...The Future of Digital Crimes and Digital Terrorism Strayer University Assignment 4 Submitted in Partial Fulfillment Of the Requirements for the Course CIS 170 Information Technology in Criminal Justice Dr. Jacob Ogunlade Spring 2015 Table of Contents Certificate of Authorship 3 name 3 Purposes one (1) strategy that the U.S. could use in order to mitigate the challenges in question. 8 Explain the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorisms 9 Conclusion 10 References 12 Certificate of Authorship I have read and understand Strayer University's Academic Integrity Policy. I promise to conduct myself with integrity in the submission of all academic work to the University and will not give or receive unauthorized assistance on the completion of assignments, research papers, examinations or other work. I understand that violations of the Academic Integrity Policy will lead to disciplinary action against me, up to and including suspension or expulsion from the University. I know that all students play a role in preserving the academic integrity of the University and have an obligation to report violations of the Academic Integrity Policy committed by another student. In addition, I name certify that I am the author of this document and any assistance I received in preparing this report fully acknowledged. I have also cited in APA format for all...
Words: 2106 - Pages: 9
...There are four primary areas that local law enforcement need in an effort to combat computer crimes, training, equipment, updated criminal codes designed to complement current enforcement efforts, and resources for tapping federal expertise and equipment related to computer crime enforcement (Stamnbaugh, Beupre, Icoye, Baker, Cassaday, and Williams, 2001). The lack of training at the local level is the difference between getting a conviction and being handed your pride in a Wal-Mart plastic bag. As computer crimes become more prevalent in our society, the importance of proper training at the local level is critical. A local patrol officer can without proper training on computer crimes may inadvertently destroy evidence. Researchers have advised local agencies to have a private company come in to conduct training and also push for a national certification (Stamnbaugh, Beupre, Icoye, Baker, Cassaday, and Williams, 2001). Just as important as training is to an agency so is the need for additional resources and technologies. As there is an abundance of resources and funds at the federal level, that doesn’t always trickle down to the local level as local law enforcement may not be able to decipher encrypted evidence. Without funding at the local levels they may never have the adequate resources and equipment to combat computer crimes, a major stumbling block (Stamnbaugh, Beupre, Icoye, Baker, Cassaday, and Williams, 2001). As technology increases it is hard for local law makers...
Words: 422 - Pages: 2
...The Future of Digital Crime and Digital Terrorism Introduction You will learn that law enforcement personnel that is just coming into this field needs to be trained with the upcoming technology. There is no need to train them on the old stuff and wait to train them on the new. They need to be able to be one step ahead of digital crime and digital terrorism. Right now, law enforcement is falling behind. Digital Crime Forecast The future of digital crime and digital terrorism is going to get worse than what it is right now. The laws and the law enforcement agencies cannot keep up with the ever changing technology. By the time they learn something to keep up with it now, something new is already out which puts law enforcement behind the power curve. Starting out as new personnel in the different law enforcement agencies you will have to get training on the technology that is already out and the one that is coming out. Technology is changing every day and is not going to stop. Learning from the past can help law enforcement forecast future trends in crime to facilitate creation of best practices for investigation and prosecution of computer crime along with researching all past, present, and future aspects of emerging methodologies in digital crime. There are eight forecasts that have been developed from the analysis and collection of data, in order to know the future of digital crime and digital terrorism. They are: Forecast 1: The number of offenses reported to the police...
Words: 1834 - Pages: 8
...Government could take an approach in ensuring all local law agencies get the proper training needed. Sure, it would be a costly amount but putting in an effort on the safety for computer users whom are citizens can be priceless. Just think how much safer would the U.S. be if all efforts were being put into training in fighting cybercrime. Laws and regulations should be enforced with maximum penalties. Criminals are thinking it is easier to commit a crime on the Internet because it is less observed, but since the terrorist act of 9/11, all computer activity is now being monitored. To better protect the nation against computer crimes and terrorism the U.S. Government will need to ensure that all states and local law agencies are up to par and have the training needed. The criminals are keeping up with the advancement of the technology with computers, so will the government in effort to help fight against all criminal activity. In recent studies, law agencies are now becoming more educated in effort of fighting computer crimes. As part of the change process, there must be a development of new laws being enforced and policies where there...
Words: 301 - Pages: 2
...Digital Computer Crime There are multiple different scenarios in which computers can play a part in crime. Technology has made significant leaps and bounds in the last three-quarters of a century, which is truly astonishing (Taylor, Fritsch, & Liederbach, 2015). While it is wonderful for thousands of citizens across the world to be able to communicate instantly back and forth, there is a percentage of people that use computers, the Internet, and electronic communication to cause harm to others. It can be frustrating to understand exactly how to keep yourself safe in this world that is largely ran by computers, therefore, the following paragraphs will go in depth on what digital computer crime is and how you can be protected. To begin, there are four major categories of digital computer crime. The first category is classified as the computer as a target (Taylor, et al., 2015). This means when the computer itself is a target, the attacker is trying to deny the legitimate user of the system access to his or her data or computer (Taylor, et al., 2015). The intruder targets the server and can cause harm to the network owners or the operation of their company (Taylor, et al., 2015). An example in this category would be the alteration of data. The enemy could attack the useful information that is stored or processed by the computer, which could alter decisions made by the company or could directly impact the user by changing their records (Taylor, et al., 2015). ...
Words: 1353 - Pages: 6
...Digital Computer Crime Digital computer crimes are criminal activities, which involve the use of information technology to get wrongful or unjustified access to a computer system with the mindset of damaging, deleting, and altering computer data (Taylor, Fritsch, Leiderbach, 2015). Computer crimes do not necessarily have to involve damage to physical property. The computer itself could have participated in the crime or may have been the intended target. We will look at the four common types of computer crimes, which are the computer as the target, the computer as an instrument of a crime, the computer as incidental to a crime, and crimes associated with the prevalence of computers (Fairchild, 2013). The computer can be used as a destination for crimes where the computer can include offenses like theft of intellectual property, marketing information, or blackmail based on data gained from computerized files. Crimes of this nature can disrupt operating systems and programs with the thought of creating chaos in business operations (Fairchild, 2013). There are various ways computers can be targeted illicit entrances to criminal justice and other government records. An example of this is a crime that targets the computer directly. In this, criminal history, modifying warrant information, creating a driver’s license, passport, or any other type of document for identification purposes is possible. First, we will look at the computer as a target. This is defined as a fundamental denial...
Words: 1317 - Pages: 6
...Marsha Thompson CIS 170 Doctor David Fox Strayer University Feb. 20, 2105 Select two of the theories, suggested in Chapter 3 of the text, that a researcher could use to explain the cause of digital crime. Provide a rationale to support your response. According to Sang M Lee, computer abuse shows no sign of decline. The social structure theory can help prevent it by enhancing insiders involvement in computer abuse. Studies show that deterrence factors influence SDI and organizational factors significantly affect ICI and ICI decreases insiders’ abuse. Interestingly, SDI negatively affects both insiders and invaders abusers. According to Peter Marzuk, psychological disorders and persons with mental illnesses and personality disorders are strongly linked to crime? Marzuk notes that new studies of violence among the mentally ill are well designed and quite convincing. His studies do state that most people who have mental illnesses are not criminals., and the ones that are do not commit not violent crimes. Marzuk says, "In the last decade, the evidence showing a link between violence, crime, and mental illness has mounted. It cannot be dismissed; it should not be ignored." This research found that people with a background of psychiatric hospitalization were more likely to have been found guilty of a criminal offense than persons without a history of psychiatric hospitalization," a finding that was true for both men and women. According to Marzuk,...
