The Importance Of Cybercrime In Law Enforcement

Decent Essays
The is no intrinsic irony that despite the fact that the majority of the industrialized world has some sort of interaction with computers and the internet on a daily bases it still seems as though the police attitude towards cybercrimes is that it should be handled through specialized units or task forces even though for better or worse the statistical reality is as mentioned before if law enforcement is to remain relevant and at the forefront of law enforcement tends this must be a process that must be taken up by all members of the community, least ignorance be the deicing factor thus allowing criminals savvy to this fact to take advantage of it (39). The mantel of cybercrime prevention must be taken up by local law enforcement so it is …show more content…
It is believed by researchers that cybercrime can be effectively reduced by working in conjunction with personnel from historical non-law enforcement origination and companies (66), there mat be some truth to this as in most cases law enforcement itself can not development new technology or software in most cases when it comes to research and development law enforcement either asks for the technology or software or implements existing technologies and tools. Some of these mentioned non-law enforcement entities comprise everyday citizens, non-policing state managed agencies or organizations, web hosting entities, other external law enforcement agencies, and internet service providers …show more content…
As before it is mentioned that cybercrime can be handled more effectively if the general public would not only educate themselves in their own personal protection and prevention to becoming a victim of cybercrime but the general public must be more proactive in reporting these crimes. It is only common scenes that an average person would be self aware of there surroundings particularly given in more extreme situations where they may find themselves in a situation or place that instinctively would cause a greater concern for ones own safety, say like being in a questionable neighborhood late at night, so why is it given that as the media has reported as well as possibly persons known that have become victims of cybercrime do not people in general take at least higher precautions when it comes to personal exposure and safety? The answer to this may lie in the idea that an event and causation that has not immediate since of danger does not speak to the basic virtue of a persons fight or flight response, this being that activities that happen in cyberspace whether aggressive or benign seem nebulous and abstract comparatively speaking to say an assault on ones own person, this and for the most part a cybercrime committed generally happens without

Related Documents

  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    More and more, criminals are using technologically advance…

    • 1447 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Through the DHS, the federal government uses resources and skills from the ICE and USSS in addition to working with the private organizations to investigate cyber terrorism. The DHS is a partner in the National Cyber Investigative Joint Task Force, whereby they work to improve inter-agency information sharing. Moreover, the government works in collaboration with the EU working group on Cybercrime and Cybersecurity to develop approaches that deal with cybercrime and cybersecurity. This partnership works to secure training required by the agencies, software licenses and computer forensic…

    • 820 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    People have been trying to stop crime for many years and current and future technology may hold the answer. Science fiction author Ray Bradbury gives us a glimpse into the near future in his short stories, and shows us that the key to a crimeless future may be soon at hand. Technology will lead to the end of crime. Admittedly technology can be attributed to many problems in the world today such as bullying. nobullying.com says, “ Cyber bullying came in… with 17 percent of the reports involving cases that were associated with the internet.”…

    • 962 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This research will focus on the theories of digital crime and how they cause criminals to commit their crimes. Choice theory is the notation that people always have some type of choice about how to behave, It is also based on the presumption that all behavior represents the single persistent strive to satisfy that person 's basic needs. Choice theory teaches that outside events that makes a person not do. It is the central aspect of its beliefs that are internally and not externally motivatives (William Glasser). Learning theory is a conceptual substructure describing how information is absorbed, processed, and retained during learning Even though Some people think theory has nothing to do with criminals who commits there illegal acts, because…

    • 1126 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    National Security Agency

    • 1122 Words
    • 5 Pages

    Federal agencies have led law enforcement efforts against computer crime since these agencies hold the technical expertise and political influence to gather significant financial and operational resources at the national level. Thus, these agencies have progressively reorganized in an attempt to channel resources directly at preventing digital crimes and capturing computer criminals, including the creation of special sections within these organizations, employing of new personnel who have specialized technical skill in this area, and the creation of new collaborative sections that combine the resources of multiple agencies. Department of Justice (DOJ) United States Department of Justice was established in 1870.…

    • 1122 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    As the danger of cyber security increases, the desire for protection increases as well. In order to fulfill this desire, laws must be established. The creation of laws are outlined to individuals on what can or cannot be done legally. With strict laws on situations, this warns individuals on what they are able to do and if they do not follow these laws what repercussions they will then face. Likewise, technology can then help to increase the access of laws to individuals in their awareness of laws.…

    • 480 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Contrasting Acts of Terrorism The very mention of the words terrorism and terrorist incites a variety of negative emotions for most people. An individual’s dread of bodily harm or worries about the condition of the state creates a condition of extreme fear. (Levav) There are two very different aspects of terrorism affecting our world today.…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays