What is cyber crime and cyber terrorism? If given any thought, this can be a very complex term to define. This assignment will not only provide an answer for it, but it will also describe the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime. Next it will explain the existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Then it will explain the fundamental manner of which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and digital terrorism. In closing, this assignment will address the key future trends in digital crime and terrorism along with a strategy that the U.S. could use in combatting digital crime and digital terrorism.
Digital crime also known as cybercrime is broadly defined as criminal activity committed using a computer to illegally access, transmit, or manipulate data (Merriam-Webster, 2019). Cyberterrorism is specifically a premeditated, political, or, ideologically motivated attack or threat of attack against information, computer systems, computer programs, and data that can result in violence against civilian targets (Taylor, Fritsch, Liederbach, 2015). Digital crimes have grown increasingly large in the past two decades with the evolution of information technology and the skill set of the criminal mind. Knowing this, ask the question of how this crime will look in the future and how using information technologies to combat them will have an overall impact on economic and social growth.
Think about it, what better way to disrupt people’s everyday lives and interactions? more people than ever before utilize and depend on the internet today to pay bills, stay connected with family and friends, to go to school, and handle all sorts of business both personal and professional. They store, upload, email valuable and very personal information about themselves, their finances, and their work all under the assumption that this method is safe. If these same systems were used to combat cybercrime, they could pose a calamitous threat to businesses and social sites being able to run effectively due to the interruptions that this may cause, loss of communication on social networks and loss of revenue for businesses, loss of time from daily operations (Coleman, 2019). This is certainly not an all-inclusive account of the impact this can have but is surely worth pondering. Functionality as it is known will absolutely be impacted with this power being given to the wrong individuals.
Existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism begin with jurisdictional issues. Because there are different policies and laws for different municipalities across state lines, this creates challenges in combatting cybercrime. Every agency wants to do their own thing if you will. Until government merges the laws and policies surrounding this to promote a sense of unity in addressing the common goal which is to combat the crime, this will continue to be a challenge. Another challenge which make combatting this crime a major issue of concern is the resources used for research and investigative purposes. Law enforcement agencies set themselves up for failure because they use the very tool that the terrorist use, the computer and share their findings which further educates the hackers.
Terrorist are now able to detect the measures they use to try to prevent crime and terrorism and in turn use the same means to out smart them by adopting new ways of committing crime and terror (Taylor, Fritsch, Liederbach 2015). A third challenge is crossing that line of violating a persons’ right to privacy. Legal ramifications can be tricky here. The best strategy to address this is to revise state policy where this very crime is concerned making this a universal policy that would allow agencies to collaborate across state lines and work together in combatting crime and terrorism. Also, avoid treating investigating and prevention techniques like an open book exam for terrorist. Do not make this information public from by publishing it online for all to see. In reference to laws protecting someone’s right to privacy, the best strategy here is to know what the law entails and be sure that all procedures for search and seizures are carried out appropriately if caught.
The fundamental manner of which the U.S. could align the efforts of federal agencies in order to better protect the nation against cyber crimes and terrorism is to make this a global war on digital crime and terror. Erase jurisdictional lines globally. This does not only include government but must also expand to the private side of information technology, computer, networking and software industries responsible for designing network security (Coleman, 2019). They need also to align globally to harmonize adequate laws and policies that would impart the stiffest penalty on identified cybercrimes whether they are committed inside or outside the U.S. There should never be an opportunity for any criminal to be able to hide from the hands of justice no matter where they commit the crime. Federal laws should make it mandatory that the guilty parties face their charges whether they are on U.S. or foreign soil where digital crimes and digital terrorism are concerned.
My opinion of the key future trends in cyber crime and digital terrorism is that new technology will continue to be developed which threatens the entire information infrastructure. The safety of our most private information will continue to be of concern. No matter how much software protection we may have, the skilled hacker will forever be able to find their way in and cause chaos. Our finances, our health/medical records, utilities, government could all fall victim to this digital nightmare which is increasingly tough to eliminate. The strategy that the U.S. may need to look in to implementing is securing the services of some of the best- known hackers. Yes, hire them, pick their brains, learn what they know and tailor prevention techniques around it to develop better tools and strategies that are only shared with privileged individuals.
Yes, cyber crime and digital terrorism are tough to investigate and have damning impacts. Yes, the future is unclear. The one constant is that this may never be completely erased, but there is lots to learn and lots to do to keep these criminals at bay and diminishing their effects.
References
- https://cops.usdoj.gov/html/dispatch/01-2014/how_the_web_presents_new_challenges_for_law _enforcement_agencies.asp
- https://www.crime-research.org/library/Cyberterrorism.html
- https://www.merriam-webster.com/dictionary/cybercrimehttps://www.i-policy.org/2011/02/how-cyber-jurisdiction-affects-cybercrime-prosecution.html Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. Upper Saddle River, NJ: Pearson/Prentice Hall.