1/101
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Expressive violence-
designed not for profit or gain but to vent rage, anger or frustration (e.g 9/11, OKC bombing, Jan 6, violence against women)
Hirschi/Godfrey view on interpersonal violence chapters
would say these chapters are a waste of time
Instrumental violence
used to maintain or improve the financial or social position (robbery, IPV)
Causes of violence
personal traits, child abuse and neglect, human instinct, exposure to vilence (violence in home, watching vilence, exposure), substance abuse (relating to higher violence+ aggravating), firearm availability (seems to trigger ego +aggravating violence), cultural values, national values
Rape
The common law definition: the carnal knowledge of a female forcibly and against her will
Contemporary statutes: gender neutral and include various acts of sexual penetration
Not a sexual crime, but a crime of violence, a coercive act of aggression
Used as a weapon in war: Russia uses rape against Ukranian women
UCR data says 140,000 rapes reported each year, constant for a while
Warm weather crime
Higher rates in metropolitan areas
NCVS data 500,000 rapes and sexual assaults during last survey year
Types of rapists
according to A. Nicholas Groth anger rapists 40%, power rapists 55%, sadistic rapists 5%
Types of rape:
date rape, on campus, marital rape, statuatory, by deception, sex in authority relations
Causes of rape:
evolutionary factors, male socialization, psychological abnormality, social learning, gender conflict view, sexual motivation
Rape and law
proving rape- extremely challenging for prosecutors, consent: essential to prove that the attack was forced and that the victim did not give voluntary consent to their attacker, legal reform: ongoing effort to both create sensitivity to the plight of victims and change the content of rape laws
Murder and homicide
Murder is the unlawful killing of a human being with malice aforethought
Degrees of murder: first degree (premeditation and deliberation), second degree (malice aforethought), manslaughter (voluntary/nonnegligent, involuntary/negligent)
Deliberate indifference, “born and alive”- person must be born to be applicable
Since 1991, the murder rate has been steadily declining: tends to be an urban crime, victims and offenders tend to be males, about half of murder victims are African Americans, 90% of offenders and victims have the same race, about ⅓ of victim and half of offenders tend to be under 25 years of age
Offenders tend to have long criminal careers
Murderous relations
Acquaintance murders: often the result of a long-simmering dispute, motivated by revenge, dispute resolution, jealousy, drug deals, racial bias, or threats to identity or status
Intimate partner murder: husbands and wives, boyfriends and girlfriends, and other romantic partners
Sexually based murders: reasons for men versus women
Stranger murders: approx 20% of all murders
School murders: has become commonplace
Serial killers
a person who kills 3 or more persons in 3 or more separate events
Types of serial killers:
Thriller strives for sexual sadism or dominance
Mission killers desire to reform the world
Expedience killers desire profits or desire protection from perceived threat
Mass murderers
Revenge killers: seek to get even with individuals or society at large
Love killers: motivated by a warped sense of devotion
Profit killers: usually trying to cover up a crime, eliminate witnesses, and carry out a criminal conspiracy
Terrorist killers: trying to send a message
Spree killers-
a killer of multiple victims whose murders occur over a relatively short span of time and often follow no discernible pattern
Assault:
attempted battery or intentionally frightening the victim by word or deed (not touching), battery requires offensive touching
Nature and extent of assault
About 230 assaults per 100000 people are reported annually to police
Most people arrested for assaults are young, white, and male
Most assaults occur in urban areas, in the summer, and in the south and west
Acquaintance and family assault
Child abuse: neglect; child sexual abuse
Parental abuse
Spousal abuse
Dating violence: relational aggression
Robbery
the taking or attempting to take anything of value from the care, custody, or control of a person or persons by force or threat of force or violence and/or by putting the victim in fear
Robbers in action
targets are vulnerable, accessible, and profitable
Choosing targets
Targeting criminals
Acquaintance robbery
Victims are often reluctant to report
Some are motivated by street justice
Robbers know there will be a “good take”
Victims are often convenient targets
Carjacking
Carefully planned and carried out by experienced criminals
Must have perceptual and procedural skills and scare the victim
Contemporary forms of interpersonal violence
Hate crimes- violent acts directed toward a particular person or members of a group merely because the targets share a discernible racial, ethnic, religious, or sexual orientation. Roots of hate: thrill-seeking, reactive (defensive), mission, retaliatory. About 7500 reports each year, most motivated by race. Where victims could identify culprits, most victims were acquainted with their attackers
Controlling hate crimes
45 states have laws against hate crimes, 27 states mandate collection of hate crime data
Hate crimes have stiffer penalties than those motivated by revenge, greed, or anger
