SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Criminology
CHAPTER
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
THIRD EDITION
Globalization and Terrorism—Our Small World
14
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter ObjectivesDefine comparative criminology and explain
what it can tell us about crime worldwide.Explain globalization
and show how it is making it more difficult to combat crime
around the world.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter ObjectivesDefine terrorism, identify its major
characteristics, and describe the different kinds of terrorist
organizations.Describe the legislative policies that were created
after the 9/11 attacks to prevent further incidents of terrorism.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.1
Define comparative criminology and explain what it can tell us
about crime worldwide.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative CriminologyThe cross-national study of
crimeWhen crime patterns in one country are compared with
those in another countryA criminologist involved in the cross-
national study of crime
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative CriminologyEthnocentrismThe phenomenon of
"culture centeredness" by which one uses one's own culture as a
benchmark against which to judge all other patterns of behavior
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative CriminologyThe crime rates of different countries
are difficult to compare because of:Differences in the way crime
is defined.Diverse crime-reporting practices.Political, social,
economic, and other influences on the reporting of statistics to
international agencies.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Comparative CriminologyIssues in ReportingFor cross-national
comparisons of crime data to be meaningful, they must share
conceptual similarities.Unfortunately, this is not always the
case.Crime statistics reflect social and political contexts.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.2
Explain globalization and show how it is making it more
difficult to combat crime around the world.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and CrimeGlobalizationA process of social
homogenization by which the experiences of everyday life,
marked by the diffusion of commodities and ideas, can foster a
standardization of cultural expressions around the world.
Photo from text page 274
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
What are the positive and negative effects of globalization?
How does globalization impact crime in the United States? How
does it affect terrorism?
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and CrimeHuman SmugglingIllegal immigration
in which an agent is involved for payment to help a person cross
a border clandestinelyHuman smuggling generally occurs with
the consent of people being smuggled, who often pay for the
service.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and CrimeTrafficking in Persons (TIP)The
exploitation of unwilling people through force, coercion, threat,
or deceptionCan be compared to a modern-day form of
slaverySome trafficking victims may believe they are being
smuggled when they are really being trafficked.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and CrimeHuman TraffickingU.S. government
officials estimate that 800,000 to 900,000 victims are trafficked
globally each year.Women and children comprise the largest
group of victims.
Figure 14-4, Profile of Worldwide Trafficking Victims
Text page 276
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
FIGURE 14-4 Profile of Worldwide Trafficking Victims.
Source: United Nations Office on Drugs and Crime (UNDOC),
Global Report on Trafficking in Persons (New York: United
Nations, 2009), p. 11. Copyright © 2009. Used by permission of
United Nations Office on Drugs and Crime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and CrimeFederal Immigration and Trafficking
LegislationRecognizing human smuggling and TIP were serious
social issues, Congress passed the Trafficking Victims
Protection Act (TVPA) of 2000.Under the TVPA, trafficking
does not require the crossing of an international border.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Globalization and CrimeThe Trafficking Victims Protection
Reauthorization Act (TVPRA) of 2003 added new initiatives.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.3
Define terrorism, identify its major characteristics, and describe
the different kinds of terrorist organizations.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismThe U.S. Department of State defines terrorism
as:Premeditated, politically motivated violence perpetrated
against noncombatant targets by subnational groups or
clandestine agents, usually intended to influence an audience.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismTerrorism acts are criminal because they:Violate
criminal law.Involve criminal activity.Produce criminal results.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismThe primary distinction between violent criminal acts
and acts of terrorism, however, has to do with the political
motivation or social ideology of the offender.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismTerrorist organizations vary in their goals and can be
categorized as follows:National TerroristsReligious
TerroristsState-sponsored TerroristsLeft-Wing TerroristsRight-
Wing TerroristsAnarchist Terrorists
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismTwo major types of terrorism:Domestic
TerrorismInternational Terrorism
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismDomestic TerrorismUnlawful force or violence by a
group or an individual who is based and operates entirely within
the Untied States and its territories without foreign direction
and whose acts are directed at elements of the U.S. government
or population
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
TerrorismInternational TerrorismUnlawful force or violence by
a group or an individual who has a connection to a foreign
power or whose activities transcend national boundaries against
persons or property to intimidate or coerce a government, the
civilian population, or any segment thereof, in furtherance of
political or social objectives
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 14.4
Describe the legislative policies that were created after the 9/11
attacks to prevent future incidents of terrorism.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationThe War on TerrorDuring the first few
years after the 9/11 attacks, three important legislative
initiatives resulted.The USA PATRIOT ActThe Sarbanes-Oxley
ActThe Homeland Security Act
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationThe USA PATRIOT ActA post-9/11
federal law designed to fight terrorismThe name of the statute is
an acronym for United and Strengthening America by Providing
Appropriate Tools Required to Intercept and Obstruct
Terrorism.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationThe USA PATRIOT ActThe USA
PATRIOT Act led some to question whether the government
threatened powers at the expense of individual rights and civil
liberties.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationThe Department of Homeland Security
(DHS)A federal agency established by the Homeland Security
Act of 2002 that is responsible for protecting America against
acts of terrorism
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationInfrastructureThe basic facilities, services,
and installations needed for the functioning of a community or
society, such as transportation and communication systems,
water and power lines, and public institutions, including
schools, post offices, and prisons
Definition from text glossary
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Post-9/11 LegislationTerrorism Commission and ReportsThe
report of the 9/11 Commission said that the September 11, 2001
attacks should have come as no surprise because the U.S.
government had received clear warnings that Islamic terrorists
were planning to strike targets within the United States
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter SummaryComparative criminology is the study of crime
on a cross national level.Globalization refers to the increasingly
interconnectedness of people, ideas, and things on a worldwide
scale.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter SummaryTerrorism is the use of criminal acts of
violence as a tactic for attaining political goals.The U.S.
declared a worldwide war on international terrorism following
the attacks of September 11, 2001.
Criminology
CHAPTER
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
THIRD EDITION
Technology and Crime—It's a Double-Edged Sword
13
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter ObjectivesExplain cybercrime and describe how it is
committed.Describe the extent and forms of
cybercrime.Describe the legislation that has been enacted in an
effort to curb cybercrime.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter ObjectivesDescribe the typical profile of computer
criminals.Explain how technology arms criminals with new
methods of crime commission while simultaneously providing
criminal justice personnel with the tools to combat crime.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter ObjectivesSummarize the steps being taken to combat
computer crime.Identify freedom-of-speech issues that modern
technology has introduced.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.1
Explain cybercrime and describe how it is committed.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
CybercrimeThe 21st century has been termed the postindustrial
information age.Criminal perpetrators have been able to take
advantage of this age.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
CybercrimeHackerA person who uses computers for exploration
and exploitationCybercrimeAny violation of a federal or state
computer-crime statute
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
CybercrimeFive Types of CybercrimeInternal
cybercrimesInternet and telecommunication crimesSupport of
criminal enterprisesComputer-manipulationHardware, software,
and information theft
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.2
Describe the extent and forms of cybercrime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Extent and Forms of CybercrimeThe Extent of CybercrimeThe
annual cost of cybercrime in the United States at around $666
million.Computer crime cost most companies an average of less
than $100,000.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Extent and Forms of CybercrimeSoftware PiracyThe
unauthorized and illegal copying of softwarePhishingAn
internet-based scam used to steal valuable information such as
credit card numbers, Social Security numbers, user IDs, and
passwords
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Extent and Forms of CybercrimeComputer VirusA computer
program that is designed to secretly invade computer systems to
modify the way in which they operate or alter the information
they store
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.3
Describe the legislation that has been enacted in an effort to
curb cybercrime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationCommunications Decency Act
(CDA) of 1996The law sought to protect minors from harmful
material on the Internet.A portion of the CDA criminalized the
knowing transmission of obscene or indecent messages to any
recipient under 18 years of age.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationReno v. ACLU (1997)Found much
of the CDA to be unconstitutional, ruling it contradicts the First
Amendment free speech guarantees
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationNo Electronic Theft Act (1997)A
federal law that criminalizes the willful infringement of
copyrighted works, including by electronic means, even when
the infringing party derives no direct financial benefit from the
infringement
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationDigital Theft Deterrence and
Copyright Damages Improvement Act (1999)A federal law that
attempted to combat software piracy by increasing the amount
of damages that could be awarded in case of copyright
infringement
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationCyber Security Enhancement Act
(2002)Part of the Homeland Security Act of 2002Directed the
U.S. Sentencing Commission to take several factors into
account in creating new sentencing guidelines for computer
criminals
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationComputer-Related CrimeAny
illegal act for which knowledge of computer technology is
involved for its investigation, perpetration, or prosecution
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Anti-Cybercrime LegislationComputer AbuseAn unlawful
incident associated with computer technology in which a victim
suffered or could have suffered loss and/or a perpetrator by
intention made or could have made a gain
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.4
Describe the typical profile of computer criminals.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Typical Profile of Computer CriminalsA Profile of Computer
CriminalsMaleBetween 16–25 years of ageLives in the United
StatesComputer user, not programmerHacks with software
written by othersPrimary motivation is to gain access to
websites and networks, not profit financially
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Typical Profile of Computer CriminalsThe History and Nature
of HackingEarly hacking involved the interstate phone
system.Phone phreakPerson who uses special
telecommunications access codes and other restricted technical
information to avoid charges or disrupt services.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.5
Explain how technology arms criminals with new methods of
crime commission while simultaneously providing criminal
justice personnel with the tools to combat crime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Technology as a Tool for Criminals
and Criminal Justice PersonnelTechnology in the Fight Against
CrimeTechnology is a double-edged sword.On one hand, it arms
potential criminals with potent new weapons of crime
commission.On the other hand, it provides criminal justice
personnel with powerful tools useful in the battle against crime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Technology as a Tool for Criminals
and Criminal Justice PersonnelDNA TechnologyThe use of
biological residue found at the scene of a crime for genetic
comparisons in aiding the identification of criminal suspects
Definition from glossary.
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Technology as a Tool for Criminals
and Criminal Justice PersonnelComputers as Crime-Fighting
ToolsExpert SystemsComputer hardware and software that
attempt to duplicate the decision-making processes used by
skilled investigators in the analysis of evidence, and in the
recognition of patterns that such evidence might represent
Definition from glossary
*
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.6
Summarize the steps being taken to combat computer crime.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Combating Computer CrimeData EncryptionThe process by
which information is encoded, making it unreadable to all but
its intended recipientsThreat AnalysisA complete and thorough
assessment of the potential disasters facing an organization
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Combating Computer CrimeAudit TrailA sequential record of
system activities that enables auditors to reconstruct, review,
and examine the sequence of states and activities surrounding
each event in one or more related transactions from inception to
output of final results back to inception
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Combating Computer CrimeDCS-1000An FBI-developed
network diagnostic tool intended to assist in criminal
investigations by monitoring and capturing large amounts of
Internet traffic
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Learning Objective 13.7
Identify freedom-of-speech issues that modern technology has
introduced.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Freedom of SpeechThe continued development of
telecommunications resources has led not only to concerns
about security and data integrity, but also to an expanding
interest in privacy, free speech, and personal freedoms.
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Freedom of SpeechFirst and Fourth Amendments to the U.S.
ConstitutionGuarantee each person freedom of speech and
security in his or her "persons, houses, papers, and effects,
against unreasonable searches and seizures”
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Freedom of SpeechElectronic Frontier Foundation (EFF)A non-
profit organization founded in July 1990 to ensure the principles
embodies in the Constitution and Bill of Rights are protected as
new communications technologies emerge
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter SummaryCybercrime is a violation of any federal or
state computer-crime statute.The sophistication of
cybercriminals makes it difficult to quantify losses.New laws
have been developed at both state and federal levels to
prosecute unauthorized computer access.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter SummaryThe typical computer hacker is a 25-year old
white American male.Technology is a double-edged sword. It
arms potential criminals with potent new weapons of crime
commission. It also provides criminal justice personnel with
tools useful in the battle against crime.
continued on next slide
Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
All Rights Reserved
Criminology, 3e
Frank Schmalleger
Chapter SummaryEffective programs to fight cybercrime must
use threat analysis.Efforts to control high-tech crime through
criminal investigation and prosecution impact issues of
individual rights.
Unit VIII Case Study
Log into the myCSU Student Portal, and navigate to the
Criminal Justice database within the CSU Online Library in
order to access the resource below: Glassberg, J. (2015). The
ransomware threat. Law Enforcement Technology, 42(9), 33-35.
Then, write a case study that answers the following questions:
· What was the problem? What were the effects of the problem?
· What is the profile of the hacker?
· What can be done to protect against the threat?
· What should be done if a computer is infected with
ransomware?
· What type(s) of cybercrime was/were involved in this article?
Does the identified offender fit the characteristics for this type
of cybercrime?
Your assignment should be a minimum of two pages in length,
not counting the title and reference pages, and you should use
APA formatting. In addition, any references used should be
properly cited.

Weitere ähnliche Inhalte

Ähnlich wie CriminologyCHAPTERCopyright © 2016, 2014, 2011 by Pearso.docx

Criminal Justice A Brief IntroductionTwelfth EditionChapter.docx
Criminal Justice A Brief IntroductionTwelfth EditionChapter.docxCriminal Justice A Brief IntroductionTwelfth EditionChapter.docx
Criminal Justice A Brief IntroductionTwelfth EditionChapter.docx
willcoxjanay
 
CHAPTER 14 Police and Homeland Security LEARNING OBJEC.docx
CHAPTER 14  Police and Homeland  Security LEARNING OBJEC.docxCHAPTER 14  Police and Homeland  Security LEARNING OBJEC.docx
CHAPTER 14 Police and Homeland Security LEARNING OBJEC.docx
bartholomeocoombs
 
The 1992 Los Angeles Riots Essay
The 1992 Los Angeles Riots EssayThe 1992 Los Angeles Riots Essay
The 1992 Los Angeles Riots Essay
Renee Jones
 
Terrorism A Study in Public Safety – Public Safety vs. Individual.docx
Terrorism A Study in Public Safety – Public Safety vs. Individual.docxTerrorism A Study in Public Safety – Public Safety vs. Individual.docx
Terrorism A Study in Public Safety – Public Safety vs. Individual.docx
mattinsonjanel
 
Transnational Crime and the Global Community
Transnational Crime and the Global CommunityTransnational Crime and the Global Community
Transnational Crime and the Global Community
Mark Wojnarek
 
Reply to post 1 & 2 with 250 words eachPost 1Since the S
Reply to post 1 & 2 with 250 words eachPost 1Since the SReply to post 1 & 2 with 250 words eachPost 1Since the S
Reply to post 1 & 2 with 250 words eachPost 1Since the S
felipaser7p
 
Crime Control in America What Works, 3eJohn L. Worrall.docx
Crime Control in America What Works, 3eJohn L. Worrall.docxCrime Control in America What Works, 3eJohn L. Worrall.docx
Crime Control in America What Works, 3eJohn L. Worrall.docx
willcoxjanay
 

Ähnlich wie CriminologyCHAPTERCopyright © 2016, 2014, 2011 by Pearso.docx (10)

Criminal Justice A Brief IntroductionTwelfth EditionChapter.docx
Criminal Justice A Brief IntroductionTwelfth EditionChapter.docxCriminal Justice A Brief IntroductionTwelfth EditionChapter.docx
Criminal Justice A Brief IntroductionTwelfth EditionChapter.docx
 
CHAPTER 14 Police and Homeland Security LEARNING OBJEC.docx
CHAPTER 14  Police and Homeland  Security LEARNING OBJEC.docxCHAPTER 14  Police and Homeland  Security LEARNING OBJEC.docx
CHAPTER 14 Police and Homeland Security LEARNING OBJEC.docx
 
Policing a vision for 2025
Policing   a vision for 2025Policing   a vision for 2025
Policing a vision for 2025
 
Schmalleger ch04 lecture
Schmalleger ch04 lectureSchmalleger ch04 lecture
Schmalleger ch04 lecture
 
The 1992 Los Angeles Riots Essay
The 1992 Los Angeles Riots EssayThe 1992 Los Angeles Riots Essay
The 1992 Los Angeles Riots Essay
 
Essay On Terrorism
Essay On TerrorismEssay On Terrorism
Essay On Terrorism
 
Terrorism A Study in Public Safety – Public Safety vs. Individual.docx
Terrorism A Study in Public Safety – Public Safety vs. Individual.docxTerrorism A Study in Public Safety – Public Safety vs. Individual.docx
Terrorism A Study in Public Safety – Public Safety vs. Individual.docx
 
Transnational Crime and the Global Community
Transnational Crime and the Global CommunityTransnational Crime and the Global Community
Transnational Crime and the Global Community
 
Reply to post 1 & 2 with 250 words eachPost 1Since the S
Reply to post 1 & 2 with 250 words eachPost 1Since the SReply to post 1 & 2 with 250 words eachPost 1Since the S
Reply to post 1 & 2 with 250 words eachPost 1Since the S
 
Crime Control in America What Works, 3eJohn L. Worrall.docx
Crime Control in America What Works, 3eJohn L. Worrall.docxCrime Control in America What Works, 3eJohn L. Worrall.docx
Crime Control in America What Works, 3eJohn L. Worrall.docx
 

Mehr von vanesaburnand

InstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxInstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docx
vanesaburnand
 
InstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxInstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docx
vanesaburnand
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
vanesaburnand
 
InstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxInstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docx
vanesaburnand
 
InstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxInstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docx
vanesaburnand
 
InstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxInstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docx
vanesaburnand
 

Mehr von vanesaburnand (20)

InstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxInstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docx
 
InstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxInstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docx
 
InstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxInstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docx
 
InstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxInstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docx
 
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxInstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
 
InstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxInstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docx
 
InstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxInstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docx
 
InstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxInstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docx
 
InstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxInstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docx
 
InstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxInstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docx
 
InstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxInstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docx
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
 
InstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxInstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docx
 
InstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxInstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docx
 
InstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxInstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docx
 
InstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxInstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docx
 
InstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxInstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docx
 
InstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxInstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docx
 
InstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxInstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docx
 
InstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxInstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docx
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 

