Preview

Cybercrime In Law Enforcement

Good Essays
Open Document
Open Document
471 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybercrime In Law Enforcement
The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy …show more content…

Obviously, if law enforcement is unaware of some of the methods criminals are using means that crime is going to go undetected and individuals will not be prosecuted. People are committing cybercrime from the comfort of their own home, so it’s not easy for law enforcement to recognize that crime is occurring compared to a person breaking the law in public. Nowadays, almost every home has devices such as a desktop, laptop, iPad, and/or iPhone that allow access to the Internet, which makes it difficult to catch cybercriminals. Some victims may not even know they were affected by cybercrime or may not report incidents to law enforcement. It’s important for law enforcement to know as much as possible regarding the usage of technology, software, and information to better detect any criminal activity (Maras, 2015). In order to prosecute, first comes detection. It is possible for law enforcement to establish the IP address from the computer that is committing cybercrime, but at the same time there could not be enough evidence to prosecute. Sometimes, criminals will alter their IP addresses to remain anonymous or use what are called proxy servers to prevent their IP addressed from being detected (Maras,

You May Also Find These Documents Helpful

  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    High technology gives criminals the opportunity to obtain valuable information. They are considered a cyber-threat. Criminals usually get illegitimate or legitimate work-related access to a company’s computer resources to sell wanted information.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Capstone Analysis

    • 285 Words
    • 1 Page

    Regular stories featured in the media on computer crime include topics covering hacking to viruses, web hackers, to internet pedophiles, sometimes accurately portraying events, sometimes misconceiving the role of technology in such activities. The increase in cybercrime has been documented in the news media. Both the increase in the incidence of criminal activity and the possible emergence of new varieties of criminal activity pose challenges for the legal system, as well as for law enforcement. Some of the things I do to try and prevent falling victim to cybercrime is keeping the latest version of virus software on my computers. Using strong passwords that only my family knows. I do not fall prey to online offers of things like free TVs, or you have won $1,000.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    Cyberspace has been traditionally defined as the exchange of information and communication from one person to another in completely different geographical locations (Britz, 2013, p.3). According to Britz cyberspace was defined as “the place between places” (Britz, 2013, p.3). Therefore, cyberspace represents the cloud where emails, calls, and, text messages must pass through before making it to its final destination. Cyberspace has been used since traditional communication devices were first introduced (Britz, 2013, p.3). Approximately half of the United States have used the Internet as a medium (Britz, 2013, p.3). However, with the wave of the Internet, criminals found new ways to commit crimes with less risk of getting caught. According to Britz computer crime, computer-related crimes, digital crimes, and cybercrime must be studied in order to understand technological and electronic crimes (Britz, 2013, p.3).…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Robbery, rape, homicide, etc. are being joined by another threat. The increase in popularity of the Internet over the years has resulted in the creation of a new type of crime, cybercrime. With that, came along a new concern: the need for safety and surveillance on the Internet. This has created a certain type of Panoptic society and displays the way in which people are subject to behave when they know that a higher power such as the Federal Government and even local law enforcement agencies have the ability to access their information via computer systems. Cybercrime can be defined in many ways whether it’s money laundering, bullying, fraud, or stalking.…

    • 1033 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Sophisticated Cyber Criminal Organizatios. In R. W. Taylor, E. J. Fritsch, & J. Liederbach, Digital Crime Digital Terrorism (pp. 97-121). Upper Saddle River, New Jersey: Pearson,…

    • 1025 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Cyber-crimes can be divided into two broad categories; the first category involves attacks on computer hardware and software tools, such as botnets, network intrusions, and malware. The category involves cybercrimes of financial nature such as online fraud and penetration of online financial services (Brenner, 2010). Others include phishing, corporate account takeover and theft of intellectual properties. Cyber-crimes are committed across geographical boundaries, with the perpetrators taking advantage of the internet to propel their criminal activities. The convenience, anonymity and increased profitability of cyber-crimes have increased the proliferation of cyber-crimes in recent years. Eighty percent of modern cyber-crimes are estimated to originate from organized criminal activities. Prevalence of the crime can be attributed to the establishment of fraud-as-service, increased profitability and increasing diversification of the digital media platforms (ITU,…

    • 3110 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    CyberCrime Motivation

    • 1610 Words
    • 5 Pages

    Kshetri, N. (2010). The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives. New York: Springer.…

    • 1610 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Crime Patterns

    • 382 Words
    • 2 Pages

    Now a day in this world cyber crime is on the rise. Everywhere you look everyone uses a computer for messaging, banking, keeping in contact with families, gaming, and many other things. Cyber crime is presenting big problems for criminologists nowadays, 1.) it is rapidly evolving, new things being built every day. 2.) It is difficult to detect through law enforcement channels, 3.) planning or coordinating its control demands technical skills that match those of the perpetrators.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technology and Crime

    • 2517 Words
    • 11 Pages

    Examples of these crimes include, electronic funds transfer crime, electronic money laundering, [2]counterfeiting, and software piracy.[3] Contrary to traditional property offences, computers coupled with telecommunications technology enables offenders not to leave any traces of usual biological evidence in interpersonal offences such as finger prints or hair that could lead to the offender through forensic tests. Even if the police traced back the computer that the fund transfer crime was originated, the actual offender would be uncertain if it’s located in internet café which is used by numerous customers. This anonymity is considered the major attraction for offenders with advanced computer skills to commit such crimes. This paper will discuss the effectiveness of the current law in protecting the people from the new treats and possible policies or methods that could be implemented by authorities to combat this…

    • 2517 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    As digital technology has advanced over the past 50-odd years with a force unprecedented in history, governments, businesses and people around the world have been affected immeasurably. The already enormous and still growing capacities for electronic storage, transmission and rapid manipulation of data changed the modern landscape virtually overnight, making the world unrecognizable in many ways to those of earlier generations. Perhaps with some of the bias that is part of the older generations, it is taken for granted that the changes have included substantial benefits. However, such fundamental restructuring in society also results in certain disadvantages, on all levels. As we begin to rely on this technology more and more, we in fact become more vulnerable. A potential example of how damaging this reliability can be may become most evident in the next several months as we approach ever closer to the dreaded Y2K. This is a problem that resulted from human laziness and greed. However, it was not meant to be malevolent. Increased opportunities for the industrious to be more productive also allows the criminal mind new avenues for malevolence. The explosion of the world of information technologies has a negative side: it has opened the door to antisocial and criminal behavior in ways that would never have previously been possible. Computer systems offer some new and highly sophisticated opportunities for law breaking, and they create the potential to commit traditional types of crimes in non-traditional ways. In addition to suffering the economic consequences of computer crime, society relies on computerized systems for almost everything in life, from air, train and bus traffic control to medical service coordination and national security. Even a small glitch in the operation of these systems can put human lives in danger. Society's dependence on computer systems, therefore, has a profound human dimension. The rapid transnational expansion of large-scale computer…

    • 3600 Words
    • 15 Pages
    Good Essays