Free speech
Workplace violence-
second leading cause of occupational death or injury, 3rd leading cause of occupational injury or death
Typical offender is a middle aged white male who faces termination in a bad economy
Stalking
a course of conduct that is directed at a specific persona and involves repeated physical or visual proximity, nonconsensual communication, or verbal, written, or implied threats sufficient to cause fear in a reasonable person
Stalking statistics
Stalking usually lasts one to two years, but the effects are felt long afterward
More than 3 million victims each year
Women more likely to be stalked than men
75% of victims know their stalker in some way
30% of stalkers are current or former intimate partners of their victims
Political crime
Illegal acts designed to undermine an existing government and threaten its survival
Violent and nonviolent acts
May stem from religious or ideological sources
Gray area between conventional and outlawed behavior
Most political criminals, even those who profit, consider themselves patriotic and altruistic
The “Arab Spring”
in February 2011, the regime of long-term Egyptian dictator Hosni Mubarak was toppled. Similar protests broke out in Tunisia, Yemen, and Libya, where the regime of dictator Muammar Gaddafi was ousted. These revolts were not viewed as terrorist acts but popular political upheavals against hated and evil dictators. The world did not recoil when Gaddafi was apprehended and brutally killed on camera.
Randy Borum’s four cognitive stages (becoming a terrorist/political criminal)
Stage 1: “its not right” an unhappy individual identifies some undesirable event -> grievance
Stage 2: “its not fair” conclusion that the undesirable event is a product of injustice
Stage 3: “its your fault” someone must be held accountable
Stage 4: "you're evil” targeted groups are appropriate choices for revenge and/or violence
Types of political crimes
Election fraud involves illegal interference with the political process, intimidation, disruption, misinformation, registration fraud, vote buying (most states have laws to control and punish election fraud)
Abuse of office/public corruption involves a breach of public trust and abuse of position by government officials and private-sector accomplices
Treason
Espionage, industrial espionage, legal controls
State political crime, using torture, ticking bomb scenario, torture warrant
Terrorism
The illegal use of force against innocent people to achieve a political objective
terrorist (engages in premeditated, politically motivated violence perpetrated against non combatant targets) and guerilla (operates in rural areas and attack the military, the police, and other government officials)
Terrorist and insurgent (engages in armed uprising, or revolt against an established civil or political authority)
Terrorist and revolutionary (engages in civil war against sovereign power that holds control of the land)
History of terrorism
Reign of terror, period of violence during the French Revolution from 1793-1794, maybe the first use of terrorism in the English language
Red terror- russian state-sanctioned violence and repression aimed at consolidating control and quelling opposition from 1918-1922
pre-WWI Europe
Nazi Germany
Irish Republican Army (IRA)- created in 1919 to end British rule in Ireland, the troubles were sectarian conflict from about 1968 to 1998 in Northern Ireland between Protestant unionists who wanted to remain part of the UK and Catholic nationalists who wanted to join Ireland. 13 Catholic protestors were killed on Bloody Sunday 1972. U2s 1983 song called sunday bloody sunday included on their 3rd album called war.
Attacks on Israel- dates to late 1930s with attacks on embassies and diplomats, 1972 Munich Olympic massacre Israeli team members hostage and killed by Black september organization a Palestinian militant group, Oct. 7 2023 massacre 1000+ Israelis killed in a massacre perpetrated by Hamas, Israel has been accused of engaging in state-sponsored terrorism and assassinations around the world.
Philippines- Spanish-American war ended Dec 1898, US also took control over Muslim conflicts which were still angry about Spanish takeover in the 1500s. Catholic nationalist rebellion began attacking US troops, began in 1872 with Spain executing 3 Filipino Catholic priests, while the Filipinos used guerilla tactics, they eventually pledged allegiance to the US in the 1900s. The muslims continue to fight and reset in the southern Philippines has gone on for over 400 years. Today there are still numerous Muslim terrorist groups in Mindanao: MNLF, ASG, isis of the Philippines.
Contemporary forms of terrorism
Political terroism, right and left wing political groups
Revolutionary terrorism: violence to frighten those in power and their supporters in order to replace the existing government with a regime that holds acceptable political or religious views
Nationalist terrorism: actions promote the interest of a minority ethnic group (or majority against minority)
Retributive terrorism: use violence as a method to influence, persuade, or intimidate to achieve a particular objective
State-sponsored terrorism: carried out by a repressive government regime to force its citizens into obedience, oppress underrepresented groups and stifle political dissent
Lone actor terrorist-
1.Plan and carry out an attack without assistance from others.
