Challenges Of Cyber Crime

Decent Essays
A cyber-crime is typically described as any criminal act dealing with computers or computer networks. Cyber-crimes requires the application of cyber forensic techniques to extract data for those investigating these cases as well as those prosecuting and judging them. Because of this specialized method of investigation and prosecution, the people involved have had to keep pace with the evolution of the cyber-criminal. Cyber-crimes have consistently been ahead of the curve as it pertains to relevant laws. Originally, cyber-crimes were prosecuted under established penal codes for their overt acts such as theft, pornography, stalking, and fraud. However, many of the existing codes do not adequately cover the scope of crimes committed using …show more content…
Those people attempting to bring to justice those who commit cyber-crimes face many issues, one of which is practicality.
With the commission of a cyber-crime, the topic of jurisdiction often arises. For example a perpetrator lives in one state and sends pornographic material to a person in another state. Who will prosecute? Who investigates and how do they do that? These are some basic problems of practicality that investigators and prosecutors face every day. Along with the logistics of investigating the crime comes the cost of investigation. Competence is another challenge faced by the justice system when dealing with cyber-crimes. Are there enough investigators and prosecutors as well as judges who understand the intricacies of cyber-crimes? Fixes to the problems associated with cyber-crimes and the successful prosecution of them include:
1) Targeted prosecutions. They are used in an attempt to discourage potential perpetrators from engaging in illegal activities. An example of this is: U.S. vs. Vyochanskyy (N.D. California,
2005), where the defendant sold counterfeit software programs on web sites including eBay.
…show more content…
3) The formation of special units in order to detect and bring to justice cyber-criminals such as: a) The ATOTF (Account Takeover Task Force), this is a partnership with the private sector and the Secret Service, Department of Treasury, and Department of Justice. They focus on the prevention, detection, and prosecution of account takeovers. b) The partnerships developed by the Secret Service with various law enforcement agencies in and out of the USA through the Electronic Crimes Task Force. The task force received support from the Cyber Intelligence Section and training from the Electronic Crimes Special Agent
Program.
c) The Secret Service has collaborated with the Department of Justice’s Computer Crimes and
Intellectual Property Section (CCIPS), which is a key partner in prevention, investigation, and prosecution of cyber-crimes. Sharing information and assets increases the chances for a successful prosecution for any and all cyber-crimes. To that end, the Secret Service provides and shares information

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Study Guide

    • 432 Words
    • 2 Pages

    1. Name three specific cyber issues that have necessitated new laws. 1) Credit card fraud. 2) Cyberstalking. 3) Theft of intellectual property and Identity theft.…

    • 432 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The criminal justice community is always evolving, there are changes in technology that have caused shockwaves through the system that reach an international level. In the review of the current system, the impact of globalization on the United States criminal justice system will be assessed, as well as comparing and contrasting the international criminal justice systems. Which include Civil Law, Common Law, Islamic Law, and Socialist Law traditions. Additionally, the impact that cybercrime and technology have on the worldwide justice system, and the differences between the policing systems that exist throughout the world will be examined. Finally, the major crimes and criminal issues that have a global impact on the justice systems around the world will be appraised.…

    • 1770 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    This research will focus on the theories of digital crime and how they cause criminals to commit their crimes. Choice theory is the notation that people always have some type of choice about how to behave, It is also based on the presumption that all behavior represents the single persistent strive to satisfy that person 's basic needs. Choice theory teaches that outside events that makes a person not do. It is the central aspect of its beliefs that are internally and not externally motivatives (William Glasser). Learning theory is a conceptual substructure describing how information is absorbed, processed, and retained during learning Even though Some people think theory has nothing to do with criminals who commits there illegal acts, because…

    • 1126 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Jurisdiction This paper will define jurisdiction and train investigators in the topic. The U.S. Attorney’s Office believes in training investigators in this particular subject. The power of jurisdiction granted by the U.S. Supreme Court to lower courts to hear cases.…

    • 898 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Chapter7: Investigation of Human Trafficking Submitted to: Ms. Mae Conley Submitted by: Cynthia Jackson CJ 519 10/15/17 Investigation of Human Trafficking 1 Human trafficking is a violation of federal civil rights laws. The FBI is investigating these crimes as one of its top civil rights priorities to protect those who may be a victim of this crime. According to Gilbert the general process of investigation is complex, but it may be summarized as the systematic and thorough inquiry into and individual or an incident in order to ascertain the truth. The identification of a trafficked victim is vital to ensure that they may be granted access to protection and support services. If a trafficked victim is not identified as…

    • 685 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    User Liberties/Rights Assessment USCENTCOM and ultimately the 160th Signal Brigade is responsible for maintaining communications in a very dynamic and high risk environment. The mission is to maintain our human rights and defend against terrorism. This mission needs to transfer to defending rights on in cyberspace. Policies confronting challenges of preserving core rights and liberties is part of the commitment.…

    • 1749 Words
    • 7 Pages
    Brilliant Essays
  • Superior Essays

    Leading Group Challenges Diane J. Hines AJS/512 November 23, 2014 Steven J. Duplissis, J.D. Leading Group Challenges Organizations incorporated in the criminal justice system include the court system, corrections and police departments. There are daily challenges within each of these agencies to deal with and the leaders must have the understanding and experience to handle the challenges within the agencies. In the criminal justice system each of the agencies play a role and the foundation in each agency is built from the leadership contained within. Conflict and Control Challenges…

    • 1596 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Uniform Crime Report (UCR) was produced in 1929 and is used to give an annual report about major crime in the United States that is submitted to the FBI’s or state UCR Program. The crime data is collected when people report crimes. According to the Federal Bureau of Investigation the UCR is a “Regularly publish or contribute to a series of statistical crime reports and publications, detailing specific offenses and outlining trends that can help you better understand crime threats both nationally and locally.” A big issued with the UCR program is that the data that is gathered is by people who report to the Police about a crime, as I mentioned earlier, but there are victims who are afraid to report to them or believe that nothing can be done…

    • 661 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Anthony Innocent

    • 1527 Words
    • 7 Pages

    When mistaken for a criminal the person that is innocent can be paying someone else’s sentence. When the person that is blamed for something they didn’t do they end up having to have that problem on their record. The person that has the situation on their record, it makes it hard to find a job. The crimes that innocent people are considered guilty for are serious and can do damage to their life.…

    • 1527 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    In the final assignment there will be two topics discussed, the first topic will be, what are the capabilities and limitations of intelligence in supporting homeland security efforts. This topic will provide examination of the various elements that make up the intelligence community from local law enforcement to national agencies, and how they all work together. The second topic is, critique the capability of the homeland security enterprise to adequately identify and address future challenges. This topic will state my position to the capabilities of the homeland security as a whole, while still keeping with civil liberties. The capabilities of gathering intelligence in support of homeland security are very vast.…

    • 1803 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Many different types of discrimination and racial separation occurred in the early 1860’s through the late 1960’s. Many took action to either support or go against these types of events therefore, leading to address these issues. There were different types of ways the discrimination and racial separation was taken into action. These events included the Jim Crow Laws, Klu Klux Klan, the Plessy v. Ferguson, and Lynching Mobs in America.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Intelligence in Homeland Security Introduction After the attack of 9/11 on the United States the Nation learned there were many areas that needed improvement in regards to the security of the homeland. The Department of Homeland Security (DHS) had to take into account the lessons learned from 9/11, especially the shortfalls that were seen in intelligence gathering and make some major changes. The DHS is not the only agency that is responsible for gathering information for the Nation’s safety, there are many different national agencies that provide intelligence for homeland security. Some of the National agencies include offices that many have heard of like Customs and Border Patrol, the U.S. Coast Guard or the Secret Service, but there are other National agencies that contribute that most Americans may not know about.…

    • 1699 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays