The method and avenues to prosecute cyber crimes can become complex. The cyber criminal uses the digital highway to commit criminal activity. According to (Finklea & Theohary, 2012) Symantec Corporation, defines cybercrime as "any crime that is committed using a computer or network, or hardware device. Cyber crime is an estimated 110 billion dollar liability, globally each year. Though Federal law enforces cybercrime on the jurisdiction the crime was committed. This is quite difficult if the criminal is around the world in a country the United States has no binding policy or laws to bring the culprits to justice. In addition, the prosecutor (local, state, & federal) is not knowledgeable in the technical aspects on how to prosecute a cyber criminal case. So the government must hire experts in the field of cyber crime to assist in prosecuting cyber criminals.
Even with lawyers and experts hire by the federal government to help prosecute cyber criminals. The laws current...
... middle of paper ...
...ndling cyber crime cases. The easier it will be to bring individuals to prosecution. The best component. I believe from reading the text and articles the best option at this time is to mitigate these types of threats through practicing better security management.
Ditzion, R., Geddes, E., & Rhodes, M. (2003). Computer crimes. American Criminal Law
Review, 40, 285–336.
Egan, M. (2013, May 09). Feds take down cyber crime ring that allegedly raided $45m.
Retrieved from http://www.foxbusiness.com/technology/2013/05/09/feds-disrupt-cyber-crime-ring-that-allegedly-raided-45m/
Finklea, K. M., & Theohary, C. A. (2012). Cybercrime: Conceptual Issues for Congress and
U.S. Law Enforcement. Journal Of Current Issues In Crime, Law & Law Enforcement, 5(1/2), 1-27
Lemos, R. (2012). Microsoft Lawsuit Names Two Responsible for Zeus Botnet Attacks.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- People want to feel safe. If someone owns a precious object it is stored in a safe hidden in their house. To further protect a house the front doors have handle locks and dead-bolts. To keep personal items safe items like wallet chains are used to stop criminals in their tracks. In the case of cars where they cannot always be watched, car alarms were made to protect from thieves. All of these systems are in place to keep people and their possessions safe. There is an area in people’s lives that is not heavily inspected for weaknesses, however.... [tags: Cyber-Crime Essays]
1424 words (4.1 pages)
- Introduction Recently, the Internet has become the most significant technology in all over the world, which is not only used by the people to contact with each other but also utilized by the business organizations to become global (Taylor, Caeti, Loper, Fritsch & Liederbach, 2006). Computer and internet enable the business organizations to execute the Electronic commerce business model, which has become very popular. Computers and Internet are a powerful source in the success of globalization and international business.... [tags: Internet Security, Cybercrime, Online crime]
2731 words (7.8 pages)
- Crime is a common word that we hear in this era of globalization. Crimes refer to any violation of law or the commission of an act forbidden by law. A nation with high index of crime cases cannot grow or develop well. This is because crime is the direct opposite of development. It can contribute to the negative impact in term of social and economic development. Cyber crime is a new type of crime that occurs in this age of Science and Technology. There are multiple definitions for cyber crime. I will only give the most generic one, which will cover all the aspects.... [tags: Identity theft, Theft, Crime, Fraud]
1626 words (4.6 pages)
- Aristotle (350 B.C.E) quoted in Jowett, B. (2009) states that: “Poverty is the parent of revolution and crime. Great Philosophers such as Aristotle helped to set the foundation of what we today define as ‘crime’, showing that even in 350 B.C.E the definition of ‘crime’ came from what was fist defined as ‘poverty’. This essay aims to critically evaluate the complexities of ‘crime’ and ‘social harm’ by first defining what we believe crime to be. By doing this we can then look at where this definition stops and where the ideas of social harm start.... [tags: poverty, Muncie, Talbot, Walters, criminology]
1695 words (4.8 pages)
- WHAT IS CYBER CRIME. Wrongdoing is a typical word that we generally heard in this globalization time. Wrongdoings allude to any infringement of law or the commission of a demonstration prohibited by law. Wrongdoing and culpability have been connected with man subsequent to long time back. There are diverse methods rehearses by distinctive nations to battle with wrongdoing. It is relying upon their degree and nature. It can be reasoned that a country with high file of wrongdoing cases can 't develop or grow well.... [tags: Crime, Criminal law, Robbery, Precedent]
1493 words (4.3 pages)
- Society today is plagued with crime that is difficult to combat, constantly changing, and has no borders; this type of crime is called cybercrime. The United States of America is attacked on a daily basis by cyber criminals both foreign and domestic. The crimes committed involve fraud, identity theft, theft of proprietary trade secrets, and even theft of national secrets. The 2009 Internet Crime Report indicates there were 336,655 received cybercrime complaints in 2009 and a total monetary loss of $559.7 million (“2009 Internet Crime Report,” 2009).... [tags: Technology, Cyber Crime]
2164 words (6.2 pages)
- In the modern world of technology, many of us still consider being hacked a rare issue we will not have to encounter in our lifetime. The unfortunate truth is that everyone who uses a computer or cell phone is at a high risk of being hacked. In a post by Information Security, they reveal, “Three out of four Americans will be a victim of cyber-crime” (Goldberg 1). Cybercrime is defined as a crime conducted via the internet or some other computer network. The frightening high statistics of being a victim of cybercrime makes me ask the question, what can we do to protect ourselves more efficiently against cyber intuitions.... [tags: Internet, Computer security, Security]
715 words (2 pages)
- The Routine Activity Theory states that there is a higher likelihood for a crime to occur when offenders are motivated to commit a crime; when there is an individual who is an easy target; and there is no person to oversee that the laws in place are not violated. This theory offers a theoretical perspective on why individual bully others on cyberspace, it offers an insight into the different reasons why different people are cyber bullies. According to the theorists, bullies need to be motivated in order to commit to executing such a crime.... [tags: Abuse, Bullying, Cyber-bullying, Crime]
930 words (2.7 pages)
- Millions of people around the world use computers and the internet every day. We all use it in school, work even at home, computers have made us life easier, it has brought so many benefits to the society but it has also brought some problems and cybercrimes is one of them. “The times have really changed,” said Greg Garcia, the department’s assistant secretary for cyber security and communications. “We’re seeing now phishing, farming, botnets … war dialing and domain server spoofing. And we’re seeing coordinated cyber-attacks against nation states.” (Fowler 5) Cybercrime is one of the most prevalent and most popular rising crimes being committed today.... [tags: Crime Essays]
2271 words (6.5 pages)
- On April 27, 2007 cyber-attacks began crippling key infrastructures of banks, ministries, and newspapers. These attacks took place, in part, because of a statue. This statue is not just a two-meter tall man holding a helmet; this individual represents and symbolizes the lives lost in the Second World War. The statue has been under a lot of speculation and has torn the population of the country in half. Some believe the status is a symbol of Soviet, formerly Nazi, while some see this statue as symbol of Soviet victory over the Nazis and Russian claims Estonia.... [tags: Cyber Crime]
1170 words (3.3 pages)