Challenges Of Cyber Crime

Decent Essays
A cyber-crime is typically described as any criminal act dealing with computers or computer networks. Cyber-crimes requires the application of cyber forensic techniques to extract data for those investigating these cases as well as those prosecuting and judging them. Because of this specialized method of investigation and prosecution, the people involved have had to keep pace with the evolution of the cyber-criminal. Cyber-crimes have consistently been ahead of the curve as it pertains to relevant laws. Originally, cyber-crimes were prosecuted under established penal codes for their overt acts such as theft, pornography, stalking, and fraud. However, many of the existing codes do not adequately cover the scope of crimes committed using …show more content…
Those people attempting to bring to justice those who commit cyber-crimes face many issues, one of which is practicality.
With the commission of a cyber-crime, the topic of jurisdiction often arises. For example a perpetrator lives in one state and sends pornographic material to a person in another state. Who will prosecute? Who investigates and how do they do that? These are some basic problems of practicality that investigators and prosecutors face every day. Along with the logistics of investigating the crime comes the cost of investigation. Competence is another challenge faced by the justice system when dealing with cyber-crimes. Are there enough investigators and prosecutors as well as judges who understand the intricacies of cyber-crimes? Fixes to the problems associated with cyber-crimes and the successful prosecution of them include:
1) Targeted prosecutions. They are used in an attempt to discourage potential perpetrators from engaging in illegal activities. An example of this is: U.S. vs. Vyochanskyy (N.D. California,
2005), where the defendant sold counterfeit software programs on web sites including eBay.
…show more content…
3) The formation of special units in order to detect and bring to justice cyber-criminals such as: a) The ATOTF (Account Takeover Task Force), this is a partnership with the private sector and the Secret Service, Department of Treasury, and Department of Justice. They focus on the prevention, detection, and prosecution of account takeovers. b) The partnerships developed by the Secret Service with various law enforcement agencies in and out of the USA through the Electronic Crimes Task Force. The task force received support from the Cyber Intelligence Section and training from the Electronic Crimes Special Agent
Program.
c) The Secret Service has collaborated with the Department of Justice’s Computer Crimes and
Intellectual Property Section (CCIPS), which is a key partner in prevention, investigation, and prosecution of cyber-crimes. Sharing information and assets increases the chances for a successful prosecution for any and all cyber-crimes. To that end, the Secret Service provides and shares information

Related Documents

  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    In the final assignment there will be two topics discussed, the first topic will be, what are the capabilities and limitations of intelligence in supporting homeland security efforts. This topic will provide examination of the various elements that make up the intelligence community from local law enforcement to national agencies, and how they all work together. The second topic is, critique the capability of the homeland security enterprise to adequately identify and address future challenges. This topic will state my position to the capabilities of the homeland security as a whole, while still keeping with civil liberties. The capabilities of gathering intelligence in support of homeland security are very vast.…

    • 1803 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    Leading Group Challenges Diane J. Hines AJS/512 November 23, 2014 Steven J. Duplissis, J.D. Leading Group Challenges Organizations incorporated in the criminal justice system include the court system, corrections and police departments. There are daily challenges within each of these agencies to deal with and the leaders must have the understanding and experience to handle the challenges within the agencies. In the criminal justice system each of the agencies play a role and the foundation in each agency is built from the leadership contained within. Conflict and Control Challenges…

    • 1596 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Uniform Crime Report (UCR) was produced in 1929 and is used to give an annual report about major crime in the United States that is submitted to the FBI’s or state UCR Program. The crime data is collected when people report crimes. According to the Federal Bureau of Investigation the UCR is a “Regularly publish or contribute to a series of statistical crime reports and publications, detailing specific offenses and outlining trends that can help you better understand crime threats both nationally and locally.” A big issued with the UCR program is that the data that is gathered is by people who report to the Police about a crime, as I mentioned earlier, but there are victims who are afraid to report to them or believe that nothing can be done…

    • 661 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Many different types of discrimination and racial separation occurred in the early 1860’s through the late 1960’s. Many took action to either support or go against these types of events therefore, leading to address these issues. There were different types of ways the discrimination and racial separation was taken into action. These events included the Jim Crow Laws, Klu Klux Klan, the Plessy v. Ferguson, and Lynching Mobs in America.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Jurisdiction This paper will define jurisdiction and train investigators in the topic. The U.S. Attorney’s Office believes in training investigators in this particular subject. The power of jurisdiction granted by the U.S. Supreme Court to lower courts to hear cases.…

    • 898 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The famous case of twenty two year old David Camez was one of many that violated cybercrime not only in the United States, but globally as well. Camez was found guilty of committing racketeering crimes along with committing fraud across the globe through an international website called Carder.su. Though the website was not only David Camez’ investment but also fifty other members, who were not found guilt or sent on trial. The members of the website were basically giving money to hack into other networks and steal personal information of customers all over the world. The hacking included stealing people’s identities and credit card information.…

    • 946 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cyber-crime is the new crime of the new century and the advent of new technologies has allowed it to become a global epidemic. Globalization and cyber crime go hand in hand as they each have severe implications on the criminal justice system. People anonymously can commit crimes against people who live in different countries than them and make it impossible to trace and fiscally unfeasible to even try. The jurisdictions of the crime also are a factor. There is not a way to bring them to justice people can only be careful and protect his or herself.…

    • 864 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Anthony Innocent

    • 1527 Words
    • 7 Pages

    When mistaken for a criminal the person that is innocent can be paying someone else’s sentence. When the person that is blamed for something they didn’t do they end up having to have that problem on their record. The person that has the situation on their record, it makes it hard to find a job. The crimes that innocent people are considered guilty for are serious and can do damage to their life.…

    • 1527 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Chapter7: Investigation of Human Trafficking Submitted to: Ms. Mae Conley Submitted by: Cynthia Jackson CJ 519 10/15/17 Investigation of Human Trafficking 1 Human trafficking is a violation of federal civil rights laws. The FBI is investigating these crimes as one of its top civil rights priorities to protect those who may be a victim of this crime. According to Gilbert the general process of investigation is complex, but it may be summarized as the systematic and thorough inquiry into and individual or an incident in order to ascertain the truth. The identification of a trafficked victim is vital to ensure that they may be granted access to protection and support services. If a trafficked victim is not identified as…

    • 685 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Essay On Homeland Security

    • 1030 Words
    • 5 Pages

    “The mission of the United States Secret Service is to safeguard the nation 's financial infrastructure and payment systems to preserve the integrity of the economy, and to protect national leaders, visiting heads of state and government, designated sites and National Special Security Events.” The key concepts to accomplishing this mission are protection, protective intelligence and criminal investigation. The main focus of the Secret Service is supported by these operational programs to ensure full protection for our country. The USSS carries out dual missions that include the protection of national and visiting leaders, and criminal…

    • 1030 Words
    • 5 Pages
    Improved Essays
  • Brilliant Essays

    User Liberties/Rights Assessment USCENTCOM and ultimately the 160th Signal Brigade is responsible for maintaining communications in a very dynamic and high risk environment. The mission is to maintain our human rights and defend against terrorism. This mission needs to transfer to defending rights on in cyberspace. Policies confronting challenges of preserving core rights and liberties is part of the commitment.…

    • 1749 Words
    • 7 Pages
    Brilliant Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays