Saturday, June 8, 2019
Victims and Legislative Solutions Essay Example for Free
Victims and Legislative Solutions Essayknowing production, use or trafficking in counterfeit or unauthorized access devices such as any(prenominal) card, plate code, account number, electronic serial number personal identification number, that can be used to obtain money, goods, benefits, or any other social occasion of value, or that can be used to initiate a transfer of funds (Cybercrime mankind and underground Entities, 2007). Despite these measures in place, cybercrime is still a massive problem.This is due to the fact that hiring and retaining skilled investigators is a daunting task because private companies offer a higher salary and better benefits than the federal government (Cybercrime Public and Private Entities, 2007). Also, staff rotation policies in place at certain law enforcement organizations make it difficult for law enforcers to fully attend and address the website properly (Cybercrime Public and Private Entities, 2007).Besides, it takes a year to train an investigator to be competent enough to handle his own case (Cybercrime Public and Private Entities, 2007). Individuals have to be trained because federal agencies lack resources to employ professional investigators (Cybercrime Public and Private Entities, 2007). In addition, multiple jurisdictions in place makes the matter even off more complicated to handle (Cybercrime Public and Private Entities, 2007).Laws used to address cybercrime differ across states and nations. For example, not all US states have anti-spam laws or anti-spyware laws Further, territorial boundaries can limit the actions that federal, state, and local law enforcement can take to investigate cybercrime that crosses local, regional and national borders (Cybercrime Public and Private Entities, 2007). Lastly, the complex nature of tracking an find theft also poses a problem.Cybercriminals can take steps to remain anonymous, making it difficult, if not impossible, to attribute a crime to them this is because c ybercriminals can be physically located in one nation or state, direct their crime through computers in multiple nations or states and store evidence for the crime on computers in yet another nation or state (Cybercrime Public and Private Entities, 2007). Hence, cybercriminals are rarely caught and if they are apprehended, the penalties are minimalCommunity service and parole are the usual sentence (Identity Theft How it Happens, 2000). Cybercriminals exist because engaging in personal identity theft enables them to acquire money and benefits such as real(a) assets, medical insurance and tax returns without working conventionally to obtain them. Also, they are rarely caught because the system in place is disorganized and ineffective that is why identity theft remains a big problem. A national and specialized agency should be set up to handle this situation.Resources should be allocated to this agency so that skilled investigators can be employed. This will speed the investigation process because individuals in the force do not have to be trained for a year to be able to effectively deal with cases.ReferencesPrivacy Rights Clearinghouse. (2000, July 12). Identity Theft How it Happens, Its Impact on Victims and Legislative Solutions. Retrieved January 20, 2008, from http//www.gao.gov/
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.