StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Digital Crime and Digital Terrorism - Report Example

Cite this document
Summary
This report "Digital Crime and Digital Terrorism" demonstrates digital criminals and digital terrorists that have beneficiated greatly by the use of information technology due to safer means of communication. Terrorists and drug traffickers have taken advantage of information technology…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Digital Crime and Digital Terrorism
Read Text Preview

Extract of sample "Digital Crime and Digital Terrorism"

DIGITAL CRIME AND DIGITAL TERRORISM al Affiliation) Introduction Digital-terrorism is an attack by terrorist groups through the means of information technology especially the internet or an attack towards computers which causes harm or disruption so as to view out political or religious goals. This can be by the use of information technology to make threats through the use of electronic communication, introduction of viruses to networks or web-site defacing. Digital crime involves criminal activities that use information technology to gain access to computer systems illegally so as to delete or alter information. It also includes activities like frauds, identity and data theft among others. Digital crime and digital terrorism are growing at an increasing rate as the variety and the frequency of the offences are increasing and also since more dangerous crimes are being committed using little physical resources. The introduction and improvement of information technology throughout the world has led to the growth of terrorism and transnational crime where criminals hire specialists to do illegal transactions through the use of information technology (Baggili, 2011). This paper looks at issues relating to digital or computer crime and digital terrorism; however, it gives an over view in these aspects meaning that it will not go into deep technical aspects of the issues. It also looks at the role and responsibilities of law enforcement agencies, various laws and legislation supporting law enforcement against digital crime and digital terrorism and procedures for investigating these crimes. Digital crime and digital terrorism types and activities There are various types of digital crime and digital terrorism activities in existence to date as a result of the introduction of information technology; these include the theft of telecommunication services which was started by the “phone phreakers”. By being able to gain access to telephone switchboards, criminals have been able to access dial- in and dial- out circuits which has enabled them make free calls or sell call time (Taylor, 2011). It also includes communication in furtherance of criminal conspiracy which is where criminals use information technology to facilitate criminal activities like money laundering, prostitution, human trafficking, gambling, trading of weapons and trafficking drugs. Information technology can facilitate these activities where criminal organizations use encrypted messages which may be out of reach of the law enforcement agencies. Terrorists also take advantage of this and that there is anonymity that allows them to coordinate their terrorist activities around the world. Digital technology has also given criminals or individuals the opportunity to easily copyright sounds, graphics and other multimedia materials for own use and for sale at a cheaper price. This has given criminals the opportunity to also disseminate offensive materials like instructions of how make explosive devices, threatening communication. Electronic transfer has also helped in moving and hiding criminal proceeds. The illegal interception of telecommunication is another type of digital crime whereby individuals or criminal groups intercept telecommunication networks. This was seen when Kevin Poulsen, a notorious hacker gained access to national security and law enforcement wiretap data in 1991 that led to the disruption of police communication and the access of police operational intelligence. There was also the introduction of cyber stalking due to the introduction of information technology that involves the use of the internet to harass individuals by accusing people falsely, damaging data and transmitting threats (Grabosky & Smith 1998). Stalkers normally target users in social networks like chat rooms and internet forums to gather information of people which is later used when committing this crime. Identity theft is among the most serious types of digital crime that involves obtaining money through the use of false identity. Here, an individual pretends to be another person in order to use their business name or credit card information when conducting commercial activities (Taylor, 2011). Law Enforcement Roles and Responses Due to the increasing rate of digital crime and digital terrorism, the law enforcement has had a major role in dealing with these crimes. These roles include investigating incidents that indicate digital crime or digital terrorism activities, seizing any material suspected to be used in these act and protecting citizens from becoming victims of these activities. The United States Immigration and Customs Enforcement (ICE) major priority is fighting criminal activities done or which are facilitated through the internet. It mainly investigates issues relating to identity and benefit document fraud, financial fraud, money laundering, human trafficking, smuggling and illegal exports. Digital laws and legislation in support of law enforcement The various digital crimes which cover large and diverse range of offences have been categorized into three by the United States Department of Justice; crimes targeting computer networks like hacking, crimes that involve obtaining illegal computer hardware and software and finally crimes that are committed through the use of computer networks like fraud, cyber terrorism and copyrighting materials. There are various laws that support law enforcement and prosecution of digital crimes (Taylor, 2011), these include; The copyright Act which covers issues dealing with copyright of software and gives remedy in such cases where one has gained financially illegally. The electronic communication privacy act (ECPA) of 1986 has helped in strengthening the right to privacy for computer users. In has been utilized by the law enforcement in prosecuting issues relating to computer hacking. This is also to allow the law enforcement agencies in cases where they want to use surveillance to investigate computer crimes or in cases where there is theft of satellite transmission television broadcasting National stolen property act which deals with issues relating to illegal transfer of funds and stolen hardware. This is meant to discourage people from using wire