{"id":212,"date":"2026-05-03T15:50:34","date_gmt":"2026-05-03T15:50:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mv05\/?p=212"},"modified":"2026-05-03T15:50:34","modified_gmt":"2026-05-03T15:50:34","slug":"the-evolution-of-crime-makes-the-traditional-law-enforcement-methods-less-effective-unlike-these-physical-crimes-cybercrimes-can-hide-behind-encrypted-networks-or-different-identities-cybercrimes-c","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mv05\/2026\/05\/03\/the-evolution-of-crime-makes-the-traditional-law-enforcement-methods-less-effective-unlike-these-physical-crimes-cybercrimes-can-hide-behind-encrypted-networks-or-different-identities-cybercrimes-c\/","title":{"rendered":"The evolution of crime makes the traditional law enforcement methods less effective. Unlike these physical crimes, cybercrimes can hide behind encrypted networks or different identities. Cybercrimes can also be committed from a distance, whereas physical crimes can&#8217;t. Jurisdiction confuses me, since these crimes could be happening from almost anywhere, and following through with the enforcement could be difficult. Police are used to work withing specefic boundaries, these offenders could be in a different country with victims all over the states. A good example of physical versus cybercrime is fraud. Physical cases involve paperwork and face-to-face interactions, so we have records of all of it. Online fraud could be through phishing and fake websites, without a record or any face-to-face interactions, making this trail so much harder to follow.  The academic gap exists since technology keeps changing, and the research cannot keep up. By the time studies are done and published, there are new cybercrimes already. The criminal justice researchers working on these studies may also not have a strong technical background, this making these studies more difficult.  A course like Cyber and Surveillance Law and Governance helps bridge the gap by combining law, sociology, and technology. This requires an understanding of both how surveillance tools work and how they need to be regulated.  The best solution is definitely a mix of both having specialized cyber units while also having officers being trained on how to understand basic digital evidence. Since most crimes recently and in the future are going to involve some kind of technology."},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":32014,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/posts\/212"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/users\/32014"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/comments?post=212"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/posts\/212\/revisions"}],"predecessor-version":[{"id":216,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/posts\/212\/revisions\/216"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/media?parent=212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/categories?post=212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/tags?post=212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}