You are on page 1of 41

PAGE 34 – UNIT 6 Introduction

• Technology – very important in crime-fighting & security


• Criminals are finding new ways to use technology to commit crimes
• Credit card fraud (stealing money from other people’s credit cards)
• Organized crime & conducted online
PAGE 34 – UNIT 6 Introduction

• Criminals are finding new ways to use technology to commit crimes


• Credit card fraud (stealing money from other people’s credit cards)
• Occurs in 2 ways
• Card-Present
• Card-not-present
PAGE 34 – UNIT 6 Introduction

• Criminals are finding new ways to use technology to commit crimes


• Credit card fraud (stealing money from other people’s credit cards)

1. Card-Present = perpetrators present stolen or counterfeit cards to make a purchase


• counterfeit cards = when a criminal skims or copies the data held on the magnetic stripe of a legitimate
credit or debit card and uses this data to create a fake plastic card, which contains the real cards details
PAGE 34 – UNIT 6 Introduction

• Criminals are finding new ways to use technology to commit crimes


• Credit card fraud (stealing money from other people’s credit cards)

2. Card-not-present = (popular these days), online or over-the-phone exchanges


PAGE 34 – UNIT 6 Introduction

• Credit card fraud (stealing money from other people’s credit cards)
• Friendly fraud – occurs when consumer mistakenly made a purchase (e-commerce)
• E.g. Google (Play stores), Apple (App Store), iTunes, etc.
• E.g. could happen by the card owner’s children
PAGE 34 – UNIT 6 Introduction

• Technology – very important in crime-fighting & security


• Criminals are finding new ways to use technology to commit crimes
• Hacking (breaking into computer networks)

There are 3 ways


• Breaches
• Social Engineering
• Man in the middle
PAGE 34 – UNIT 6 Introduction

• Hacking (breaking into computer networks) – Breaches


• Emails and passwords may be somewhere publicly on the internet
• When we store our credentials on social media websites
• Hacking can occur when there is a data breach => our data is leaked

Prevention
• Use different passwords for your account
PAGE 34 – UNIT 6 Introduction

• Hacking (breaking into computer networks) – Social Engineering


• When we give our info to the stranger on the internet
• Hacker will pretend to be someone to get your info = phishing (most common)
• E.g. you get a link to fill in your info under the purpose you might be interested
PAGE 34 – UNIT 6 Introduction

• Hacking (breaking into computer networks) –


Social Engineering

Another way of social engineering


• Install a RAT on the victim’s devices
• RAT = malware program that includes a back door
for administrative control over the target PC.
• E.g. we got a link or we download an app to install
on our devices from an unknown website.
PAGE 34 – UNIT 6 Introduction

• Hacking (breaking into computer networks) – Man in the middle


• Not very likely to occur, but can happen
• Occur when we use public Wi-Fi and we don’t use HTTP connection through the internet traffic

• If we don’t use an HTTP connection, VPN is advised for use.


PAGE 34 – UNIT 6 Introduction

• Technology – very important in crime-fighting & security


• Criminals are finding new ways to use technology to commit crimes
• Hacking (breaking into computer networks)
PAGE 34 – UNIT 6 Introduction

• The threat of terrorism – becomes greater


• To combat that, modern devices are developed to protect airports & other public places, and to
check identities.
PAGE 34 – UNIT 6 Introduction

• The threat of terrorism – becomes greater


• Terrorism – the unlawful use of violence and intimidation, especially against civilians, in the
pursuit of political aims.
PAGE 34 – UNIT 6 Introduction

• What is terrorism exactly?


• Notoriously hard to explain
• Because no international consensus on the definition, legally, or academically

• Terrorism (broad concept)


• Violence, or the threat of violence, against non-combatants or civilians
• Usually motivated by political, religious, or ideological beliefs
PAGE 34 – UNIT 6 Introduction

• Terrorism (specific scope) • Organized crime


• Usually politically or socially motivated • profit-motivated
• need to seek media attention • no need to seek media attention
• has a desire for government recognition • No desire for government recognition
PAGE 34 – UNIT 6 Introduction

• Terrorism (specific scope)


• Not done by the mentally ill people
• Not perpetrated by a government against another nation
• If there is an act perpetrated by a government against another nation = an act of war / an act of self-
defense.
• But it could happen if the government indirectly commits an act of terrorism by funding a terrorist
organization or covertly organizing the terrorist act.
PAGE 34 – UNIT 6 Introduction

• Terrorism (specific scope)


• Not an act of violence by a government against its own people.
• If there is an act like that, we call it an act of oppression or repression.
PAGE 34 – UNIT 6 Introduction

• Terrorism (specific scope)


PAGE 28 – UNIT 5 Introduction

• This special equipment provides protection against attack


• Helps the officer to carry out his/ her duties.
• Handcuffs – to restrain offenders (prevent them from moving)
PAGE 28 – UNIT 5 Introduction