2.Not affiliated with terror organizations, nor are they under orders to take violent action.
3.May fit the disconnected-disordered profile or the caring-compelled profile.
Philippines
Spanish-American war ended Dec 1898, US also took control over Muslim conflicts which were still angry about Spanish takeover in the 1500s. Catholic nationalist rebellion began attacking US troops, began in 1872 with Spain executing 3 Filipino Catholic priests, while the Filipinos used guerilla tactics, they eventually pledged allegiance to the US in the 1900s. The muslims continue to fight and reset in the southern Philippines has gone on for over 400 years. Today there are still numerous Muslim terrorist groups in Mindanao: MNLF, ASG, isis of the Philippines.
Psychological view
After carefully reviewing existing evidence n the psychological state of terrorists, mental health expert Borum concludes
Mental illness is not a critical factor in explaining terrorist behavior. Alsom most terrorists are not psychopaths.
There is no terrorist personality nor is there any accurate profile -psychological or otherwise, of the terrorist
History of child abuse and trauma, and themes of perceived injustice and humiliation are often prominent in terrorist biographies but do not help to explain.
I.What Motivates the Terrorist? Psychological view.
Mental illness is not a critical factor in explaining terrorist behavior, and most are not psychologically abnormal.
Terrorism is not linked to mental illness or personality defects.
There is no “terrorist personality.”
Histories of childhood abuse and trauma and themes of perceived injustice are often prominent in terrorist biographies, but they don’t really help to explain terrorism.
Motivation
Psychological view: some if not all suffer from psychological deficits
Alienation view: lack of opportunity, religious beliefs
Family conflict view: products of dysfunctional families
Political views
Socialization
Ideological views
Explaining state-sponsored terrorism
Extent of terrorism threat
National consortium for START- a university of Maryland research and education center comprised of a network of scholars using science to identify the causes and human consequences of terrorism in the US and around the world
Between 2002 and 2019, IS carried out more than 41000 attacks which cause 33000 deaths
Asia and Africa and locations for the most attacks
Some of the active groups include the Taliban, Boko Haram, Al-Qaeda, Al-Shabaab, Houthi, Islamic State
Early responses to terrorism
Hijackings (1960s-70s), in 1974 security measures introducing screening and safeguarding measures began, metal detectors and baggage screening, the sky marshals program placed armed officers on US flights
1985 the bombing of Air India flight 182 over the Atlantic ocean
1988 the bombing of Pan Am flight 103 over Lockerbie, Scotland
1996 introduced the aviation security plan of action to provide a systematic response to threats
World trade center bombing of 1993, truck bomb, 6 people killed and more than 1000 injured in what was at the time the deadliest act of terrorism perpetrated on US soil
OK City terrorist attack, 1995, domestic terrorism, 168 people died Terry Nichols with Timothy McVeigh 1968 were both found guilty of the bombing
9/11 19 international terrorist flew 4 commercial planes into 2 buildings and 1 field, estimated 2977 people were killed
Combatting terrorism with political change
According to the Rand Corporation, a nonprofit research group, the following steps are required to defeat Jihadist groups
Attack the ideological underpinnings of global jihadism
Sever ideological and other links between terrorist groups
Director of national intelligence established in 2004
DNI leads and directs the 18 agencies of the intelligence community
Manages the allocation and expenditure of budget allocated by congress
Federal law enforcement made terrorism its #1 commitment, joint terroism task forces formed
Department of Homeland Security- preventing terrorist attacks in the US, reducing America’s vulnerability to terrorism, minimizing attacks and recovering.
State and major local law enforcement have terrorism operation and information centers
Local law enforcement- NYC have established counterterrorism bureau
National network of fusion centers
a fusion center is a collaborative effort of two or more agencies that provide resources, expertise and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity.
