Criminal Law University Student Credentials

Verified

Added on  2022/08/12

|5
|721
|13
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
[Cyber crime]
Scenario revolving around cybercrime, regulations revolving around them and governmental
measures in order to prevent further such crimes from being committed.
2020
University
Student Credentials

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Criminal Law 1
Personality Profile of a Cyber Criminal
An understanding of the criminal is a must in order to understand the kind of crime or
the level of crime that individual is capable of. The bases on which the cyber criminals are
distinguished are personal traits, motivating factors and even the types as in coders, inside
traders or even cyber terrorists. These help figure out the disturbances or off track behaviours
so as to identify them as a personality of a cyber -criminal (Cyber Security Capacity Portral ,
2016).
Specific crimes committed by Cyber Criminals
Few of the most common crimes that Cyber Criminals commit include, Cyber
Stalking, Online harassment, and invasion of privacy, trafficking of humans, phishing scams,
money laundering, pornography and also Identity Theft. Though there are various others, but
these are the few ones that are committed every now and then (Panda Security, 2018).
Society’s role
Throughout the past years , the law enforcement of the US has been progressively
seen or noticed the increase of cybercriminals in the far away areas of the country or so called
remote areas, both to enable nearby specialists to find and capture cyber criminals and to
remove them extradite them accordingly into the legitimate framework of America (Burgess,
2018). Personally what people can do here is keeping them safe and not sharing their private
information with any one. Society on a larger scale can protect each other and support
building of certain softwares and even ask for help from the state as such to assist them with
funds and sources so as to protect their rights. Places where the extradition treaties do not
apply, in such cases, the government has to be pressured in order to take swift steps to ensure
the safety of its citizens (Greenberg, 2020).
Document Page
Criminal Law 2
Urgent actions that need to be taken by governments
In such situations, certain actions can prevent harm or even further harm for that matter.
Few of these include:
1. Creating a detailed and comprehensive structure to prevent data being utilized
somewhere other than the federal authorities or the individual himself and protecting
national cyber security and global cyber space from certain risky threats.
2. Implementation of the government wide initiatives of the cyber security.
3. Keeping strict eye on the security of new devices or the new advancements made by
the countries or globally for that matter.
4. Federal efforts should also be improved in order to protect the sensitive data and
privacy of individuals (GAO, 2018).
In general, FBI also has played a very important role in preventing the cyber -crime by
being vigilant enough and constructing certain ransom wares to fight against cyber -crime.
They have a whole team dedicated towards preventing such crimes all over the country.
These authorities keep an eye and track the working of each and every individual (FBI,
2020).
Bibliography
Document Page
Criminal Law 3
Burgess, C. (2018, April 13). Do Cybercriminals Ever Get Extradited? Retrieved February
19, 2020, from Security Boulevard: https://securityboulevard.com/2018/04/do-
cybercriminals-ever-get-extradited/
Cyber Security Capacity Portral . (2016). Profiling the Cybercriminal. Retrieved February
19, 2020, from Cyber Security Capacity Portral :
https://www.sbs.ox.ac.uk/cybersecurity-capacity/content/profiling-cybercriminal
FBI. (2020). Cbercrime. Retrieved February 19, 2020, from FBI:
https://www.fbi.gov/investigate/cyber
GAO. (2018, September 6). High-Risk Series: Urgent Actions Are Needed to Address
Cybersecurity Challenges Facing the Nation. Retrieved February 19, 2020, from
GAO: https://www.gao.gov/products/gao-18-622
Greenberg, A. (2020). Cybercops Without Borders. Retrieved February 19, 2020, from
Forbes: https://www.forbes.com/2009/06/01/cyberbusts-security-internet-technology-
security-cyberbusts.html#3beef9ce767d
Panda Security. (2018, August 20). Types of Cybercrime. Retrieved February 19, 2020, from
Panda Security: https://www.pandasecurity.com/mediacenter/panda-security/types-of-
cybercrime/

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Criminal Law 4
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]