1 / 19

Chapter 10

Chapter 10. Crimes Against Property. Crimes Against Property. Arson Willful and malicious burning of a person’s property Insurance fraud is a common example Not as easy to get away with as one would think Can be a part of a hate crime Burning of churches Vandalism AKA malicious mischief

barney
Download Presentation

Chapter 10

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 10 Crimes Against Property

  2. Crimes Against Property • Arson • Willful and malicious burning of a person’s property • Insurance fraud is a common example • Not as easy to get away with as one would think • Can be a part of a hate crime • Burning of churches • Vandalism • AKA malicious mischief • Willful destruction of, or damage to, a property • Various crimes fit in this category • Extent of damage determines if the crime is a felony or misdemeanor

  3. Larceny • Unlawful taking and carrying away of the property of another person • Two types of larceny • Petty • Theft of anything small in value (i.e. less than $100.00) • Grand • Theft of anything greater than $100.00 in value • Also involves keeping something that does not belong to you that can be recovered with a reasonable amount of finding the owner • Find a wallet with ID in it and you keep it • Receiving property that was stolen • You’re driving down the road and the back of a money truck opens up. Dollar bills proceed to fly out the back door • Shoplifting • Taking items from a store without paying for them or intending to pay for them • Also includes • Skipping out on a restaurant bill • Not having enough money to pay a restaurant bill • Filling up your gas tank and leaving without paying • Concealment is the crime of attempted shoplifting

  4. More crimes!!!!1 • Embezzlement • Unlawful taking of property by someone to whom it was entrusted • Examples. . .? • Robbery • Unlawful taking of property from a person’s immediate possession by force or intimidation • Involves two harms • Theft of property • Actual or potential harm to the victim • Extortion or blackmail is the use of threats to obtain property of another

  5. Pyramid Schemes In the classic "pyramid" scheme, participants attempt to make money solely by recruiting new participants into the program The hallmark of these schemes is the promise of sky-high returns in a short period of time for doing nothing other than handing over your money and getting others to do the same. The fraudsters behind a pyramid scheme may go to great lengths to make the program look like a legitimate multi-level marketing program. But despite their claims to have legitimate products or services to sell, these fraudsters simply use money coming in from new recruits to pay off early stage investors. Eventually the pyramid will collapse. At some point the schemes get too big, the promoter cannot raise enough money from new investors to pay earlier investors, and many people lose their money.

  6. Other crimes of interest • Forgery • A crime in which a person falsely makes or alters a writing or document with intent to defraud • Uttering is when you offer a document as real when it is truly a fake • Receiving stolen property • Receiving or buying property that you know or have reason to believe is stolen • Knowledge that the property is stolen may be implied by the circumstances • Wow this is cheap • You bought it from Crazy Mary’s Trunkside Depot • Unauthorized Use of a Vehicle • A person takes a motor vehicle without the owner’s consent • Joyriding • Auto theft • Carjacking • Federal offense with implications of life in prison

  7. Hackers • Hackers • A person who gains illegal access to a computer system when they have no authorization to do so • Why hack? • Gain classified information • Steal money from financial institutions • Because they can • Three types of hackers • White hat hackers work for computer security companies (AVG, McAfee, Symantec) to detect vulnerabilities in systems and fix them before they become problems • Black hat hackers break into systems to defraud, steal, or destroy networks • Grey hat hackers do a little bit of both (think Thomas Anderson from the Matrix) • The most famous hacker is Kevin Mitnick

  8. It’s like a cold. . .but for your PC • Viruses • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. • A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. • Viruses are often spread by attachments in e-mail messages or instant messaging messages. • That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. • Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. • Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. • Melissa virus was the most famous

  9. Malware and worms and horsies • Malware is short for malicious software and is typically used as a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network, whether it's a virus, spyware, et al. • Worms are like viruses, except they can travel through networks without being activated by the user • Conficker worm • Trojan horse • The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  • Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. • Sub7 is the most famous Trojan Horse

  10. Adware and Spyware • Spyware • A type of malware that is installed on computers and collects information about users without their knowledge. • The presence of spyware is typically hidden from the user. • A keystroke logger is an example of this • Adware • Any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used • Midaddle was a good example of this

  11. COOKKKKIIIIEEEEE!!!!!!!! HUMM NUM NUMNUMNUMNUM • Browser cookie • A plain text file (.txt) that sits on your computer in a temporary folder that stores data about a browsing session. • If you log into a website it generally sets a cookie to temporarily store your information so you don’t have to log in every time you change a page • Tracking cookie • A tracking cookie is a cookie that tracks your browsing behaviors. • Marketers use this data to understand how users use their partner websites and optimize their networks for the average user that visits their networks. • Third party cookies • Third-party cookies are cookies that are set by one site, but can be read by another site. • For example, when you visit site1.com, it might set a cookie that can be read by site2.com. • Some advertisers use these types of cookies to track your visits to the various websites on which they advertise. • By themselves, cookies might not necessarily be bad, but third-party cookies can be a lot of trouble because you may not know what the source is.

  12. Not just a gelatinous cube of mixed meat particles • Named after the Monty Python sketch • Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. • Phishing can come from Spam • The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. • You won the lottery • You need to help a foreign minister from Nigeria • Mr. Song Lee from Hang Seng International Bank

  13. Kill them with fire!!!1! • How do we prevent this from happening • Hardware • Unified Threat Management device (Astaro Security Gateway) • Router with a built-in firewall • Software • Anti-virus, spy-ware, and malware software suites (Kaspersky, AVG, McAfee, Symantec, Microsoft Security Essentials) • You!!!! • Don’t click on links or files in e-mails • Keep your operating system software fully updated • Disable third-party cookies in your favorite browser • STOP USING INTERNET EXPLORER 6!!! • Don’t ignore threats from your PC’s anti-bad stuff software • Backup your important files on a regular basis • Online with Mozy or Carbonite • Microsoft offers 25GB of storage for free on their Skydriveservice • External hard drive with push-button backup • . . .or

  14. BUY A MAC!!!!! . . . or

  15. USE LINUX!!!!!

  16. What do you do if you are infected with. . . • Adware or spyware • AdAware, SpySweeper, or some other program can remove the threat pretty easily • Viruses or worms • Depends on the virus • Some virus removal programs will remove the threat. . .but the bad news is more often than not there is irreparable harm to the PC • Which means you might have to. . .

  17. NUKE IT!!!!!!!!1!! • DBaN • Darik’s Boot and Nuke • Program that writes random ones and zeros over a hard drive • Permanently wipes your hard drive

More Related