USA patriot act
legislation giving US law enforcement agencies a freer hand to investigate and apprehend suspected terrorists
Expanded all four traditional tools of surveillance: wire taps, search warrants, pen/trap orders (recording phone calls), subpoenas
MSU established the terrorism and preparedness data resource center housed at UofM
sought to archive and distribute data that are relevant to the study of terrorism and the response to terrorism for descriptive and scientific analysis by academics and researchers
USA freedom act-
replaced patriot act in 2015 preventing the NSA from continuing its mass phone data collection program
Jan 6. Attack on capital-
estimated 140 police officers were criminally assaulted, groups of individuals sought to hang VP Mike Pence by Jan 2025
Intellectual property theft
The unlawful or unauthorized act of using, replicating, distributing, or exploiting someone else’s intellectual property without permission or authorization from the owner
Occurs when individuals or entities violate the exclusive rights granted to the creators or owners of IP under various legal frameworks such as patents, trademarks, copyrights, and trade secrets.
Counterfeiting
producing and selling counterfeit goods that imitate the design, appearance, or brand of original products
Copyright infringement
reproducing, distributing, or displaying copyrighted materials without authorization from the copyright owner (e.g plagiarism)
Online privacy:
distributing copyright content such as movies, music, or software, through unauthorized online channels often through file sharing platforms or illegal streaming websites
Trade secret theft:
illegally accessing, using, or disclosing confidential business information or trade secrets without authorization
Industrial espionage:
gathering information or trade secrets from competitors through illicit means like spying or hacking
Malicious insiders:
when current or former employees steal IP such as proprietary technology, trade secrets, or sensitive data, either for personal gain or to benefit a competitor.
What is counterfeiting?
A fake or unauthorized replica of a genuine product, such as money, documents, designer items, or other valuable goods
Made in exact imitation of something valuable or important with the intention to deceive or defraud
A fraudulent imitation of something else: a forgery
2.5% of world imports estimated counterfeit goods
Pharmaceuticals (cancer, diabetes, malaria, antibiotics, pain killers), healthcare supplies, technologies, eyewear
Fake malaria meds
responsible for estimated 72000-267000 preventable deaths annually in sub-Saharan Africa in 2014, US government largest purchaser/distributor
2023 pharmaceutical crime
annual incidents more than 6900
Often counterfeited, $1 trillion market:
food (olive oil, seafood, honey, dairy etc.). Car parts and machinery (airbags, brake pads, wheels), golf merchandise, clothing
Consequences of counterfeits:
safety, identity theft and fraud, economic impact- lost taxes, corporations loss, support of organized crime and terrorism
Blue collar crimes
common law theft crimes such as larceny, burglary, and arson
White collar crimes
crimes that involve business enterprise such as embezzlement, price fixing, and bribery (part 1 felony offenses under UCC)
green-collar crime
violations of law designed to protect the environment
History of economic crimes
Theft: the intentional taking, keeping, or using of another’s property without authorization or permission
3 groups of property criminals in 18th century (skilled thieves, smugglers, poachers)
Development of white and green collar- became more prominent in the industrial era, Edwin Sutherland first defined white collar crime, green collar crime is a subdivision of white collar crime and is motivated by profit
Blue collar criminals explained
Occasional criminals, do not view themselves as committed career criminals, situational inducement is an unplanned opportunity to commit crime
Professional criminals- make a significant portion of income from crime, nonviolent forms of criminal behavior are undertaken with high degree of skill for monetary gain and maximize opportunities while minimizing odds of apprehension
Larceny- constructive possession, petit (petty) larceny, grand larceny 1000+ or varies state
Shoplifting- snitches, boosters, booster box, merchant privilege laws
Credit card theft- costs hundred of billions each year, law passed in 1971 limits customer’s liability to $50 per card
Auto theft- in $65 billion losses annually
Bad checks
Receiving and fencing stolen property
Burglary-
entering a home by force, threat or deception with intent to commit a crime
According to UCR aobut 1.1 mil occur every year
Declining rates over past decade
Most occur in daytime hours
Average loss is more than $2600
Arson
the willful, malicious burning of a home, public building, vehicle, or commercial building
45000 arsons reported annually
Some arsonists are emotionally disturbed
Some are professionals who set fires to gain profit
White collar crime- explained
Any business-related act that uses deceit, deceptions, or dishonesty to carry out a criminal enterprise
Business fraud and swindles (ponzi schemes, telemarketing swindles)
Chiseling- ongoing conspiracy to use one’s business position to cheat institutions or individuals by providing them with fault or bogus goods and services or by providing services that violate legal controls on business practices (e.g insider trading= financial chiseling)
exploitation -clear right to expect a service, and the offender threatens to withhold the service unless additional payment, sexual and financial
Influence peddling- in govt/business, bribing
Employee fraud and embezzlement- employee theft and pilferage, management fraud, embezzlement
Client fraud- health care fraud- healthcare provider engages in fraud in obtaining patients and administering their treatment, patients try to scam the system for their own benefit.
