Angela Marshall
Professor Christopher Young
Strayer University/Information Technology in Crime
March 1, 2015
Overall impact utilizing information technologies in combatting digital crime and digital terrorism. Every day that passes the world is becoming more and more reliant on information technology. Both public and private sectors of technology, banks, public utilities, commercial companies, and even governments use online technology in its daily business. It is easily argued that many of these advancements are beneficial, but what is the cost that is associated with them? As everything begins to use technology then everything becomes a target or victim …show more content…
of cyber-terrorism.
Prospective attackers monitor the Internet looking for exposed Web sites of companies or individuals as we know almost all small businesses and personal pc’s are not protected against virus or malware attacks so they become the most vulnerable to violate. There sites often are the least ready to defend themselves against such an attack because of absence of security measures.
Digital crime has terrifying fact of life but while this may seem a formidable trend, companies and hosts are not defenseless against such crimes. Today there are many security products available like firewalls, automated systems patching, vulnerability notification services, Internet threat assessment and notification systems, intrusion prevention and anti-spyware software but there are some basic steps every company and host can take to limit the possibility of attack and diminish the effectiveness of an attack if launched (Taylor, Fritsch, & Liederbach, 2015)
Challenges that result from the independent nature of the law enforcement agencies within the U.S. with computer crimes and terrorism. Law enforcement agencies need updated hardware and knowledgeable digital crime investigators. The traditional criminal activity is very different from the computerized crime, the tools and the methods of crime are also different, but the intentions and gain are the same. Many digital investigators within government law agencies are overworked and experience stress related to their work due to the overpowering of criminals accessing the computer world.
Law enforcement agencies face many challenges that deal with cybercrime. One of the biggest challenges facing government agencies is jurisdiction. Jurisdiction pertains to which agency or court has the authority to administer justice in a particular matter, and to the scope of those agencies ' and courts ' authority (Shinder, 2011). Cybercrime has no boundaries on the internet, crossing over jurisdiction within seconds, the individual committing the crime may not even be aware that he/she is in alien jurisdiction.
Law enforcement agencies must determine geographic jurisdiction of a cybercrime case, before investigation starts.
Difficulty arises when the perpetrator is located in another city, state, or even country than their victim. Laws differing from state to state and nation to nation, make it difficult to control or investigate such crimes. Even when law enforcement agencies are willing to pursue a case across state lines, it may be difficult to obtain assistance from out-of-state agencies when the conduct is limited to harassing e-mail messages and no actual violence has occurred (Rouse, 2000-2015).
Cybercrime is not a city, state, or a country issue, cybercrime is a global issue that touches every person that utilizes the internet around the world. Laws differing from state to state and nation to nation, make it difficult to control or investigate cybercrime. With this being said the most salient solution would to make cybercrime laws the same across the globe. While this may seem challenging and much needed negotiation from government agencies to government agencies globally this will ensure success in working together as a global nation to fight against cybercrime.
U.S. aligning the federal agencies in order to better protect the nation against digital crimes and …show more content…
terrorism. Protecting the United States from terrorism is the founding mission of the Department of Homeland Security. However much improvement is needed, as digital crime and terrorism are rapidly growing as more and more turn to the wide world web. With digital crime happen all over the world information sharing is critical for success in maintaining such crimes. On February 12, 2013 Today, President Obama signed an Executive Order to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with our industry partners (Secretary, 2013). The Executive Order requires Federal agencies to produce unclassified reports of threats to U.S. companies and requires the reports to be shared in a timely manner. The Order also expands the Enhanced Cybersecurity Services program, enabling near real time sharing of cyber threat information to assist participating critical infrastructure companies in their cyber protection efforts.
Future Trends Digital Crime will continue to increase, requiring the Police and Courts to offer new training for officers and investigators, bringing in police specialist, and new knowledge for attorneys and judges will be needed.
Fraud and Identity theft will be the largest computer crime problem impacting the Police. This crime will continue to grow at a rapid pace, simply put, tracking down fraudsters for internet crime, comes with many problems. Especially when the criminal lives in a country were little supervision is down on internet, and the authorities have a minimal relationship with US authorities.
The overall strategy needed for the U.S.
to use in order to combat digital crime and digital terrorism is to work together in both the private and public sector of information sharing. As long as we continue to try to address a global issue independently the longer it will take to secure our globe of digital crime and terrorism.
References
Privacy/Data Protection Project. (2005, 05 11). Retrieved from University of Miami School of Medicine: http://privacy.med.miami.edu/glossary/xd_ccpa.htm
Rouse, M. (2000-2015). Cyberstalking . Retrieved from TechTarget: http://searchsecurity.techtarget.com/definition/cyberstalking
Secretary, T. W. (2013, 02 13). Executive Order on Improving Critical Infrastructure Cybersecurity. Retrieved from The White House : https://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity-0
Shinder, D. (2011, 01 26). What Makes Cybercrime Laws so Difficult to Enforce. Retrieved from Tech Republic / US: http://www.techrepublic.com/blog/it-security/what-makes-cybercrime-laws-so-difficult-to-enforce/
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Sophisticated Cyber Criminal Organizatios. In R. W. Taylor, E. J. Fritsch, & J. Liederbach, Digital Crime Digital Terrorism (pp. 97-121). Upper Saddle River, New Jersey: Pearson,
Inc.