entity and must attach itself to another program to move through a network
  • 32. Cyber Crimes in the Business World ◦ Hackers ◦ The Spread of Spam ◦ Pirating Intellectual Property Online
  • 33. Cyber Crimes Against the Community  Fighting Cyber Crime ◦ Challenges for Law Enforcement  Cyber Forensics  Jurisdictional Challenges ◦ Federal Law Enforcement and Cyber Crime ◦ Private Efforts to Combat Cyber Crime