Tax evasion- must show that offenders purposely attempted to evade or defeat a tax payment, otherwise its “passive neglect”
Corporate crime- institutions or their representatives willfully violate the laws that restrain these institutions from doing social harm or require them to do social good. Illegal restraint of trade - conspiracy that stifles competition, creates a monopoly, artificially maintain prices, or otherwise interfere with free market competitor. The Sherman antitrust act outlaws conspiracy among corporations designed to control the marketplace.
Price fixing- 2 or more competitors cannot sell the same or similar product at an agreed price
Deceptive pricing- contractors provide incomplete or misleading information on how much it will cost to fulfill a contract
False claim advertising.
Green collar crime explained
also known as environmental or ecological crime. Conservation criminology- the study of harms and crime against the environment, study of environmental law and policy, study of corporate crimes and the environment, and environmental justice from a criminology standpoint. began in 1990s, grew out of civil rights movement
No agreement on what falls within this area
Legalist- violations of existing laws designed to protect people, the environment, or both
Environmental justice- broader view than existing laws allow
Biocentric- any human activity that disrupts a biosystem
the harm perspective holds that all serious social harms should be included when conceptualizing crime.
Carole gibbs-
conservation criminology and global trade in electronic waste
Forms of green collar crime
- worker safety/environmental crimes, illegal logging, illegal wildlife exports/fishing, dumping and polluting
Public order crimes
behavior that is outlawed because it threatens the general well being of society and challenges its accepted moral principles, sometimes referred to as victimless crimes” 1. Violates the moral order but has no specific victim other than society 2. Prohibited because one of the functions of criminal law is to express a shared sense of public morality
Social harm
immoral acts can be distinguished from crimes nased on the injury they cause
Acts that cause harm or injury are outlawed and punished as crimes
Acts, even those that are vulgar, offensive, and depraved, are not outlawed if they harm no one
Moral crusaders/crusades
The temperance movement: a campaign during the 19th and 20th centuries that advocated for the reduction or elimination of alcohol consumption, initially the focus was on modernization but it grew to demand legally enforced abstinence. The movement led to 18th amendment to the US constitution which enacted nationwide abstinence 1920 to 1933
Antimiscegnation laws: the criminalization of sexual relationship and reproduction between members of different ethnic races, in early america, miscegenation was fairly accepted (pocahontas and john rolfe were the 1st to from an interracial marriage in US), towards the later 17th
These laws were used to imprison those who married or were having intimate relations because of a combination of racism and sexuality, economic exploitation, fear of an alliance between African Americans and American Indians, religion
In 1661 VA passed legislation prohibiting interracial marriage and later passed a law that prohibited ministers from marrying mixed race couples, fine was 10000 pounds of tobacco
Some states statutes prevented residents from travelling to another state to marry and did not consider such marriages legal, “preserving white racial purity”
SC upheld these laws in 1883 and congressmen up to 100 years ago have tried to add amendment
In 1967 18 states still had laws prohibiting interracial marriages
In loving v virginia the SC ruled that these laws were unconstitutional because they violated the equal protection clause of the 14th amendment
2022 congress passed the respect for marriage act, codifying Loving v Virginia
In 1958 only 4% of Americans approved, by 2020 94% of americans approved of interracial marriage
Same sex marriage protections
1996 defence of marriage act defined marriage as a union between one man and one woman, Lawrence v Texas made it impermissible for states to criminalize oral and anal sex under statutes prohibiting sodomy, Obergefell v. Hodges ruled that same sex bans violated the 14th amendment, Clarence Thomas said they should “reconsider” the Obergefell v Hodges, Griswold, and Lawrence cases in Dobbs v. Jackson.
Obergefell decision based on Loving
other moral crusades
Prayer in school
Gun ownership
Sexually explicit books and magazines
abortion
What “cruel and unusual harmful act was prohibited across many parts of the US between 1661 and 1980
miscegenation/ sexual relations and reproduction between members of different ethnic races
Substance abuse
Long history dates to Mesopotamia, ancient Greece, and the Crusades.
