Criminal Justice 2011
Chapter 17:
White-collar and Computer Crime
Criminal InvestigationThe Art and the Science
by Michael D. LymanCopyright 2011
17.1 Understand the various types of white-collar crime.17.2 Understand the problem of money-laundering investigations.17.3 List the various techniques used by organized crime to hide or “launder” illicit financial proceeds.17.4 Learn the different types of confidence games and how they work.17.5 Describe the nature of computer crimes and the various types of computer offenses known today.17.6 Know what evidence to look for in the investigation of computer crimes.17.7 Understand the profile of the computer crime suspect.
CHAPTER SUMMARY
Understand the various types of white-collar crime.
Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome
17.1
White Collar Crime17.1
Non-violent
Committed for financial gain
Accomplished by means of deception
White Collar Crime17.1
The statutes are quite complicated!
“By virtue of his or her office, business or employment, oras trustee or bailee, having possession or custody of money or ofa negotiable security, instrument, paper or other negotiable writingof another, intentionally uses, transfers, conceals, or retainspossession of such money, security, instrument, paper or writingwithout the owner’s consent, contrary to his or her authority, andwith intent to convert to his or her own use or to the use of anyother person except the owner.” Wisconsin State Statute, 943.20(1)(b)
Corporate Crime 17.1
Concealing defects
Environmental
Crimes
Cheating customer
s
Misleading
investors
A form of White Collar crime…
Understand the problem of money-laundering investigations.
Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome
17.2
Money Laundering 17.2
Step Four:Obtain the $$$ back
Step Two:Hide $$$ from
The Government
Step One: Illegally earn $$$
Step Three:Use legitimate Businesses to
“wash” the $$$
List the various techniques used by organized crime to hide or “launder” illicit financial proceeds.
Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome
17.3
Methods of Money Laundering 17.3
Double Invoicing
Currency Exchanges Smurfing Bank
Methods
It is as varied as the businesses that exist in this country, both small and large
Acquiring financial
institutions
Money orders
Learn the different types of confidence games and how they work.
Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome
17.4
Confidence Games17.4
Travel ScamsThe Pyramid
“Get Rich Quick” Scheme
The Bank Examiner Scheme
The Pigeon Drop
The spectrum of white-collar crime also extends to the timeless scam of the confidence game (or “con”).
Home Repair Scams
Contest Cons
Describe the nature of computer crimes and the various types of computer offenses known today.
Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome
17.5
The introduction of fraudulent
records or data
Types of Computer Crime 17.5
Unauthorized use of
computer-related
facilities
The alteration or destruction of information
or files
Stealing through use
of the computer
Computer Crimes 17.5
Old Crimes in a new
wayStalking
Harassment
Child pornography
Computer Crimes 17.5
New Crimes in a new
eraHacking
Scanning
Masquerading
Trojan horses, viruses, data diddling, piracy, etc…
Hardware
Software
Two Categories Computer Components17.5
Computer
Know what evidence to look for in the investigation of computer crimes.
Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome
17.6
Investigating Computer Crime 17.6
Obtain computer evidence
Examine computer evidence
Preserve evidence for court purposes
Interview the suspect
Investigating Computer Crime 17.6
Obtaining computer
evidence… Computer media
Computer data
Evidence online
Other computer evidence including peripherals
Insert a picture of the inside of a computer here
please
Investigating Computer Crime 17.6
Examining computer
evidence… Computer media
Computer data
Evidence online
Other computer evidence including peripherals
Insert a picture of an online “history”
Here please
Understand the profile of the computer crime suspect.
Learning ObjectivesAfter this lecture, you should be able to complete the following Learning Outcome
17.7
Most perpetrators are young and were educated in colleges and universitieswhere computer attacks are common and sometimes condoned as“educational activity.”
The Profile! 17.7
Age
Most suspects are among the most skilled andhigher-performing technologists. This is seen, in particular, in organizationsin which a worker is overqualified for the work he or she is doing.
The Profile! 17.7
Skills and knowledge
In most cases, perpetrators perform their acts whileworking at their jobs. Investigators should anticipate that vulnerabilitiesidentified will usually result in the most qualified person taking advantageof them.
The Profile! 17.7
Positions of trust
Perpetrators in many types of computer crime have beenknown to need assistance. This is because computer crimes require moreknowledge and access than one person usually possesses.
The Profile! 17.7
Assistance
Frequently, people working together may encourageeach other to engage in unauthorized acts that escalate into seriouscrimes.
The Profile! 17.7
Differential association
Most computer crime perpetrators interviewed inthe study differentiated between harming people and organizations, the latterof which was easily condoned.
In addition, they rationalized that theywere only harming a computer and not causing any loss to people ororganizations.
The Profile! 17.7
Robin Hood syndrome
17.1 Understand the various types of white-collar crime.17.2 Understand the problem of money-laundering investigations.17.3 List the various techniques used by organized crime to hide or “launder” illicit financial proceeds.17.4 Learn the different types of confidence games and how they work.17.5 Describe the nature of computer crimes and the various types of computer offenses known today.17.6 Know what evidence to look for in the investigation of computer crimes.17.7 Understand the profile of the computer crime suspect.
CHAPTER REVIEW