1 / 11

Unit 7 - Encryption CJ 315 - Dr. Joe Ciccone

Unit 7 - Encryption CJ 315 - Dr. Joe Ciccone. It is all about the crime. Last Week & FERPA. Summary of your week Federal Laws FERPA Why was it enacted Do you feel safe at college? This week Federal Data on Crime & Violence Practical Use of Tech Info. Key Terms & Places.

gamba
Download Presentation

Unit 7 - Encryption CJ 315 - Dr. Joe Ciccone

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Unit 7 - EncryptionCJ 315 - Dr. Joe Ciccone It is all about the crime

  2. Last Week & FERPA • Summary of your week • Federal Laws • FERPA • Why was it enacted • Do you feel safe at college? • This week Federal Data on • Crime & Violence • Practical Use of Tech Info

  3. Key Terms & Places Secure Sockets Layer (SSL) - Security protocol that protects data sent between web browsers and web servers. Spyware - Software that installs itself on people's computers usually when they download free programs; this software tracks users movements around the Internet and serves up pop-ads. Platform for Privacy Preferences Project (P3P) - a technological framework that relies on predefined standards set by the user to negotiate with web sites about how that user's information will be utilized and disseminated to third parties.

  4. UCR Links – Federal Law Enforcement • 2008 Report • Crime Clock - Crime Map • http://www.fbi.gov/ucr/cius2008/about/crime_clock.html • Violent Crime – 23 second • Property Crime – 3 second

  5. National Incident-Based Reporting System(NIBRS) – Crp. Mike Roberts • Consists of individual incident records for the 8 Index crimes and 38 other offenses with details on • Offense • Victim • Offender • Property • Records each offense occurring in incident • Distinguishes between attempted and completed crimes • Expands burglary hotel rule to include rental storage facilities • Records rape of males and females • Restructures definition of assault • Collects weapon information for all violent offenses • Provides details on arrests for the 8 Index crimes and 49 other offenses.

  6. Crimes in the Electronic Frontier • We have looked at the various vulnerabilities on the Internet, software piracy, computer sabotage, and electronic break-ins.  • Trespassing in cyberspace ~ • Encryption does it really work? • How can we protects the Internet user? • How can the Police help us?

  7. Field Trip Reports • Web Field Trip: No Electronic Theft Act • The No Electronic Theft ("NET") Act and see the actual language of the act. • Web Field Trip: Encryption • Cryptography at the Center for Democracy & Technology web site.

  8. NIBRS – Name that Criminal • http://bjs.ojp.usdoj.gov/content/nibrs.cfm • In 1982, BJS and the FBI sponsored a study of the UCR Program with the objective of revising it to meet law enforcement needs into the 21st century. A 5-year redesign effort to provide more comprehensive and detailed crime statistics resulted in the National Incident-Based Reporting System (NIBRS) which collects data on each reported crime incident. The UCR Program is currently being expanded to NIBRS. • Currently 23 states and 5271 Agencies – are participating. • HATE Crimes

  9. Crime and Change~What will happen tomorrow?

  10. Sources of data discrepanciesbetween Summary UCR and NIBRS Human error • Misclassifications of • Aggravated assault • Motor vehicle theft • Larceny Hierarchy • Suppression of multiple offenses by hierarchy rule Operational • Modified offense definitions • Converting State penal code to FBI crime definitions • Over-reporting because of State practices • Recording every possible offense with which offender may be charged Computer • Inadequate programming

  11. Thank you for all of your work this term! • Dark Figure of Crime – Changes in Tech Crime • Methodology – Survey - Questionnaire • http://bjs.ojp.usdoj.gov/index.cfm?ty=pbdetail&iid=1975 • National Crime Victimization Survey, Basic Screen Questionnaire • Problems & Questions from you? • THANK YOU • Have a great week • Check your Grade book 

More Related