Responding To Computer Crimes
Name of writer
Name of Institution
Outline
Introduction
Categories of Computer Crimes
Prosecution of Computer Crimes
Example of FBI
Computer Crimes and Legislation
Conclusion
References
Responding to Computer Crimes

Introduction
Computer crime is described as any infringements of criminal law that engage knowledge of computer technology for their perpetration, investigation, or prosecution. Because of the variety of computer connected crimes, a narrower description would not be sufficient. While the expression computer crime comprises traditional crimes performed with the employ of a computer, the quick materialization of computer technologies and the exponential growth of the Internet have produced a diversity of new, technology-related criminal attitudes that must also be integrated in the class of computer crimes. A recent example of computer crime to illustrate the importance of this issue can be seen from the news that the three culprits, one American and two unnamed Russians, are responsible for stealing more than 130 million credit and debit card numbers in 2007. (Lodrick, 2007) As a consequence, there has been a dramatic augment in particular legislation to battle these new criminal attitudes.

Categories of Computer Crimes
Computer-related crimes are separated into three categories according to the computers function in the specific crime. First, a computer may be the purpose of a crime.  This class chiefly refers to stealing of computer hardware or software.  Second, a computer perhaps the theme of a crime, in this class, the computer is similar to the ambler who is assaulted or the house that is robbed--it is the theme of the assault and the place of any destruction reasoned. This class includes all of the crimes that have appeared out of the technology detonation of the previous several decades, comprising the exercise of often interconnected viruses, worms, Trojan horses, logic bombs, sniffers, and disseminated denial of service attacks. numerous criminals in this class are encouraged by misbehavior rather than monetary gain. (Cohen, 2005) This sort of crime is chiefly well-liked among juveniles, discontented employees and professional hackers who desire to demonstrate their abilities. Third, a computer perhaps a device used to commit traditional crimes in an additional complex way. These traditional crimes comprise recognize robbery, child pornography, patent rights violation, and mail or wire scam.

Prosecution of Computer Crimes
Computer crimes are disreputably hard to prosecute because of both the nature of the technology itself and the relative ignorance of law enforcement with the technology. For instance, to thwart law enforcement from protecting proof, people might encrypt information so that even if law enforcement captures the data, enforcement staff will be incapable to realize its contents. The nature of the Internet permits people to involve in criminal behavior online with virtual ambiguity. With respect to computer crimes for example hacking, a victim may never even understand that she was a victim of a computer offense. Additional encumbering law enforcement, several personal and commercial articles that do discover an interruption are afraid to report violations because of possible negative promotion.

Example of FBI
The FBI has formed several agendas and installed new technologies to help in the inquiry and prosecution of computer crime. The FBI initiated a new division, the Cyber Crime Division, devoted to investigating computer crimes. The Cyber Crime Division is planned to perform as a central coordinator for the FBI divisions that tackle computer crimes. Particularly, the Computer Crimes Division is accountable for criminal investigations of intellectual possessions, high-tech, and computer crimes. Furthermore, the FBIs Innocent Images National Initiative, which is component of its Crimes Against Children Program, an arm of its Criminal Investigative Division, has permitted agents to carry out investigations of conveyed child pornography, posturing as both children and sexual predators in online surroundings.  As of August 2002, above 3500 people have been condemned under this program.  The FBI also investigates computer crimes in its Internet Fraud Complaint Center (IFCC), an additional arm of its Criminal Investigative Division, to perform as a liaison between law enforcement agencies and victims of computer fraud.  In addition, the FBI has accumulated computer crime teams at every of its 56 field offices.

Computer Crimes and Legislation
The legal system is becoming more tech savvy and many law enforcement departments now have cyber crime units created specifically to deal with computer related crimes, and of course we now have laws that are specifically designed for computer related crime. (May, 2004)

While computer crime remains insecurely described, the majority industrialized nations have modified their legislation to tackle four requirements formed by computer crimes (i) protection of solitude (ii) prosecution of economic crimes (iii) protection of intellectual possessions and (iv) procedural supplies to help in the prosecution of computer crimes.  Worldwide, national governments are approved computer-related criminal codes that address illegal entrance and exploitation of information alike to the Computer Fraud and Abuse Act of 1996 in the United States. Criminalization of copyright violation is also gaining impetus around the world.

Conclusion
The worldwide interconnection of susceptible computer systems may need a homogeneous intercontinental legal agenda for dealing with multinational computer-associated crimes. There have been two important steps towards attaining this framework. First, the thirty-three nations and the United States America signature the Council of Europes Treaty on Cybercrime on November 23, 2001, in Budapest, Hungary. The Treaty on Cybercrime essential parties (i) to set up substantive laws against cybercrime to (ii) make certain that their law enforcement officials have the essential procedural authorities to investigate and prosecute cybercrime violations efficiently and (iii) supply international cooperation to additional parties in the battle against computer-associated crime. Second, there is a Subgroup on High-tech Crime at G-8s Lyon Group in which the US contributes energetically. (Broadhurst, 2005) One achievement of the Subgroup comprises the expansion of a network that permits law enforcement to contact law enforcement of further associate nations at any instance of the day for quick support in investigating computer crime and conserving electronic proof.

0 comments:

Post a Comment