1 / 32

Class Name, Instructor Name

Criminal Justice 2011. Chapter 14:. SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes. Class Name, Instructor Name. Date, Semester. CHAPTER SUMMARY. 14.1. Summarize vice crimes and laws. 14.2. Describe white-collar and corporate crime. 14.3.

sezja
Download Presentation

Class Name, Instructor Name

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Criminal Justice 2011 • Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes Class Name,Instructor Name Date, Semester

  2. CHAPTER SUMMARY 14.1 Summarize vice crimes and laws. 14.2 Describe white-collar and corporate crime. 14.3 : Summarize the crime of money laundering. Identify the different types of computer crime. 14.4 Describe how computer crime investigations are conducted. 14.5 Describe hit-and-run crimes and how they are investigated. 14.6

  3. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.1 Summarize vice crimes and laws.

  4. 14.1 Vice Crimes Generally speaking “vice crimes” involve conduct that is both illegal and immoral Picture of a prostitute working the streets

  5. 14.1 Vice Crimes • Prostitution and related crimes • Illegal Gambling • Pornography including child pornography • Drugs

  6. 14.1 Vice and Sexual Morality Statutes Many states have such laws… Photo placeholder

  7. 14.1 Vice and Sexual Morality Statutes Specific crimes in Wisconsin: Photo placeholder

  8. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.2 Describe white-collar and corporate crime.

  9. 14.2 White Collar Crime Non-violent Committed for financial gain Accomplished by means of deception

  10. 14.2 White Collar Crime The statutes are quite complicated! “By virtue of his or her office, business or employment, or as trustee or bailee, having possession or custody of money or of a negotiable security, instrument, paper or other negotiable writing of another, intentionally uses, transfers, conceals, or retains possession of such money, security, instrument, paper or writing without the owner’s consent, contrary to his or her authority, and with intent to convert to his or her own use or to the use of any other person except the owner.” Wisconsin State Statute, 943.20(1)(b)

  11. 14.2 Corporate Crime A form of White Collar crime… Misleading investors Cheating customers Environmental Crimes Concealing defects

  12. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.3 Summarize the crime of money laundering.

  13. 14.3 Money Laundering Step One: Illegally earn $$$ Step Two: Hide $$$ from The Government Step Three: Use legitimate Businesses to “wash” the $$$ Step Four: Obtain the $$$ back

  14. 14.3 Methods of Money Laundering It is as varied as the businesses that exist in this country, both small and large Money orders Acquiring financial institutions Bank Methods Smurfing Currency Exchanges Double Invoicing

  15. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.4 Identify the different types of computer crime.

  16. 14.4 Types of Computer Crime The introduction of fraudulent records or data Unauthorized use of computer-related facilities The alteration or destruction of information or files Stealing through use of the computer

  17. 14.4 Computer Crimes • Old Crimes in a new way Stalking Harassment Child pornography

  18. 14.4 Computer Crimes • New Crimes in a new era Hacking Scanning Masquerading Trojan horses, viruses, data diddling, piracy, etc…

  19. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.5 Describe how computer crime investigations are conducted.

  20. 14.5 Two Categories Computer Components Computer Hardware Software

  21. 14.5 Investigating Computer Crime • Obtain computer evidence • Examine computer evidence • Preserve evidence for court purposes • Interview the suspect

  22. 14.5 Investigating Computer Crime • Obtaining computer evidence… Insert a picture of the inside of a computer here please Computer media Computer data Evidence online Other computer evidence including peripherals

  23. 14.5 Investigating Computer Crime • Examining computer evidence… Insert a picture of an online “history” Here please Computer media Computer data Evidence online Other computer evidence including peripherals

  24. Learning Objectives After this lecture, you should be able to complete the following Learning Outcome • 14.6 Describe hit-and-run crimes and how they are investigated.

  25. 14.6 Hit and Run Crimes Causing injury Or damage Leaving the Scene

  26. 14.6 Hit and Run Crime • Felony If death or an injury is the result of the accident The person who caused the accident knows that the accident occurs The suspect flees the scene without aiding the victim

  27. 14.6 Hit and Run Crime • Misdemeanor If damage is the result of the accident The person who caused the accident knows that the accident occurs The suspect flees the scene without notifying police or the owner of the property

  28. 14.6 Investigating Hit and Run • Step One Respond to the scene quickly Be on the alert for vehicles fleeing the scene with fresh damage Protect the scene when you arrive from further accidents

  29. 14.6 Investigating Hit and Run • Step Two Aid any victim that is injured Update dispatch Obtain statement regarding H&R vehicle

  30. 14.6 Investigating Hit and Run • Step Three Send out BOLO Process crime scene Return scene to normal

  31. 14.6 Investigating Hit and Run • Step Four Send out TTY to other jurisdictions Send evidence to Crime Lab for analysis Check garages for vehicle repairs that match suspect damage

  32. CHAPTER REVIEW 14.1 Summarize vice crimes and laws. 14.2 Describe white-collar and corporate crime. 14.3 : Summarize the crime of money laundering. Identify the different types of computer crime. 14.4 Describe how computer crime investigations are conducted. 14.5 Describe hit-and-run crimes and how they are investigated. 14.6

More Related