This paper aims to address the issue of computer crime in relation to the criminal justice system, in particular, law enforcement. The challenge of computer crime faces the entire criminal justice system, comprising the police officers, prosecutors, criminal investigation personnel, and judges. Further, the paper indicates the effects of computer crime on the community and its institutions. A recommendation on how best law enforcement agencies can counter computer crime is also proposed.
With vast advancement in innovation and modern technology, there is wide use of computers across the globe. Today, computers are being used by all institutions of the society such as schools, financial institutions, production industries, government departments and private businesses. The rise of the internet has further advanced usage of computers to individual apartments. According to a report released by International Telecommunication Unit, the number of people using the internet had increased to around 3.2 billion (Casey, 2011). The use of computer system has become so rampant that we have to encounter them in all our aspects. This enormous change has provided an opportunity to computer criminals to ravage. By use of high technology computer systems, computer criminals are able to crash essential systems, disrupt bank operations, interrupt telephone services or even alter production processes.
Delegate your assignment to our experts and they will do the rest.
Computer crime basically falls under three main perspectives: Computer crime, cyber terrorism, and internet crime. Computer crime is any illegal act executed by an individual with significant knowledge in computer systems (Parker, 2013). This includes unauthorized access to data, destruction or theft of systems or data, data alteration, Trojan horses, viruses and electronic vandalism. Internet crime is the most common due to increase in the number of users and rise in internet networks. Internet crime includes spam, unauthorized access to data, viruses, and worms. Cyber terrorism, on the other hand, is the use of computerized systems to make explosives that are used against innocent people to gain political mileage against governments.
The rise of computer networks has increased the vulnerability of computer systems making them an easy target for criminals. While major steps are being taken to secure these systems, lack of advanced mechanisms to track down space and time of computer crime is affecting the process. Fight against computer crime is further hindered by lack of personnel with adequate knowledge and equipment to detect computer crime.
Recommendations
The rise in computer crime demand critical and rapid attention. Law enforcement agencies are required to keep pace with the advanced technology. It is important that police officers, criminal investigation personnel, prosecutors, and judges have a remarkable understanding of computer systems (Parker 2013).
Further, intercontinental collaboration is needed to combat computer crime. A worldwide structure must be established to confront all issues related to computer crime. There should also be international cooperation to enact new laws and policies against computer crime.
Many people are not aware of the gravity of computer crime (Casey, 2011). It is, therefore, important to enhance public awareness of the seriousness of the problem to all members of the society including the general public, legislators, members of the criminal justice system and private business owners. Making them aware of the problem, would trigger them to be more proactive and take necessary action any time they suspect or come across incidents of computer crime.
Evaluation and measurement standards
In order to determine whether appropriate measures have been achieved to combat computer crime, further research needs to be carried out by government agencies, learning institutions, and the press. The research would evaluate the efficiency of criminal justice systems to respond to computer crimes. Research findings would be published for necessary control measures to be undertaken.
References
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic Press.
Parker, D. B. (2013). Fighting computer crime (pp. 108-188). New York, NY: Scribner.