The Dangers Of Global Cybercrime

Superior Essays
The continuing technological revolution in communications and information exchange over the past years has led to a growth in a new form of crime, cybercrime. Hence, criminals across the globe have invented various ways to use computer technology for theft, fraud as well as harassment. According to Holder and Jaishankar (2011, cited in Tiganoaia, 2013), cybercrime is defined as “an offence that is committed against individuals or groups of individuals with a criminal motive to intentionally cause physical or mental damages, using modern telecommunication networks such as the internet and mobile devices”. Since the late seventies, cybercrime has been apparent, and it has progressively evolved into a more invasive crime. There is no doubt that global cybercrime has become a significant issue. …show more content…
The center for strategic and international studies (2014) estimates that the potential cost of the global economy from cybercrime may reach more than 400 billion annually, including losses and costs for restoration and protection. Consequently, the strategies to reduce the crime are difficult to implement, although not impossible. A reduction of cybercrime could be achieved by increasing levels of network security and enforcing strict laws. This essay will first discuss network security measures, and how it would be essential approach to eliminate such obstacles in cyberspace. Secondly, it will describe the federal approaches used for prosecuting cybercrime, and analyse enforcement strategies. Finally, it will debate the effectiveness of network security measures and enforcement laws and their role in decreasing

Related Documents

  • Improved Essays

    The working group was tasked with preparing a report identifying which laws were sufficient in investigating and prosecuting crimes conducted via the Internet. Moreover, emphasis was placed on the sale of weapons, illegal narcotics, pharmaceuticals, prescription drugs, fraud, and child pornography. Additionally, the working group was to investigate which new technologies, capabilities, and legal authorities were required to investigate and prosecute those individuals and groups that commit crimes using the Internet. Furthermore, the working group was to identify new and existing tools that could be used to educate, empower parents, teachers, to include public and private sector users to prevent or minimize risk posed by unlawful use of the Internet.…

    • 664 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Thousand Oaks: Sage Publications, pp.466 - 471. In the book, J. Miller discusses the idea of criminology in the twenty-first century, since the arrival of computers in the 1970’s and with the further introduction of the web in the early 1990’s there was increased use of these technologies by criminals as a means of committing cybercrimes awhile masking their identity’s.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In his revealing book Future Crimes, Marc Goodman shows us the threat that we, as inhabitants of this new technological world, either are facing or going to face in future years. Goodman started his cybercrime resume with the Los Angeles Police Department. After the LAPD, he spent years working for federal agencies such as the FBI and the secret service with on their computer crime units. When he began working with the computer crime units, cybercrimes were still in their infancy, now he has seen the eruption of cyber terrorism and Crime Inc. Goodman’s book shows the American public the vulnerabilities of their social media accounts and how the information obtained from them can be used against them. He also reveals how large the Dark Web really is and how it is already causing threats because of the unregulated sale of every product imaginable.…

    • 494 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    As the danger of cyber security increases, the desire for protection increases as well. In order to fulfill this desire, laws must be established. The creation of laws are outlined to individuals on what can or cannot be done legally. With strict laws on situations, this warns individuals on what they are able to do and if they do not follow these laws what repercussions they will then face. Likewise, technology can then help to increase the access of laws to individuals in their awareness of laws.…

    • 480 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybercrime In Canada

    • 546 Words
    • 3 Pages

    In Canada to strengthen the security of already existing law and electronic devices vivid kinds of tools are being used. To implement national and international responses to collect electronic evidence in cybercrime activities Canada using wide range of tools. Following are the important national and international tools: [4] International Tools: United Nations Convention against transnational organized crime: This instrument came in to effect on 25th of December 2003. It is one among the major international instruments in action counter to transnational organized crime. The code of the tool is to hinder, abolish and punish trafficking in persons, exclusively women and children.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    There are many ways in which a criminal could use electronic means to incite fear and violence. It's far less expensive to purchase a computer than to access guns or bombs, making this approach appealing for many potential criminals worldwide. It can be anonymous and conducted at a great distance away from the target. Experts in cyber terrorism have pointed out that the potential harm posed by these threats may be exaggerated, but there is some disagreement. If it was to succeed, our outdated computer networks owned by the national government could be comprised.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The forecast provides a developing use of inductive logic based on existing knowledge and trends in computer crime, criminal justice, and national security. There are two significant limitations to the forecast, which is the lack of empirical data and the inability to be precise in anticipating incidents of computer crime(Digital Crime and Terrorism). The judicial prosecutorial and investigative officials, as well as scholars and computer security specialist, are knowledgeable about cybercrime and show perform a comprehensive review of criminals and law procedures related to the crime of equipment. A few strategies that u.s could use to combat digital crime, and terrorism would be to Create a separate secure network with integrated security for the particular use of critical infrastructure systems with large-scale monitoring is a potential strategy(.Heritage.org).…

    • 930 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With growing rises of terrorism across the world -- but the U.S. especially-- it is crucial that suspicious activities get checked out immediately. For legal reasons, looking into someone’s internet activities should be the same as looking in someone’s house; there should be probable cause or some type of warrant. As shown in cases such as the Boston Marathon shooting, the internet and citizens’ internet content can help solve crimes on a national level -- in these instances, monitoring the internet is a duty to the country and is necessary to protect the wellbeing of…

    • 529 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Cyber Crime Research Paper

    • 1158 Words
    • 5 Pages

    Cybercrime: The Easy Way to Commit a Crime Cybercriminals are able to commit detrimentals crimes with a click of a few buttons. Cybercrime is the “unauthorized use or disruption of computer files... the theft of an electronic identity...the use of a computer to facilitate or carry out a traditional crime (Engdahl 100).” According to the author of the article “Cybersecurity,” cyber attacks are becoming more and more common.…

    • 1158 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Police Technology

    • 1272 Words
    • 6 Pages

    Web sites, electronic mail, chat rooms, and file sharing networks can all yield evidence in an investigation of computer-related crime. Law enforcement officials know this and they have responded to the problem by using the same technology as the criminals. This paper will set…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays