Digital crime and terrorism are one of the remaining challenges that law enforcement agencies must address to ensure greater security and harmony globally. Law enforcement agencies therefore need better tools through which they can predict the past, present and future aspects of digital crimes, so that they can be well equipped to limit the actions of those who perpetrate such crimes. This document will analyze the eight key predictions related to digital crime and how law enforcement can develop strategies to combat these crimes. Prediction 1: The need to allocate law enforcement more resources to fight cybercrimesThe prediction highlights the need for a change in law enforcement and judicial agencies in all jurisdictions to make officials serving in such departments well equipped to eliminate digital crimes. One of the key areas of this forecast will be the introduction of appropriate technology with systems capable of collecting cybercrime data within the jurisdictions where these crimes take place. Corporate and private organizations that conduct numerous transactions over the Internet are at risk of falling prey to cybercriminals and therefore more cybercrime laws need to be enacted to fill existing gaps in law enforcement. Privacy laws should be updated to include activities conducted across the web and this will help law enforcement deal with cybercriminals who gain access to documents and information to which they are not entitled (Taylor, Caeti, & Fritsch, 2010 , pp. 310-312).Prediction 2: Internet Fraud and Identity TheftThe issue of monetary fraud through the Internet is becoming challenging for law enforcement agencies due to the increase in the number of people and...... means of paper.. .... This can then be used as a ploy to extort and blackmail against the targeted organizations. Law enforcement must pay attention to such incidents because they can cause cybercriminals to disrupt essential functions (Gragido, Pirc, & Rogers, 2011, pp. 86-88).Works CitedBrenner S. (2007). Law in the age of intelligent technology. Oxford: Oxford University Press. Broadhurst R. and Grabosky P. (2005). Cybercrime: the challenge in Asia. Hong Kong: Hong Kong University Press. Gragido W, Pirc J., & Rogers R. (2011). Cybercrime and espionage: An analysis of subversive multivector threats. Burlington: Elsevier. Mansell R. and Raboy M. (2011). The Handbook of Global Media and Communications Policy. London: John Wiley and Sons.Taylor R., Caeti T. and Fritsch E. (2010). Digital crime and digital terrorism. New York: Prentice Hall.
tags