communication or the mail to defraud individuals. There was also an anti-cyber crime law enacted by congress in 1996 which widened the scope covered by the Computer Fraud and Abuse Law. This is the National Information Infrastructure Protection Act (NIIPA) which covers all computers connected to the internet and has also criminalized the unauthorized access of computer files with the aim of transmitting government secrets. The child pornography prevention act 1996 was enacted so as to discourage the online distribution of pornography materials to individuals who are not of age. This Act also makes it a criminal offence to produce and distribute children sexual images in the internet. Procedure of investigating computer-related crimes With the increase in digital crime and the advance in the way these crimes are committed, the possibility of innocent individuals being framed for the crimes increases as these criminals hide behind them. This has led to the introduction of procedure used in the investigation of computer related crimes. Incidences are investigated when there is a violation of a federal criminal code and when the Attorney’s office is in support of the investigation. Firstly information is gathered where the investigators try to trace that information back to its source by tracking the IP address of the computers. Investigators may also match a particular crime with crimes that are in there data base for comparison as most criminals use certain tactics in their criminal activities. This will give the investigators a list of suspects from which they will start investigating each one of them by looking at the one who had the motive and opportunity to commit the crime and who can be able to commit such a crime. Once enough evidence is gathered, this leads to the second step that involves searching and seizing where search warrants are requested for. In this step the law enforcement agencies seize computers and other equipments which are then searched in order to check if there is any incriminating material or materials that can be used as evidence in illegal activities. Information may also be recovered where the law enforcement agency may recover information from sources that are not seized, for example, a website. Finally, arrests are made depending on the materials seized. Materials seized like computers and hard disks are then taken through the digital forensic process in order to recover, analyze and be able to present facts about information which may be used in court. Forensic engineers use sophisticated software tools to examine information that have been deleted or never saved in the computer (Goel, et al, 2010). The process involves ascertaining if the computer contains any relevant information, retrieving and analyzing by using forensic programs then finally developing a report to be used in court. Future trends in digital crime and terrorism There is concern over the increasing use of encryption fraud and money transactions by the use of information technology and also the retention of top specialists in information technology indicates the possibilities that this groups will be able to come up with innovative ways of using information technology (Barrett, 1997) . The government and major international financial institutions also are concerned of intrusion of critical data systems by criminals and terrorists. With the reliance of information technology, all data is kept in the system which may be damaging to a country if is accessed by criminals. Intrusion may be through the introduction of viruses in the system or incapacitating computer systems. The enhancement in the mobilization of terrorist groups through the internet has also been a concern and is a major concern in the future. This is seen where terrorists can now easily fund or be funded through the internet by, for example, the means wire transfers without any trace. Recruitment of people and communication to plot for attacks can also be done easily through the use of encrypted messages. The legitimate civil liberties concerns may limit monitoring of information technology, however, most of the information technology are controlled by the private sector that take protection of customers more seriously than fighting crime and terrorism. This makes the possibility of gathering information minimal. Conclusion Digital criminals and digital terrorists have beneficiated greatly by the use of information technology due to safer means of communication and access to the global market. Terrorists and drug traffickers have taken advantage of information technology in order to gain full advantage for their own benefits. In the coming years, there will be the need for the country to balance between the national security and privacy for the interest of people and to maintain national liberty when conducting investigations by means of surveillance. However this will be a challenge as most information technology companies are private companies which value the privacy of individuals as compared to the national security. References NATO Advanced Research Workshop on Responses to Cyber Terrorism, & Centre of Excellence Defence Against Terrorism. (2008): Responses to cyber terrorism. Amsterdam, Netherlands: IOS Press. Baggili, I. (2011). Digital forensics and cyber crime: Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers: Berlin: Springer. Goel, S. & ICDF2C 1, 2009, Albany, NY. (2010). Digital forensics and cyber crime: First international ICST conference: revised selected papers. Berlin: Springer. Casey, E. (2010). Digital evidence and computer crime: Forensic science, computers and The Internet: London: Academic. Kanellis, P. (2006). Digital crime and the forensic science in cyberspace: Hershey PA: Idea Group Pub. Taylor, R. W. (2011). Digital crime and digital terrorism: Boston: Prentice Hall. Grabosky, P. N, & Smith R. G. (1998). Crime in the digital age: Controlling Telecommunications and cyberspace illegalities: New Brunswick, N.J: Transaction. Barrett, N. (1997). Digital crime: Policing the cybernation. Montreal: Renouf. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Digital Crime and Digital Terrorism Report Example | Topics and Well Written Essays - 1500 words, n.d.)
Digital Crime and Digital Terrorism Report Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1790881-the-history-of-digital-crimes-and-digital-terrorism
(Digital Crime and Digital Terrorism Report Example | Topics and Well Written Essays - 1500 Words)
Digital Crime and Digital Terrorism Report Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1790881-the-history-of-digital-crimes-and-digital-terrorism.
“Digital Crime and Digital Terrorism Report Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1790881-the-history-of-digital-crimes-and-digital-terrorism.
  • Cited: 0 times

CHECK THESE SAMPLES OF Digital Crime and Digital Terrorism

THE_MEDIA_DB

In a recent university address titled “Internet Rights and Wrongs: Choices and Challenges in a Networked World,” Secretary of State Hillary Clinton berated authoritarian regimes and praised the people of Tunisia and Egypt for using digital tools to organise democratic protests (On real Internet Freedom)....
4 Pages (1000 words) Essay

Security or Freedom

Of course, because the crime is terrorism and because the criminals behind the act that ignited these crimes possessed a definite ethnic stereotypical appearance, it becomes easier to accept.... The argument that easy facilitation of search warrants is an incredibly powerful weapon in the war on terror is not the argument that is at stake at this point; increasingly the evidence is piling up that the abuse of the relaxation of rules regarding search warrants has been used not to protect American against a second attack by foreign terrorists, but to justify the invasion of the privacy of law-abiding Americans with no connection to terrorism whatever....
3 Pages (750 words) Assignment

Illegal Actions of Hackers

Digital Crime and Digital Terrorism.... This essay “Illegal Actions of Hackers” will cover hacking which may be socially acceptable and illegal.... The paper will also discuss the importance of commitment to the hacking subculture, the different types of hackers and their motivation for hacking....
2 Pages (500 words) Essay

Meaning of Fourth of July

Similarly, the fundamental rights of the Americans are being gradually taken away by the government under the disguise or “safety from terrorism”.... In order to prevent terrorism in the country, the government has introduced many laws that allow the government to take away the freedom and liberty of the citizens on mere suspicion without evidence (Kennedy and Kennedy).... The members of the Continental Congress firmly believed that “all men are created equal” and thus have certain “unalienable rights” including those of “life, liberty, and the pursuit of happiness” (digital History)....
2 Pages (500 words) Essay

Collection Plan for the Scenario

In developing useful intelligence information for a given reason that could include the aversion of a terrorist attack or the prevention of crime, there is need to obtain facts from the ground that provide the necessary guides for the arrest of the situation or the development… For effectiveness of the intelligence, the management of the intelligence collection process from the identification of the necessary information to the collection and organization of the data, the different results yielded Organizing the data collected and managing it for consumption entails the whole intelligence process....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us