U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Redefining Borders: The Challenges of Cybercrime

NCJ Number
191680
Journal
Crime, Law, and Social Change Volume: 34 Issue: 3 Dated: October 2000 Pages: 259-273
Author(s)
David L. Speer
Editor(s)
Alan Block
Date Published
2000
Length
15 pages
Annotation
The article deals with cybercrime; how it is classified and how it fits in with other types of crime; the effects it has on domestic and international security; and methods to control and protect against this type of crime at home and abroad.
Abstract
Cybercrime is the newest security threat and differs from other types of crime. The offender is usually not present at the crime scene and may even reside in a different country. There can be a large number and variety of victims, even though government and its agencies are usually prime targets. This crime is a threat both domestically and internationally, but the motives and intentions of the perpetrator are not always clearly defined. There is much debate over the magnitude of the problem and disagreements about possible solutions. The author believes that the threat of cybercrime can be combated successfully but that action by governments, here and abroad, is crucial. The author recommends a number of steps to improve security both domestically and internationally. First, there must be increased funding for cybercrime programs in security agencies and local law enforcement. Second, the public should be educated and made aware of what is legal and what is illegal use of computers. Multilateral international security agreements also need to be developed with other countries and their law enforcement agencies. The author suggests that a new, specialized international organization to deal with cybercrime may be necessary, but that governments and corporations have yet to address the issue seriously and probably will not do so until a major attack occurs. References