Drinking has gone down over the past 30 years, as well as other drug use
Why gateway drugs likely matter:
adolescence is a period of transition characterized by significant hormonal, psychosocial, and neural changes, increased vulnerability to stress and risk taking behaviors such as sensation seeking, recreational drugs likely to change the brain
Smoking (nicotine)
Alcohol
Marijuana
CDC reported 24% reduction in US drug overdoses in 2024
Causes of substance abuse
Subcultural view, psychological view, genetic factors, social learning, problem behavior syndrome, rational choice
Substance abuse harms
Drug use and crime- interferes with maturation and socialization, drug addiction increased frequency but not necessarily the violence of criminal activity, share roots in impulsive and deviant behavior, creates need to finance drug habit, criminal deviance increases probability of later drug use
Alcohol and its prohibition- temperance movement, the 18th amendment passed in 1919 to prohibit sale of alcoholic beverages
Prohibition failed due to several reasons including organized crime supplying alcohol
Drugs and the law
Pure food and drug act- requires manufacturers to list amount of habit-forming drugs on product labels but did not restrict their use
Harrison Narcotics Act 1914- restricted im
Narcotic control act of 1956 increased penalties for drug offenders, since 197- various federal laws have attempted to increase penalties imposed on drug smugglers and to limit the manufacture and sale of newly developed substances
Drug control strategies
Source control- deter the sale and importation of drugs through systemic apprehension of large-volume drug dealers
Interdiction strategies
Law enforcement strategies
Punishment strategies
Community strategies
Drug education and prevention strategies
Drug-testing programs
Treatment strategies
Employment programs
Legalization of drugs
War on drugs has cost more than $500 billion in the past 20 years
Federal and local governments spend $28 billion of drug control and treatment each year
More people die each year from abuse of legal drugs than are killed in drug wars or die from abusing illegal drugs
Legalization by government control of price and distribution, taxes
Opponents argue that legalization might increase drug use creating an even larger group of nonproductive drug dependent people who must be cared for by the rest of society
Crime trends
after decades of declining rates, England and Wales crime rates doubled in 2015 when cybercrime events were included in their national victimization survey
The US victimization rate (cyber victimization
identity theft- irregular/stable 7-10%, cyberbullying- increasing, cyberstalking- decreasing, financial fraud- increasing) has been measured with various instruments with varying results.
Cybercrime
the theft and/ or destruction of information, resources, or funds via computers, computer networks, or the internet
3 types of cybercrime
Cybertheft- using a computer network for criminal profits: copyright infringement, identity theft, securities fraud
Cybervandalism- attacks aimed at disrupting, defacing, and destroying technology
cyberwar/cyberterrorism- using computers for acts of war, spying, and disrupting other’s networks
Cybertheft for profit
Theft from ATM (POS terminals/fuel pumps)- using a device or camera on an ATM that copies data from a bank card’s magnetic strip when a customer uses the ATM, adding skimming devices
Distributing illegal or dangerous services and materials e.g. obscenity (pornography), prosecuting internet pornography
Distributing dangerous drugs, counterfeit
Denial of service attacks (DoS)-
involve threats or attacks to prevent the legitimate operation of the site, some have monetary objective while others don’t
Internet extortion/ransomware-
malware attached to an email or compromised website that freezes a computer, cryptowall ransomware
Illegal copyright infringement
warez, file sharing
Internet securities fraud
market manipulation, fraudulent offering of securities, illegal touting
Identity theft-
phishing, spear-phishing
E-tailing fraud
illegal buying/selling merchandise on the internet
Cybercrime with malicious intent
Worms, viruses, logic bombs ets
Worms- use computer networks or the internet to
viruses
Logic bombs- slag code- delayed action virus that may be set off when certain data is entered
Website defacement- hacker accesses the victim’s website and enters misleading or damaging information, vandalize rather than profit
Cyberstalking- using internet to stalk
Cyberstalking victimization 2019- 3.4 million 16+ were victims of cyberstalking
67% knew their stalker
Females stalked +2x than males
67% of victims of both cyber and traditional stalking were fearful of being killed/physically harmed
More likely to be stalked by an intimate partner
80% of people talk about taking protection against stalking
Viewed as less criminal than physical stalking
Growing challenge in CJ system
Stalking legislation
Federal law prohibits anonymous internet communication eith intent to annoy, abuse, threaten, or harass, punishable but up to 5 years in prison
Most states have also enacted their own specific legislation with varying degrees and definitions of protections
MI- malicious use of telecommunications services act
Responding to cyberstalking
millions of reported cases, peak 80 cases prosecuted under federal statute in 2019
Cyberbullying
non consensual posting of photos/videos, catfishing
Cyberspying
involves govt, NSA/Edward Snowden