preview

Essay about CyberCrime and Terrorism

Good Essays

Throughout the years, there has been a steady increase in the amount of cyber crime committed. Technology is a constantly changing entity, constantly evolving, always progressing. Naturally this can make it hard to stay on top of things. In turn, law enforcement runs into various issues regarding cyber crime and cyber terrorism. Cyber crime and terrorism is so complex of a crime that it can be hard to break down the barriers that can lead to justifying the action. Major issues that are prominent in cyber crime and terrorism are that laws vary greatly from country to country. There is also a major lack of knowledge and equipment in many departments as well as training. On top of these major issues, there are also issues with reporting these …show more content…

The fact that cyber crime can be committed from half way across the world is a huge burden on those whose job it is to apprehend the criminals. The main problem that springs up, is the sheer fact that not every country has the same laws. One country may not have the same definition of cyber crime as the United States, or even recognize the act as a criminal offense. This can cause major issues when the countries laws differ, or even if the criminal is inside an unfriendly territory. This makes the process of apprehending a criminal extremely difficult and time consuming. Countries may often refuse to extradite criminals when this occurs; causing a standstill in the apprehension progress, and once this occurs, the solution must be purely diplomatic, and can be a long process. In addition to the major issue of distance, there is also an issue that is much more of an internal problem. Since much of this technology is relatively new in the scheme of things, many of the law enforcement departments have a major lack of knowledge, equipment and training to deal with cyber crime and cyber terrorism. This causes a major flaw in the defense of government entities because so few are trained to actually understand the interworking of cyberspace and how to properly protect information, but just know basics about how to utilize computer equipment. We

Get Access