Cybercrime: Police Authorities' Response and Improvement Strategies

Verified

Added on  2023/05/30

|11
|3420
|335
Essay
AI Summary
This essay delves into the escalating issue of cybercrime, differentiating between cyber-dependent and cyber-enabled crimes. It examines the various forms cybercrime takes, from financial fraud to online harassment, and discusses the challenges faced by law enforcement in addressing these digital offenses. The essay critically analyzes the responses of police authorities, including the National Cyber Crime Unit and the National Crime Agency, highlighting strategies such as international collaboration, improved reporting, and the use of digital forensics. It emphasizes the need for proactive measures, public education, and technological tools like VPNs to combat cybercrime. The essay underscores the importance of adapting policing strategies to the evolving landscape of cyber threats and the continuous need for improvement in law enforcement responses.
Document Page
Running head: ESSAY 0
CRIMINOLOGY
DECEMBER 14, 2018
STUDENT DETAILS:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ESSAY 1
In the present time, the cybercrime is greatly rising in the world of technology. The criminals
of the World Wide Web use internet users’ private data for the personal achievement. These
criminals jump deep in the dark web to purchase and trade the unlawful service and goods.
These criminals still get access to classify the data related to the government. The expression
cybercrime means any kind of criminal action made through, and making use the Information
and Communications Technology (ICT) device (Cross, 2015). The cybercrime is described as
the crime where the computer is the purpose of the crime like phishing, hacking, doing spam.
It is used as the device to conduct the crime such as hate crime and child pornography. The
cybercriminals can use the technologies related to the computer to access private data,
business commercial secret or use the net for unfair or hateful objectives. The criminals may
also use the computer to establish the communication or documents or data storage. The
criminal who executes these unlawful actions is often considered to as hacker. The
cybercrime can also be considered to as crime related to computer (McElreath, et. al, 2018).
The purpose of the criminal actions may be to make sexual crimes like seeing and sharing the
offensive images, controlling or allocating the computer systems, or to accept cash, goods,
sources or data without permission. The net is used by the gang to deal the extensive variety
of goods online like drugs, firearms, and offensive images of children. In the following parts,
the manner of respond of police authorities to both cyber-enabled and cyber-dependent
cybercrimes and way to improve responses is discussed and critically examined.
The cybercrime is the umbrella expression used to define two closely related, but different
range of criminal action (DiMase, et. al, 2015). Cyber-crimes fall into two categories. These
are cyber-dependent crimes and cyber-enabled crimes.
The online crimes have enhanced in brutality and the occurrence over the last two decades.
Though, even if various scientific regulations have generally engaged criminological the
Document Page
ESSAY 2
approaches, strategies or the theories to describe the experience, incident, ordinary
criminology has dedicated comparatively slight concentration to the examination of the
cyber-criminals and the sufferers of the cyber criminals. The drawing on this assumption that
more criminological attention must be provided to the significant category of the crime. This
report states the interdisciplinary reviews of the present state of the study on cyber-dependent
crime. The cyber-dependent crimes are crimes, which may be conducted only by the
Information and Communications Technology devices, whereas tools are device for
conducting crimes, and target of the crimes such as establishing and propagating malware for
the economic benefits, hacking to steal, damages, misrepresent, and end the information and
networks or activities. This is the extensively identified issue, effort to measure cyber-
dependent crime have resulted in noticeably different numbers, focusing the trouble of trying
to develop the scales, outlay and the influence of the attack.
The cyber-crime is conducted for various different causes by the people, group, and
independent states. For examples, greatly skilled people or highly skilled groups who can
circulate software to attack the network and system, either to do misconduct or influence
others to do so, controlled criminal gangs, and cyber-terrorist who aim to cause extreme
interruption and impacts. It also includes gangs or people with high skills, gangs and persons
with low skills but the capacity to use cyber devices established by others, states sponsored
groups throwing cyber-attack with purpose of collecting data or conceding government of
United Kingdom, protection, financial asset, and business asset, and the workers with
advantaged access to the network and computer (Brown, 2015).
The cyber-enabled crime is the traditional crime that may be enhanced in scale and reach by
the computer users, computer network, or other forms of ICT like cyber-enabled frauds. This
is crime that does not depend on computer and network but have been transformed in scale by
use of net and communication technologies. They came in following categories like
Document Page
ESSAY 3
cybercrime connected to finance such as Intellectual property crime (piracy, copy content,
and falsification), online market for prohibited item, invasive communication
(communications sent by the social media and cyber trolling), crimes which particularly aim
people involving cyber-enabled violence against girl and female (like disclose the private
sexual pictures without agreement (cyber annoyance, harassment, coercion). It also includes
child sexual crimes, inappropriate pictures of children, and risky pornography, offensive
publication and illegal pictures.
The enhancing dependence on the technologies related to the computers is being oppressed
by the offenders or wrongdoers or the criminals who use technologies to carry the usual or
the habitual crimes like the fraud, drug acquisition and the child abuse. The most noted and
highlighted points of these crimes are deception and robbery, pursued by the online nuisance
and the online sexual offending that is the primary fear with the offenders potentially being
embattled by the perpetrators universally. The results from newest confidence survey of
Durham Constabulary state that the cybercrime had score uppermost out of all the offences
the common public are ‘in the threat’ of (Ige, 2018).
It is recognised by the office for National Statistics that there were one thousand seven
hundred fraud crimes referred to the National Fraud Intelligence Bureau by the activity frauds
for the Durham Constabulary field in the end of the year 2016 that is the nine per cent
reduction from the similar time ending year 2015. These are new and practical figures and
used only as the direction. In region the Durham and Darlington this associates to the rate of
three offences per one thousand population that is the similar as the local average and
improved than the national average of the four offences per one thousand people. The level of
fraud is very complicated to evaluate or review because this is the illusory offence. The
oppression is repeatedly again arbitrary, covering the groups or companies as well as the
persons. Certain sufferers of fraud can be ignorant that they have been the injured party of the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ESSAY 4
crime or, for some time after the occasion that some deceitful activities have happened. Other
people may be not willing to see themselves as the sufferers or hesitant to report the crime to
the relevant system or the authority, sensing uncomfortable that they have fallen injured
party. The level of fraud reported by means of the managerial means is thought to
significantly minimize the actual level of these crimes.
Further, other modern expression of cyber-dependent crime is effort of ‘hacktivist,’ someone
who complaints against the acts and approaches of the company. Perhaps the great
apprehension to the police, however, is the capacity of criminals in all over the world to use
the net for purpose of surveillance and violence. The borderless scope of the net, and
hereafter cybercrime, refers that the government may be directed from any place in the world,
making law implementation not only provoking, but in certain examples, practically not
possible. Furthermore, in the present time the criminals may involve in surveillance without
the requirement for higher practical skills. As discussed above, the internet can support, with
‘do yourself’ malware kit, for an instance, accessible in online forum.
The cyber crime is the severe criminal offence as per the Computer Misuse Act. The National
Crime Agency makes the new guidance to stop the cyber-enabled crimes and the cyber-
dependent crimes. The new guidance would contain the reporting, involving the part of action
frauds, early reaction to online mistreatment and nuisance in addition to other cyber-enabled
crimes, conserving the proof and digital forensics, professional or the expert abilities and
administration of the difficult investigation such as the international link or important
connection. This would connect in with other fields of the police public security work so that
the online features of this type of crimes, for example, online preparing in child sexual
abusing matters are connected in with present or latest guidance. The police and National
Crime Agency take cyber crime very critically. The police and National Crime Agency would
make each effort to take into custody and put the criminals on the trial. There is possibility
Document Page
ESSAY 5
that the young people being include with cyber crime may face the visit and warning from the
police or by the officers of National Crime Agency, computer being detained and being
prevented from the internet access. These young people may be arrested or can be held liable
to pay fine or the penalty. For some serious offences, crimes, or wrongdoings, they can put up
to life in prison. The permanent criminal records can influence the learning and future career
forecast, in addition to possible future out of the country travel.
The point to be considered by police is that what they can do to control the cyber-crimes. The
investigation by the government agencies may be the proper crime warning at certain levels
(Subramaniam and Ravi, 2016). To that extent the private police and public police are
essential or compulsory but not so enough. In short terms, the criminal justice responses are
generally the matter of ‘so tiny, so late’, supposing that police officers may discover the
conduct or performance at all. This is hardly matter that they may prevent it onward of time
(Knake and Segal, 2016).
To handle cyber dependent cyber-crime and cyber-enabled cyber-crime, United Kingdom law
enforcement effort in the partnership which involves the National Cyber Crime Unit and the
Metropolitan Police Policies and Practices: the collaboration authoritative, was particularly
related for two motives (Nye, 2017). The cybercrime is the matter that cries out for vital
prophylactic measure in all over the world. Certainly, the cybercrime is one of the most
demanding issues for policing in the present time and in the upcoming period, as improved
technologies become more extremely implanted in the daily routine. The foreign association
is thus important in the competition against the cyber wrongdoing. Additionally, the session
drew on and carried together the knowledge or experiences of the people from the Asian
countries, covering beyond the boundaries of the worldwide north to the worldwide south
(Awan, et. al, 2017).
Document Page
ESSAY 6
In addition, the strategies of police officers are to focus on responding to cyber-attack aimed
at criminals of United Kingdom, advancing the reporting of cyber-crime, helping criminals
and enhancing take-up of protecting protection. Other strategies are-
United Kingdom based cyber criminal; creating the United Kingdom a high-risk nation for
criminal to host and commit the cybercrime;
Global cyber criminals and group: recognising, accusing, and disturbing the most
important cyber criminals at the international level;
Making able global cyber-crime market: debasing criminal market, declining profitability
of cyber-criminal business models and rising barriers to entry and working for cyber criminal
(Klimburg and Zylberberg, 2015).
Moreover, in the long term the great responses to cybercrime are in the learning or training of
the people who are most susceptible and the disposition of crime deterrence devices more
usually (Nye, 2014). There has been certain success with victims of frauds and deception,
particularly the persons who have transferred money overseas in hope of winning the heart or
demanding the prize (Skopik, Settanni, and Fiedler, 2016). It is essential that the well-built
encryption passwords as well as the practical personal networks should be available. The
VPN would encrypt all the traffic leaving the tools until this reaches at the end. If
cybercriminals do handle to hack the line to establish the communication, they would not cut
off anything but encrypted data. This is the very good concept to use the VPN at whatever
time the person a public Wi-Fi network, whether it is in the libraries, hotels, railway station,
cafes and the airport (Broadhurst, et. al, 2014)
Therefore, the police officers should perform quickly to decide the accurate response to the
crimes that can involve scanning networks for concealed tools or collecting digital proof to
support the warrant and trial (Smith, 2018). It is required to respond in the dynamic situations
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ESSAY 7
with more and more differences of crimes and difficulties. The police are required to accept
co-production or co-creation model of actions, not teamwork. The police should work for
establishing the new system and new norms for making the necessary changes in the crime as
they occur and transferring the data regarding it just as rapidly. The responses can be
improved by work towards establishing the big data logical abilities for strategies and
policies (Wall, 2015). For an example, to build the skills of police officers to face new cyber
security threat, Firebrand has made the committed cyber suites, made in line with Hydra; the
training atmosphere used by the police officer to teach real-time decisions taking. Other
example is that the cyber-skilled police are working across the United Kingdom and the
training has had the direct influence on the crime they are tasked with replying to authorities
(Onyeji, Bazilian and Bronk, 2014).
As per the above analysis, it can be concluded that the cybercrime is the fast-growing field of
the crime with more and more offenders or wrongdoers exploiting the swiftness, expediency
and secrecy of the internet to do the diverse range of criminal actions that know no border,
either substantial border or practical border, cause severe destruction and pose very actual
fears to the victims. The crimes related to computer and the digital investigation comprises
the significant part of the criminal polices, laws and the practices as data or information
becomes the foundation stone of the worldwide market or the financial system. The original
and creative manners of offensive, exploit and snooping with the computers and techniques
related to computers are frequently rising, posing growing fears to the societies, wealth and
the protection (Brown and Cheng, 2018).
It is necessary that in handling the cybercrime the right legal structure of the crimes is at
right place and that there is transparency in how the power which is used to examine the
cybercrime interacts with the crimes created to grab the cyber criminals. In United Kingdom,
the existing legal structure to cyber dependent crimes, involving the new amendments, and
Document Page
ESSAY 8
makes focus on the areas that stay difficult and in the requirement of the concentration from
the policymakers. It is now the daily requirement for most of the subjects to include the skills
of the cyber officers or groups. The cyber officers will possibly be involved in unbalanced
data collection, wireless charting, and the router examination. As cyber-attacks enhance in all
over the world, this kind of cyber training programme is crucial for all officers involved in
cybercrime at any level. It can enhance liability to police management and the rules of the
company.
Document Page
ESSAY 9
References
Awan, J.H., Memon, S., Khan, R.A., Noonari, A.Q., Hussain, Z., and Usman, M. (2017)
Security strategies to overcome cyber measures, factors and barriers. Eng. Sci. Technol. Int.
Res. J, 1(1), pp. 51-58.
Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., and Chon, S. (2014) An analysis of
the nature of groups engaged in cyber crime. Oxford: Oxford University press
Brown, C.S. (2015) Investigating and prosecuting cyber crime: Forensic dependencies and
barriers to justice. International Journal of Cyber Criminology, 9(1), p. 55.
Brown, K.E., and Cheng, D.J. (2018) A Collaborative Government-University-Industry
Model for a STEM Career-Education Pathway: Phase III: The R&D of Forensic Analytics
and Biometrics. Journal of Student Research, 34(9), pp. 12-20.
Cross, C. (2015) How to tackle cybercrime before people even know they're a victim. The
Conversation, 52 (19), pp. 23-34.
DiMase, D., Collier, Z.A., Heffner, K., and Linkov, I. (2015) Systems engineering framework
for cyber physical security and resilience. Environment Systems and Decisions, 35(2),
pp.291-300.
Ige, O. A. (2018) Effects of Gender and Technological Fluency on Learners' Attitude to
Cyber Crime Prevention in Urban Learning Ecologies: Lessons for Swedish
Gymnasiums. International Journal of Cyber Criminology, 50(8), pp. 65-80
Klimburg, A., and Zylberberg, H. (2015) Cyber Security Capacity Building: Developing
Access. Oxford: Oxford University Press.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ESSAY 10
Knake, R., and Segal, A. (2016) How the next US president can contain china in
cyberspace. J Int Aff, 70(1), pp. 21-28.
McElreath, D.H., Doss, D.A., McElreath, L., Lindsley, A., Lusk, G., Skinner, J., and
Wellman, A. (2018) The communicating and marketing of radicalism: A case study of ISIS
and cyber recruitment. International Journal of Cyber Warfare and Terrorism (IJCWT), 8(3),
pp. 26-45.
Ning, H., Li, Q., Wei, D., Liu, H., and Zhu, T. (2017) Cyberlogic paves the way from cyber
philosophy to cyber science. IEEE Internet of Things Journal, 4(3), pp.783-790.
Nye Jr, J.S. (2017) Deterrence and dissuasion in cyberspace. International Security, 41(3),
pp.44-71.
Nye, J.S. (2014) The regime complex for managing global cyber activities. Cambridge:
Cambridge University Press
Onyeji, I., Bazilian, M., and Bronk, C. (2014) Cyber security and critical energy
infrastructure. The Electricity Journal, 27(2), pp. 52-60.
Skopik, F., Settanni, G., and Fiedler, R. (2016) A problem shared is a problem halved: A
survey on the dimensions of collective cyber defense through security information
sharing. Computers & Security, 60, pp.154-176.
Smith, R. (2018) Crime in the digital age: Controlling telecommunications and cyberspace
illegalities. New York: Routledge.
Subramaniam, V.S.R., and Ravi, R. (2016) Cyber Crime Control Techno-Legal Network.
USA: Springer
Wall, D.S. (2015) The Internet as a conduit for criminal activity. New York: Routledge.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]