• This special equipment provides protection against attack


• Firearms/guns – not normally carried in the UK
• Police are armed with non-lethal (non-deadly) weapons such as extendable batons.
• Expendable baton – from polycarbonate >>> to produce strong mouldings.
PAGE 28 – UNIT 5 Introduction

• This special equipment provides protection against attack


• CS gas – incapacitate (weaken) violent offenders.
PAGE 28 – UNIT 5 Introduction

• This special equipment provides protection against attack


• Taser guns – deliver a high voltage but low current shock to the offender (which causes temporary
paralysis but does not cause long-term harm)
PAGE 28 – UNIT 5 Introduction

• This special equipment provides protection against attack


• Global Positioning Systems (GPS) – can accurately identify a location within a few meters using
signals from earth-orbiting satellites.
PAGE 28 – UNIT 5 Introduction

• Global Positioning Systems (GPS)

There are 3 elements of GPS


• Space (Satellites) — The satellites circling the Earth, transmitting signals to users on
geographical position and time of day.
• Ground control — The Control Segment is made up of Earth-based monitor stations, master
control stations, and ground antenna.
• User equipment — GPS receivers and transmitters including items like watches,
smartphones, and telematics devices.
PAGE 28 – UNIT 5 Introduction

• Global Positioning Systems (GPS)


Uses of GPS

1. Location — Determining a position.


2. Navigation — Getting from one location to another.
3. Tracking — Monitoring object or personal movement.
4. Mapping — Creating maps of the world.
5. Timing — Making it possible to make precise time measurements.
PAGE 28 – UNIT 5 Introduction

• Global Positioning Systems (GPS)


PAGE 28 – UNIT 5 Introduction

• This special equipment provides protection against attack


• Sensors – can detect or measure changes in the environment (motion, shock, smoke, etc.)
PAGE 28 – UNIT 5 Introduction

• This special equipment provides protection against attack


• High-resolution camera (Flashcam) – used to monitor an area continually. If the picture changes,
the sensors trigger the alarm.
PAGE 34 – UNIT 6 Introduction

• Biometrics – the ability to identify the individual by some unique property (voice or face)
• Purpose: to tighten security protecting personal documents
Examples:
• Digital Fingerprinting
• Eye scans (expensive)
• Palm morphology reader
• Finger / vein recognition
• Signing on the dotted line
PAGE 34 – UNIT 6 Introduction

• Biometrics – the ability to identify the individual by some unique property (voice or face)
• Purpose: to tighten security protecting personal documents
Examples:
• Digital Fingerprinting
• Eye scans (expensive)
• Palm morphology reader
• Finger / vein recognition
• Signing on the dotted line
PAGE 34 – UNIT 6 Introduction

• Iris scanning – recognizes someone’s eyes.


• Can identify frequent-flying passengers on airlines (security control)
• Dynamic grip recognition – recognizes the shape of a gun-owner’s hand
• Sensors read & recognize the user’s hand grip & store that in memory
• When the trigger is squeezed, that grip is matched to the stored records, enabling the gun to fire
• If not match, the firearm stays locked
PAGE 34 – UNIT 6 Introduction

• Robots – can be used in security


• Can perform more cheaply or without risk to human life
• Programmed to receive the signal from sensors inside or outside the robot.
• E.g. Rotundus (sensors – cameras, microphone, heat detectors, smoke detectors – are all internal)
PAGE 34 – UNIT 6 Glossary

• Low-tech (adj): using simple technology.


• Unique (adj): the only one of its type; not like any other.
PAGE 34 – UNIT 6 Glossary

• Body armor (n): protective covering.


• GPS (n): Global Positioning System; a system that uses satellite signals to show you your
exact position.
PAGE 34 – UNIT 6 Glossary

• Grip (n): ability to hold onto a surface; the way in which you hold something in your hand.
• Motion sensor (n): a device which detects movement.
PAGE 34 – UNIT 6 Glossary

• PIN (n): Personal Identification Numbers; a number given to you, e.g. by a bank, so that you
can take your money from a cash machine or pay for goods using a card.
• Recognition (n): the ability to identify somebody or something from individual characteristics.
PAGE 34 – UNIT 6 Glossary

• Security (n): the activities involved in protecting something or somebody.


• Sensor (n): a device used to detect the presence of a particular quality or effect such as heat,
light, sound, etc.
PAGE 34 – UNIT 6 Glossary

• Shock (n): sudden violent movement or contact with something.


• Tagging (n): a system where an electronic device is attached to a person in order to know
where they are at all times.
PAGE 34 – UNIT 6 Glossary

• Trigger (n): a small metal lever that you press with your finger to fire a gun.
• Escape (v): to get away from something.
• Incapacitate (v): to make somebody unable to do anything.
THANKS

You might also like