Free Essay SamplesAbout UsContact Us Order Now

combatting cybercrime

0 / 5. 0

Words: 825

Pages: 3

55

Criminal Justice
Student’s Name
Institutional Affiliation
Date
Abstract
The past few years have been a constant battle against cybercrime since most criminals rely on the underlying technology and the internet to promote their operations. The technological certainties that were brought by the combat against cybercrime concern the protection of citizens’ rights and invasiveness of law enforcement since they complicated the observance of these rights. Most governments know that its citizen’s privacy is a priority yet the law enforcement invade them in their fight against cybercrime. For that reason, the essay offers a background that builds a global setup and policy atmosphere that stabilizes the needs of crime-free government, personal communications and business while safeguarding the protection of civil liberties, privacy, and property. One way that the law enforcement can combat cybercrime without invading any citizens’ right is by encouraging victims to report any cyber-attack. The essay concludes by ensuring that civil liberties are upheld amid technological and legal cooperation against cyber-attack.
Keywords: Cybersecurity, crime, network, cyber-attack, database, Computer
Combatting Cybercrime
In today’s world, many people rely increasingly on the current technology and the internet. Despite all the advantages, it has to offer, the upsurge in connectivity brings the risk of identity theft, fraud, and abuse to its users. In short, the more Americans rely on the current technology, the more vulnerable they become to the cyber-attacks.

Wait! combatting cybercrime paper is just an example!

The fight against cyber-crime by the law enforcement and the lawmakers raises the question of whether or not they are to disregard some constitutional right to protect Americans. Moreover, some of the problems concern the privacy law and the electronic surveillance which are explained in details in the paragraphs that follow. For that reason, the primary purpose of the essay is to determine the legal values that should administer the use of such events and what non-technical restraints are likely or should be placed against them without breaking the constitutional rights of the American citizens.
A privacy law prohibits any exploitation or disclosure of an individual’s data. The issue concerning the privacy laws goes hand in hand with the electronic surveillance whereby the privacy of an American citizen is overstepped through monitoring. An organization or individual’s privacy can be threatened by anyone or any entity that collects and manipulates personal information over the social networking and the regime’s that allow intrusive law-enforcement exercise or scrutiny. The most commonly used devices by the electronic surveillance are cameras, wiretapping, CCTV, and bugging. Additionally, surveillance can also be done through a mobile phone or computer. In the plight to end cybercrime, it has been seen that some governments intrude the privacy of its citizens by monitoring the internet. As a result, countries such as the US, Canada, Great Britain, Australia, New Zealand and Great Britain use electronic surveillance without the knowledge of its citizens (Drozdova, 2001). As much as the unconventional monitoring, stalking, searching and the scrutinizing of communications is helpful in the combat against cybercrime, the lawmakers and enforcement violate the civil liberties of its citizens.
Some of the suggestions I recommend for the law enforcement and lawmakers to combat cybercrime while protecting the constitutional rights of the America citizens include the adoption of firewalls, virtual private networks, secure network protocols and routers (Drozdova, 2001). The IP version and the following group of internet procedures allow routers along provision paths to record addresses of former destinations in the message header. Figuratively, the feature hides the critical content and author while guarding the identity of the sender and the communication during searching or tracking.
Secondly, exchange of information among the computer staff and law enforcement regarding the mode of attack and penetration, anomalies, early warnings and suspected crime in the operation of the computer can facilitate timely response of the incident and prevention. Nevertheless, it is imperative to note that stronger cybersecurity deters some cybercrimes and not all cyber-attack (Wexler, 2014). Another helpful suggestion is the law enforcement cooperation with the private corporations and internet service providers since most companies have considerable cybercrime experience that offers guidance on the preventive measures and how cyber-criminals operate. For instance, the introduction of (IC3) internet crime complaint center helps the affected victims in speaking out since such organizations encourage victims to report cybercrimes (Wexler, 2014). Moreover, IC3 receives a number of crimes such as economic espionage, hacking, and identity theft.
The use of automation can be helpful since it heightens both privacy and security. Automation can only be efficient when semi-automated and automated tools are used since they expedite the discovery of security gaps, scalability of achievement, mapping to the origin of the attack and finally increases effectiveness and efficiency (Drozdova, 2001). Automation conserves the confidentiality and anonymity of acquitted individuals whose communications may be exposed to search in the sequence of investigation. Notably, the combination of laws constraining law enforcement, automated and other tools protect privacy and offers security against cybercrimes. Conclusively, whenever the law-enforcement tactics are becoming invasive, and computerization is not dependable or accessible, legal restrictions are considered essential.
The use of network monitoring by the computer security professionals minus the participation of law enforcement for reasons of boosting network performance and guaranteeing security does not face limitations of criminal law since it acts as a shielding measure. The collaboration between the internet service providers (ISPs) and the mainframe security experts could be beckoned to shield database, hardware, and software (Drozdova, 2001). This idea will not only serve in combatting cybercrime but also defending against legal responsibilities that may arise from negligence claims. In that context, practical computer security and timely detection of and response to unauthorized access or use of cyber systems would help in the reduction of both invasive law enforcement and cybercrime.
In conclusion, cybercrime has registered a large number of cases since many communities continue becoming dependent on computer networks which render them vulnerable to cyber-attacks from criminals. As a result of this crime, the lawmakers and the law enforcement tend to disregard some of the constitutional rights with the pretext of protecting American citizens against cybercrime. However, this essay offers suggestions to the law enforcement about ways of combatting with cybercrime while still safeguarding the constitutional rights of its citizens.
References
Drozdova, E. A. (2001). Civil liberties and security in cyberspace. Center for International
Security and Cooperation, Stanford University.
Wexler, C. (2014). The role of local law enforcement agencies in preventing and investigating
cybercrime. Retrieved from: http://www.policeforum.org/assets/docs/Critical_Issues_Series_2/the%20role%20of%20local%20law%20enforcement%20agencies%20in%20preventing%20and%20investigating%20cybercrime%202014.pdf

Get quality help now

Samantha Sykes

5,0 (472 reviews)

Recent reviews about this Writer

I can't thank the essay writer at StudyZoomer enough for their exceptional work. The essay they delivered was of the highest quality, showcasing their expertise and dedication.

View profile

Related Essays

Case Study Drug Addiction

Pages: 1

(275 words)

Recism and Health

Pages: 1

(275 words)

step1

Pages: 1

(550 words)

Drug Abuse Challenge

Pages: 1

(275 words)

Dueling claims on crime trend.

Pages: 1

(275 words)

Brainstorming

Pages: 1

(275 words)