Case Study Of Cybercrime

709 Words 3 Pages
Cyber is an adjective defined as “of, relating to, or involving computers or computer networks,” and terror is a noun defined as “a very strong feeling of fear” or “something that causes very strong feelings of fear: something that is terrifying,” (, 2015). One can logically conclude that cyber-terror is a form of fear involving computers. As technology continues to evolve and everyday life becomes more dependent on technology, terms like cyber-terror and cybercrimes become further intergraded in our vernacular thus our understanding of those terms and what they mean to ordinary citizens must be developed with it. The issues of, both surrounding and created by, cybercrime and cyber-terror have and will continue to reach all …show more content…
One issue is determining who has jurisdiction over the incident. There are several factors to consider when assigning jurisdiction, such as which branch of law does the case fall into: civil or criminal and if criminal, does it fall into state or federal courts? This pertains to the details of the incident such as the grade of offence or geographical location in which the offence was committed as well as the location of the intended target, (Shinder, 2011). Once the details of the case are understood and categorized, only then can the case proceed further in the criminal justice system.
Another obstacle that authorities face is a lack of computer-literate investigators. To even investigate the crime that has taken place, detectives must be qualified and competent to pursue those at fault effectively. These investigators need to be highly trained specialist in the field of information technology coupled with knowledge in basic law enforcement polices and procedures. These specialists must also possess current computer forensic examination skills, knowledge of various IT hardware and software, and extensive cybercrime familiarity (Wolf,
…show more content…
Nearly 150,000 viruses and malicious codes circulate through cyberspace infecting over 148,000 computers daily, (KPMG International, 2011). The cost of information lost to cybercrime in 2008 ($265 million) doubled in just a year when measured at the end of 2009 in the amount of $560 million within the US alone, (KPMG International, 2011). Cybercrime along with the targeted victims have grown in complexity as well. In 2000, the first documented cybercrime (the “I Love You” worm), was a spam email that affected 45 million users would wide. Ten years later, the Stuxnet worm was used as a weapon aimed at Iran’s nuclear facilities and destroyed a fifth of the countries’ nuclear centrifuges, (KPMG International, 2011). The fact that the sophistication of these programs have evolved to the form of weapons mean that the possibilities are endless and will only continue to grow in

Related Documents