29
Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Embed Size (px)

Citation preview

Page 1: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Criminal Justice 2011

Chapter 17:

White-collar and Computer Crime

Criminal InvestigationThe Art and the Science

by Michael D. LymanCopyright 2011

Page 2: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

17.1 Understand the various types of white-collar crime.17.2 Understand the problem of money-laundering investigations.17.3 List the various techniques used by organized crime to hide or “launder” illicit financial proceeds.17.4 Learn the different types of confidence games and how they work.17.5 Describe the nature of computer crimes and the various types of computer offenses known today.17.6 Know what evidence to look for in the investigation of computer crimes.17.7 Understand the profile of the computer crime suspect.

CHAPTER SUMMARY

Page 3: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Understand the various types of white-collar crime.

Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome

17.1

Page 4: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

White Collar Crime17.1

Non-violent

Committed for financial gain

Accomplished by means of deception

Page 5: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

White Collar Crime17.1

The statutes are quite complicated!

“By virtue of his or her office, business or employment, oras trustee or bailee, having possession or custody of money or ofa negotiable security, instrument, paper or other negotiable writingof another, intentionally uses, transfers, conceals, or retainspossession of such money, security, instrument, paper or writingwithout the owner’s consent, contrary to his or her authority, andwith intent to convert to his or her own use or to the use of anyother person except the owner.” Wisconsin State Statute, 943.20(1)(b)

Page 6: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Corporate Crime 17.1

Concealing defects

Environmental

Crimes

Cheating customer

s

Misleading

investors

A form of White Collar crime…

Page 7: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Understand the problem of money-laundering investigations.

Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome

17.2

Page 8: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Money Laundering 17.2

Step Four:Obtain the $$$ back

Step Two:Hide $$$ from

The Government

Step One: Illegally earn $$$

Step Three:Use legitimate Businesses to

“wash” the $$$

Page 9: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

List the various techniques used by organized crime to hide or “launder” illicit financial proceeds.

Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome

17.3

Page 10: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Methods of Money Laundering 17.3

Double Invoicing

Currency Exchanges Smurfing Bank

Methods

It is as varied as the businesses that exist in this country, both small and large

Acquiring financial

institutions

Money orders

Page 11: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Learn the different types of confidence games and how they work.

Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome

17.4

Page 12: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Confidence Games17.4

Travel ScamsThe Pyramid

“Get Rich Quick” Scheme

The Bank Examiner Scheme

The Pigeon Drop

The spectrum of white-collar crime also extends to the timeless scam of the confidence game (or “con”).

Home Repair Scams

Contest Cons

Page 13: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Describe the nature of computer crimes and the various types of computer offenses known today.

Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome

17.5

Page 14: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

The introduction of fraudulent

records or data

Types of Computer Crime 17.5

Unauthorized use of

computer-related

facilities

The alteration or destruction of information

or files

Stealing through use

of the computer

Page 15: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Computer Crimes 17.5

Old Crimes in a new

wayStalking

Harassment

Child pornography

Page 16: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Computer Crimes 17.5

New Crimes in a new

eraHacking

Scanning

Masquerading

Trojan horses, viruses, data diddling, piracy, etc…

Page 17: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Hardware

Software

Two Categories Computer Components17.5

Computer

Page 18: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Know what evidence to look for in the investigation of computer crimes.

Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome

17.6

Page 19: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Investigating Computer Crime 17.6

Obtain computer evidence

Examine computer evidence

Preserve evidence for court purposes

Interview the suspect

Page 20: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Investigating Computer Crime 17.6

Obtaining computer

evidence… Computer media

Computer data

Evidence online

Other computer evidence including peripherals

Insert a picture of the inside of a computer here

please

Page 21: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Investigating Computer Crime 17.6

Examining computer

evidence… Computer media

Computer data

Evidence online

Other computer evidence including peripherals

Insert a picture of an online “history”

Here please

Page 22: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Understand the profile of the computer crime suspect.

Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome

17.7

Page 23: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Most perpetrators are young and were educated in colleges and universitieswhere computer attacks are common and sometimes condoned as“educational activity.”

The Profile! 17.7

Age

Page 24: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Most suspects are among the most skilled andhigher-performing technologists. This is seen, in particular, in organizationsin which a worker is overqualified for the work he or she is doing.

The Profile! 17.7

Skills and knowledge

Page 25: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

In most cases, perpetrators perform their acts whileworking at their jobs. Investigators should anticipate that vulnerabilitiesidentified will usually result in the most qualified person taking advantageof them.

The Profile! 17.7

Positions of trust

Page 26: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Perpetrators in many types of computer crime have beenknown to need assistance. This is because computer crimes require moreknowledge and access than one person usually possesses.

The Profile! 17.7

Assistance

Page 27: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Frequently, people working together may encourageeach other to engage in unauthorized acts that escalate into seriouscrimes.

The Profile! 17.7

Differential association

Page 28: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

Most computer crime perpetrators interviewed inthe study differentiated between harming people and organizations, the latterof which was easily condoned.

In addition, they rationalized that theywere only harming a computer and not causing any loss to people ororganizations.

The Profile! 17.7

Robin Hood syndrome

Page 29: Criminal Justice 2011 Chapter 17: White-collar and Computer Crime Criminal Investigation The Art and the Science by Michael D. Lyman Copyright 2011

17.1 Understand the various types of white-collar crime.17.2 Understand the problem of money-laundering investigations.17.3 List the various techniques used by organized crime to hide or “launder” illicit financial proceeds.17.4 Learn the different types of confidence games and how they work.17.5 Describe the nature of computer crimes and the various types of computer offenses known today.17.6 Know what evidence to look for in the investigation of computer crimes.17.7 Understand the profile of the computer crime suspect.

CHAPTER REVIEW