Escolar Documentos
Profissional Documentos
Cultura Documentos
Challenges
Justin Chung
In the first case (Remsburg v. Docusearch, 2003), the victim, Amy Lynn Boyer
was murdered by Liam Youens. Liam Youens had been obsessed with Boyer for
two years and start to cyberstalk her by establishing a website called Amy Boyer
prior to the murder (Pittaro, 2007). Youens stated in the website that how his
sincere love toward Boyer was subject to rejection by Boyer (Pittaro, 2007).
According to the judgement, Youens contacted Docusearch, an online agent for
obtaining others personal information anonymously, to gather Boyers
employment information. After Docusearch successfully obtained Boyers
workplace address, Youens killed Boyer by shooting her with a handgun. The
second case is about the offender threatened a 28-year-old woman by
repeatedly posting her personal information in different online chat rooms and
bulletin boards anonymously (Rene, 1999). Also, the message signified that she
wish to be raped. Subsequently, there were men who came across to her
apartment saying they wanted to rape her. The third case is about the
defendant harassed a co-worker continuously by utilizing anonymous remailer
(Rene, 1999).
According to these three cases, it can be observed that the constant technical
development provides anonymous identities for the offenders to evade the
investigation and prosecution, and transcend the law enforcement (Petrocelli,
2005). As there are various communication ways in cyberspace, such as chat
room and bulletin board, the cybercriminals can simply post personal
information and humiliating hearsay about the victim without their users
identification (Petrocelli, 2005). Besides, the brokerage websites which provide
assistance for searching personal information are subject to abuse by culprits
(Pittaro, 2007). In additions, proxy server is another common anonymizing
method to conceal online activity (Spence-Diehl, 2003). Offenders can
manipulate their identities by establishing a proxy server when connecting to
network. Therefore, it is challenging that the internet not only facilitates the
communication of individuals, but also fosters the perpetrators to commit
cybercrime in different methods. With the aforesaid advantages, the
perpetrators can easily evade from being arrested and convicted (Bowker &
Gray, 2004).
Encryption
Secondly, encryption can place investigators in vulnerable position when they
analyze evidence during investigation (Ashford, 2015). In the course of
searching evidence at crime scenes, it is difficult to locate flash storage devices
Coordinator for the Shanghai Cooperation Organization stated that the result
of Convention on Cybercrime is unavailing because it violates the Russian
Constitution by empowering foreign investigators to obtain data from Russian
border without Russian official permission (Kizekova, 2012). Moreover, even if
all international legal systems were harmonized, the slow process of enacting
legislation could not keep pace with the rapid developing technologies (Brown,
2015). Therefore, transnational cybercrime remains a cosmopolitan challenge all
over the world.
Conclusion
In conclusion, three critical challenges have been analyzed in this paper. In
terms of difficulties in identification, offenders usually evade investigation and
detection by utilizing different anonymizing methods to conceal their network
identities, such as anonymous remailer, proxy server and posting comment on
bulletin board. Also, the infinite data which flows in network traffic challenge
law enforcement agencies during investigation. For the matter of encryption, it
duplicates the difficulties when investigators collect evidence which has been
encrypted by sophisticated criminals. Other than encryption by cybercriminals,
international smartphone manufacturers like Apple and Google which
deliberately enhance their products security by encryption. On the one hand
this tendency tightens their security, and on the other hand it places law
enforcement agencies at an inferior position during investigation. Also the legal
punishment for contempt of court may less than the cybercrime in which
criminals commit, they may not be willing to divulge the decrypted data. In
terms of transnational cybercrime, the jurisdiction of domestic law subject to
its own territory is challenging. When legal enforcement agencies identify and
extradite foreign cybercriminal, and intercepting trans-border network, it
involves complicated legal procedure and huge effort to deal with those matters.
Moreover, due to the impossibility of harmonizing the international legal
frameworks, and the slow process of legislative development, transnational
cybercrime is still an arduous problem. Therefore, the topic of cybercrime is
definitely challenging.
Reference
Apple (2015). iOS security: iOS 8.3 or later, iOS security guide white paper.
Available online:
https://www.apple.com/business/docs/iOS_Security_Guide.pdf [Accessed
27/9/2015]
Ashford, W. (2015) Law enforcement officers weigh in on encryption at
Infosecurity Europe, Available online:
http://www.computerweekly.com/news/4500247458/Law-enforcement-of
ficers-weigh -in-on-encryption-at-Infosecurity-Europe [Accessed
22/9/2015]
Baer, M. (2010) CS and the internet landscape we have constructed. Virginia
Journal of Law & Technology, 15, 153-172. Bocij, P. (2005) Reactive stalking:
A new perspective on victimization. The British Journal of Forensic
Practice, 7(1), 23-45.
Bowker, A., & Gray, M. (2004). An introduction to the supervision of the
cybersex offender. Federal Probation, 68(3), 3-9.
Brenner, W. (2012) Cybercrime and the law: challenge, issues and outcomes.
Boston: University Press of New England Brown,
C.S.D. (2015) Investigating and prosecuting cybercrime: Forensic dependencies
and barriers to justice, International journal of cyber criminology, 9(1).
Available online:
http://www.cybercrimejournal.com/Brown2015vol9issue1.pdf [Accessed
25/9/2015]
Brunker, M. (2002) FBI agent charged with hacking. The NCBNews, 15 August
[Online]. Available at:
http://www.nbcnews.com/id/3078784/#.VhGcSdwdBuA [Accessed
30/9/2015]
Comey, J. B. (2014) Going Dark: Are Technology, Privacy, and Public Safety on a
Collision Course? Director Federal Bureau of Investigation. Available
online:
https://www.fbi.gov/news/speeches/going-dark-are-technology-privacy-a
nd-public-saf ety-on-a-collision-course [Accessed 30/9/2015]
Council of Europe Treaty Office (2015) Convention on Cybercrime, certs no.: 185.
Available online:
http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?CL=ENG&C
M=&NT=18 5&DF=&VL [Accessed 30/9/2015]
Cyber Crime Act (2001) Dell SecureWorks (2015). Stegoloader: A stealthy