Words: 689 - Pages: 3
...Digital Computer Crimes Byron Hill Information Technology in Criminal Justice CIS 170 Professor Basta April 20, 2016 Computer crime is usually a term referring to fraud, embezzlement, and manipulation. According to the Department of Justice’s Criminal Justice Resource Manual, computer crime is “any illegal act for which knowledge of computer technology is essential for successful prosecution” (Computer Crimes, 2015). There are many types of computer crimes but the four main ones consist of: Internal computer crimes (viruses), telecommunications crimes (hacking), computer manipulation crimes (embezzlement & fraud), and traditional theft of hardware and software. The most common forms of digital crime are theft, identity theft, hacking, stalking, and malicious files and software (Laura, 2015). These crimes are called Cyber Crimes. They are on the rise due to the fact that people today take care of all their business online. Individuals are always on the go so using their smart devices is a normal for handling personal, financial, and other business. Theft occurs a lot online when individuals infringe upon another’s person copyrighted materials. Individuals steal the material and sell it as their own without the permission of the owner (Laura, 2015). Identity theft is one of the most horrific types of Cyber Crimes. Through identity theft, victims face financial losses and gain a ruined reputation. If the criminal is good, they are able to access an individual’s...
Words: 1061 - Pages: 5
...History of Digital Crimes and Digital Terrorism and Their Common Current Forms Stephanie Fisk Strayer Universality CIS 170 Professor CIANCIOTTA Dec. 12th, 2013 Introduction Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as internet chat rooms, emails, notice boards, groups, and mobile phone. Such crimes may threaten a nation’s security and financial health. Problems surrounding these types of crimes have become high profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is attempting...
Words: 2411 - Pages: 10
...personal and recreational environments. They have automated many of the menial tasks of business, such as accounting, payroll, filing, record keeping, etc. This increased use of technology has caught the attention of the criminal element. The computer has become both target and tool to a new breed of cyber-criminal. Computers are becoming an increasingly important part of everyday life. They also provide new opportunities for criminal enterprise. The computer provides both new types of crime, and new ways of perpetrating traditional crimes. Computer crime investigation differs from more traditional crime investigation in several critical ways and will require law enforcement agencies to adopt new policies and practices. This paper documents the increasing rate of computer-based crime, points out several critical areas where it differs from more traditional crimes, and outlines some new problems and issues which law enforcement must address to combat computer crime. Finally, this paper suggests a plan of action suitable for many law enforcement agencies to prepare for dealing with computer based crime.The Birth of "hacking" Early use of the term "hacker" was applied to computer hobbyists who spent their spare time creating video games and other basic computer programs. However, this term acquired a negative connotation in the 1980s when computer experts illegally accessed several high-profile databanks. Databases at the Los Alamos National Laboratory (a...
Words: 1250 - Pages: 5
...SOCIAL SAFETY: SOLVING CRIMES AND THE RISE OF DIGITAL VIGILANTES Social Media & Mobile Technology For End Users 2nd February 2014 Abstract This paper aims to discuss the benefits and downsides of social media and how digital vigilantes and the police use social networking to solve crimes, as well as help and prevent them from happening. It will touch on issues such as crowd-sourced policing and it’s implications on cases, whether it aids in the apprehension of criminals or rather as a hindrance to police investigations. When people speak about crime, they are usually referring to a shoplifting incident, a shooting, selling of illegal drugs or assaulting someone, but crime goes much further than that. According to Oxford Dictionaries, crime is an action or omission, which constitutes an offence and is punishable by law. So when the topic of crime comes up, one shouldn’t think about just stealing or murders, they must realize that something as little as jumping a red light when no ones around is also a crime. This paper aims to discuss the effects of social media on crime, the rise of digital vigilantes and whether or not social media has helped solve crimes and decrease the crime rate. Safety is one of the most important things on people’s minds. No...
Words: 2212 - Pages: 9
...CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME To purchase this visit following link: https://coursehomework.com/product/cis-170-assignment-1-digital-computer-crime/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME Assignment 1 Digital Computer Crime Course Home Work aims to provide quality study notes and tutorials to the students of CIS 170 Assignment 1 Digital Computer Crime Strayer Latest in order to ace their studies. CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME To purchase this visit following link: https://coursehomework.com/product/cis-170-assignment-1-digital-computer-crime/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME Assignment 1 Digital Computer Crime Course Home Work aims to provide quality study notes and tutorials to the students of CIS 170 Assignment 1 Digital Computer Crime Strayer Latest in order to ace their studies. CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME To purchase this visit following link: https://coursehomework.com/product/cis-170-assignment-1-digital-computer-crime/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME Assignment 1 Digital Computer Crime Course Home Work aims to provide quality study notes and tutorials to the students of CIS 170 Assignment 1 Digital Computer Crime Strayer Latest in order to ace their studies. CIS 170 ASSIGNMENT 1 DIGITAL COMPUTER CRIME To purchase this visit following link: https://coursehomework...
