In the present time, the cybercrime is greatly rising in the world of technology. The criminals of the World Wide Web use internet users’ private data for the personal achievement. These criminals jump deep in the dark web to purchase and trade the unlawful service and goods. These criminals still get access to classify the data related to the government. The expression cybercrime means any kind of criminal action made through, and making use the Information and Communications Technology (ICT) device (Cross, 2015). The cybercrime is described as the crime where the computer is the purpose of the crime like phishing, hacking, doing spam. It is used as the device to conduct the crime such as hate crime and child pornography. The cybercriminals can use the technologies related to the computer to access private data, business commercial secret or use the net for unfair or hateful objectives. The criminals may also use the computer to establish the communication or documents or data storage. The criminal who executes these unlawful actions is often considered to as hacker. The cybercrime can also be considered to as crime related to computer (McElreath, et. al, 2018).
The purpose of the criminal actions may be to make sexual crimes like seeing and sharing the offensive images, controlling or allocating the computer systems, or to accept cash, goods, sources or data without permission. The net is used by the gang to deal the extensive variety of goods online like drugs, firearms, and offensive images of children. In the following parts, the manner of respond of police authorities to both cyber-enabled and cyber-dependent cybercrimes and way to improve responses is discussed and critically examined.
The cybercrime is the umbrella expression used to define two closely related, but different range of criminal action (DiMase, et. al, 2015). Cyber-crimes fall into two categories. These are cyber-dependent crimes and cyber-enabled crimes.
The online crimes have enhanced in brutality and the occurrence over the last two decades. Though, even if various scientific regulations have generally engaged criminological the approaches, strategies or the theories to describe the experience, incident, ordinary criminology has dedicated comparatively slight concentration to the examination of the cyber-criminals and the sufferers of the cyber criminals. The drawing on this assumption that more criminological attention must be provided to the significant category of the crime. This report states the interdisciplinary reviews of the present state of the study on cyber-dependent crime. The cyber-dependent crimes are crimes, which may be conducted only by the Information and Communications Technology devices, whereas tools are device for conducting crimes, and target of the crimes such as establishing and propagating malware for the economic benefits, hacking to steal, damages, misrepresent, and end the information and networks or activities. This is the extensively identified issue, effort to measure cyber-dependent crime have resulted in noticeably different numbers, focusing the trouble of trying to develop the scales, outlay and the influence of the attack.
The cyber-crime is conducted for various different causes by the people, group, and independent states. For examples, greatly skilled people or highly skilled groups who can circulate software to attack the network and system, either to do misconduct or influence others to do so, controlled criminal gangs, and cyber-terrorist who aim to cause extreme interruption and impacts. It also includes gangs or people with high skills, gangs and persons with low skills but the capacity to use cyber devices established by others, states sponsored groups throwing cyber-attack with purpose of collecting data or conceding government of United Kingdom, protection, financial asset, and business asset, and the workers with advantaged access to the network and computer (Brown, 2015).
The cyber-enabled crime is the traditional crime that may be enhanced in scale and reach by the computer users, computer network, or other forms of ICT like cyber-enabled frauds. This is crime that does not depend on computer and network but have been transformed in scale by use of net and communication technologies. They came in following categories like cybercrime connected to finance such as Intellectual property crime (piracy, copy content, and falsification), online market for prohibited item, invasive communication (communications sent by the social media and cyber trolling), crimes which particularly aim people involving cyber-enabled violence against girl and female (like disclose the private sexual pictures without agreement (cyber annoyance, harassment, coercion). It also includes child sexual crimes, inappropriate pictures of children, and risky pornography, offensive publication and illegal pictures.
The enhancing dependence on the technologies related to the computers is being oppressed by the offenders or wrongdoers or the criminals who use technologies to carry the usual or the habitual crimes like the fraud, drug acquisition and the child abuse. The most noted and highlighted points of these crimes are deception and robbery, pursued by the online nuisance and the online sexual offending that is the primary fear with the offenders potentially being embattled by the perpetrators universally. The results from newest confidence survey of Durham Constabulary state that the cybercrime had score uppermost out of all the offences the common public are ‘in the threat’ of (Ige, 2018).
It is recognised by the office for National Statistics that there were one thousand seven hundred fraud crimes referred to the National Fraud Intelligence Bureau by the activity frauds for the Durham Constabulary field in the end of the year 2016 that is the nine per cent reduction from the similar time ending year 2015. These are new and practical figures and used only as the direction. In region the Durham and Darlington this associates to the rate of three offences per one thousand population that is the similar as the local average and improved than the national average of the four offences per one thousand people. The level of fraud is very complicated to evaluate or review because this is the illusory offence. The oppression is repeatedly again arbitrary, covering the groups or companies as well as the persons. Certain sufferers of fraud can be ignorant that they have been the injured party of the crime or, for some time after the occasion that some deceitful activities have happened. Other people may be not willing to see themselves as the sufferers or hesitant to report the crime to the relevant system or the authority, sensing uncomfortable that they have fallen injured party. The level of fraud reported by means of the managerial means is thought to significantly minimize the actual level of these crimes.
