{"id":2308,"date":"2013-02-04T13:28:07","date_gmt":"2013-02-04T18:28:07","guid":{"rendered":"http:\/\/www.carnaghan.com\/?p=2308"},"modified":"2019-07-22T17:05:50","modified_gmt":"2019-07-22T22:05:50","slug":"challenges-policy-makers-face-to-counter-cybercrime","status":"publish","type":"post","link":"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/","title":{"rendered":"Challenges Policy Makers face to Counter Cybercrime"},"content":{"rendered":"

Pfleeger (2005) reminds us that modern cyber-criminals can often be individuals that are difficult to detect.  They \u201cwear business suits, have university degrees, and appear to be pillars of their communities.\u201d  In addition to this, because of the wide spread accessibility to the internet and communications, it makes it easier for these criminals to operate in groups spread across the globe.  The international issue is a major cause for concern because there is no single authoritative group that has the power to prosecute individuals committing these crimes within various countries.  In his article titled \u201cRedefining Borders: The Challenges of Cybercrime\u201d (Speer, 2000) discusses some of these challenges and how the legal system is slowly adapting to provide various solutions.  Multi-lateral agreements and the Mutual Legal Assistance Treaty (MLAT) are tools which can enable countries to assist each other and process extradition; however this is often a long and costly process which yields disappointing results in apprehending the offender.<\/p>\n

In their article on Cyber Crimes, (Sinrod & Reilly, 2000), claim that \u201claw enforcement officials have been frustrated by the inability of legislators to keep cyber-crime legislation ahead of the fast-moving technological curve.\u201d  They go on to inform us that competing interests of individual rights such as free speech and privacy need to be looked at when protecting the integrity of public and private networks.  This leads us to consider how much of an intervention will be needed by laws and regulations set forth by the United States government in order to tackle these problems.  While laws have changed significantly since Sinrod & Reilly\u2019s article, the challenges outlined here have hampered the current legislation which is not able to deal with many cybercrime concerns adequately.<\/p>\n

Public demand is increasing for more comprehensive cybercrime laws.  Many people have been the victim of such crimes and awareness has been raised as to their severity.  Conkrite et al (2011) affirm that the \u201cindustry knows best\u201d approach for cyber-security has been inefficient.  The Public\u2019s level demand for cyber-security is higher than most firms\u2019 individual demand\u2019.  In the last year, congress has failed to enact major cyber security legislation; however South Carolina Governor Nikki Haley is devoted to improving current legislation.  In South Carolina last year a stolen state employee password allowed a hacker to breach the South Carolina tax system gaining information on nearly 4 million individual and 800,000 business tax filers.  Chabrow (2013).  Haley is up for reelection next year and due to public demand, she \u201ccan\u2019t afford not to keep address cybersecurity head-on.\u201d  Public demand will continue to affect policy to help improve the current laws, which have improved in many ways; however there is still a lot of work to be done in order to effectively provide individual protections needed in US legislation.<\/p>\n

References:<\/p>\n

    \n
  1. Pfleeger, P., & Fleeger, S., L. (2007). Security in Computing Fourth Edition. Upper Saddle River: NJ. Prentice Hall.<\/li>\n
  2. Chabrow, E. (2013).  Politician Feels People\u2019s Pain over Breach.  Bank Info Security.  Retrieved from: http:\/\/www.bankinfosecurity.com\/blogs\/politician-feels-peoples-pain-on-breach-p-1407\/op-1<\/a><\/li>\n
  3. Cronkrite, M., Szydlik, J., Park, J. (2011).  The Strategies for Critical Cyber Infrastructure (CCI) Protection by Enhancing Software Assurance.  The Proceedings of the 5th<\/sup> International Conference on Information Warfare and Security pp66-75.<\/i>  Retrieved from http:\/\/books.google.com\/books?hl=en&lr=&id=Eobsx_gvPywC&oi=fnd&pg=PA68&dq=The+Strategies+for+Critical+Cyber+Infrastructure+(CCI)+Protection+by+Enhancing+Software+Assurance<\/a><\/li>\n
  4. Sinrod, E., J., & Reilly, W., P. (2000). Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws, 16 SANTA CLARA COMPUTER & HIGH TECH. L.J. 177, 194<\/li>\n
  5. Speer, D. (2000). Redefining Borders: The Challenges of Cybercrime.  The challenges of cybercrime. Crime, Law and Social Change, 34(3), 259-273.  Retrieved from ABI\/INFORM Global. (Document ID: 403872181).<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"

    Pfleeger (2005) reminds us that modern cyber-criminals can often be individuals that are difficult to detect.  They \u201cwear business suits, have university degrees, and appear to be pillars of their communities.\u201d  In addition to this, because of the wide spread accessibility to the internet and communications, it makes it easier for these criminals to operate […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[356],"tags":[4235],"post_series":[409],"class_list":["post-2308","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-csec-620","post_series-human-aspects-in-cybersecurity"],"yoast_head":"\nChallenges Policy Makers face to Counter Cybercrime - Ian Carnaghan<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Challenges Policy Makers face to Counter Cybercrime - Ian Carnaghan\" \/>\n<meta property=\"og:description\" content=\"Pfleeger (2005) reminds us that modern cyber-criminals can often be individuals that are difficult to detect.  They \u201cwear business suits, have university degrees, and appear to be pillars of their communities.\u201d  In addition to this, because of the wide spread accessibility to the internet and communications, it makes it easier for these criminals to operate […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"Ian Carnaghan\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-04T18:28:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-22T22:05:50+00:00\" \/>\n<meta name=\"author\" content=\"Ian Carnaghan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@icarnaghan\" \/>\n<meta name=\"twitter:site\" content=\"@icarnaghan\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ian Carnaghan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/\"},\"author\":{\"name\":\"Ian Carnaghan\",\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\"},\"headline\":\"Challenges Policy Makers face to Counter Cybercrime\",\"datePublished\":\"2013-02-04T18:28:07+00:00\",\"dateModified\":\"2019-07-22T22:05:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/\"},\"wordCount\":645,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\"},\"keywords\":[\"CSEC 620\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/\",\"url\":\"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/\",\"name\":\"Challenges Policy Makers face to Counter Cybercrime - Ian Carnaghan\",\"isPartOf\":{\"@id\":\"https:\/\/www.carnaghan.com\/#website\"},\"datePublished\":\"2013-02-04T18:28:07+00:00\",\"dateModified\":\"2019-07-22T22:05:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carnaghan.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Challenges Policy Makers face to Counter Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carnaghan.com\/#website\",\"url\":\"https:\/\/www.carnaghan.com\/\",\"name\":\"Ian Carnaghan\",\"description\":\"Software Developer, Blogger, Educator\",\"publisher\":{\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carnaghan.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\",\"name\":\"Ian Carnaghan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g\",\"caption\":\"Ian Carnaghan\"},\"logo\":{\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/\"},\"description\":\"I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.\",\"sameAs\":[\"http:\/\/www.carnaghan.com\",\"https:\/\/x.com\/icarnaghan\"],\"url\":\"https:\/\/www.carnaghan.com\/author\/icarnaghan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Challenges Policy Makers face to Counter Cybercrime - Ian Carnaghan","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"Challenges Policy Makers face to Counter Cybercrime - Ian Carnaghan","og_description":"Pfleeger (2005) reminds us that modern cyber-criminals can often be individuals that are difficult to detect.  They \u201cwear business suits, have university degrees, and appear to be pillars of their communities.\u201d  In addition to this, because of the wide spread accessibility to the internet and communications, it makes it easier for these criminals to operate […]","og_url":"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/","og_site_name":"Ian Carnaghan","article_published_time":"2013-02-04T18:28:07+00:00","article_modified_time":"2019-07-22T22:05:50+00:00","author":"Ian Carnaghan","twitter_card":"summary_large_image","twitter_creator":"@icarnaghan","twitter_site":"@icarnaghan","twitter_misc":{"Written by":"Ian Carnaghan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/#article","isPartOf":{"@id":"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/"},"author":{"name":"Ian Carnaghan","@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5"},"headline":"Challenges Policy Makers face to Counter Cybercrime","datePublished":"2013-02-04T18:28:07+00:00","dateModified":"2019-07-22T22:05:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/"},"wordCount":645,"commentCount":0,"publisher":{"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5"},"keywords":["CSEC 620"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/","url":"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/","name":"Challenges Policy Makers face to Counter Cybercrime - Ian Carnaghan","isPartOf":{"@id":"https:\/\/www.carnaghan.com\/#website"},"datePublished":"2013-02-04T18:28:07+00:00","dateModified":"2019-07-22T22:05:50+00:00","breadcrumb":{"@id":"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.carnaghan.com\/challenges-policy-makers-face-to-counter-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carnaghan.com\/"},{"@type":"ListItem","position":2,"name":"Challenges Policy Makers face to Counter Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/www.carnaghan.com\/#website","url":"https:\/\/www.carnaghan.com\/","name":"Ian Carnaghan","description":"Software Developer, Blogger, Educator","publisher":{"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carnaghan.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5","name":"Ian Carnaghan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g","caption":"Ian Carnaghan"},"logo":{"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/"},"description":"I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.","sameAs":["http:\/\/www.carnaghan.com","https:\/\/x.com\/icarnaghan"],"url":"https:\/\/www.carnaghan.com\/author\/icarnaghan\/"}]}},"views":182,"_links":{"self":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/posts\/2308"}],"collection":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/comments?post=2308"}],"version-history":[{"count":0,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/posts\/2308\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/media?parent=2308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/categories?post=2308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/tags?post=2308"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/post_series?post=2308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}