320 likes | 465 Views
Criminal Justice 2011. Chapter 14:. SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes. Class Name, Instructor Name. Date, Semester. CHAPTER SUMMARY. 14.1. Summarize vice crimes and laws. 14.2. Describe white-collar and corporate crime. 14.3.
E N D
Criminal Justice 2011 • Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes Class Name,Instructor Name Date, Semester
CHAPTER SUMMARY 14.1 Summarize vice crimes and laws. 14.2 Describe white-collar and corporate crime. 14.3 : Summarize the crime of money laundering. Identify the different types of computer crime. 14.4 Describe how computer crime investigations are conducted. 14.5 Describe hit-and-run crimes and how they are investigated. 14.6
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.1 Summarize vice crimes and laws.
14.1 Vice Crimes Generally speaking “vice crimes” involve conduct that is both illegal and immoral Picture of a prostitute working the streets
14.1 Vice Crimes • Prostitution and related crimes • Illegal Gambling • Pornography including child pornography • Drugs
14.1 Vice and Sexual Morality Statutes Many states have such laws… Photo placeholder
14.1 Vice and Sexual Morality Statutes Specific crimes in Wisconsin: Photo placeholder
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.2 Describe white-collar and corporate crime.
14.2 White Collar Crime Non-violent Committed for financial gain Accomplished by means of deception
14.2 White Collar Crime The statutes are quite complicated! “By virtue of his or her office, business or employment, or as trustee or bailee, having possession or custody of money or of a negotiable security, instrument, paper or other negotiable writing of another, intentionally uses, transfers, conceals, or retains possession of such money, security, instrument, paper or writing without the owner’s consent, contrary to his or her authority, and with intent to convert to his or her own use or to the use of any other person except the owner.” Wisconsin State Statute, 943.20(1)(b)
14.2 Corporate Crime A form of White Collar crime… Misleading investors Cheating customers Environmental Crimes Concealing defects
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.3 Summarize the crime of money laundering.
14.3 Money Laundering Step One: Illegally earn $$$ Step Two: Hide $$$ from The Government Step Three: Use legitimate Businesses to “wash” the $$$ Step Four: Obtain the $$$ back
14.3 Methods of Money Laundering It is as varied as the businesses that exist in this country, both small and large Money orders Acquiring financial institutions Bank Methods Smurfing Currency Exchanges Double Invoicing
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.4 Identify the different types of computer crime.
14.4 Types of Computer Crime The introduction of fraudulent records or data Unauthorized use of computer-related facilities The alteration or destruction of information or files Stealing through use of the computer
14.4 Computer Crimes • Old Crimes in a new way Stalking Harassment Child pornography
14.4 Computer Crimes • New Crimes in a new era Hacking Scanning Masquerading Trojan horses, viruses, data diddling, piracy, etc…
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.5 Describe how computer crime investigations are conducted.
14.5 Two Categories Computer Components Computer Hardware Software
14.5 Investigating Computer Crime • Obtain computer evidence • Examine computer evidence • Preserve evidence for court purposes • Interview the suspect
14.5 Investigating Computer Crime • Obtaining computer evidence… Insert a picture of the inside of a computer here please Computer media Computer data Evidence online Other computer evidence including peripherals
14.5 Investigating Computer Crime • Examining computer evidence… Insert a picture of an online “history” Here please Computer media Computer data Evidence online Other computer evidence including peripherals
Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.6 Describe hit-and-run crimes and how they are investigated.
14.6 Hit and Run Crimes Causing injury Or damage Leaving the Scene
14.6 Hit and Run Crime • Felony If death or an injury is the result of the accident The person who caused the accident knows that the accident occurs The suspect flees the scene without aiding the victim
14.6 Hit and Run Crime • Misdemeanor If damage is the result of the accident The person who caused the accident knows that the accident occurs The suspect flees the scene without notifying police or the owner of the property
14.6 Investigating Hit and Run • Step One Respond to the scene quickly Be on the alert for vehicles fleeing the scene with fresh damage Protect the scene when you arrive from further accidents
14.6 Investigating Hit and Run • Step Two Aid any victim that is injured Update dispatch Obtain statement regarding H&R vehicle
14.6 Investigating Hit and Run • Step Three Send out BOLO Process crime scene Return scene to normal
14.6 Investigating Hit and Run • Step Four Send out TTY to other jurisdictions Send evidence to Crime Lab for analysis Check garages for vehicle repairs that match suspect damage
CHAPTER REVIEW 14.1 Summarize vice crimes and laws. 14.2 Describe white-collar and corporate crime. 14.3 : Summarize the crime of money laundering. Identify the different types of computer crime. 14.4 Describe how computer crime investigations are conducted. 14.5 Describe hit-and-run crimes and how they are investigated. 14.6