Top Banner
Homeland security and cyber crime
33
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter14

Homeland security and cyber crime

Page 2: Chapter14

Defining Homeland Security:

A concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.

Page 3: Chapter14

Defining Terrorism:

The unlawful use of force against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.

Page 4: Chapter14
Page 5: Chapter14

The Changing Global Context of Terrorism

Osama bin Laden and Al Qaeda

Domestic Terrorism

Evolving Threat Patterns◦ The Diffusion of Al Qaeda

◦ The Internationalization of Domestic Terrorism

Page 6: Chapter14
Page 7: Chapter14

Questions:◦ How has the War on Terrorism changed the

criminal justice system in the United States?

◦ Is terrorism something you worry about on a regular or semi-regular basis? Does this worry alter your behavior?

Page 8: Chapter14

Identify three important trends in international terrorism.

Page 9: Chapter14

Trends identified by homeland security expert Brian Jenkins:

• Terrorists have developed more efficient means of managing their finances.

• Terrorists have developed more efficient models of organization.

• Terrorists have exploited new communication technology.

Page 10: Chapter14

Explain why the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA) is an important legal tool against terrorists.

Page 11: Chapter14

The Antiterrorism and Effective DeathPenalty Act (AEDPA):

Passed in 1995 in response to the OKC bombings

Prohibits persons from providing material support to foreign terrorist organizations (FTOs)

Page 12: Chapter14

The Patriot Act: Designed to “level the playing field.” Makes it easier for law enforcement to collect

information about suspected terrorists and detain them.

Enhances the ability of the government to keep non citizens suspected of terrorist activities out of the United States.

Targets the fundraising activities of terrorist organizations.

Page 13: Chapter14

The Patriot Act: Relaxes restrictions on information sharing between

government agencies. Creates a crime of “knowingly harboring a terrorist.”

Allows greater freedom in seizing email.

Funds allow the tripling of border patrol agents, customs inspectors, and immigration agents.

Non-citizens can be detained up to seven days without being informed of the charges against them.

Eliminates the statute of limitations for terror-related offenses.

Page 14: Chapter14

Describe the primary goals of an intelligence agency and indicate how it differs from an agency that focuses solely on law enforcement.

Page 15: Chapter14

Intelligence agencies rely on the following strategies to collect information:

◦ Electronic surveillance

◦ Human-source collection

◦ Open-source collection

◦ Intelligence sharing

◦ Counterintelligence

Page 16: Chapter14

Issues with the response to terrorism:

Terror related investigations have strained local law enforcement resources and led to crime increases in some areas.

Communication difficulties have led to dissatisfaction for many local agencies.

Page 17: Chapter14

Explain how American law enforcement agencies have used “preventive policing” to combat terrorism.

Page 18: Chapter14

Preventive Policing ◦ Prevent crimes before they occur

The Criminal Justice model

The Intelligence Model◦ Local Intelligence◦ The National Counterterrorism Center

Page 19: Chapter14

List the primary duties of first responders following a terrorist attack or other catastrophic event.

Page 20: Chapter14

Emergency Preparedness and Response◦ Duties include:

Securing the scene

Rescuing and treating any injured civilians

Containing and suppressing fires or other hazardous conditions

Retrieving those who have been killed

Page 21: Chapter14

Border Security

◦ Regulated Ports of entry 88 millions foreign visitors arrive through America’s

more than 100 international airports, with millions more crossing the borders with Mexico and Canada.

◦ Unregulated Ports of Entry Millions of people illegally cross into the United

States through the borders with Mexico and Canada each year.

Page 22: Chapter14

Explain how the Patriot Act has made it easier for federal agents to conduct searches during terrorism investigations.

Page 23: Chapter14

Terrorist Profiling Searches, Surveillance, and Security

◦ The Patriot Act and Searches Allows the FBI or other federal agencies to obtain

warrants for “terrorism” investigations, “chemical weapons” investigations, or “computer fraud and abuse” investigations as long as agents can prove that such actions have a “significant purpose” – no proof of criminal activity is required

◦ The Patriot Act and Surveillance

Page 24: Chapter14

Due Process and Indefinite Detention

Military Justice

• Enemy combatants tried by military tribunals rather than civilian courts

• No right to trial by jury

Changing CourseClosing GTMOAccessing Criminal CourtsAccessing Military Commissions

Page 25: Chapter14

Distinguish cyber crime from “traditional” crime.

Page 26: Chapter14
Page 27: Chapter14

Cyber crime is a crime that occurs online as opposed to the physical world.◦ Cyber Consumer Fraud

◦ Cyber Theft

◦ Identity Theft

◦ Phishing

◦ Cyber Aggression and the New Media Cyberstalking

Cyberbullying

Page 28: Chapter14
Page 29: Chapter14

Questions:

◦ Discuss the extent of identity theft?

◦ How can you prevent becoming a victim of identity theft?

Page 30: Chapter14

Describe the three following forms of malware: (a) botnets, (b) worms, and (c) viruses.

Page 31: Chapter14

Botnet – a network of computers that have been appropriated without the knowledge of their owners and used to spread harmful programs via the internet.

Worm – a computer program that can automatically replicate itself over a network such as the internet and interfere with the normal use of a computer.

Virus – a computer program that can replicate itself over a network such as the internet and interfere with the normal use of a computer; cannot exist as a separate entity and must attach itself to another program to move through a network

Page 32: Chapter14

Cyber Crimes in the Business World

◦ Hackers

◦ The Spread of Spam

◦ Pirating Intellectual Property Online

Page 33: Chapter14

Cyber Crimes Against the Community

Fighting Cyber Crime

◦ Challenges for Law Enforcement

Cyber Forensics

Jurisdictional Challenges

◦ Federal Law Enforcement and Cyber Crime

◦ Private Efforts to Combat Cyber Crime