Free Essay

Digital Crime

In: Social Issues

Submitted By Seemefinish
Words 1834
Pages 8
The Future of Digital Crime and Digital Terrorism
Introduction
You will learn that law enforcement personnel that is just coming into this field needs to be trained with the upcoming technology. There is no need to train them on the old stuff and wait to train them on the new. They need to be able to be one step ahead of digital crime and digital terrorism. Right now, law enforcement is falling behind.
Digital Crime
Forecast
The future of digital crime and digital terrorism is going to get worse than what it is right now. The laws and the law enforcement agencies cannot keep up with the ever changing technology. By the time they learn something to keep up with it now, something new is already out which puts law enforcement behind the power curve. Starting out as new personnel in the different law enforcement agencies you will have to get training on the technology that is already out and the one that is coming out.
Technology is changing every day and is not going to stop. Learning from the past can help law enforcement forecast future trends in crime to facilitate creation of best practices for investigation and prosecution of computer crime along with researching all past, present, and future aspects of emerging methodologies in digital crime. There are eight forecasts that have been developed from the analysis and collection of data, in order to know the future of digital crime and digital terrorism. They are:
Forecast 1: The number of offenses reported to the police involving computers and electronic storage media will continue to increase substantially, requiring changing priorities for resource allocation, new training for line officers and investigators, new police specialties, and new knowledge for prosecuting attorneys and judges.
Forecast 2: The largest computer crime problem affecting local law enforcement representing the largest number of victims and the largest monetary loss will be Internet fraud, including fraud via identify theft.
Forecast 3: Virtual crimes against persons will increase at a faster rate compared with past years as a result of the significant expansion in networking, personal computing, and social networking sites. These hybrid crimes, which have coercive characteristics similar to those found in psychological warfare, will require new laws expressly to address the problem and new methodologies for investigation, prevention, and education.
Forecast 4: Computer hacker groups will emerge in developing countries around the world, increasing the threat of malicious attacks motivated by religion, politics, and money.
Forecast 5: Current organized crime groups, particularly those that are entrepreneurial, will increasingly adopt computerization as a criminal instrument. These are the examples that were used as organized crime group: Record keeping – criminals has been keeping computer records just like businesses. They use spreadsheets and databases so it will not be noticed they are committing a criminal act. Counterfeit currency and documents – criminals can easily obtain and make fake passports and money through the technology of scanners, printers, fax machine, and copiers. Illegal immigration – this is mainly through organized crime.
They have found a way to smuggle immigrants into the country without being traced; Counterfeit products – this is the selling of man-made dvds, pocket books, audio tapes, video tapes, and software for the computer. People steal copyrighted information and sell it to the public for less. Black market – is where people do not go through the right channels to obtain licensing or pay taxes. They just go the illegal way to make their money. Theft and fraud – this is how people obtain personal information of someone and uses it to their benefits. These days welfare fraud is on the rise because of the economy.
Everyone wants a piece of the pie and will use anybody information to obtain money and help from social services. Telecommunication fraud – is obtaining information through telephone, hacking into to the telephone systems, accessing information through corporate companies. Sexually Related Commerce – is the arranging of prostitution through the internet. You have website where you can buy a date or sugar daddy. It used to be you can go on the street and pick one up, but since you get busted for picking up prostitutes you can now go online and buy you one without leaving your home. Gambling online has become easy for people that do not want to leave their home and go to the casino. Now you can easily lose your money or get your identity stolen right through the internet. Gambling was going to the casino and having fun with friends or family but, if you have problems with gambling people has taken it to the computer.
Forecast 6: Terrorist groups will increasingly use global networking as a tool to accomplish their goals. This includes use of the Internet for recruitment, surreptitious communications, and coordination purposes as well as attempting to use network access to critical infrastructure systems to strike for their cause via the creation chaos, disinformation, and file destruction-cyber terrorism.
Forecast 7: The character of espionage will continue to broaden into the arenas of information warfare, economic espionage, and theft of intellectual property.
Forecast 8: Criminals terrorist, nation-states, patriots, and anarchists will increasingly use technology-based instruments and methodologies, which can surreptitiously capture data/information or destroy technological communications, information processing, and/or storage appliances. These are examples of the use of technology based instruments: Electromagnetic impulse and High Energy Radio Frequency – is the type of instrument that China uses as a weapon. Criminals use these as a way to jam signals in order to disrupt communications for their benefits. Compromising Electronic Emanations and Tempest/Emissions Security (EMSEC) – is used for espionage and surveillance. This is how criminals tract where police are located and what they are saying over their radios.
Malicious Software – is viruses, Trojan horses, worms, and other unwanted software that can be emailed to your computer. These are programs that are actively being prepared every day. You do not need computer knowledge in order to access malicious software. Terrorist groups use these types of software in order to obtain information. This is how they become more knowledgeable about the things that go on in the United States. (Taylor, Fritsch, Liederbach, & Holt, 2011).
The number and sophistication of cyber-attacks has increased dramatically over the past five years and is expected to grow more and more. The threat has reached the point that it will give enough time, motivation and funding to the criminal. The criminal will be able to access any system directly from the internet. Even though, law enforcement agencies has identified the main cyber-attacks it’s still hard for them to keep up with them. Technology is changing drastically, until it’s hard to keep up with the problems that seem to persist on an everyday basis.
Digital crime will keep evolving because of technology. The more technology comes out the worse digital crime will get. It’s to the point now you can use your cellphone to complete illegal transactions. They are even making technology better in scanners, copiers, fax machines, and printers. Everything is becoming more and more efficient for criminal behavior. These types of things criminals use to access whatever information or to complete a task that is illegal. People say online shopping is better than going to the store but, my opinion is neither one of them are good.
If you go to the store people are liable to scan your credit information without you even knowing it. They have ways of scanning it while you trying to pay for merchandise. Shopping online is even worse because if the websites are not secure when it comes to making purchases, then your information can get stolen. Terrorism has gone to the internet because it’s a way of hiding the financial support or recruitment of individuals. They make it seem like you are reading up on information about a certain terrorist group, then once you are on the site it’s like they have accessed your information and you start getting recruited.
Terrorist groups have ways of making themselves unknown and unseen. That is the most dangerous thing to have going on in any country. But as technology evolves terrorists evolve with the technology. They know the ends and outs of technology before it even hit the market. Personnel that are new to law enforcement need to be trained in that manner. They need to be versatile when it comes to technology. You cannot just know the basics of technology. As a law enforcement official you need to know everything from computer fraud to malicious software.
You need to be able to track down the different databases and networks that are being used to commit cybercrimes. Training is the only way that we are going to keep up with this growing technology. This includes knowledge of security issues, processes, and practices; investigative techniques; and the capacity to perform forensic analysis of electronic devices. (Taylor et al., 2011). The most important is man power. If you do not have the bodies to attempt these tasks, then we will never be able to keep up with digital crime or digital terrorism.
In order to reduce digital crime and digital terrorism there should be a data collection of computer criminality so that we can have an idea of how much computer crime is going on in each state. If data was collected, they would know who to target and where the target is trying to collect information from. We do not have that type of plan in place. There needs to be some kind of examination going on with computer crimes. Law enforcement needs to know how it happened and when.
To prevent digital crimes they need to be one step ahead of the criminals. They do not need to just focus on the crime at hand; it needs to go deeper into the crime. Basically they need to think like a criminal and not just analyze what the criminal has done. There are a lot of things that needs to be done in order to reduce this crime because eliminating it is not an option. It will never go away; it will just get more advanced.
Conclusion
In conclusion, this paper has discussed the different forecasts that is becoming of digital crime and digital terrorism. Public and private places must be alert of the threat that technology has been bringing to society. The most challenge is trying to keep law enforcement agencies up to speed with the new technology that is occurring. The most important thing is that the laws have to be change along with technology. If laws do not change, criminals will continue with digital crime, especially people that are into digital terrorism.
This is how they recruit people to complete terrorist acts. The laws have to cover global and transnational criminal activities. They cannot just be based on things that are happening in the states. It has to branch out to other countries, because these organized crimes are becoming more dominant now that technology is improving.

Similar Documents

Premium Essay

Digital Crimes

...The Future of Digital Crimes and Digital Terrorism Strayer University Assignment 4 Submitted in Partial Fulfillment Of the Requirements for the Course CIS 170 Information Technology in Criminal Justice Dr. Jacob Ogunlade Spring 2015 Table of Contents Certificate of Authorship 3 name 3 Purposes one (1) strategy that the U.S. could use in order to mitigate the challenges in question. 8 Explain the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorisms 9 Conclusion 10 References 12 Certificate of Authorship I have read and understand Strayer University's Academic Integrity Policy. I promise to conduct myself with integrity in the submission of all academic work to the University and will not give or receive unauthorized assistance on the completion of assignments, research papers, examinations or other work. I understand that violations of the Academic Integrity Policy will lead to disciplinary action against me, up to and including suspension or expulsion from the University. I know that all students play a role in preserving the academic integrity of the University and have an obligation to report violations of the Academic Integrity Policy committed by another student. In addition, I name certify that I am the author of this document and any assistance I received in preparing this report fully acknowledged. I have also cited in APA format for all...

Words: 2106 - Pages: 9

Premium Essay

Digital Crime

...Assignment 1: Crime Theories Professor George CIS 170 Information Technology in Criminology May 5, 2014 Control theory can be as major theories of crime developed by Hirschi, Reckless, Gottfredson, Hagan, etc. According to them, everyone desires to commit crimes. Instead of asking why people commit crimes, the well-known question they ask is ‘why people do not commit crimes?' There, the lack of control is the main reason of encouraging people to commit crimes. This can be done not only because of the lack of social bonds and laws, but also because of the lack of self-control. "Exposure to control also might differ by social location and the historical period, such as the changing level and control given to males and females." (Cullen and Agnew, 2002) Crime can be known, as an act done in violation of those duties, which are individual, owes to the community, and for the breach of which the law has provided with a punishment. Anyhow, though the criminal law of the country had not recognized some behaviors as crimes, some behaviors extremely harm the peaceful continuance of the society. Thus, "today, however, despite popular belief is to the contrary, the proportion of criminal law in regard to the totality of the legal system has shrunk dramatically." (Weeramantry, 2009) Because of that, Digital crime, which can be considered as such a crime was recognized and included as a separate crime. With the development of information and communication technology, in twenty first...

Words: 982 - Pages: 4

Premium Essay

Digital Crime

...There are four primary areas that local law enforcement need in an effort to combat computer crimes, training, equipment, updated criminal codes designed to complement current enforcement efforts, and resources for tapping federal expertise and equipment related to computer crime enforcement (Stamnbaugh, Beupre, Icoye, Baker, Cassaday, and Williams, 2001). The lack of training at the local level is the difference between getting a conviction and being handed your pride in a Wal-Mart plastic bag. As computer crimes become more prevalent in our society, the importance of proper training at the local level is critical. A local patrol officer can without proper training on computer crimes may inadvertently destroy evidence. Researchers have advised local agencies to have a private company come in to conduct training and also push for a national certification (Stamnbaugh, Beupre, Icoye, Baker, Cassaday, and Williams, 2001). Just as important as training is to an agency so is the need for additional resources and technologies. As there is an abundance of resources and funds at the federal level, that doesn’t always trickle down to the local level as local law enforcement may not be able to decipher encrypted evidence. Without funding at the local levels they may never have the adequate resources and equipment to combat computer crimes, a major stumbling block (Stamnbaugh, Beupre, Icoye, Baker, Cassaday, and Williams, 2001). As technology increases it is hard for local law makers...

Words: 422 - Pages: 2

Premium Essay

Digital Crime

...Government could take an approach in ensuring all local law agencies get the proper training needed.   Sure, it would be a costly amount but putting in an effort on the safety for computer users whom are citizens can be priceless.   Just think how much safer would the U.S. be if all efforts were being put into training in fighting cybercrime.   Laws and regulations should be enforced with maximum penalties.   Criminals are thinking it is easier to commit a crime on the Internet because it is less observed, but since the terrorist act of 9/11, all computer activity is now being monitored.   To better protect the nation against computer crimes and terrorism the U.S. Government will need to ensure that all states and local law agencies are up to par and have the training needed.   The criminals are keeping up with the advancement of the technology with computers, so will the government in effort to help fight against all criminal activity.   In recent studies, law agencies are now becoming more educated in effort of fighting computer crimes.   As part of the change process, there must be a development of new laws being enforced and policies where there...

Words: 301 - Pages: 2

Premium Essay

Digital Computer Crime

...Digital Computer Crime There are multiple different scenarios in which computers can play a part in crime. Technology has made significant leaps and bounds in the last three-quarters of a century, which is truly astonishing (Taylor, Fritsch, & Liederbach, 2015). While it is wonderful for thousands of citizens across the world to be able to communicate instantly back and forth, there is a percentage of people that use computers, the Internet, and electronic communication to cause harm to others. It can be frustrating to understand exactly how to keep yourself safe in this world that is largely ran by computers, therefore, the following paragraphs will go in depth on what digital computer crime is and how you can be protected. To begin, there are four major categories of digital computer crime. The first category is classified as the computer as a target (Taylor, et al., 2015). This means when the computer itself is a target, the attacker is trying to deny the legitimate user of the system access to his or her data or computer (Taylor, et al., 2015). The intruder targets the server and can cause harm to the network owners or the operation of their company (Taylor, et al., 2015). An example in this category would be the alteration of data. The enemy could attack the useful information that is stored or processed by the computer, which could alter decisions made by the company or could directly impact the user by changing their records (Taylor, et al., 2015). ...

Words: 1353 - Pages: 6

Premium Essay

Digital Computer Crime

...Digital Computer Crime Digital computer crimes are criminal activities, which involve the use of information technology to get wrongful or unjustified access to a computer system with the mindset of damaging, deleting, and altering computer data (Taylor, Fritsch, Leiderbach, 2015). Computer crimes do not necessarily have to involve damage to physical property. The computer itself could have participated in the crime or may have been the intended target. We will look at the four common types of computer crimes, which are the computer as the target, the computer as an instrument of a crime, the computer as incidental to a crime, and crimes associated with the prevalence of computers (Fairchild, 2013). The computer can be used as a destination for crimes where the computer can include offenses like theft of intellectual property, marketing information, or blackmail based on data gained from computerized files. Crimes of this nature can disrupt operating systems and programs with the thought of creating chaos in business operations (Fairchild, 2013). There are various ways computers can be targeted illicit entrances to criminal justice and other government records. An example of this is a crime that targets the computer directly. In this, criminal history, modifying warrant information, creating a driver’s license, passport, or any other type of document for identification purposes is possible. First, we will look at the computer as a target. This is defined as a fundamental denial...

Words: 1317 - Pages: 6

Premium Essay

Digital Crime Theories

...Marsha Thompson CIS 170 Doctor David Fox Strayer University Feb. 20, 2105 Select two of the theories, suggested in Chapter 3 of the text, that a researcher could use to explain the cause of digital crime. Provide a rationale to support your response. According to Sang M Lee, computer abuse shows no sign of decline. The social structure theory can help prevent it by enhancing insiders involvement in computer abuse. Studies show that deterrence factors influence SDI and organizational factors significantly affect ICI and ICI decreases insiders’ abuse. Interestingly, SDI negatively affects both insiders and invaders abusers. According to Peter Marzuk, psychological disorders and persons with mental illnesses and personality disorders are strongly linked to crime? Marzuk notes that new studies of violence among the mentally ill are well designed and quite convincing. His studies do state that most people who have mental illnesses are not criminals., and the ones that are do not commit not violent crimes. Marzuk says, "In the last decade, the evidence showing a link between violence, crime, and mental illness has mounted. It cannot be dismissed; it should not be ignored." This research found that people with a background of psychiatric hospitalization were more likely to have been found guilty of a criminal offense than persons without a history of psychiatric hospitalization," a finding that was true for both men and women. According to Marzuk,...

Words: 689 - Pages: 3

Premium Essay

Digital Computer Crimes

...Digital Computer Crimes Byron Hill Information Technology in Criminal Justice CIS 170 Professor Basta April 20, 2016 Computer crime is usually a term referring to fraud, embezzlement, and manipulation. According to the Department of Justice’s Criminal Justice Resource Manual, computer crime is “any illegal act for which knowledge of computer technology is essential for successful prosecution” (Computer Crimes, 2015). There are many types of computer crimes but the four main ones consist of: Internal computer crimes (viruses), telecommunications crimes (hacking), computer manipulation crimes (embezzlement & fraud), and traditional theft of hardware and software. The most common forms of digital crime are theft, identity theft, hacking, stalking, and malicious files and software (Laura, 2015). These crimes are called Cyber Crimes. They are on the rise due to the fact that people today take care of all their business online. Individuals are always on the go so using their smart devices is a normal for handling personal, financial, and other business. Theft occurs a lot online when individuals infringe upon another’s person copyrighted materials. Individuals steal the material and sell it as their own without the permission of the owner (Laura, 2015). Identity theft is one of the most horrific types of Cyber Crimes. Through identity theft, victims face financial losses and gain a ruined reputation. If the criminal is good, they are able to access an individual’s...

Words: 1061 - Pages: 5

Free Essay

History of Digital Crimes and Digital Terrorism and Their Common Current Forms

...History of Digital Crimes and Digital Terrorism and Their Common Current Forms Stephanie Fisk Strayer Universality CIS 170 Professor CIANCIOTTA Dec. 12th, 2013 Introduction Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as internet chat rooms, emails, notice boards, groups, and mobile phone. Such crimes may threaten a nation’s security and financial health. Problems surrounding these types of crimes have become high profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is attempting...

Words: 2411 - Pages: 10

Premium Essay

Digital Crimes

...personal and recreational environments. They have automated many of the menial tasks of business, such as accounting, payroll, filing, record keeping, etc. This increased use of technology has caught the attention of the criminal element. The computer has become both target and tool to a new breed of cyber-criminal. Computers are becoming an increasingly important part of everyday life. They also provide new opportunities for criminal enterprise. The computer provides both new types of crime, and new ways of perpetrating traditional crimes. Computer crime investigation differs from more traditional crime investigation in several critical ways and will require law enforcement agencies to adopt new policies and practices. This paper documents the increasing rate of computer-based crime, points out several critical areas where it differs from more traditional crimes, and outlines some new problems and issues which law enforcement must address to combat computer crime. Finally, this paper suggests a plan of action suitable for many law enforcement agencies to prepare for dealing with computer based crime.The Birth of "hacking" Early use of the term "hacker" was applied to computer hobbyists who spent their spare time creating video games and other basic computer programs. However, this term acquired a negative connotation in the 1980s when computer experts illegally accessed several high-profile databanks. Databases at the Los Alamos National Laboratory (a...

Words: 1250 - Pages: 5

Premium Essay

Social Safety: Solving Crimes and the Rise of Digital Vigilantes

...SOCIAL SAFETY: SOLVING CRIMES AND THE RISE OF DIGITAL VIGILANTES Social Media & Mobile Technology For End Users 2nd February 2014 Abstract This paper aims to discuss the benefits and downsides of social media and how digital vigilantes and the police use social networking to solve crimes, as well as help and prevent them from happening. It will touch on issues such as crowd-sourced policing and it’s implications on cases, whether it aids in the apprehension of criminals or rather as a hindrance to police investigations. When people speak about crime, they are usually referring to a shoplifting incident, a shooting, selling of illegal drugs or assaulting someone, but crime goes much further than that. According to Oxford Dictionaries, crime is an action or omission, which constitutes an offence and is punishable by law. So when the topic of crime comes up, one shouldn’t think about just stealing or murders, they must realize that something as little as jumping a red light when no ones around is also a crime. This paper aims to discuss the effects of social media on crime, the rise of digital vigilantes and whether or not social media has helped solve crimes and decrease the crime rate. Safety is one of the most important things on people’s minds. No...

Words: 2212 - Pages: 9

Free Essay

Social Safety: Solving Crimes and the Rise of Digital Vigilantes

...(CNN) -- The videos, pictures and tweets are chilling. A picture of a girl dangling limply from the arms of two young men. Other boys, laughingly saying the girl had to be dead because she didn't flinch as her body was violated. An alleged rape, made into a joke. The images and social media messages are at the heart of criminal charges against two high school football players accused of sexually assaulting an underage teenage girl during a series of end-of-summer parties in August. Both boys are charged with rape. One also is accused of "illegal use of a minor in nudity-oriented material." Their trial before an Ohio juvenile court judge is scheduled for February 13. CNN is not identifying the girl, who is a juvenile, in accordance with its policy not to release the names of alleged rape victims. The alleged attackers also are juveniles, but they have been identified by a judge in court, by defense attorneys and in newspapers and other media reports as Trent Mays and Ma'lik Richmond, both 16. The case has attracted the attention of bloggers and even Anonymous, a loosely organized cooperative of activist hackers. Social media videos led to rape charges Murphy: Rape is grossly under prosecuted Social media spotlights Ohio rape case Rape case shocks Ohio town Anonymous has released information about the town and the football team and is threatening to release more unless everyone comes clean about what happened that August night. "The town of Steubenville has been good...

Words: 284 - Pages: 2

Free Essay

Cis 170 Assignment 1 Digital Computer Crime

...CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME To purchase this visit following link: https://coursehomework.com/product/cis-170-assignment-1-digital-computer-crime/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME Assignment 1 Digital Computer Crime Course Home Work aims to provide quality study notes and tutorials to the students of CIS 170 Assignment 1 Digital Computer Crime Strayer Latest in order to ace their studies. CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME To purchase this visit following link: https://coursehomework.com/product/cis-170-assignment-1-digital-computer-crime/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME Assignment 1 Digital Computer Crime Course Home Work aims to provide quality study notes and tutorials to the students of CIS 170 Assignment 1 Digital Computer Crime Strayer Latest in order to ace their studies. CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME To purchase this visit following link: https://coursehomework.com/product/cis-170-assignment-1-digital-computer-crime/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME Assignment 1 Digital Computer Crime Course Home Work aims to provide quality study notes and tutorials to the students of CIS 170 Assignment 1 Digital Computer Crime Strayer Latest in order to ace their studies. CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME To purchase this visit following link: https://coursehomework...

Words: 1009 - Pages: 5

Premium Essay

Assignment 1: Digital Computer Crimes

...Assignment 1: Digital Computer Crimes Brandy N Bledsoe Mark Stone CIS170 July 14, 2013 The computer is a doorway to a world of opportunity on the Internet that is not policed by any single law enforcement agency. The potential for financial gain along with the ease of commission has resulted in many crimes via the Internet that previously occurred via mail or over the telephone. These are the type of crimes that you do not expect as a normal everyday citizen; so many of these crimes are committed right underneath your nose. It is a wide variety of crimes that are classified under digital computer crimes. The following paragraphs will explain the four major categories of computer crimes, the most common forms of digital crime, how the computer as an instrument of a crime presents the biggest threat to the world and the roles and responses of the U.S. government. The first category of computer crimes is the computer as a target, this means that the criminal targets the network and or the device. These criminals possess the skill, technique and knowledge of computers; crimes found under this category are data alteration, network intruders, and denial-of-service as well as computer vandalism. In April of 2007, Russia launched cyber-attacks on Estonian parliament, banks, ministries and newspapers; these countries were in a disagreement over the placement of a bronze soldier statue. As a result of these attacks, the country was disabled and became crippled. The second category...

Words: 1501 - Pages: 7

Premium Essay

The Role of Federal Agencies in Fighting Digital Crime

...The Role of Federal Agencies in Fighting Digital Crime Abstract The United States of America is the most connected and technologically advanced country in the world. The genius of our electrical engineers, computer scientists, and technology companies has helped to change the way that the world does business, made our daily lives safer and more enjoyable, and brought the world closer together. Albeit, these are remarkable innovations, but they have unfortunately given criminals, terrorists, and hostile states new opportunities to steal American property, disrupt our way of life, and compromise our National security. This paper will attempt to show the roles and challenges of law enforcement agencies such as the Secret Service, FBI, Department of Homeland Security, and others that have taken on roles to fight computer crimes and terrorism. This paper will also discuss how the U.S. could align the efforts of these agencies to better protect the nation against digital crimes and terrorism. Keywords: law enforcers, national security, protect, crime The Role of Federal Agencies in Fighting Digital Crime Cyber crooks are always working to steal the privacy and money of hard-working Americans. The computers of American consumers are subject to endless scams and schemes achieved by malicious e-mails, malware turning their computers into unwitting bots that send out unwanted spam, or the plethora of identity theft conjured up by these crooks to steal hard-working people’s...

Words: 892 - Pages: 4