Documente Academic
Documente Profesional
Documente Cultură
Cybercrime Unit
Recently our organization has purchased drones for investigations into cyber criminal
activity. The acquisition of these drones will not only enhance the investigative abilities
of this organizations investigative bureau, but it may propel our capabilities to uncover,
deter and prevent acts of terrorism aimed specifically at our nation. As times change,
and technology becomes more accessible to the world, criminals have learned to exploit
technology for the benefit and furtherance of criminal organizations. These organizations
represent ideology whos purpose is to disrupt the lives of the American people through
unit, cybercriminals can now be tracked and their acts of violence and intimidation can
now be deterred or prevented. The development of a cybercrimes unit may in fact be able
to uncover planned operations that may be deemed as being the Next big thing!
By developing a cybercrimes unit, our organizations investigators will have the ability
to collect intelligence, monitor on going potential problems relating to terrorism and stop
acts of calculated extremist violence. Cybercriminals have for the past several years, utilized
technology sources such as the internet to conduct preplanning for operations dealing
with terrorism. By using this method of technology, cybercriminals are able to discuss
plans with other militants, who conspire to cause harm to our nations citizens, disrupt
infrastructure and cause panic and disorder in the daily lives of American citizens. With
the development of a cybercrimes unit, these acts our investigators can concentrate on
countering cyber criminals by combating computer and network intrusions, track identity
theft, participate in cyber investigative joint task forces, identify cyber scams, and
Like any other organization cyber criminals require money for support and funding.
Cybercriminals exploit modern technology such as the internet, media social sites and other
similar sources to gather information, conduct fundraising, conduct data mining, and utilize
reconnaissance and surveillance on key or potential targets. Cybercriminals also use these
Cybercriminals over the years have realized that the use of the internet is not only efficient
but is also risky. Cybercriminals have realized that there activities can be tracked by law
enforcement and has forced some activity to go underground. In order to uncover this
must exploit all avenues and leads provided by cybercriminals who depend on this
networking avoiding the use of modern technology, would be the courier system used
by Osama Bin Laden. It was the tracing of technology leads which eventually lead to
the courier and the discovery of Osama Bin Ladens location and demise.
With the implementation of a cybercrimes unit, law enforcement would be able to identify
cybercriminals and establish a common link to known associates and sympathizers based
off of cyber communication. Through the identification of this type of information, law
enforcement, would be able to collect and compare information on the capabilities and
the capabilities of the cybercriminals organization, law enforcement can keep gathering an
immense collection of intelligence, through a legal, ethical and moral standard of publically
posted information. The information provided is not only legal preserving the 4th Amendment
Rights of search and seizure provisions but also gives instances of probable cause to
4
utilize search and seizure applications of persons, places or things, relevant to terrorism.
The violation of 4th Amendment Rights in the interest of public safety such as the National
cyber intelligence.
nation, however this technology can also be used against them to dismantle their
helped to stop planned terror attacks which could have lead to the death of countless
innocent people. Examples of these types of incidents have taken place on European soil,
where sleeper terror cells have been uncovered and dismantled. The preventive measures
by these cybercrime units not only have saved the lives of countless people, but has also
dealt these terror organizations, financial and logistical setbacks. The intelligence gathered
at these incidents may have in fact provided leads to other possible sleeper cells, operations
and training, or additional future targets. With your support and authorization, the
implementation of a cybercrimes unit will help prevent these incidents from occurring.
5
References
Use of the Internet for Counter-Terrorist Purposes: Liat Shetret (2011). POLICY BRIEF: Use of the
Internet for Counter-Terrorist Purposes. Center on Global Counterterrorism Cooperation.
Countering Use of the Internet for Terrorist Purposes Statement of Frank J. Cilluffo (May 24, 2013).
Homeland Security Policy Institute; George Washington University. Countering Use of the Internet for
Terrorist. Before the United Nations Security Council Counter Terrorism Committee May 24, 2013