Kürzlich hochgeladen (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

CriminologyCHAPTERCopyright © 2016, 2014, 2011 by Pearso.docx

  • 1. Criminology CHAPTER Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger THIRD EDITION Globalization and Terrorism—Our Small World 14 Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Chapter ObjectivesDefine comparative criminology and explain what it can tell us about crime worldwide.Explain globalization and show how it is making it more difficult to combat crime around the world. continued on next slide Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Chapter ObjectivesDefine terrorism, identify its major characteristics, and describe the different kinds of terrorist
  • 2. organizations.Describe the legislative policies that were created after the 9/11 attacks to prevent further incidents of terrorism. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Learning Objective 14.1 Define comparative criminology and explain what it can tell us about crime worldwide. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Comparative CriminologyThe cross-national study of crimeWhen crime patterns in one country are compared with those in another countryA criminologist involved in the cross- national study of crime Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Comparative CriminologyEthnocentrismThe phenomenon of "culture centeredness" by which one uses one's own culture as a benchmark against which to judge all other patterns of behavior Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
  • 3. All Rights Reserved Criminology, 3e Frank Schmalleger Comparative CriminologyThe crime rates of different countries are difficult to compare because of:Differences in the way crime is defined.Diverse crime-reporting practices.Political, social, economic, and other influences on the reporting of statistics to international agencies. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Comparative CriminologyIssues in ReportingFor cross-national comparisons of crime data to be meaningful, they must share conceptual similarities.Unfortunately, this is not always the case.Crime statistics reflect social and political contexts. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Learning Objective 14.2 Explain globalization and show how it is making it more difficult to combat crime around the world. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger
  • 4. Globalization and CrimeGlobalizationA process of social homogenization by which the experiences of everyday life, marked by the diffusion of commodities and ideas, can foster a standardization of cultural expressions around the world. Photo from text page 274 * Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger What are the positive and negative effects of globalization? How does globalization impact crime in the United States? How does it affect terrorism? Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Globalization and CrimeHuman SmugglingIllegal immigration in which an agent is involved for payment to help a person cross a border clandestinelyHuman smuggling generally occurs with the consent of people being smuggled, who often pay for the service. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e
  • 5. Frank Schmalleger Globalization and CrimeTrafficking in Persons (TIP)The exploitation of unwilling people through force, coercion, threat, or deceptionCan be compared to a modern-day form of slaverySome trafficking victims may believe they are being smuggled when they are really being trafficked. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Globalization and CrimeHuman TraffickingU.S. government officials estimate that 800,000 to 900,000 victims are trafficked globally each year.Women and children comprise the largest group of victims. Figure 14-4, Profile of Worldwide Trafficking Victims Text page 276 * Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger FIGURE 14-4 Profile of Worldwide Trafficking Victims. Source: United Nations Office on Drugs and Crime (UNDOC), Global Report on Trafficking in Persons (New York: United Nations, 2009), p. 11. Copyright © 2009. Used by permission of United Nations Office on Drugs and Crime.
  • 6. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Globalization and CrimeFederal Immigration and Trafficking LegislationRecognizing human smuggling and TIP were serious social issues, Congress passed the Trafficking Victims Protection Act (TVPA) of 2000.Under the TVPA, trafficking does not require the crossing of an international border. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Globalization and CrimeThe Trafficking Victims Protection Reauthorization Act (TVPRA) of 2003 added new initiatives. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Learning Objective 14.3 Define terrorism, identify its major characteristics, and describe the different kinds of terrorist organizations. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e
  • 7. Frank Schmalleger TerrorismThe U.S. Department of State defines terrorism as:Premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger TerrorismTerrorism acts are criminal because they:Violate criminal law.Involve criminal activity.Produce criminal results. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger TerrorismThe primary distinction between violent criminal acts and acts of terrorism, however, has to do with the political motivation or social ideology of the offender. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger TerrorismTerrorist organizations vary in their goals and can be categorized as follows:National TerroristsReligious TerroristsState-sponsored TerroristsLeft-Wing TerroristsRight- Wing TerroristsAnarchist Terrorists
  • 8. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger TerrorismTwo major types of terrorism:Domestic TerrorismInternational Terrorism Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger TerrorismDomestic TerrorismUnlawful force or violence by a group or an individual who is based and operates entirely within the Untied States and its territories without foreign direction and whose acts are directed at elements of the U.S. government or population Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger TerrorismInternational TerrorismUnlawful force or violence by a group or an individual who has a connection to a foreign power or whose activities transcend national boundaries against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives
  • 9. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Learning Objective 14.4 Describe the legislative policies that were created after the 9/11 attacks to prevent future incidents of terrorism. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Post-9/11 LegislationThe War on TerrorDuring the first few years after the 9/11 attacks, three important legislative initiatives resulted.The USA PATRIOT ActThe Sarbanes-Oxley ActThe Homeland Security Act Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Post-9/11 LegislationThe USA PATRIOT ActA post-9/11 federal law designed to fight terrorismThe name of the statute is an acronym for United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism. continued on next slide Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved
  • 10. Criminology, 3e Frank Schmalleger Post-9/11 LegislationThe USA PATRIOT ActThe USA PATRIOT Act led some to question whether the government threatened powers at the expense of individual rights and civil liberties. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Post-9/11 LegislationThe Department of Homeland Security (DHS)A federal agency established by the Homeland Security Act of 2002 that is responsible for protecting America against acts of terrorism Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Post-9/11 LegislationInfrastructureThe basic facilities, services, and installations needed for the functioning of a community or society, such as transportation and communication systems, water and power lines, and public institutions, including schools, post offices, and prisons Definition from text glossary *
  • 11. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Post-9/11 LegislationTerrorism Commission and ReportsThe report of the 9/11 Commission said that the September 11, 2001 attacks should have come as no surprise because the U.S. government had received clear warnings that Islamic terrorists were planning to strike targets within the United States Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Chapter SummaryComparative criminology is the study of crime on a cross national level.Globalization refers to the increasingly interconnectedness of people, ideas, and things on a worldwide scale. continued on next slide Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Chapter SummaryTerrorism is the use of criminal acts of violence as a tactic for attaining political goals.The U.S. declared a worldwide war on international terrorism following the attacks of September 11, 2001.
  • 12. Criminology CHAPTER Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger THIRD EDITION Technology and Crime—It's a Double-Edged Sword 13 Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Chapter ObjectivesExplain cybercrime and describe how it is committed.Describe the extent and forms of cybercrime.Describe the legislation that has been enacted in an effort to curb cybercrime. continued on next slide Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Chapter ObjectivesDescribe the typical profile of computer criminals.Explain how technology arms criminals with new methods of crime commission while simultaneously providing criminal justice personnel with the tools to combat crime. continued on next slide
  • 13. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Chapter ObjectivesSummarize the steps being taken to combat computer crime.Identify freedom-of-speech issues that modern technology has introduced. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Learning Objective 13.1 Explain cybercrime and describe how it is committed. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger CybercrimeThe 21st century has been termed the postindustrial information age.Criminal perpetrators have been able to take advantage of this age. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger CybercrimeHackerA person who uses computers for exploration
  • 14. and exploitationCybercrimeAny violation of a federal or state computer-crime statute Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger CybercrimeFive Types of CybercrimeInternal cybercrimesInternet and telecommunication crimesSupport of criminal enterprisesComputer-manipulationHardware, software, and information theft Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Learning Objective 13.2 Describe the extent and forms of cybercrime. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Extent and Forms of CybercrimeThe Extent of CybercrimeThe annual cost of cybercrime in the United States at around $666 million.Computer crime cost most companies an average of less than $100,000. Copyright © 2016, 2014, 2011 by Pearson Education, Inc.
  • 15. All Rights Reserved Criminology, 3e Frank Schmalleger Extent and Forms of CybercrimeSoftware PiracyThe unauthorized and illegal copying of softwarePhishingAn internet-based scam used to steal valuable information such as credit card numbers, Social Security numbers, user IDs, and passwords Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Extent and Forms of CybercrimeComputer VirusA computer program that is designed to secretly invade computer systems to modify the way in which they operate or alter the information they store Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Learning Objective 13.3 Describe the legislation that has been enacted in an effort to curb cybercrime. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger
  • 16. Anti-Cybercrime LegislationCommunications Decency Act (CDA) of 1996The law sought to protect minors from harmful material on the Internet.A portion of the CDA criminalized the knowing transmission of obscene or indecent messages to any recipient under 18 years of age. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Anti-Cybercrime LegislationReno v. ACLU (1997)Found much of the CDA to be unconstitutional, ruling it contradicts the First Amendment free speech guarantees Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Anti-Cybercrime LegislationNo Electronic Theft Act (1997)A federal law that criminalizes the willful infringement of copyrighted works, including by electronic means, even when the infringing party derives no direct financial benefit from the infringement Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Anti-Cybercrime LegislationDigital Theft Deterrence and
