Publication #11

on

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

The criminal justice system is the one that enforces the law and what is considered a crime and the degree of the punishment, and it relates to cybercrime in the sense that a traditional crime has evolve thanks to cyber technology and adding new sophistication to crimes having to work hand by hand to prosecute cyber criminals. For example, a traditional crime of thief was going to physical assaulting people taking their money or belongings away. Now, a cybercriminal would either install hardware in an ATM and steal money from one or more people or hack into people’s computers and steal their money digitally. These cases are more complex because there is no physical harm and it is being done remotely, there is little evidence. This complexity brings us to a broader spectrum of cybersecurity, opening new jobs specially in the law enforcement like “Digital forensics,” where they investigate, gather, and analyze data to properly bring the criminals to justice and being prosecute. A clear example is the FBI, which cybercrime is used not just in one state but in the whole country and abroad and the FBI must employ digital forensics to reach this wide range of crimes happening remotely in conjunction of partnerships in other countries. Moreover, Cyber engineers also contribute to criminal justice and cybercrime in the programing of tools (software) to do surveillance, counter hacking and finally identify location where a cybercrime is happening. Finally, criminologist have been involved in cybercrime to study and research like the exploration of specific types of cybercrimes such as digital piracy, cyber bullying, child pornography, and identify thief to prevent it and reduce it from occurring. Their research points that technological changes created these new opportunities for criminal behavior and some theories as self-control theory, differential association/learning theory, neutralization theory and routines activities theory are used to explain cyber offending. 

Leave a Reply

Your email address will not be published. Required fields are marked *