Weitere ähnliche Inhalte Ähnlich wie CriminologyCHAPTERCopyright © 2016, 2014, 2011 by Pearso.docx (10) Mehr von vanesaburnand (20) Kürzlich hochgeladen (20) CriminologyCHAPTERCopyright © 2016, 2014, 2011 by Pearso.docx1. Criminology
CHAPTER
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
THIRD EDITION
Globalization and Terrorism—Our Small World
14
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter ObjectivesDefine comparative criminology and explain
what it can tell us about crime worldwide.Explain globalization
and show how it is making it more difficult to combat crime
around the world.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter ObjectivesDefine terrorism, identify its major
characteristics, and describe the different kinds of terrorist
2. organizations.Describe the legislative policies that were created
after the 9/11 attacks to prevent further incidents of terrorism.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.1
Define comparative criminology and explain what it can tell us
about crime worldwide.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative CriminologyThe cross-national study of
crimeWhen crime patterns in one country are compared with
those in another countryA criminologist involved in the cross-
national study of crime
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative CriminologyEthnocentrismThe phenomenon of
"culture centeredness" by which one uses one's own culture as a
benchmark against which to judge all other patterns of behavior
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
3. All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative CriminologyThe crime rates of different countries
are difficult to compare because of:Differences in the way crime
is defined.Diverse crime-reporting practices.Political, social,
economic, and other influences on the reporting of statistics to
international agencies.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative CriminologyIssues in ReportingFor cross-national
comparisons of crime data to be meaningful, they must share
conceptual similarities.Unfortunately, this is not always the
case.Crime statistics reflect social and political contexts.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.2
Explain globalization and show how it is making it more
difficult to combat crime around the world.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
4. Globalization and CrimeGlobalizationA process of social
homogenization by which the experiences of everyday life,
marked by the diffusion of commodities and ideas, can foster a
standardization of cultural expressions around the world.
Photo from text page 274
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
What are the positive and negative effects of globalization?
How does globalization impact crime in the United States? How
does it affect terrorism?
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and CrimeHuman SmugglingIllegal immigration
in which an agent is involved for payment to help a person cross
a border clandestinelyHuman smuggling generally occurs with
the consent of people being smuggled, who often pay for the
service.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
5. Frank Schmalleger
Globalization and CrimeTrafficking in Persons (TIP)The
exploitation of unwilling people through force, coercion, threat,
or deceptionCan be compared to a modern-day form of
slaverySome trafficking victims may believe they are being
smuggled when they are really being trafficked.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and CrimeHuman TraffickingU.S. government
officials estimate that 800,000 to 900,000 victims are trafficked
globally each year.Women and children comprise the largest
group of victims.
Figure 14-4, Profile of Worldwide Trafficking Victims
Text page 276
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
FIGURE 14-4 Profile of Worldwide Trafficking Victims.
Source: United Nations Office on Drugs and Crime (UNDOC),
Global Report on Trafficking in Persons (New York: United
Nations, 2009), p. 11. Copyright © 2009. Used by permission of
United Nations Office on Drugs and Crime.
6. Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and CrimeFederal Immigration and Trafficking
LegislationRecognizing human smuggling and TIP were serious
social issues, Congress passed the Trafficking Victims
Protection Act (TVPA) of 2000.Under the TVPA, trafficking
does not require the crossing of an international border.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and CrimeThe Trafficking Victims Protection
Reauthorization Act (TVPRA) of 2003 added new initiatives.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.3
Define terrorism, identify its major characteristics, and describe
the different kinds of terrorist organizations.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
7. Frank Schmalleger
TerrorismThe U.S. Department of State defines terrorism
as:Premeditated, politically motivated violence perpetrated
against noncombatant targets by subnational groups or
clandestine agents, usually intended to influence an audience.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismTerrorism acts are criminal because they:Violate
criminal law.Involve criminal activity.Produce criminal results.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismThe primary distinction between violent criminal acts
and acts of terrorism, however, has to do with the political
motivation or social ideology of the offender.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismTerrorist organizations vary in their goals and can be
categorized as follows:National TerroristsReligious
TerroristsState-sponsored TerroristsLeft-Wing TerroristsRight-
Wing TerroristsAnarchist Terrorists
8. Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismTwo major types of terrorism:Domestic
TerrorismInternational Terrorism
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismDomestic TerrorismUnlawful force or violence by a
group or an individual who is based and operates entirely within
the Untied States and its territories without foreign direction
and whose acts are directed at elements of the U.S. government
or population
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismInternational TerrorismUnlawful force or violence by
a group or an individual who has a connection to a foreign
power or whose activities transcend national boundaries against
persons or property to intimidate or coerce a government, the
civilian population, or any segment thereof, in furtherance of
political or social objectives
9. Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.4
Describe the legislative policies that were created after the 9/11
attacks to prevent future incidents of terrorism.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationThe War on TerrorDuring the first few
years after the 9/11 attacks, three important legislative
initiatives resulted.The USA PATRIOT ActThe Sarbanes-Oxley
ActThe Homeland Security Act
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationThe USA PATRIOT ActA post-9/11
federal law designed to fight terrorismThe name of the statute is
an acronym for United and Strengthening America by Providing
Appropriate Tools Required to Intercept and Obstruct
Terrorism.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
10. Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationThe USA PATRIOT ActThe USA
PATRIOT Act led some to question whether the government
threatened powers at the expense of individual rights and civil
liberties.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationThe Department of Homeland Security
(DHS)A federal agency established by the Homeland Security
Act of 2002 that is responsible for protecting America against
acts of terrorism
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationInfrastructureThe basic facilities, services,
and installations needed for the functioning of a community or
society, such as transportation and communication systems,
water and power lines, and public institutions, including
schools, post offices, and prisons
Definition from text glossary
*
11. Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationTerrorism Commission and ReportsThe
report of the 9/11 Commission said that the September 11, 2001
attacks should have come as no surprise because the U.S.
government had received clear warnings that Islamic terrorists
were planning to strike targets within the United States
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter SummaryComparative criminology is the study of crime
on a cross national level.Globalization refers to the increasingly
interconnectedness of people, ideas, and things on a worldwide
scale.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter SummaryTerrorism is the use of criminal acts of
violence as a tactic for attaining political goals.The U.S.
declared a worldwide war on international terrorism following
the attacks of September 11, 2001.
12. Criminology
CHAPTER
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
THIRD EDITION
Technology and Crime—It's a Double-Edged Sword
13
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter ObjectivesExplain cybercrime and describe how it is
committed.Describe the extent and forms of
cybercrime.Describe the legislation that has been enacted in an
effort to curb cybercrime.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter ObjectivesDescribe the typical profile of computer
criminals.Explain how technology arms criminals with new
methods of crime commission while simultaneously providing
criminal justice personnel with the tools to combat crime.
continued on next slide
13. Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter ObjectivesSummarize the steps being taken to combat
computer crime.Identify freedom-of-speech issues that modern
technology has introduced.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.1
Explain cybercrime and describe how it is committed.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
CybercrimeThe 21st century has been termed the postindustrial
information age.Criminal perpetrators have been able to take
advantage of this age.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
CybercrimeHackerA person who uses computers for exploration
14. and exploitationCybercrimeAny violation of a federal or state
computer-crime statute
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
CybercrimeFive Types of CybercrimeInternal
cybercrimesInternet and telecommunication crimesSupport of
criminal enterprisesComputer-manipulationHardware, software,
and information theft
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.2
Describe the extent and forms of cybercrime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Extent and Forms of CybercrimeThe Extent of CybercrimeThe
annual cost of cybercrime in the United States at around $666
million.Computer crime cost most companies an average of less
than $100,000.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
15. All Rights Reserved
Criminology, 3e
Frank Schmalleger
Extent and Forms of CybercrimeSoftware PiracyThe
unauthorized and illegal copying of softwarePhishingAn
internet-based scam used to steal valuable information such as
credit card numbers, Social Security numbers, user IDs, and
passwords
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Extent and Forms of CybercrimeComputer VirusA computer
program that is designed to secretly invade computer systems to
modify the way in which they operate or alter the information
they store
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.3
Describe the legislation that has been enacted in an effort to
curb cybercrime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
16. Anti-Cybercrime LegislationCommunications Decency Act
(CDA) of 1996The law sought to protect minors from harmful
material on the Internet.A portion of the CDA criminalized the
knowing transmission of obscene or indecent messages to any
recipient under 18 years of age.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationReno v. ACLU (1997)Found much
of the CDA to be unconstitutional, ruling it contradicts the First
Amendment free speech guarantees
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationNo Electronic Theft Act (1997)A
federal law that criminalizes the willful infringement of
copyrighted works, including by electronic means, even when
the infringing party derives no direct financial benefit from the
infringement
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationDigital Theft Deterrence and
17. Copyright Damages Improvement Act (1999)A federal law that
attempted to combat software piracy by increasing the amount
of damages that could be awarded in case of copyright
infringement
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationCyber Security Enhancement Act
(2002)Part of the Homeland Security Act of 2002Directed the
U.S. Sentencing Commission to take several factors into
account in creating new sentencing guidelines for computer
criminals
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationComputer-Related CrimeAny
illegal act for which knowledge of computer technology is
involved for its investigation, perpetration, or prosecution
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationComputer AbuseAn unlawful
incident associated with computer technology in which a victim
suffered or could have suffered loss and/or a perpetrator by
18. intention made or could have made a gain
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.4
Describe the typical profile of computer criminals.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Typical Profile of Computer CriminalsA Profile of Computer
CriminalsMaleBetween 16–25 years of ageLives in the United
StatesComputer user, not programmerHacks with software
written by othersPrimary motivation is to gain access to
websites and networks, not profit financially
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Typical Profile of Computer CriminalsThe History and Nature
of HackingEarly hacking involved the interstate phone
system.Phone phreakPerson who uses special
telecommunications access codes and other restricted technical
information to avoid charges or disrupt services.
19. Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.5
Explain how technology arms criminals with new methods of
crime commission while simultaneously providing criminal
justice personnel with the tools to combat crime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Technology as a Tool for Criminals
and Criminal Justice PersonnelTechnology in the Fight Against
CrimeTechnology is a double-edged sword.On one hand, it arms
potential criminals with potent new weapons of crime
commission.On the other hand, it provides criminal justice
personnel with powerful tools useful in the battle against crime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Technology as a Tool for Criminals
and Criminal Justice PersonnelDNA TechnologyThe use of
biological residue found at the scene of a crime for genetic
comparisons in aiding the identification of criminal suspects
20. Definition from glossary.
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Technology as a Tool for Criminals
and Criminal Justice PersonnelComputers as Crime-Fighting
ToolsExpert SystemsComputer hardware and software that
attempt to duplicate the decision-making processes used by
skilled investigators in the analysis of evidence, and in the
recognition of patterns that such evidence might represent
Definition from glossary
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.6
Summarize the steps being taken to combat computer crime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
21. Combating Computer CrimeData EncryptionThe process by
which information is encoded, making it unreadable to all but
its intended recipientsThreat AnalysisA complete and thorough
assessment of the potential disasters facing an organization
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Combating Computer CrimeAudit TrailA sequential record of
system activities that enables auditors to reconstruct, review,
and examine the sequence of states and activities surrounding
each event in one or more related transactions from inception to
output of final results back to inception
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Combating Computer CrimeDCS-1000An FBI-developed
network diagnostic tool intended to assist in criminal
investigations by monitoring and capturing large amounts of
Internet traffic
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.7
22. Identify freedom-of-speech issues that modern technology has
introduced.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Freedom of SpeechThe continued development of
telecommunications resources has led not only to concerns
about security and data integrity, but also to an expanding
interest in privacy, free speech, and personal freedoms.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Freedom of SpeechFirst and Fourth Amendments to the U.S.
ConstitutionGuarantee each person freedom of speech and
security in his or her "persons, houses, papers, and effects,
against unreasonable searches and seizures”
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Freedom of SpeechElectronic Frontier Foundation (EFF)A non-
profit organization founded in July 1990 to ensure the principles
embodies in the Constitution and Bill of Rights are protected as
new communications technologies emerge
23. Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter SummaryCybercrime is a violation of any federal or
state computer-crime statute.The sophistication of
cybercriminals makes it difficult to quantify losses.New laws
have been developed at both state and federal levels to
prosecute unauthorized computer access.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter SummaryThe typical computer hacker is a 25-year old
white American male.Technology is a double-edged sword. It
arms potential criminals with potent new weapons of crime
commission. It also provides criminal justice personnel with
tools useful in the battle against crime.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter SummaryEffective programs to fight cybercrime must
use threat analysis.Efforts to control high-tech crime through
criminal investigation and prosecution impact issues of
individual rights.
24. Unit VIII Case Study
Log into the myCSU Student Portal, and navigate to the
Criminal Justice database within the CSU Online Library in
order to access the resource below: Glassberg, J. (2015). The
ransomware threat. Law Enforcement Technology, 42(9), 33-35.
Then, write a case study that answers the following questions:
· What was the problem? What were the effects of the problem?
· What is the profile of the hacker?
· What can be done to protect against the threat?
· What should be done if a computer is infected with
ransomware?
· What type(s) of cybercrime was/were involved in this article?
Does the identified offender fit the characteristics for this type
of cybercrime?
Your assignment should be a minimum of two pages in length,
not counting the title and reference pages, and you should use
APA formatting. In addition, any references used should be
properly cited.