  • 17. Copyright Damages Improvement Act (1999)A federal law that attempted to combat software piracy by increasing the amount of damages that could be awarded in case of copyright infringement Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Anti-Cybercrime LegislationCyber Security Enhancement Act (2002)Part of the Homeland Security Act of 2002Directed the U.S. Sentencing Commission to take several factors into account in creating new sentencing guidelines for computer criminals Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Anti-Cybercrime LegislationComputer-Related CrimeAny illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Anti-Cybercrime LegislationComputer AbuseAn unlawful incident associated with computer technology in which a victim suffered or could have suffered loss and/or a perpetrator by
  • 18. intention made or could have made a gain Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Learning Objective 13.4 Describe the typical profile of computer criminals. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Typical Profile of Computer CriminalsA Profile of Computer CriminalsMaleBetween 16–25 years of ageLives in the United StatesComputer user, not programmerHacks with software written by othersPrimary motivation is to gain access to websites and networks, not profit financially Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Typical Profile of Computer CriminalsThe History and Nature of HackingEarly hacking involved the interstate phone system.Phone phreakPerson who uses special telecommunications access codes and other restricted technical information to avoid charges or disrupt services.
  • 19. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Learning Objective 13.5 Explain how technology arms criminals with new methods of crime commission while simultaneously providing criminal justice personnel with the tools to combat crime. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Technology as a Tool for Criminals and Criminal Justice PersonnelTechnology in the Fight Against CrimeTechnology is a double-edged sword.On one hand, it arms potential criminals with potent new weapons of crime commission.On the other hand, it provides criminal justice personnel with powerful tools useful in the battle against crime. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Technology as a Tool for Criminals and Criminal Justice PersonnelDNA TechnologyThe use of biological residue found at the scene of a crime for genetic comparisons in aiding the identification of criminal suspects
  • 20. Definition from glossary. * Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Technology as a Tool for Criminals and Criminal Justice PersonnelComputers as Crime-Fighting ToolsExpert SystemsComputer hardware and software that attempt to duplicate the decision-making processes used by skilled investigators in the analysis of evidence, and in the recognition of patterns that such evidence might represent Definition from glossary * Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Learning Objective 13.6 Summarize the steps being taken to combat computer crime. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger
  • 21. Combating Computer CrimeData EncryptionThe process by which information is encoded, making it unreadable to all but its intended recipientsThreat AnalysisA complete and thorough assessment of the potential disasters facing an organization Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Combating Computer CrimeAudit TrailA sequential record of system activities that enables auditors to reconstruct, review, and examine the sequence of states and activities surrounding each event in one or more related transactions from inception to output of final results back to inception Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Combating Computer CrimeDCS-1000An FBI-developed network diagnostic tool intended to assist in criminal investigations by monitoring and capturing large amounts of Internet traffic Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Learning Objective 13.7
  • 22. Identify freedom-of-speech issues that modern technology has introduced. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Freedom of SpeechThe continued development of telecommunications resources has led not only to concerns about security and data integrity, but also to an expanding interest in privacy, free speech, and personal freedoms. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Freedom of SpeechFirst and Fourth Amendments to the U.S. ConstitutionGuarantee each person freedom of speech and security in his or her "persons, houses, papers, and effects, against unreasonable searches and seizures” Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Freedom of SpeechElectronic Frontier Foundation (EFF)A non- profit organization founded in July 1990 to ensure the principles embodies in the Constitution and Bill of Rights are protected as new communications technologies emerge
  • 23. Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Chapter SummaryCybercrime is a violation of any federal or state computer-crime statute.The sophistication of cybercriminals makes it difficult to quantify losses.New laws have been developed at both state and federal levels to prosecute unauthorized computer access. continued on next slide Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Chapter SummaryThe typical computer hacker is a 25-year old white American male.Technology is a double-edged sword. It arms potential criminals with potent new weapons of crime commission. It also provides criminal justice personnel with tools useful in the battle against crime. continued on next slide Copyright © 2016, 2014, 2011 by Pearson Education, Inc. All Rights Reserved Criminology, 3e Frank Schmalleger Chapter SummaryEffective programs to fight cybercrime must use threat analysis.Efforts to control high-tech crime through criminal investigation and prosecution impact issues of individual rights.
  • 24. Unit VIII Case Study Log into the myCSU Student Portal, and navigate to the Criminal Justice database within the CSU Online Library in order to access the resource below: Glassberg, J. (2015). The ransomware threat. Law Enforcement Technology, 42(9), 33-35. Then, write a case study that answers the following questions: · What was the problem? What were the effects of the problem? · What is the profile of the hacker? · What can be done to protect against the threat? · What should be done if a computer is infected with ransomware? · What type(s) of cybercrime was/were involved in this article? Does the identified offender fit the characteristics for this type of cybercrime? Your assignment should be a minimum of two pages in length, not counting the title and reference pages, and you should use APA formatting. In addition, any references used should be properly cited.