Canadian Policies to Thwart Terrorist and Criminal Research Paper

Excerpt from Research Paper :

Canadian Policies to Thwart Terrorist and Criminal Activities

Canadian Policies to Combat Crime and Terrorism

Problems being faced due to Cyber-Crime in Today's World

What is Identity Theft?

How and Why Cyber-Crime Occurs?

Why Cyber-Crime has become an Important Issue?

How Release of Personal Information makes an Individual vulnerable to Identity Theft?

Future Implications

Since time immemorial, crime and criminal activities have been found at an accelerated pace, however, with the penetration of the world into the twenty first century with numerous technological advancements and innovations, these acts have taken a new form. This evidently signifies that crime through cyberspace has become one of the widespread and prevailing activities of the today's fast paced world, where the entire human race is moving towards the industrial and hi-tech progressions at a constant speed. Moreover, the criminal and terrorist activities in a more sophisticated version have become a common aspect of mundane life (Brenner, 2010).

The criminal activities is not confined to any one country, rather, the entire globe and its people are confronting this grave issue on a universal basis, which even includes the developing nations as well-developed countries. Cyber-crime has become one of the insidious, subtle, dangerous and artful activities that have affected a number of people in the contemporary world (Brenner, 2010).

Perhaps cyber-crime may give the impression to be less dangerous because it does not harm or damage the individual (who is being targeted) physically. However, this is more insidious because the cyber criminals directly play with the person's goodwill, name, credibility and reputation in association with their credit details in order to get hold of their identity in obtaining employment and other aspects of life by gaining access to a person's private information that is strictly confidential (Brenner, 2010).

Since the world is advancing, newer issues and concerns are emerging where the older issues are being corrected with time. In fact, cyber crime has become one of the significant attributes of the technological change and innovation that is constantly updating, and hence giving rise to numerous new challenges with respect to the information access and privacy of the individuals as well as the governments, military, and even the nation's economic information. The records and studies have comprehensively identified that cyber attacks have not only become sophisticated, instead the number of attacks has elevated dramatically in the last few years, which is also expected to grow (Brenner, 2010).

While taking into account the cyber crime, one can extensively determine that Canada is one of the nations that are persistently experiencing increasing number of cyber crimes in the modern world of today. This is particularly due to the reason that the widespread platform internet has become an effectual, invaluable and productive utensil for not only the Canadian individuals but also for the Canadian businesses and their governments on a broad spectrum. Nevertheless, with the evolution, progression and development of the cyberspace, the cyber threats are also being escalated at an unprecedented rate that is causing risk to the overall security, wealth and quality of life (Clough, 2010).

Considering the severe and constantly growing issue of cyber crime, the government of Canada is very much committed in providing security and protection to the inhabitants from the threat and risk of cyber crime and cyber criminals. In this regard, the research thesis would provide a deep analysis on cyber crime that has become a prominent issue and what are the policies of the Canadian government to thwart and combat the severe issue (Clough, 2010).

Canadian Policies to Combat Crime and Terrorism

Cybercrime is generally referred to the defined criminal activity or offence that is performed by means of computer hacking and network (especially through telecommunication network such as internet and mobile phones), which acts as the primary object of the crime. This type is crime is committed with the core motive and intention to harm the reputation of the individual or group of people. Cyber crimes are usually a harsh threat to a nation's security, economic conditions and financial health (Public, 2011).

However, almost every nation in the current epoch are taking measures and developing policies against cyber crimes that can handle and administer the terrorist activities. In a very similar manner, Canada has also developed approach in its own manner to embark global and domestic threats. The governmental bodies and agencies have developed ongoing and multifaceted activities in which they are engaged in
Parts of this Document are Hidden
Click Here to View Entire Document
a collaborative manner in counter terrorism. This is due to the reason that safety and security of the residents of Canada is the main concern of the government that they wish to ensure to the local people. Therefore, the government is working in partnership with the international allies is the primary goal that can lead to ensuring the security to the inhabitants (Public, 2011).

Considering the policies of Canada, records have revealed the fact that Canada has been involved in a four-step plan in order to alleviate the cyber crime within the country. The four step plan include prevent, detect, deny and respond (Public, 2012). The activities in the first step (prevent) includes the monitoring of the individual's intentions and motivations who are likely to get involved in offensive or terrorist activities either at home or overseas. Moreover, the activities in this step also focus on the factors that can create a motivation to the individuals in being involved in illicit activities (Public, 2012).

The second step (detect) of the procedure involves activities that have the focus on various aspects regarding the terrorist activities such as determination of terrorists groups and organizations, their supporters and the nature of their plans. Investigations and intelligence operations are the primary means to detect such leads that can cause criminal prosecutions (Public, 2012).

The third step (deny) include law enforcement actions that moderate and alleviate the vulnerabilities in terrorist planning that can turn the nation into a more difficult target for the terrorist activities. Finally, the last stage (respond) involves expanding and widening the competence that can spontaneously respond in a proportionate and rapid manner, which can reduce the affect and severity of terrorist activity (Public, 2012).

In actual fact, records have also exposed the piece of information that Canada has also developed strict laws with respect to the criminal codes of Canada that exhibits every individual's act would be counted as offensive or an illegal act in case if they have acquired other person's identity information with the intention of committing an felonious offence such as fraud or deception. Strict actions are taken against such individuals who are found to be guilty of such an offense that is defined by the legislative bodies (courts) (Public, 2011).

The laws and policies have been especially developed in order to prevent or lighten the cyber threat that can eventually protect the internal digital infrastructure. Besides, the law enforcement community of Canada is making an ongoing effort to crack down the individuals who use the platform of Internet especially for crime and illegal activities. The constant efforts indicate the commitment of the government to provide a safe, secure and prosperous cyberspace to the citizens of the country. Indeed the government is also working on legislations that can update and revise the law enforcement's investigative powers that can ensure technological innovations are not being used to evade or avoid lawful interceptions of communications supporting criminal activity (Public, 2011).

Problems being faced due to Cyber-Crime in Today's World

Since the globe has transformed into the technological era, the primary means of communication, interaction, transfer and sharing of information is becoming confined to technological mediums such as internet. The technological advancements on one hand has created easy ways and means of data sharing, while on the other hand, it has created more opportunities for the criminals to commit crimes over the internet. This undoubtedly indicates that an individual is likely to be expected to release their personal information on daily basis in order to receive benefits, perks and services. However, this communication and transfer of information over the internet is making more vulnerable to 'identity' theft and cyber crimes (Westby, 2003).

What is Identity Theft?

Identity theft is gaining access to someone else's identity with the prime motivation to using his or her personal and confidential information (that include credit details) in order to damage the person's name and reputation. The victim is usually the person whose information has been used by the identity theft. As an outcome of identity theft, the victim is highly prone to suffer from adverse and difficult outcomes in conditions when they are held accountable or guilty for performer's actions. These types of crimes are usually committed when an individual steals the personal information (without their consent) like name, social security number, credit card number and any other private information in order to commit fraud or related crimes (Hanel, 2010).

It is rather more challenging to determine the identity threat because the victims are usually unaware of the fact that how their personal information was stole by the identity theft. In fact,…

Sources Used in Documents:


Balkin, J.M. (2007). Cybercrime: Digital Cops in a Networked Environment. Edited Version. New York, USA: NYU Press.

Brenner, S.W. (2010). Cybercrime: Criminal Threats from Cyberspace. USA: ABC-CLIO.

Burgess, A., Regehr C., & Roberts, A. (2011). Victimology: Theories and Applications: Theories and Applications. USA: Jones & Bartlett Learning.

Clough, J. (2010). Principles of Cybercrime. 1st Edition. New York, USA: Cambridge University Press.

Cite This Research Paper:

"Canadian Policies To Thwart Terrorist And Criminal" (2012, November 20) Retrieved October 28, 2020, from

"Canadian Policies To Thwart Terrorist And Criminal" 20 November 2012. Web.28 October. 2020. <>

"Canadian Policies To Thwart Terrorist And Criminal", 20 November 2012, Accessed.28 October. 2020,