CJ 220 Test #3

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/101

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

102 Terms

1
New cards

Expressive violence-

 designed not for profit or gain but to vent rage, anger or frustration (e.g 9/11, OKC bombing, Jan 6, violence against women)

2
New cards

Hirschi/Godfrey view on interpersonal violence chapters

would say these chapters are a waste of time

3
New cards

Instrumental violence

used to maintain or improve the financial or social position (robbery, IPV)

4
New cards

Causes of violence

personal traits, child abuse and neglect, human instinct, exposure to vilence (violence in home, watching vilence, exposure), substance abuse (relating to higher violence+ aggravating), firearm availability (seems to trigger ego +aggravating violence), cultural values, national values

5
New cards

Rape

  • The common law definition: the carnal knowledge of a female forcibly and against her will

  • Contemporary statutes: gender neutral and include various acts of sexual penetration

  • Not a sexual crime, but a crime of violence, a coercive act of aggression

  • Used as a weapon in war: Russia uses rape against Ukranian women

  • UCR data says 140,000 rapes reported each year, constant for a while

  • Warm weather crime

  • Higher rates in metropolitan areas

  • NCVS data 500,000 rapes and sexual assaults during last survey year

6
New cards

Types of rapists

according to A. Nicholas Groth anger rapists 40%, power rapists 55%, sadistic rapists 5%

7
New cards

Types of rape:

date rape, on campus, marital rape, statuatory, by deception, sex in authority relations

8
New cards

Causes of rape:

 evolutionary factors, male socialization, psychological abnormality, social learning, gender conflict view, sexual motivation

9
New cards

Rape and law

proving rape- extremely challenging for prosecutors, consent: essential to prove that the attack was forced and that the victim did not give voluntary consent to their attacker, legal reform: ongoing effort to both create sensitivity to the plight of victims and change the content of rape laws

10
New cards

Murder and homicide

  • Murder is the unlawful killing of a human being with malice aforethought

  • Degrees of murder: first degree (premeditation and deliberation), second degree (malice aforethought), manslaughter (voluntary/nonnegligent, involuntary/negligent)

  • Deliberate indifference, “born and alive”- person must be born to be applicable

  • Since 1991, the murder rate has been steadily declining: tends to be an urban crime, victims and offenders tend to be males, about half of murder victims are African Americans, 90% of offenders and victims have the same race, about ⅓ of victim and half of offenders tend to be under 25 years of age

  • Offenders tend to have long criminal careers

11
New cards

Murderous relations

  • Acquaintance murders: often the result of a long-simmering dispute, motivated by revenge, dispute resolution, jealousy, drug deals, racial bias, or threats to identity or status

  • Intimate partner murder: husbands and wives, boyfriends and girlfriends, and other romantic partners

  • Sexually based murders: reasons for men versus women

  • Stranger murders: approx 20% of all murders

  • School murders: has become commonplace

12
New cards

Serial killers

a person who kills 3 or more persons in 3 or more separate events

13
New cards

Types of serial killers:

  1. Thriller strives for sexual sadism or dominance

  2. Mission killers desire to reform the world

  3. Expedience killers desire profits or desire protection from perceived threat

14
New cards

Mass murderers

  • Revenge killers: seek to get even with individuals or society at large

  • Love killers: motivated by a warped sense of devotion

  • Profit killers: usually trying to cover up a crime, eliminate witnesses, and carry out a criminal conspiracy

  • Terrorist killers: trying to send a message

15
New cards

Spree killers-

 a killer of multiple victims whose murders occur over a relatively short span of time and often follow no discernible pattern

16
New cards

Assault:

attempted battery or intentionally frightening the victim by word or deed (not touching), battery requires offensive touching

17
New cards

Nature and extent of assault

  • About 230 assaults per 100000 people are reported annually to police

  • Most people arrested for assaults are young, white, and male

  • Most assaults occur in urban areas, in the summer, and in the south and west

18
New cards

Acquaintance and family assault

  • Child abuse: neglect; child sexual abuse

  • Parental abuse

  • Spousal abuse

  • Dating violence: relational aggression

19
New cards

Robbery

the taking or attempting to take anything of value from the care, custody, or control of a person or persons by force or threat of force or violence and/or by putting the victim in fear

20
New cards

Robbers in action

 targets are vulnerable, accessible, and profitable

21
New cards

Choosing targets

Targeting criminals

Acquaintance robbery

  • Victims are often reluctant to report

  • Some are motivated by street justice

  • Robbers know there will be a “good take”

  • Victims are often convenient targets

22
New cards

Carjacking

  • Carefully planned and carried out by experienced criminals

  • Must have perceptual and procedural skills and scare the victim

23
New cards

Contemporary forms of interpersonal violence

  • Hate crimes- violent acts directed toward a particular person or members of a group merely because the targets share a discernible racial, ethnic, religious, or sexual orientation. Roots of hate: thrill-seeking, reactive (defensive), mission, retaliatory. About 7500 reports each year, most motivated by race. Where victims could identify culprits, most victims were acquainted with their attackers

24
New cards

Controlling hate crimes

  • 45 states have laws against hate crimes, 27 states mandate collection of hate crime data

  • Hate crimes have stiffer penalties than those motivated by revenge, greed, or anger

  • Free speech

25
New cards

Workplace violence-

 second leading cause of occupational death or injury, 3rd leading cause of occupational injury or death

Typical offender is a middle aged white male who faces termination in a bad economy


26
New cards

Stalking

a course of conduct that is directed at a specific persona and involves repeated physical or visual proximity, nonconsensual communication, or verbal, written, or implied threats sufficient to cause fear in a reasonable person 

27
New cards

Stalking statistics

Stalking usually lasts one to two years, but the effects are felt long afterward

  • More than 3 million victims each year

  • Women more likely to be stalked than men

  • 75% of victims know their stalker in some way

  • 30% of stalkers are current or former intimate partners of their victims

28
New cards

Political crime

  • Illegal acts designed to undermine an existing government and threaten its survival

  • Violent and nonviolent acts

  • May stem from religious or ideological sources

  • Gray area between conventional and outlawed behavior

  • Most political criminals, even those who profit, consider themselves patriotic and altruistic

29
New cards

The “Arab Spring”

 in February 2011, the regime of long-term Egyptian dictator Hosni Mubarak was toppled. Similar protests broke out in Tunisia, Yemen, and Libya, where the regime of dictator Muammar Gaddafi was ousted. These revolts were not viewed as terrorist acts but popular political upheavals against hated and evil dictators. The world did not recoil when Gaddafi was apprehended and brutally killed on camera. 

30
New cards

Randy Borum’s four cognitive stages (becoming a terrorist/political criminal)

  • Stage 1: “its not right” an unhappy individual identifies some undesirable event -> grievance

  • Stage 2: “its not fair” conclusion that the undesirable event is a product of injustice

  • Stage 3: “its your fault” someone must be held accountable

  • Stage 4: "you're evil” targeted groups are appropriate choices for revenge and/or violence

31
New cards

Types of political crimes

  • Election fraud involves illegal interference with the political process, intimidation, disruption, misinformation, registration fraud, vote buying (most states have laws to control and punish election fraud)

  • Abuse of office/public corruption involves a breach of public trust and abuse of position by government officials and private-sector accomplices

  • Treason

  • Espionage, industrial espionage, legal controls

  • State political crime, using torture, ticking bomb scenario, torture warrant

32
New cards

Terrorism

  • The illegal use of force against innocent people to achieve a political objective

  • terrorist (engages in premeditated, politically motivated violence perpetrated against non combatant targets) and guerilla (operates in rural areas and attack the military, the police, and other government officials)

  • Terrorist and insurgent (engages in armed uprising, or revolt against an established civil or political authority)

  • Terrorist and revolutionary (engages in civil war against sovereign power that holds control of the land)

33
New cards

History of terrorism

  • Reign of terror, period of violence during the French Revolution from 1793-1794, maybe the first use of terrorism in the English language

  • Red terror- russian state-sanctioned violence and repression aimed at consolidating control and quelling opposition from 1918-1922

  • pre-WWI Europe

  • Nazi Germany

  • Irish Republican Army (IRA)- created in 1919 to end British rule in Ireland, the troubles were sectarian conflict from about 1968 to 1998 in Northern Ireland between Protestant unionists who wanted to remain part of the UK and Catholic nationalists who wanted to join Ireland. 13 Catholic protestors were killed on Bloody Sunday 1972. U2s 1983 song called sunday bloody sunday included on their 3rd album called war.

  • Attacks on Israel- dates to late 1930s with attacks on embassies and diplomats, 1972 Munich Olympic massacre Israeli team members hostage and killed by Black september organization a Palestinian militant group, Oct. 7 2023 massacre 1000+ Israelis killed in a massacre perpetrated by Hamas, Israel has been accused of engaging in state-sponsored terrorism and assassinations around the world.

  • Philippines- Spanish-American war ended Dec 1898, US also took control over Muslim conflicts which were still angry about Spanish takeover in the 1500s. Catholic nationalist rebellion began attacking US troops, began in 1872 with Spain executing 3 Filipino Catholic priests, while the Filipinos used guerilla tactics, they eventually pledged allegiance to the US in the 1900s. The muslims continue to fight and reset in the southern Philippines has gone on for over 400 years. Today there are still numerous Muslim terrorist groups in Mindanao: MNLF, ASG, isis of the Philippines.

34
New cards

Contemporary forms of terrorism

  • Political terroism, right and left wing political groups

  • Revolutionary terrorism: violence to frighten those in power and their supporters in order to replace the existing government with a regime that holds acceptable political or religious views

  • Nationalist terrorism: actions promote the interest of a minority ethnic group (or majority against minority) 

  • Retributive terrorism: use violence as a method to influence, persuade, or intimidate to achieve a particular objective

  • State-sponsored terrorism: carried out by a repressive government regime to force its citizens into obedience, oppress underrepresented groups and stifle political dissent

  • Lone actor terrorist- 

1.Plan and carry out an attack without assistance from others.

2.Not affiliated with terror organizations, nor are they under orders to take violent action.

3.May fit the disconnected-disordered profile or the caring-compelled profile.


35
New cards

Philippines

Spanish-American war ended Dec 1898, US also took control over Muslim conflicts which were still angry about Spanish takeover in the 1500s. Catholic nationalist rebellion began attacking US troops, began in 1872 with Spain executing 3 Filipino Catholic priests, while the Filipinos used guerilla tactics, they eventually pledged allegiance to the US in the 1900s. The muslims continue to fight and reset in the southern Philippines has gone on for over 400 years. Today there are still numerous Muslim terrorist groups in Mindanao: MNLF, ASG, isis of the Philippines.

36
New cards

Psychological view

  • After carefully reviewing existing evidence n the psychological state of terrorists, mental health expert Borum concludes

    • Mental illness is not a critical factor in explaining terrorist behavior. Alsom most terrorists are not psychopaths.

    • There is no terrorist personality nor is there any accurate profile -psychological or otherwise, of the terrorist

    • History of child abuse and trauma, and themes of perceived injustice and humiliation are often prominent in terrorist biographies but do not help to explain.

37
New cards

I.What Motivates the Terrorist? Psychological view.

  1. Mental illness is not a critical factor in explaining terrorist behavior, and most are not psychologically abnormal.

  2. Terrorism is not linked to mental illness or personality defects.

  3. There is no “terrorist personality.”

  4. Histories of childhood abuse and trauma and themes of perceived injustice are often prominent in terrorist biographies, but they don’t really help to explain terrorism.

38
New cards

Motivation

  • Psychological view: some if not all suffer from psychological deficits

  • Alienation view: lack of opportunity, religious beliefs

  • Family conflict view: products of dysfunctional families

  • Political views

  • Socialization

  • Ideological views

  • Explaining state-sponsored terrorism

39
New cards

Extent of terrorism threat

  • National consortium for START- a university of Maryland research and education center comprised of a network of scholars using science to identify the causes and human consequences of terrorism in the US and around the world

  • Between 2002 and 2019, IS carried out more than 41000 attacks which cause 33000 deaths

  • Asia and Africa and locations for the most attacks

  • Some of the active groups include the Taliban, Boko Haram, Al-Qaeda, Al-Shabaab, Houthi, Islamic State

40
New cards

Early responses to terrorism

  • Hijackings (1960s-70s), in 1974 security measures introducing screening and safeguarding measures began, metal detectors and baggage screening, the sky marshals program placed armed officers on US flights

  • 1985 the bombing of Air India flight 182 over the Atlantic ocean

  • 1988 the bombing of Pan Am flight 103 over Lockerbie, Scotland

  • 1996 introduced the aviation security plan of action to provide a systematic response to threats

  • World trade center bombing of 1993, truck bomb, 6 people killed and more than 1000 injured in what was at the time the deadliest act of terrorism perpetrated on US soil

  • OK City terrorist attack, 1995, domestic terrorism, 168 people died Terry Nichols with Timothy McVeigh 1968 were both found guilty of the bombing

  • 9/11 19 international terrorist flew 4 commercial planes into 2 buildings and 1 field, estimated 2977 people were killed

41
New cards

Combatting terrorism with political change

  • According to the Rand Corporation, a nonprofit research group, the following steps are required to defeat Jihadist groups

    • Attack the ideological underpinnings of global jihadism

    • Sever ideological and other links between terrorist groups

  • Director of national intelligence established in 2004

    • DNI leads and directs the 18 agencies of the intelligence community

    • Manages the allocation and expenditure of budget allocated by congress

  • Federal law enforcement made terrorism its #1 commitment, joint terroism task forces formed

  • Department of Homeland Security- preventing terrorist attacks in the US, reducing America’s vulnerability to terrorism, minimizing attacks and recovering.

  • State and major local law enforcement have terrorism operation and information centers

  • Local law enforcement- NYC have established counterterrorism bureau

42
New cards

National network of fusion centers

a fusion center is a collaborative effort of two or more agencies that provide resources, expertise and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity.

43
New cards

USA patriot act

legislation giving US law enforcement agencies a freer hand to investigate and apprehend suspected terrorists

  • Expanded all four traditional tools of surveillance: wire taps, search warrants, pen/trap orders (recording phone calls), subpoenas

44
New cards

MSU established the terrorism and preparedness data resource center housed at UofM

sought to archive and distribute data that are relevant to the study of terrorism and the response to terrorism for descriptive and scientific analysis by academics and researchers

45
New cards

USA freedom act-

replaced patriot act in 2015 preventing the NSA from continuing its mass phone data collection program

46
New cards

Jan 6. Attack on capital-

 estimated 140 police officers were criminally assaulted, groups of individuals sought to hang VP Mike Pence by Jan 2025

47
New cards

Intellectual property theft

  • The unlawful or unauthorized act of using, replicating, distributing, or exploiting someone else’s intellectual property without permission or authorization from the owner

  • Occurs when individuals or entities violate the exclusive rights granted to the creators or owners of IP under various legal frameworks such as patents, trademarks, copyrights, and trade secrets.

48
New cards

Counterfeiting

producing and selling counterfeit goods that imitate the design, appearance, or brand of original products

49
New cards

Copyright infringement

 reproducing, distributing, or displaying copyrighted materials without authorization from the copyright owner (e.g plagiarism)

50
New cards

Online privacy:

distributing copyright content such as movies, music, or software, through unauthorized online channels often through file sharing platforms or illegal streaming websites

51
New cards

Trade secret theft:

illegally accessing, using, or disclosing confidential business information or trade secrets without authorization

52
New cards

Industrial espionage:

gathering information or trade secrets from competitors through illicit means like spying or hacking

53
New cards

Malicious insiders:

when current or former employees steal IP such as proprietary technology, trade secrets, or sensitive data, either for personal gain or to benefit a competitor.

54
New cards

What is counterfeiting?

  • A fake or unauthorized replica of a genuine product, such as money, documents, designer items, or other valuable goods

  • Made in exact imitation of something valuable or important with the intention to deceive or defraud

  • A fraudulent imitation of something else: a forgery

55
New cards

2.5% of world imports estimated counterfeit goods

Pharmaceuticals (cancer, diabetes, malaria, antibiotics, pain killers), healthcare supplies, technologies, eyewear

56
New cards

Fake malaria meds

responsible for estimated 72000-267000 preventable deaths annually in sub-Saharan Africa in 2014, US government largest purchaser/distributor

57
New cards

2023 pharmaceutical crime

annual incidents more than 6900

58
New cards

Often counterfeited, $1 trillion market:

food (olive oil, seafood, honey, dairy etc.). Car parts and machinery (airbags, brake pads, wheels), golf merchandise, clothing

59
New cards

Consequences of counterfeits:

safety, identity theft and fraud, economic impact- lost taxes, corporations loss, support of organized crime and terrorism

60
New cards

Blue collar crimes

common law theft crimes such as larceny, burglary, and arson

61
New cards

White collar crimes

crimes that involve business enterprise such as embezzlement, price fixing, and bribery (part 1 felony offenses under UCC)

62
New cards


green-collar crime

violations of law designed to protect the environment

63
New cards

History of economic crimes

  • Theft: the intentional taking, keeping, or using of another’s property without authorization or permission

  • 3 groups of property criminals in 18th century (skilled thieves, smugglers, poachers)

  • Development of white and green collar- became more prominent in the industrial era, Edwin Sutherland first defined white collar crime, green collar crime is a subdivision of white collar crime and is motivated by profit

64
New cards

Blue collar criminals explained

  • Occasional criminals, do not view themselves as committed career criminals, situational inducement is an unplanned opportunity to commit crime

  • Professional criminals- make a significant portion of income from crime, nonviolent forms of criminal behavior are undertaken with high degree of skill for monetary gain and maximize opportunities while minimizing odds of apprehension

  • Larceny- constructive possession, petit (petty) larceny, grand larceny 1000+ or varies state

  • Shoplifting- snitches, boosters, booster box, merchant privilege laws

  • Credit card theft- costs hundred of billions each year, law passed in 1971 limits customer’s liability to $50 per card

  • Auto theft- in $65 billion losses annually

  • Bad checks

  • Receiving and fencing stolen property

65
New cards

Burglary-

  • entering a home by force, threat or deception with intent to commit a crime

    • According to UCR aobut 1.1 mil occur every year

    • Declining rates over past decade

    • Most occur in daytime hours

    • Average loss is more than  $2600

66
New cards

Arson

  • the willful, malicious burning of a home, public building, vehicle, or commercial building

    • 45000 arsons reported annually

    • Some arsonists are emotionally disturbed

    • Some are professionals who set fires to gain profit

67
New cards

White collar crime- explained

  • Any business-related act that uses deceit, deceptions, or dishonesty to carry out a criminal enterprise

  • Business fraud and swindles (ponzi schemes, telemarketing swindles)

  • Chiseling- ongoing conspiracy to use one’s business position to cheat institutions or individuals by providing them with fault or bogus goods and services or by providing services that violate legal controls on business practices (e.g insider trading= financial chiseling) 

  • exploitation -clear right to expect a service, and the offender threatens to withhold the service unless additional payment, sexual and financial

  • Influence peddling- in govt/business, bribing

  • Employee fraud and embezzlement- employee theft and pilferage, management fraud, embezzlement

  • Client fraud- health care fraud- healthcare provider engages in fraud in obtaining patients and administering their treatment, patients try to scam the system for their own benefit. 

  • Tax evasion- must show that offenders purposely attempted to evade or defeat a tax payment, otherwise its “passive neglect”

  • Corporate crime- institutions or their representatives willfully violate the laws that restrain these institutions from doing social harm or require them to do social good. Illegal restraint of trade - conspiracy that stifles competition, creates a monopoly, artificially maintain prices, or otherwise interfere with free market competitor. The Sherman antitrust act outlaws conspiracy among corporations designed to control the marketplace.

    • Price fixing- 2 or more competitors cannot sell the same or similar product at an agreed price

    • Deceptive pricing- contractors provide incomplete or misleading information on how much it will cost to fulfill a contract

    • False claim advertising.

68
New cards

Green collar crime explained

also known as environmental or ecological crime. Conservation criminology- the study of harms and crime against the environment, study of environmental law and policy, study of corporate crimes and the environment, and environmental justice from a criminology standpoint. began in 1990s, grew out of civil rights movement

  • No agreement on what falls within this area

  • Legalist- violations of existing laws designed to protect people, the environment, or both

  • Environmental justice- broader view than existing laws allow

  • Biocentric- any human activity that disrupts a biosystem

  • the harm perspective holds that all serious social harms should be included when conceptualizing crime.

69
New cards


Carole gibbs-

 conservation criminology and global trade in electronic waste

70
New cards

Forms of green collar crime

- worker safety/environmental crimes, illegal logging, illegal wildlife exports/fishing, dumping and polluting

71
New cards

Public order crimes

 behavior that is outlawed because it threatens the general well being of society and challenges its accepted moral principles, sometimes referred to as victimless crimes” 1. Violates the moral order but has no specific victim other than society 2. Prohibited because one of the functions of criminal law is to express a shared sense of public morality

72
New cards

Social harm

 immoral acts can be distinguished from crimes nased on the injury they cause

  • Acts that cause harm or injury are outlawed and punished as crimes

  • Acts, even those that are vulgar, offensive, and depraved, are not outlawed if they harm no one

73
New cards

Moral crusaders/crusades

  • The temperance movement: a campaign during the 19th and 20th centuries that advocated for the reduction or elimination of alcohol consumption, initially the focus was on modernization but it grew to demand legally enforced abstinence. The movement led to 18th amendment to the US constitution which enacted nationwide abstinence 1920 to 1933

  • Antimiscegnation laws: the criminalization of sexual relationship and reproduction between members of different ethnic races, in early america, miscegenation was fairly accepted (pocahontas and john rolfe were the 1st to from an interracial marriage in US), towards the later 17th 

    • These laws were used to imprison those who married or were having intimate relations because of a combination of racism and sexuality, economic exploitation, fear of an alliance between African Americans and American Indians, religion 

    • In 1661 VA passed legislation prohibiting interracial marriage and later passed a law that prohibited ministers from marrying mixed race couples, fine was 10000 pounds of tobacco

    • Some states statutes prevented residents from travelling to another state to marry and did not consider such marriages legal, “preserving white racial purity”

    • SC upheld these laws in 1883 and congressmen up to 100 years ago have tried to add amendment

    • In 1967 18 states still had laws prohibiting interracial marriages

    • In loving v virginia the SC ruled that these laws were unconstitutional because they violated the equal protection clause of the 14th amendment

    • 2022 congress passed the respect for marriage act, codifying Loving v Virginia

    • In 1958 only 4% of Americans approved, by 2020 94% of americans approved of interracial marriage

74
New cards

Same sex marriage protections

  • 1996 defence of marriage act defined marriage as a union between one man and one woman, Lawrence v Texas made it impermissible for states to criminalize oral and anal sex under statutes prohibiting sodomy, Obergefell v. Hodges ruled that same sex bans violated the 14th amendment, Clarence Thomas said they should “reconsider” the Obergefell v Hodges, Griswold, and Lawrence cases in Dobbs v. Jackson.

  • Obergefell decision based on Loving

75
New cards

other moral crusades

  • Prayer in school

  • Gun ownership

  • Sexually explicit books and magazines

  • abortion

76
New cards

What “cruel and unusual harmful act was prohibited across many parts of the US between 1661 and 1980

miscegenation/ sexual relations and reproduction between members of different ethnic races

77
New cards

Substance abuse

  • Long history dates to Mesopotamia, ancient Greece, and the Crusades.

  • Drinking has gone down over the past 30 years, as well as other drug use

78
New cards

Why gateway drugs likely matter:

adolescence is a period of transition characterized by significant hormonal, psychosocial, and neural changes, increased vulnerability to stress and risk taking behaviors such as sensation seeking, recreational drugs likely to change the brain

  • Smoking (nicotine)

  • Alcohol

  • Marijuana

CDC reported 24% reduction in US drug overdoses in 2024

79
New cards

Causes of substance abuse

  • Subcultural view, psychological view, genetic factors, social learning, problem behavior syndrome, rational choice

80
New cards

Substance abuse harms

  • Drug use and crime- interferes with maturation and socialization, drug addiction increased frequency but not necessarily the violence of criminal activity, share roots in impulsive and deviant behavior, creates need to finance drug habit, criminal deviance increases probability of later drug use

  • Alcohol and its prohibition- temperance movement, the 18th amendment passed in 1919 to prohibit sale of alcoholic beverages

  • Prohibition failed due to several reasons including organized crime supplying alcohol

81
New cards

Drugs and the law

  • Pure food and drug act- requires manufacturers to list amount of habit-forming drugs on product labels but did not restrict their use

  • Harrison Narcotics Act 1914- restricted im

  • Narcotic control act of 1956 increased penalties for drug offenders, since 197- various federal laws have attempted to increase penalties imposed on drug smugglers and to limit the manufacture and sale of newly developed substances

82
New cards

Drug control strategies

  • Source control- deter the sale and importation of drugs through systemic apprehension of large-volume drug dealers

  • Interdiction strategies

  • Law enforcement strategies

  • Punishment strategies

  • Community strategies

  • Drug education and prevention strategies

  • Drug-testing programs

  • Treatment strategies

  • Employment programs

83
New cards

Legalization of drugs

  • War on drugs has cost more than $500 billion in the past 20 years

  • Federal and local governments spend $28 billion of drug control and treatment each year

  • More people die each year from abuse of legal drugs than are killed in drug wars or die from abusing illegal drugs

  • Legalization by government control of price and distribution, taxes

  • Opponents argue that legalization might increase drug use creating an even larger group of nonproductive drug dependent people who must be cared for by the rest of society

84
New cards

Crime trends

after decades of declining rates, England and Wales crime rates doubled in 2015 when cybercrime events were included in their national victimization survey

85
New cards

The US victimization rate (cyber victimization

identity theft- irregular/stable 7-10%, cyberbullying- increasing, cyberstalking- decreasing, financial fraud- increasing) has been measured with various instruments with varying results.

86
New cards

Cybercrime

the theft and/ or destruction of information, resources, or funds via computers, computer networks, or the internet

87
New cards

3 types of cybercrime

  • Cybertheft- using a computer network for criminal profits: copyright infringement, identity theft, securities fraud

  • Cybervandalism- attacks aimed at disrupting, defacing, and destroying technology

  • cyberwar/cyberterrorism- using computers for acts of war, spying, and disrupting other’s networks

88
New cards

Cybertheft for profit

  • Theft from ATM (POS terminals/fuel pumps)- using a device or camera on an ATM that copies data from a bank card’s magnetic strip when a customer uses the ATM, adding skimming devices

  • Distributing illegal or dangerous services and materials e.g. obscenity (pornography), prosecuting internet pornography

  • Distributing dangerous drugs, counterfeit

89
New cards

Denial of service attacks (DoS)-

 involve threats or attacks to prevent the legitimate operation of the site, some have monetary objective while others don’t

90
New cards

Internet extortion/ransomware-

malware attached to an email or compromised website that freezes a computer, cryptowall ransomware

91
New cards

Illegal copyright infringement

warez, file sharing

92
New cards

Internet securities fraud

market manipulation, fraudulent offering of securities, illegal touting

93
New cards

Identity theft-

phishing, spear-phishing

94
New cards

E-tailing fraud

illegal buying/selling merchandise on the internet

95
New cards

Cybercrime with malicious intent

  • Worms, viruses, logic bombs ets

  • Worms- use computer networks or the internet to

  • viruses

  • Logic bombs- slag code- delayed action virus that may be set off when certain data is entered

  • Website defacement- hacker accesses the victim’s website and enters misleading or damaging information, vandalize rather than profit

  • Cyberstalking- using internet to stalk

96
New cards

Cyberstalking victimization 2019- 3.4 million 16+ were victims of cyberstalking

  • 67% knew their stalker

  • Females stalked +2x than males

  • 67% of victims of both cyber and traditional stalking were fearful of being killed/physically harmed

  • More likely to be stalked by an intimate partner

  • 80% of people talk about taking protection against stalking

  • Viewed as less criminal than physical stalking

  • Growing challenge in CJ system

97
New cards

Stalking legislation

  • Federal law prohibits anonymous internet communication eith intent to annoy, abuse, threaten, or harass, punishable but up to 5 years in prison

  • Most states have also enacted their own specific legislation with varying degrees and definitions of protections

  • MI- malicious use of telecommunications services act

98
New cards

Responding to cyberstalking

millions of reported cases, peak 80 cases prosecuted under federal statute in 2019

99
New cards

Cyberbullying

non consensual posting of photos/videos, catfishing

100
New cards

Cyberspying

 involves govt, NSA/Edward Snowden