.

Tuesday, April 16, 2019

Victims and Legislative Solutions Essay Example for Free

Victims and Legislative Solutions Essayknowing production, use or trafficking in counterfeit or unauthorized access devices such as whatsoever card, plate code, account number, electronic serial number personal identification number, that offer be used to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of bills (Cybercrime humanity and confidential Entities, 2007). Despite these measures in place, cybercrime is still a massive problem.This is due to the fact that hiring and retaining expert investigators is a daunting task because private companies offer a higher salary and better benefits than the national government (Cybercrime Public and Private Entities, 2007). Also, staff rotation policies in place at certain integrity enforcement organizations make it difficult for law enforcers to fully attend and address the situation properly (Cybercrime Public and Private Entities, 2007).Besides, it takes a year to train an investigator to be competent enough to process his own exemplar (Cybercrime Public and Private Entities, 2007). Individuals keep back to be trained because federal agencies lack resources to employ professional investigators (Cybercrime Public and Private Entities, 2007). In addition, multiple jurisdictions in place makes the matter even more complicated to handle (Cybercrime Public and Private Entities, 2007).Laws used to address cybercrime differ across states and nations. For example, not all US states have anti-spam laws or anti-spyware laws Further, jurisdictional boundaries can limit the actions that federal, state, and local law enforcement can take to investigate cybercrime that crosses local, regional and national borders (Cybercrime Public and Private Entities, 2007). Lastly, the complex nature of tracking an identify theft also poses a problem.Cybercriminals can take steps to remain anonymous, making it difficult, if not impossible, to attribute a crime to them this i s because cybercriminals can be physically located in one nation or state, direct their crime finished computers in multiple nations or states and store evidence for the crime on computers in yet other nation or state (Cybercrime Public and Private Entities, 2007). Hence, cybercriminals are rarely caught and if they are apprehended, the penalties are stripped-downCommunity service and parole are the usual sentence (Identity stealth How it Happens, 2000). Cybercriminals exist because engaging in identity theft enables them to acquire money and benefits such as material assets, medical insurance and tax returns without working conventionally to obtain them. Also, they are rarely caught because the system in place is disorganized and inefficient that is why identity theft remains a big problem. A national and specialized role should be set up to handle this situation.Resources should be allocated to this agency so that skilled investigators can be employed. This will speed the i nvestigation process because individuals in the force do not have to be trained for a year to be able to effectively deal with cases.ReferencesPrivacy Rights Clearinghouse. (2000, July 12). Identity Theft How it Happens, Its Impact on Victims and Legislative Solutions. Retrieved January 20, 2008, from http//www.gao.gov/

No comments:

Post a Comment