Local Response To Computer Crimes

Local Response to Computer Crimes

Describe at least two reasons why local law enforcement and municipalities face challenges when investigating computer crimes. Identify at least one key component that local law enforcement agencies should have to improve their investigative response.

Historically, computer crime investigations have been spearheaded by federal agencies. The federal agencies identified in the text, such as the FBI and DOJ seem to have successfully gathered both public and political attention concerning the need for resources aimed at addressing the computer crime problem. However, law enforcement personnel at the local level continue to encounter issues that have hindered efforts to combat computer crimes effectively within their own jurisdictions.

With computer crimes on the increase in combination with people reporting them more frequently to local law enforcement a challenge for local agencies is that local officers may not have the capacity or understanding of computer crimes necessary to properly investigate these offenses. Secondly, despite the ever-increasing caseload of computer crimes, there appears to be a lack of recognition and support from upper-level management within local police agencies in terms of providing the resources necessary to counter these threats. The majority of these cases receive a low priority at the local level.

Officers involved in combating computer crime at the local and state level must be supplied with an increase in resources and technology in order to fight computer crime more effectively. These areas can be broadly grouped into four “critical needs”: (1) training, (2) equipment, (3) updated criminal codes designed to complement current enforcement efforts, and (4) resources for tapping federal expertise and equipment related to computer crime enforcement. I think the most important category is training. Even if the agency does not have the funding to fully investigate computer crimes, they will have the training and knowledge to pass it on to an agency that can assist them without damaging evidence.

References:

Taylor, Robert W., Fritsch, E. J., Liederbach, J. R., Holt, A. J. (2011) Digital Crime, Digital Terrorism for Ashford University, 2nd Edition. [VitalSource Bookshelf Online]. Retrieved from https://bookshelf.vitalsource.com/#/books/9780558968830/

Place an Order

Plagiarism Free!

Scroll to Top