Select Page
  

Weekly Current Events: You will find an ARTICLE (CNet, NYTimes, Wired Magazine, etc…) and write a short reflection on it. Your work must (i) summarize the article, (ii) state why you find it interesting, and (iii) tie it into as many concepts from class as possible (iv) have the original article attached to it (no article, no credit). It must be at least 1 page long, typed, double-spaced, with complete sentences.https://moodle.oakland.edu/mod/url/view.php?id=357…https://moodle.oakland.edu/mod/resource/view.php?i…
taylor_ch09_lecture.ppt

Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Essay on
Cybercrime Current Event
Just from $10/Page
Order Essay

Digital Crime
and Digital Terrorism
THIRD EDITION
CHAPTER
9
Anarchy and Hate
on the World Wide
Web
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Chapter Objectives
After completing this chapter, you should
be able to:
1. Legally define a hate crime and
describe how white supremacist groups
use the Internet to spread their
message of hate.
2. Explain the relationship between leftwing groups and “special interest or
single-issue extremist” groups.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Chapter Objectives
After completing this chapter, you should
be able to:
3. Describe ALF and ELF, and provide
examples of each group’s recent
terrorist activities in the United States.
4. Describe some of the techniques that
right-wing hate groups use to spread
their propaganda.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Chapter Objectives
After completing this chapter, you should
be able to:
5. Discuss the primary issues associated
with the USA PATRIOT Act, and list the
four traditional tools of surveillance
that have been expanded within the
Act.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Chapter Objectives
After completing this chapter, you should
be able to:
6. Explain the conflicting roles and
activities observed within law
enforcement pertaining to investigation
versus intelligence gathering.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Digital Hate
• Hate crimes have a unique impact on
victims, as well as they community.
Hate crimes tend to be brutal and
injurious.
▪ Hate crimes are not only physically
painful, but emotionally painful.
▪ Legal definitions vary.
▪ The police are not well trained to handle
such crimes.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Digital Hate
• According to federal law, a hate crime
is defined as:
▪ A criminal offense against persons,
property, or society that is motivated, in
whole or in part, by an offender’s bias
against an individual’s or a group’s
perceived race, religion, ethnic/national
origin, gender, age, disability, or sexual
orientation.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Digital Hate
• Right-wing extremism represents a
movement that promotes whites. Many
of these groups use the Internet to
recruit potential new members and
spread their message of hate.
▪ Stormfront.org
▪ New Saxon
▪ Ethnic Cleansing
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Terrorist Extremists From The Left
• Extreme left movements are best
observed in modern eco-terrorists.
▪ Eco terrorism is the use or threatened
use of violence of a criminal nature
against innocent victims or property by
an environmentally oriented national
group for environmental-political
reasons, or aimed at an audience
beyond the target, often as a symbolic
nature.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Terrorist Extremists From The Left
• Extreme left movements are best
observed in modern eco-terrorists.
▪ These groups are most often referred to
“special-interest or single-issue
extremists.”
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
ELF and ALF
• ALF was established in Great Britain in
the mid-1970s.
▪ ALF is committed to ending the abuse
and exploitation of animals.
▪ ALF members engage in direction
against those who utilize animals for
research or economic gain.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
ELF and ALF
• ELF emerged from a group called Earth
First!
▪ This group developed in Arizona in 1980
▪ Unlike ALF, ELF is focuses on the
environment.
▪ Members have engaged in monkey
wrenching, a vandalism technique used
against active construction.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Domestic Terrorist in Cyberspace
• A danger the Internet poses with
domestic terrorist groups is that it
allows for a level of communication
between separate groups that
traditionally has not occurred.
▪ The Internet also allows for wider
recruitment.
▪ Extremist groups use Web sites, clubs,
posting boards, news groups, and many
other forms of communication.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Domestic Terrorist in Cyberspace
• Dehumanize, Desensitize, and
Demonize
▪ Domestic terrorist groups dehumanize
the enemy or desensitize the consumer
toward violence with compute games
that are filled with extremist beliefs.
• Border Patrol
• Ethnic Cleansing
• The Jewish Conspiracy
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Domestic Terrorist in Cyberspace
• Internet cartoons are used to spread
ideas.
▪ One of the most widely distributed
cartoons of the right is Jew Rats.
▪ The Internet allows individuals to selfpublish their cartoons and videos.
▪ Extremist groups also directly target
young people.
• PETA’s Grrr! magazine and PETA 2
website
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Storage and Dissemination of
Information
• The Internet allows for wide
dissemination and storage of
information.
▪ Archived sermons
▪ Postings of mission statements and
credos
▪ Blueprints for criminal acts
▪ Newsletters with group information
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Storage and Dissemination of
Information
• The most dangerous action on
extremist Web sites are when they
place specific information about
individuals on their sites.
▪ The Nuremberg Files is the most famous
instance of this.
▪ The only lawful limitations on speech
are: obscenity, fighting words,
commercial speech, and incitement.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Terrorism, Intelligence Gathering,
and the USA PATRIOT Act
• The framework for U.S. intelligence was
created in a different tie to deal with
different problems other than terrorism.
▪ Law enforcement’s primary focus is to
collect evidence after a crime is
committed in order to support
prosecution in a court trial.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Terrorism, Intelligence Gathering,
and the USA PATRIOT Act
• The framework for U.S. intelligence was
created in a different tie to deal with
different problems other than terrorism.
▪ Unlike the FBI and other police
organizations, the CIA collects and
analyzes information regarding national
security in order to warn our
government before an act occurs.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Terrorism, Intelligence Gathering,
and the USA PATRIOT Act
• The differences between investigation
and intellection:
▪ Investigation is reactive. Reports are
generally open. Sources are generally
known and open. Arrests are made
based on evidence and facts.
▪ Intelligence is proactive. Reports are
almost always closed. Sources are
confidential and closed. Arrests are
rarely made.
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Terrorism, Intelligence Gathering,
and the USA PATRIOT Act
• September 11, 2001 revealed
numerous weaknesses in
counterterrorism efforts.
▪ Communication problems among
agencies
▪ Overly bureaucratic and decentralized
structure
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Terrorism, Intelligence Gathering,
and the USA PATRIOT Act
• September 11, 2001 revealed
numerous weaknesses in
counterterrorism efforts.
▪ Failure by agencies to correctly analyze
relevant intelligence information to
potential terrorist threats
▪ Overly restrictive guidelines
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Terrorism, Intelligence Gathering,
and the USA PATRIOT Act
• In order to overcome these problems
the USA PATRIOT Act was signed into
law.
▪ The Act expanded all four traditional
tools of surveillance used by law
enforcement with significantly reduced
checks and balances.
• Wiretaps
• Search warrants
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved
Terrorism, Intelligence Gathering,
and the USA PATRIOT Act
• In order to overcome these problems
the USA PATRIOT Act was signed into
law.
▪ The Act expanded all four traditional
tools of surveillance used by law
enforcement with significantly reduced
checks and balances.
• Pen/Trap and trace orders
• Court orders and subpoenas
Digital Crime and Digital Terrorism, Third Edition
Taylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.
All Rights Reserved

Purchase answer to see full
attachment

Order your essay today and save 10% with the discount code ESSAYHSELP