The Future of Digital Crimes and Digital Terrorism
1
The Future of Digital Crimes and Digital Terrorism
Strayer University
Felicia McCaw
Professor Sean Hord
CIS 170
Online Spring 2016
June 9, 2016
The Future of Digital Crimes and Digital Terrorism
2
Digital crimes also interchangeably referred to as computer crime is the violation and invasion of a computer or network with the intent of committing fraud, malicious damage or complete destruction. Not only is invasion as a concept of unwanted intrusion but the felonious use of a computer and network to commit these acts of criminality reflect the directional path of future criminal acts.
In result of the increased surveillance and increased security being regulated by cyber trained law enforcement the expected methodology of intrusion and criminal acts are expected to be changed and differentiated. Because the versatility and ease of using the computer, network and new technology in criminal acts these tools are more of a hinder than a plus for law enforcement. Further the escalating usage of computer and internet users signifies that the rate of internet crime will escalate because of the supposed status of not being able to be caught.
Another factor that encourages criminal activity is the ease of financial gain and with commitment, knowledge and newly learned technology this can be evidentially a plus in a criminal’s favor and a self-facilitator to act and commit. Crime as a state is not an inherent trait but a studied and learned behavior with full emulative ability that in turns acts as its own stimulus.
As with digital crime, digital terrorism is also a prevalent malady that is troubling the United States and its law enforcement agencies. Escalating attacks, intrusion, denial of service (DoS) are very costly and financial inhibitors to the businesses and governmental agencies under attacks. Further the increased use of wireless local area networks acts as temptation to invade, intrude and perpetuate a crime.
The Future of Digital Crimes and Digital Terrorism
3
Acts of digital terrorism can also be facilitated against private citizens with the use of network and social-psychological exploitative manipulation. The inducing of fear and intimidation is the goal of primary for criminals along with social alteration. Because of the state of anonymity this is a spiraling stimulus of the increase of attacks and the internalizing of fear.
In challenge to the levels of intimidation and threat against people and government the overall impact as far as economic is to circumvent the attacks against business, customers and alliances. By investigation, pursuit, prosecution and communicative acts between agencies these criminal acts are too flagant to ignore and with coordination between agencies the increase should be abled to be handled.
Preventing the effect on social aspects of life is to remove the overall impact and combat digital crime and digital terrorism to ensure no change in interactive daily usage of computers and internet. Because the entrepreneurial spirit is highly evident the safety of records, financial transactions and support of business continuality is primary along with personal safety for users of all computerized devices.
As such the examining of computer crimes and terrorism as it affects independent segments of law enforcement throughout the United States is phenomenally large. Some of the challenges law enforcement deal with is the preserving and sanctifying of evidential evidence for court to facilitate and assist with the closing of a case. Another challenge is the pinpointing the area where the act of criminality occurred and the jurisdiction that covers it. Interchangeable communication between the governmental agencies has to be coordinated with suggestive and with singular thought to win and close the case.
The Future of Digital Crimes and Digital Terrorism
4
Amazingly the coordination and cooperation between criminals is incredible and rather awesome and reflects a sophisticated approach and as legal enforcement the upgrading, honing and learning of technical skills is important. One way or strategy that the United States could use to mitigate some of the attacks or challenges is to regulate new security and firewall protection. Bridging the chasm between law enforcement and digital crime will require extensive education in the computerized arena to assist with updating security and protective measures.
Also, the capturing and organizing of information should be uniform per regulations and retained in a pattern to reflect co-agreement between agencies to allow ease and accessibility to all law enforcement agencies. Facilitating a uni-base which contains all records with full access to the secret services, FBI, and Department of Homeland Security should help stop the compromising of cases with immediate changes reflected.
Future trends in digital crime and digital terrorism will continue on its path of escalation with the use of new technology and innovative changes in the network and usage. Fraud and Identity Theft will continue to be the largest criminal offenses due to the ability of criminals who are attacking to stay anonymous and the lack of limitation of the Internet. Further the ease of committing crimes is pure simplicity with a minimum of cost that acts as charging stimulus and as such criminals see this as a “go” signal.
Strategy at its best works as an assistant, coordinator to facilitate a defensive stance against the ongoing surge of criminal behavior being used as a complement to digital crime and digital terrorism. One thought to keep in mind is that the law is the law and all have to obey the laws and treated same and with that thought in mind corrective study of actions, mannerisms,
The Future of Digital Crimes and Digital Terrorism
5
attitudes toward people, businesses and governmental agencies become a prior to help combat destructive behavior with the facilitation of psychological methodology and indicative studies.
One step at time is the strategy for the United States to combat digital crime and digital terrorism with the applying of penalties, criminal time with no probation and the treating of invasionary violations as a treasonal act with charges that applicably apply. Further because the criminal element has a lead the creation of departments to foil and circumvent these activities along with the installing of extreme security which would track and trace invaders would be an advisement to follow.
REFERENCES
Taylor, R.W., Fritsch, E.J. & Liederbach, J. (2015), Digital Crime and Digital Terrorism.
(3rd ed.). Boston: Pearson, Inc.
Donnelly, M. (2015). Social Impacts of Cyber Crime. Research Starters: Sociology (Online Edition),
Kuehn, L. (2016). Threats from the digital underground. CCPA Monitor, 22(5), 52-53.
Gogolin, G. (2011). THE CHASM BETWEEN LAW ENFORCEMENT AND DIGITAL CRIME. Journal of Current Issues in Crime, Law & Law Enforcement, 4(4), 469-478
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment