Understanding Crime in Canada: An Introduction to Criminology, Third Edition PDF
Document Details
Uploaded by Deleted User
2024
Neil Boyd
Tags
Summary
This document is a PowerPoint presentation about Understanding Crime in Canada: An Introduction to Criminology, Third Edition, edited by Neil Boyd. The presentation is on topics such as white-collar crime, cybercrime, and terrorism.
Full Transcript
Understanding Crime in Canada: An Introduction to Criminology, Third Edition NOTICE Copyright Disclaimer This PowerPoint presentation is copyright protected. Individuals who have adopted the related Emo...
Understanding Crime in Canada: An Introduction to Criminology, Third Edition NOTICE Copyright Disclaimer This PowerPoint presentation is copyright protected. Individuals who have adopted the related Emond Publishing textbook for their course are granted permission to use this presentation for instructional purposes only. Slides may not be distributed under any kind of Open Access style license, or website, or be duplicated, copied, sold, or otherwise exploited for any commercial purpose without Emond Publishing’s express written consent. Thank you. Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Crime in Canada: An Introduction to Criminology, Third Edition Understanding Crime in Canada An Introduction to Criminology Third Edition Edited by Neil Boyd Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Crime in Canada: An Introduction to Criminology, Third Edition CHAPTER 19 White-Collar Crime, Cybercrime, and Terrorism 3 Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Understanding Crime Crime in Canada: in Canada: AnAn Introduction Introduction to to Criminology, Criminology, Third Third Edition Edition 4 White Collar-Crime: An Overview The first decade of the new millennium began and ended with unprecedented white-collar scandals that shook the public’s faith in business: The fall of energy giant Enron in an infamous accounting fraud in 2001 The unravelling of Bernie Madoff’s record-breaking US$65 billion Ponzi scheme in 2009 Volkswagen’s “Dieselgate” scandal And in 2022, cryptocurrency billionaire Sam Bankman-Fried was charged with multiple counts of fraud and conspiracy relating to the dealings of his now-bankrupt cryptocurrency exchange, FTX. A historically softer enforcement culture may have made Canada a haven for white-collar offenders. Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Crime in Canada: An Introduction to Criminology, Third Edition 5 What Is White-Collar Crime? Chicago School sociologist Edwin Sutherland first conceived of the term white-collar crime in an influential 1939 address to the American Sociological Society. Sutherland challenged the then-popular notion that crime was caused by low intelligence, psychopathy, or poverty, arguing that the rich committed as many crimes as the poor. Sutherland also estimated that the cost of crimes committed by the wealthy greatly exceeded the cost of those committed by the poor. Sutherland defined white-collar crime as crime committed by a person of respectability and high social status in the course of his occupation. The companies named in Sutherland’s 1949 book, White Collar Crime, successfully used legal threats to keep their actual company names out of the book for 34 years. Copyright © 2024 Emond Montgomery Publications. All rights reserved. 6 What Is White-Collar Crime? What Makes White-Collar Crime Distinct? Material privilege Public ignorance Influence on the Wide impact system Corporate context Occupational context Use of technology Complexity Physical integrity Copyright © 2024 Emond Montgomery Publications. All rights reserved. 7 White-Collar Offences Typical white-collar offences include: Fraud Insider trading Money laundering Market manipulation Bribery Price fixing Embezzlement Health and safety breaches Tax evasion Cybercrime Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Understanding Crime Crime in Canada: in Canada: AnAn Introduction Introduction to to Criminology, Criminology, Third Third Edition Edition 8 Introduction to Cybercrime and Terrorism Computers and the Internet provide countless opportunities for people to misuse such technological advances and facilitate acts of deviance and crime online, cutting across national boundaries and targeting victims on a global scale. Terrorism, although its roots can be traced back thousands of years, has also been understood as cybercrime because terrorist organizations have developed into transnational networks as a result of modern information and communication technologies. Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Crime in Canada: An Introduction to Criminology, Third Edition 9 Definition and Explanation of Cybercrime Cybercrime is the use of cyberspace or computer technology to facilitate acts of crime and deviance. Cybercrimes are broad ranging and have a significant social impact, but the scale and scope of cybercrime remains largely unknown because of inconsistent legal definitions and data collection efforts on the part of law enforcement, as well as underreporting by victims. Cybercrimes are a significant challenge for law enforcement officials to investigate because of the sheer volume of data to monitor, the forensic skills needed to investigate such crimes, and jurisdictional issues. Copyright © 2024 Emond Montgomery Publications. All rights reserved. 10 Levels of the Internet The three levels of the Internet are: 1. the surface web. 2. the deep web. SENDER DESTINATION 3. the dark web. Tor (The Onion Router) is a program used to TOR NODE ENCRYPTED LINK gain access to the dark UNENCRYPTED LINK web that hides a user’s location and identity. Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Crime in Canada: An Introduction to Criminology, Third Edition 11 Types of Cybercrimes Most cybercrimes include some element of social engineering, which involves researching the potential victim, developing trust with the person, and exploiting that trust to obtain information to commit the crime. Three principal categories of cybercrime include: 1. Computer-supported crimes: technology is only a repository for evidence. 2. Computer-facilitated crimes: computers are a tool used to commit crime. 3. Computer crimes: those that target a computer or network (hacking). Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Crime in Canada: An Introduction to Criminology, Third Edition 12 Defining Terrorism Radicalization is multi-dimensional and cannot be explained by a single factor. Some proposed influences include intergroup conflict, religious and political leaders, social networks and personal connections, family, prison, and the Internet. Whether radicalization is about belief or about action, most experts agree that it is the combination of the two, wherein a key component of becoming radicalized involves one’s willingness to engage in action to maintain a high level of commitment to a radical cause. Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Crime in Canada: An Introduction to Criminology, Third Edition 13 Defining Terrorism Terrorism is a highly contested term because of the varying social, cultural, and political context in which it is defined, as well as its complex and multi-dimensional nature. The common thread that characterizes the activities and behaviour of terrorist entities is their political motivation and the use of threats of violence. General strain theory suggests that collective strains increase negative emotions, as well as reduce social control and self- control and the ability to cope through both legal and military channels, thus fostering the social learning of terrorism by strengthening group ties and the formation of terrorist groups. Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Crime in Canada: An Introduction to Criminology, Third Edition 14 Ideological Beliefs and Motivations of Terrorists Terrorist groups and sympathizers have their own distinct ideologies, but they share similarities in their motives and violent tactics, such as the need to preserve their heritage from a perceived threat, and calls for violence that are symbolic. Some primary categories of radical beliefs include: Jihadists Right-wing terrorists Left-wing terrorists Single-issue terrorists Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Crime in Canada: An Introduction to Criminology, Third Edition 15 Terrorist Campaigns: Tactics and Targets Tactics and targets of terrorism vary in scope and largely depend on the group’s aims, motives, and ideology. Right-wing terrorists have historically engaged in pre-meditated political assassinations, murders, and bombings. More recently, lone actor terrorism has become the strategy of choice, and have become less selective and less sophisticated. Left-wing terrorists are more calculated and selective. They most often target businesses, and banks in particular. Religious terrorists target a wide audience of enemies who don’t share their faith. Their tactics cause the most wide-spread damage: IEDs, suicide bombings. Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Crime in Canada: An Introduction to Criminology, Third Edition 16 Terrorists’ Use of the Internet Terrorists have exploited the Internet’s easy-to-use, quick and cheap, unregulated, and relatively secure platforms, and have in turn created an online environment that promotes terrorist activities. Conway (2006) identified five core uses of the Internet by terrorists: 1. Information provision 2. Financing 3. Networking 4. Recruitment 5. Information gathering Copyright © 2024 Emond Montgomery Publications. All rights reserved. Understanding Crime in Canada: An Introduction to Criminology, Third Edition 17 Counter-Terrorism Strategies Countering violent extremism (CVE) is a non-coercive strategy designed to divert individuals from radicalization to violence. Effective counter-terrorism and CVE initiatives require that an array of key stakeholders (e.g., law enforcement officials, community groups, and academics) be involved in the process because the causes of terrorism and violent extremism are multi-faceted and require a multi-faceted response. CVE programs can be classified as prevention, intervention, repression, or rehabilitation. Copyright © 2024 Emond Montgomery Publications. All rights reserved.