Further, other modern expression of cyber-dependent crime is effort of ‘hacktivist,’ someone who complaints against the acts and approaches of the company. Perhaps the great apprehension to the police, however, is the capacity of criminals in all over the world to use the net for purpose of surveillance and violence. The borderless scope of the net, and hereafter cybercrime, refers that the government may be directed from any place in the world, making law implementation not only provoking, but in certain examples, practically not possible. Furthermore, in the present time the criminals may involve in surveillance without the requirement for higher practical skills. As discussed above, the internet can support, with ‘do yourself’ malware kit, for an instance, accessible in online forum.
The cyber crime is the severe criminal offence as per the Computer Misuse Act. The National Crime Agency makes the new guidance to stop the cyber-enabled crimes and the cyber-dependent crimes. The new guidance would contain the reporting, involving the part of action frauds, early reaction to online mistreatment and nuisance in addition to other cyber-enabled crimes, conserving the proof and digital forensics, professional or the expert abilities and administration of the difficult investigation such as the international link or important connection. This would connect in with other fields of the police public security work so that the online features of this type of crimes, for example, online preparing in child sexual abusing matters are connected in with present or latest guidance. The police and National Crime Agency take cyber crime very critically. The police and National Crime Agency would make each effort to take into custody and put the criminals on the trial. There is possibility that the young people being include with cyber crime may face the visit and warning from the police or by the officers of National Crime Agency, computer being detained and being prevented from the internet access. These young people may be arrested or can be held liable to pay fine or the penalty. For some serious offences, crimes, or wrongdoings, they can put up to life in prison. The permanent criminal records can influence the learning and future career forecast, in addition to possible future out of the country travel.
The point to be considered by police is that what they can do to control the cyber-crimes. The investigation by the government agencies may be the proper crime warning at certain levels (Subramaniam and Ravi, 2016). To that extent the private police and public police are essential or compulsory but not so enough. In short terms, the criminal justice responses are generally the matter of ‘so tiny, so late’, supposing that police officers may discover the conduct or performance at all. This is hardly matter that they may prevent it onward of time (Knake and Segal, 2016).
To handle cyber dependent cyber-crime and cyber-enabled cyber-crime, United Kingdom law enforcement effort in the partnership which involves the National Cyber Crime Unit and the Metropolitan Police Policies and Practices: the collaboration authoritative, was particularly related for two motives (Nye, 2017). The cybercrime is the matter that cries out for vital prophylactic measure in all over the world. Certainly, the cybercrime is one of the most demanding issues for policing in the present time and in the upcoming period, as improved technologies become more extremely implanted in the daily routine. The foreign association is thus important in the competition against the cyber wrongdoing. Additionally, the session drew on and carried together the knowledge or experiences of the people from the Asian countries, covering beyond the boundaries of the worldwide north to the worldwide south (Awan, et. al, 2017).
In addition, the strategies of police officers are to focus on responding to cyber-attack aimed at criminals of United Kingdom, advancing the reporting of cyber-crime, helping criminals and enhancing take-up of protecting protection. Other strategies are-
United Kingdom based cyber criminal; creating the United Kingdom a high-risk nation for criminal to host and commit the cybercrime;
Global cyber criminals and group: recognising, accusing, and disturbing the most important cyber criminals at the international level;
Making able global cyber-crime market: debasing criminal market, declining profitability of cyber-criminal business models and rising barriers to entry and working for cyber criminal (Klimburg and Zylberberg, 2015).
Moreover, in the long term the great responses to cybercrime are in the learning or training of the people who are most susceptible and the disposition of crime deterrence devices more usually (Nye, 2014). There has been certain success with victims of frauds and deception, particularly the persons who have transferred money overseas in hope of winning the heart or demanding the prize (Skopik, Settanni, and Fiedler, 2016). It is essential that the well-built encryption passwords as well as the practical personal networks should be available. The VPN would encrypt all the traffic leaving the tools until this reaches at the end. If cybercriminals do handle to hack the line to establish the communication, they would not cut off anything but encrypted data. This is the very good concept to use the VPN at whatever time the person a public Wi-Fi network, whether it is in the libraries, hotels, railway station, cafes and the airport (Broadhurst, et. al, 2014)
Therefore, the police officers should perform quickly to decide the accurate response to the crimes that can involve scanning networks for concealed tools or collecting digital proof to support the warrant and trial (Smith, 2018). It is required to respond in the dynamic situations with more and more differences of crimes and difficulties. The police are required to accept co-production or co-creation model of actions, not teamwork. The police should work for establishing the new system and new norms for making the necessary changes in the crime as they occur and transferring the data regarding it just as rapidly. The responses can be improved by work towards establishing the big data logical abilities for strategies and policies (Wall, 2015). For an example, to build the skills of police officers to face new cyber security threat, Firebrand has made the committed cyber suites, made in line with Hydra; the training atmosphere used by the police officer to teach real-time decisions taking. Other example is that the cyber-skilled police are working across the United Kingdom and the training has had the direct influence on the crime they are tasked with replying to authorities (Onyeji, Bazilian and Bronk, 2014).
As per the above analysis, it can be concluded that the cybercrime is the fast-growing field of the crime with more and more offenders or wrongdoers exploiting the swiftness, expediency and secrecy of the internet to do the diverse range of criminal actions that know no border, either substantial border or practical border, cause severe destruction and pose very actual fears to the victims. The crimes related to computer and the digital investigation comprises the significant part of the criminal polices, laws and the practices as data or information becomes the foundation stone of the worldwide market or the financial system. The original and creative manners of offensive, exploit and snooping with the computers and techniques related to computers are frequently rising, posing growing fears to the societies, wealth and the protection (Brown and Cheng, 2018).
It is necessary that in handling the cybercrime the right legal structure of the crimes is at right place and that there is transparency in how the power which is used to examine the cybercrime interacts with the crimes created to grab the cyber criminals. In United Kingdom, the existing legal structure to cyber dependent crimes, involving the new amendments, and makes focus on the areas that stay difficult and in the requirement of the concentration from the policymakers. It is now the daily requirement for most of the subjects to include the skills of the cyber officers or groups. The cyber officers will possibly be involved in unbalanced data collection, wireless charting, and the router examination. As cyber-attacks enhance in all over the world, this kind of cyber training programme is crucial for all officers involved in cybercrime at any level. It can enhance liability to police management and the rules of the company.
References
Awan, J.H., Memon, S., Khan, R.A., Noonari, A.Q., Hussain, Z., and Usman, M. (2017) Security strategies to overcome cyber measures, factors and barriers. Eng. Sci. Technol. Int. Res. J, 1(1), pp. 51-58.
Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., and Chon, S. (2014) An analysis of the nature of groups engaged in cyber crime. Oxford: Oxford University press
Brown, C.S. (2015) Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology, 9(1), p. 55.
Brown, K.E., and Cheng, D.J. (2018) A Collaborative Government-University-Industry Model for a STEM Career-Education Pathway: Phase III: The R&D of Forensic Analytics and Biometrics. Journal of Student Research, 34(9), pp. 12-20.
Cross, C. (2015) How to tackle cybercrime before people even know they’re a victim. The Conversation, 52 (19), pp. 23-34.
DiMase, D., Collier, Z.A., Heffner, K., and Linkov, I. (2015) Systems engineering framework for cyber physical security and resilience. Environment Systems and Decisions, 35(2), pp.291-300.
Ige, O. A. (2018) Effects of Gender and Technological Fluency on Learners’ Attitude to Cyber Crime Prevention in Urban Learning Ecologies: Lessons for Swedish Gymnasiums. International Journal of Cyber Criminology, 50(8), pp. 65-80
Klimburg, A., and Zylberberg, H. (2015) Cyber Security Capacity Building: Developing Access. Oxford: Oxford University Press.
Knake, R., and Segal, A. (2016) How the next US president can contain china in cyberspace. J Int Aff, 70(1), pp. 21-28.
McElreath, D.H., Doss, D.A., McElreath, L., Lindsley, A., Lusk, G., Skinner, J., and Wellman, A. (2018) The communicating and marketing of radicalism: A case study of ISIS and cyber recruitment. International Journal of Cyber Warfare and Terrorism (IJCWT), 8(3), pp. 26-45.
Ning, H., Li, Q., Wei, D., Liu, H., and Zhu, T. (2017) Cyberlogic paves the way from cyber philosophy to cyber science. IEEE Internet of Things Journal, 4(3), pp.783-790.
Nye Jr, J.S. (2017) Deterrence and dissuasion in cyberspace. International Security, 41(3), pp.44-71.
Nye, J.S. (2014) The regime complex for managing global cyber activities. Cambridge: Cambridge University Press
Onyeji, I., Bazilian, M., and Bronk, C. (2014) Cyber security and critical energy infrastructure. The Electricity Journal, 27(2), pp. 52-60.
Skopik, F., Settanni, G., and Fiedler, R. (2016) A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60, pp.154-176.
Smith, R. (2018) Crime in the digital age: Controlling telecommunications and cyberspace illegalities. New York: Routledge.
Subramaniam, V.S.R., and Ravi, R. (2016) Cyber Crime Control Techno-Legal Network. USA: Springer
Wall, D.S. (2015) The Internet as a conduit for criminal activity. New York: Routledge.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download