Words: 1009 - Pages: 5
...(CNN) -- The videos, pictures and tweets are chilling. A picture of a girl dangling limply from the arms of two young men. Other boys, laughingly saying the girl had to be dead because she didn't flinch as her body was violated. An alleged rape, made into a joke. The images and social media messages are at the heart of criminal charges against two high school football players accused of sexually assaulting an underage teenage girl during a series of end-of-summer parties in August. Both boys are charged with rape. One also is accused of "illegal use of a minor in nudity-oriented material." Their trial before an Ohio juvenile court judge is scheduled for February 13. CNN is not identifying the girl, who is a juvenile, in accordance with its policy not to release the names of alleged rape victims. The alleged attackers also are juveniles, but they have been identified by a judge in court, by defense attorneys and in newspapers and other media reports as Trent Mays and Ma'lik Richmond, both 16. The case has attracted the attention of bloggers and even Anonymous, a loosely organized cooperative of activist hackers. Social media videos led to rape charges Murphy: Rape is grossly under prosecuted Social media spotlights Ohio rape case Rape case shocks Ohio town Anonymous has released information about the town and the football team and is threatening to release more unless everyone comes clean about what happened that August night. "The town of Steubenville has been good...
Words: 284 - Pages: 2
...Assignment 1: Digital Computer Crimes Brandy N Bledsoe Mark Stone CIS170 July 14, 2013 The computer is a doorway to a world of opportunity on the Internet that is not policed by any single law enforcement agency. The potential for financial gain along with the ease of commission has resulted in many crimes via the Internet that previously occurred via mail or over the telephone. These are the type of crimes that you do not expect as a normal everyday citizen; so many of these crimes are committed right underneath your nose. It is a wide variety of crimes that are classified under digital computer crimes. The following paragraphs will explain the four major categories of computer crimes, the most common forms of digital crime, how the computer as an instrument of a crime presents the biggest threat to the world and the roles and responses of the U.S. government. The first category of computer crimes is the computer as a target, this means that the criminal targets the network and or the device. These criminals possess the skill, technique and knowledge of computers; crimes found under this category are data alteration, network intruders, and denial-of-service as well as computer vandalism. In April of 2007, Russia launched cyber-attacks on Estonian parliament, banks, ministries and newspapers; these countries were in a disagreement over the placement of a bronze soldier statue. As a result of these attacks, the country was disabled and became crippled. The second category...
Words: 1501 - Pages: 7
...The Role of Federal Agencies in Fighting Digital Crime Abstract The United States of America is the most connected and technologically advanced country in the world. The genius of our electrical engineers, computer scientists, and technology companies has helped to change the way that the world does business, made our daily lives safer and more enjoyable, and brought the world closer together. Albeit, these are remarkable innovations, but they have unfortunately given criminals, terrorists, and hostile states new opportunities to steal American property, disrupt our way of life, and compromise our National security. This paper will attempt to show the roles and challenges of law enforcement agencies such as the Secret Service, FBI, Department of Homeland Security, and others that have taken on roles to fight computer crimes and terrorism. This paper will also discuss how the U.S. could align the efforts of these agencies to better protect the nation against digital crimes and terrorism. Keywords: law enforcers, national security, protect, crime The Role of Federal Agencies in Fighting Digital Crime Cyber crooks are always working to steal the privacy and money of hard-working Americans. The computers of American consumers are subject to endless scams and schemes achieved by malicious e-mails, malware turning their computers into unwitting bots that send out unwanted spam, or the plethora of identity theft conjured up by these crooks to steal hard-working people’s...
Words: 892 - Pages: 4