The Complexities of Prosecuting Cyber Crime

637 Words2 Pages

Cyber crime and traditional crime have similar identifiable traits when criminal activity is the outcome. The goal of any criminal is to cause harm, threat steal, extortion, to name a few with intent to harm the public good. Local and state law prosecutes traditional crimes through the state attorney. The prosecutor represents the people(entity) of the state. The defendant or the entity charged must prove to the state, by reasonable doubt, their innocent’s of the charges. Individuals that are charged with a crime have the option of hearing their case in front of a judge or a jury. The prosecution can also offer the defendant a plea bargain deal. These deals usually lessen the punishment while also rendering a guilty verdict for the state.
The method and avenues to prosecute cyber crimes can become complex. The cyber criminal uses the digital highway to commit criminal activity. According to (Finklea & Theohary, 2012) Symantec Corporation, defines cybercrime as "any crime that is committed using a computer or network, or hardware device. Cyber crime is an estimated 110 billion dollar liability, globally each year. Though Federal law enforces cybercrime on the jurisdiction the crime was committed. This is quite difficult if the criminal is around the world in a country the United States has no binding policy or laws to bring the culprits to justice. In addition, the prosecutor (local, state, & federal) is not knowledgeable in the technical aspects on how to prosecute a cyber criminal case. So the government must hire experts in the field of cyber crime to assist in prosecuting cyber criminals.
Even with lawyers and experts hire by the federal government to help prosecute cyber criminals. The laws current...

... middle of paper ...

...ndling cyber crime cases. The easier it will be to bring individuals to prosecution. The best component. I believe from reading the text and articles the best option at this time is to mitigate these types of threats through practicing better security management.

Works Cited

Ditzion, R., Geddes, E., & Rhodes, M. (2003). Computer crimes. American Criminal Law
Review, 40, 285–336.
Egan, M. (2013, May 09). Feds take down cyber crime ring that allegedly raided $45m.
Retrieved from http://www.foxbusiness.com/technology/2013/05/09/feds-disrupt-cyber-crime-ring-that-allegedly-raided-45m/
Finklea, K. M., & Theohary, C. A. (2012). Cybercrime: Conceptual Issues for Congress and
U.S. Law Enforcement. Journal Of Current Issues In Crime, Law & Law Enforcement, 5(1/2), 1-27
Lemos, R. (2012). Microsoft Lawsuit Names Two Responsible for Zeus Botnet Attacks.
Eweek, 4.

Open Document