¶ … internet and the increased availability of personal computers around the world have increased the vulnerability of critical infrastructure systems. In recent years computers have been used by terrorist to distribute information about terrorist attacks. Now many experts fear that terrorist will use computers to carry out an attack on electricity grid or other systems that are crucial to the operation of a nation's infrastructure. The purpose of this discussion is to investigate the ways in which cybercrimes occur and the how it applies to the criminal justice system approach to dealing with terrorism. Before we began the literature review let us provide an overview of the methodology used to identify and locate sources of information found in the literature review.
Methodology
The sources used in the following literature review are from Academic Journals, books, newspapers, government agencies and articles found on the internet. Many of the Journals used are published by well respected institutions of higher learning. These sources were chosen because they are creditable and provide solid insight into the world of cybercrime as it relates to the development and implementation of legislation.
Analysis/Discussion
According to an article entitled "Computer Crimes," the Department of Justice defines Cybercrime as "any violations of criminal law that involve knowledge of computer technology for their perpetration, investigation, or prosecution (Ditzion et al. pg. 285)." The authors go on to explain that this is a broad definition and that there also exist criminal behaviours that are technology specific (Ditzion et al.). In addition, the Department of Justice places cybercrime into three categories: a computer as an object of a crime, a computer as an instrument used in a crime, and a computer as the subject of a crime (Ditzion et al.). The last category includes such crimes as logic bombs, Trojan horses, viruses and worms (Ditzion et al.).
Indeed cybercrime has been detrimental to businesses and individual and cost billions of dollars each year (Ditzion et al.; Pasley; Arquilla & Ronfeldt). Additionally, in many cases it is difficult to catch the criminals that are the perpetrators of such crimes. This is the case because crimes conducted through the use of a computer are more difficult to trace and because an attack may affect a Canadian business but the person that actually carried out the crime may live in Germany. In some cases it is also difficult to prosecute cyber criminals because laws differ amongst jurisdictions. The authors contend that for this reason there has been a rise in the development of specialized legislation to combat cybercrime (Ditzion et al.).
In the past legislation has been created in an attempt to address the problem of cybercrime. An article found in the Yale Law Journal asserts that
"The first cases of computer crime were heralded as an unprecedented phenomenon that law was not equipped to handle. Scholars and policymakers have since proposed a number of deterrence strategies, from criminal sanctions to tort law and the architecture of the web itself, but none of these methods has proved successful at deterring criminal hacking (Wible Pg 1557)."
The journal article goes on to explain that the Computer Fraud and Abuse Act of 1984 passed by congress was designed to prevent unwarranted intrusions. Along with other issues this and problems associated with prosecution this particular law has not deterred cyber criminals (Wible). In addition, enforcement of such laws has proven difficult under 18 U.S.C. [section] 1030(b). Such laws also necessitate large investments of resources and time, and training for local law enforcement agents (Wible). The article also asserts that factors such as encryption technologies and digital anonymity give those that commit cybercrimes an advantage over law enforcement agencies and existing laws (Wible). In addition, the uncertainties about jurisdictional issues cases that are costly to investigate and that entail sophisticated tracking capabilities, state prosecution is nearly unattainable (Wible).
The journal explains that "Proponents of tort liability for computer crime argue that, as compared to the criminal law, civil actions give targets control over the litigation. (30) The possibility of obtaining damages gives targets, otherwise unwilling to admit electronic vulnerabilities to consumers, an incentive to report (Wible)." The authors explain that even though ISP liability has received the most attention there are four types of tort liability that could be implemented in relation to cyber crimes (Wible). These liabilities include ISP liability, hacker liability, security company liability and liability for victims who do not to take private precautions (Wible).
The authors contend that the criticism of such laws A is that "tort liability does not carry a strong symbolic message condemning illegal hacking. The various...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now