Preview

Computer Crime: CIS 170 Information Technology In Criminal Justice

Better Essays
Open Document
Open Document
870 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Crime: CIS 170 Information Technology In Criminal Justice
Categories of Computer Crime
CIS 170 Information Technology in Criminal Justice
Strayer University

There are four categories of computer crime.
• The computer as a target.
• The computer as an instrument.
• The computer as incidental to crime.
• Crime associated with the prevalence of computers.
This paper will describe and give examples of each of these crimes.
When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.
Disgruntled employees are a large percentage of companies’ monetary losses
…show more content…
Researching the FBI website, I have found many ways the FBI is trying to combat cybercrime. The FBI has developed a cyber division to address cyber crime. They have specially trained cyber squads in all of their field offices. Newly developed cyber action teams travel around the world on a moment’s notice to assist in computer intrusion cases” and that “gather vital intelligence that helps us identify the cyber crimes that are most dangerous to our national security and to our economy.” There are 93 task forces for computer crime nationwide to assist state, local, and federal agencies. The FBI partners with other agencies including the Department of Defense and the Department of Homeland Security to fight computer crimes together. (FBI — Computer Intrusions. (n.d.). The court system needs harsher penalties for crimes involving fraud, theft, harassment, and stalking involving computers. No plea bargaining should be allowed. The local police should have a task force available for these types of crimes and treat them equal to other crimes. Computers may not appear dangerous but they make everyone vulnerable to many types of

You May Also Find These Documents Helpful

  • Good Essays

    Chapter 9/11 Essay

    • 538 Words
    • 3 Pages

    As a result of the vicious attacks, on that day, the FBI role in fighting against terrorism have changed drastically. They are now able to search telephone records, emails, etc. without a court order. The FBI has a new focus. Post 911 they have reorganized technology, investigations, operations etc. They have become more proactive in fighting against terrorism. It is no easy task for the FBI but 911 was a wakeup call for change in how America is protected. Former President George W. Bush and Congress felt it was necessary for an increase in the government by reorganizing new federal agencies and creating new ones. The number of FBI agents assigned to drug investigations, fraud and racketeering dropped as a result of 911. Below is a list of the FBI’s duties prior and post September 11th. It…

    • 538 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It is only with the effective coordination and cooperation between all levels of government and private sector companies that efforts to combat cyber-crime will succeed. The FBI recognizes and appreciates the interest and efforts of private sector companies in preventing cyber-crime as well as their willingness to work with law enforcement to address the…

    • 1718 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The development inside the technological and communications progression has matured from a lot of developments within central science and its growth is ongoing. Both positive and negative effects have occurred from the technology working in our criminal justice system. In this paper we will cover the different options for new technology that helps stop crime.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The criminal justice system is in a great need of information technology (IT) because the criminal justice system runs on information. There are too many information about criminal incidents, information about people who are serving their sentences or waiting for trial. There are also information about the court process including the past or upcoming trials. Those information would affects the way people are treated in the system and perhaps impacts the final outcome of any individual case.…

    • 318 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Every year, millions of viruses are released through the Internet. The FBI reports that there are a variety of cyber-threats, such as identify theft, Internet fraud and cyber-crimes related crimes like terrorism.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    How the FBI Investigates Computer Crime. (2004). Cert Coordination Center website. Retrieved November 12, 2005 from www.cert.org/tech_tips/FBI_investigates_crime.html…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    To efficiently compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets, we first have to look at exactly what information technology is available to police today. One popular technology that is used by police departments is COMPSTAT abbreviated for computer statistics. Compstat is a "strategic control system" designed for the collection and feedback of information on crime and related quality of life issues. The COMPSTAT process can be summarized in one simple statement: "Collect, analyze, and map crime data and other essential police performance…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    People have an idea of how law enforcement works but rarely ever think of how much technology affects it, and how much it keep them safe and keep their kids safe. The world changes every single day so consequently law enforcement has to keep up, for example 30 years ago there were no such things as cyber crimes but today there are all new laws and technology to prevent and protect against these crimes. Some innovations were much needed and sought after and others were spontaneous and groundbreaking. It is used in almost every aspect of the system from crime scene investigation to tactical operations and simple patrol. Looking at the past, present and future of criminal justice technology it’s incredible to see how far it has come. Technology…

    • 1795 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    “Policing in America today is at a crossroads as it looks towards the future, the old policing strategies are no longer suited to address the emerging threats and growth of electronic crimes arising from out of the growth and popularity of the Internet, these crimes include: online fraud, child pornography, embezzlement, economic espionage, privacy violations, computer intrusions, cyber--stalking or any other offences that occur in an electronic environment for the express purpose of economic gain or with the intend to destroy or inflict harm to another person or institution.” …

    • 2169 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The iris remains stable over time as long as there are no injuries and single enrolment scan can last a lifetime. Some might think that medical and surgical procedures would affect the overall shape and color of the iris, this is true, but the fine texture will remain the same over many decades. This technology is pattern dependent and sight does not affect the outcome of the scan, the technology can even be used on blind individuals (N.A. www.findbiometrics.com).…

    • 1153 Words
    • 5 Pages
    Good Essays
  • Good Essays

    I really enjoyed this week's class because it was more hands on. In a classroom setting, it is sometimes hard to picture the different scenarios being lectured. Being ‘on the scene’ in the parking lot helped me see a clearer picture. Going through the motions of low-risk stops helped me, grasp the full concept of the risk that police officers go through every day. I was clueless about the details to officers actions pertaining to different stops.…

    • 713 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Digital Crime

    • 611 Words
    • 2 Pages

    The FBI has four major focuses relating to digital crime; to capture criminals behind serious computer intrusions and the spread of malicious code, to stop online sexual predators that produce or share child pornography and meet and exploit children online, to stop operations targeting U.S. intellectual property, and to dismantle national and transnational organized crime groups engaging in Internet fraud. (Taylor and Fritsch, 2011) They have 93 taskforces that provide partnerships between federal, state and local law enforcement agencies. They also investigate internationally to protect the United States against terroristic and foreign intelligence attacks.…

    • 611 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Law enforcement agencies must stay tuned to the technological advances. Many police departments still do not have the adequate funding to implement computerization of certain departments, which would excel if modernized. The law enforcement departments that have evolved into modernization have a more efficient workforce. Police departments have implemented the Criminal Justice Records System. According to Wallace and Roberson, “Allow the police administrator to ascertain the nature and extent of crime within the agency’s jurisdiction. Provide a means for controlling…

    • 1199 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays