Sunteți pe pagina 1din 5

1

Running head: Cybercrime Unit

Cybercrime Unit

Student Raymond Garcia

University of San Diego: Professional & Continuing Education

Critical Issues in Law Enforcement & Public Safety LEPS-530-01-SP16

Professor Michael Begovich

February 15, 2016


2

Running head: Cybercrimes Unit

Recently our organization has purchased drones for investigations into cyber criminal

activity. The acquisition of these drones will not only enhance the investigative abilities

of this organizations investigative bureau, but it may propel our capabilities to uncover,

deter and prevent acts of terrorism aimed specifically at our nation. As times change,

and technology becomes more accessible to the world, criminals have learned to exploit

technology for the benefit and furtherance of criminal organizations. These organizations

represent ideology whos purpose is to disrupt the lives of the American people through

acts of terrorism, intimidation and propaganda. With the development of a cybercrimes

unit, cybercriminals can now be tracked and their acts of violence and intimidation can

now be deterred or prevented. The development of a cybercrimes unit may in fact be able

to uncover planned operations that may be deemed as being the Next big thing!

By developing a cybercrimes unit, our organizations investigators will have the ability

to collect intelligence, monitor on going potential problems relating to terrorism and stop

acts of calculated extremist violence. Cybercriminals have for the past several years, utilized

technology sources such as the internet to conduct preplanning for operations dealing

with terrorism. By using this method of technology, cybercriminals are able to discuss

plans with other militants, who conspire to cause harm to our nations citizens, disrupt

infrastructure and cause panic and disorder in the daily lives of American citizens. With

the development of a cybercrimes unit, these acts our investigators can concentrate on

countering cyber criminals by combating computer and network intrusions, track identity

theft, participate in cyber investigative joint task forces, identify cyber scams, and

defend the nations infrastructure.


3

Like any other organization cyber criminals require money for support and funding.

Cybercriminals exploit modern technology such as the internet, media social sites and other

similar sources to gather information, conduct fundraising, conduct data mining, and utilize

reconnaissance and surveillance on key or potential targets. Cybercriminals also use these

options to exchange and communicate ideas, tradecraft, manuals, and propaganda.

Cybercriminals over the years have realized that the use of the internet is not only efficient

but is also risky. Cybercriminals have realized that there activities can be tracked by law

enforcement and has forced some activity to go underground. In order to uncover this

underground activity that is not planned or discussed on modern technology, investigators

must exploit all avenues and leads provided by cybercriminals who depend on this

technology for profit and support. An example of this underground development of

networking avoiding the use of modern technology, would be the courier system used

by Osama Bin Laden. It was the tracing of technology leads which eventually lead to

the courier and the discovery of Osama Bin Ladens location and demise.

With the implementation of a cybercrimes unit, law enforcement would be able to identify

cybercriminals and establish a common link to known associates and sympathizers based

off of cyber communication. Through the identification of this type of information, law

enforcement, would be able to collect and compare information on the capabilities and

sophistication of that organization, with other law enforcement agencies. By understanding

the capabilities of the cybercriminals organization, law enforcement can keep gathering an

immense collection of intelligence, through a legal, ethical and moral standard of publically

posted information. The information provided is not only legal preserving the 4th Amendment

Rights of search and seizure provisions but also gives instances of probable cause to
4

utilize search and seizure applications of persons, places or things, relevant to terrorism.

The violation of 4th Amendment Rights in the interest of public safety such as the National

Security Agency scandal has prompted controversial backlash in methods of obtaining

cyber intelligence.

In conclusion, technology can be used by cybercriminals to create turmoil within our

nation, however this technology can also be used against them to dismantle their

organization. Credible information gathered by intelligence communities, have

helped to stop planned terror attacks which could have lead to the death of countless

innocent people. Examples of these types of incidents have taken place on European soil,

where sleeper terror cells have been uncovered and dismantled. The preventive measures

by these cybercrime units not only have saved the lives of countless people, but has also

dealt these terror organizations, financial and logistical setbacks. The intelligence gathered

at these incidents may have in fact provided leads to other possible sleeper cells, operations

and training, or additional future targets. With your support and authorization, the

implementation of a cybercrimes unit will help prevent these incidents from occurring.
5

References

Use of the Internet for Counter-Terrorist Purposes: Liat Shetret (2011). POLICY BRIEF: Use of the
Internet for Counter-Terrorist Purposes. Center on Global Counterterrorism Cooperation.

Countering Use of the Internet for Terrorist Purposes Statement of Frank J. Cilluffo (May 24, 2013).
Homeland Security Policy Institute; George Washington University. Countering Use of the Internet for
Terrorist. Before the United Nations Security Council Counter Terrorism Committee May 24, 2013

S-ar putea să vă placă și