Verified Document

Canadian Policies To Thwart Terrorist And Criminal Research Paper

Canadian Policies to Thwart Terrorist and Criminal Activities Canadian Policies to Combat Crime and Terrorism

Problems being faced due to Cyber-Crime in Today's World

What is Identity Theft?

How and Why Cyber-Crime Occurs?

Why Cyber-Crime has become an Important Issue?

How Release of Personal Information makes an Individual vulnerable to Identity Theft?

Future Implications

Since time immemorial, crime and criminal activities have been found at an accelerated pace, however, with the penetration of the world into the twenty first century with numerous technological advancements and innovations, these acts have taken a new form. This evidently signifies that crime through cyberspace has become one of the widespread and prevailing activities of the today's fast paced world, where the entire human race is moving towards the industrial and hi-tech progressions at a constant speed. Moreover, the criminal and terrorist activities in a more sophisticated version have become a common aspect of mundane life (Brenner, 2010).

The criminal activities is not confined to any one country, rather, the entire globe and its people are confronting this grave issue on a universal basis, which even includes the developing nations as well-developed countries. Cyber-crime has become one of the insidious, subtle, dangerous and artful activities that have affected a number of people in the contemporary world (Brenner, 2010).

Perhaps cyber-crime may give the impression to be less dangerous because it does not harm or damage the individual (who is being targeted) physically. However, this is more insidious because the cyber criminals directly play with the person's goodwill, name, credibility and reputation in association with their credit details in order to get hold of their identity in obtaining employment and other aspects of life by gaining access to a person's private information that is strictly confidential (Brenner, 2010).

Since the world is advancing, newer issues and concerns are emerging where the older issues are being corrected with time. In fact, cyber crime has become one of the significant attributes of the technological change and innovation that is constantly updating, and hence giving rise to numerous new challenges with respect to the information access and privacy of the individuals as well as the governments, military, and even the nation's economic information. The records and studies have comprehensively identified that cyber attacks have not only become sophisticated, instead the number of attacks has elevated dramatically in the last few years, which is also expected to grow (Brenner, 2010).

While taking into account the cyber crime, one can extensively determine that Canada is one of the nations that are persistently experiencing increasing number of cyber crimes in the modern world of today. This is particularly due to the reason that the widespread platform internet has become an effectual, invaluable and productive utensil for not only the Canadian individuals but also for the Canadian businesses and their governments on a broad spectrum. Nevertheless, with the evolution, progression and development of the cyberspace, the cyber threats are also being escalated at an unprecedented rate that is causing risk to the overall security, wealth and quality of life (Clough, 2010).

Considering the severe and constantly growing issue of cyber crime, the government of Canada is very much committed in providing security and protection to the inhabitants from the threat and risk of cyber crime and cyber criminals. In this regard, the research thesis would provide a deep analysis on cyber crime that has become a prominent issue and what are the policies of the Canadian government to thwart and combat the severe issue (Clough, 2010).

Canadian Policies to Combat Crime and Terrorism

Cybercrime is generally referred to the defined criminal activity or offence that is performed by means of computer hacking and network (especially through telecommunication network such as internet and mobile phones), which acts as the primary object of the crime. This type is crime is committed with the core motive and intention to harm the reputation of the individual or group of people. Cyber crimes are usually a harsh threat to a nation's security, economic conditions and financial health (Public, 2011).

However, almost every nation in the current epoch are taking measures and developing policies against cyber crimes that can handle and administer the terrorist activities. In a very similar manner, Canada has also developed approach in its own manner to embark global and domestic threats. The governmental bodies and agencies have developed ongoing and multifaceted activities in which they are engaged in a collaborative manner in counter terrorism. This is due to the reason that safety and security of the residents of Canada is the main concern of...

Therefore, the government is working in partnership with the international allies is the primary goal that can lead to ensuring the security to the inhabitants (Public, 2011).
Considering the policies of Canada, records have revealed the fact that Canada has been involved in a four-step plan in order to alleviate the cyber crime within the country. The four step plan include prevent, detect, deny and respond (Public, 2012). The activities in the first step (prevent) includes the monitoring of the individual's intentions and motivations who are likely to get involved in offensive or terrorist activities either at home or overseas. Moreover, the activities in this step also focus on the factors that can create a motivation to the individuals in being involved in illicit activities (Public, 2012).

The second step (detect) of the procedure involves activities that have the focus on various aspects regarding the terrorist activities such as determination of terrorists groups and organizations, their supporters and the nature of their plans. Investigations and intelligence operations are the primary means to detect such leads that can cause criminal prosecutions (Public, 2012).

The third step (deny) include law enforcement actions that moderate and alleviate the vulnerabilities in terrorist planning that can turn the nation into a more difficult target for the terrorist activities. Finally, the last stage (respond) involves expanding and widening the competence that can spontaneously respond in a proportionate and rapid manner, which can reduce the affect and severity of terrorist activity (Public, 2012).

In actual fact, records have also exposed the piece of information that Canada has also developed strict laws with respect to the criminal codes of Canada that exhibits every individual's act would be counted as offensive or an illegal act in case if they have acquired other person's identity information with the intention of committing an felonious offence such as fraud or deception. Strict actions are taken against such individuals who are found to be guilty of such an offense that is defined by the legislative bodies (courts) (Public, 2011).

The laws and policies have been especially developed in order to prevent or lighten the cyber threat that can eventually protect the internal digital infrastructure. Besides, the law enforcement community of Canada is making an ongoing effort to crack down the individuals who use the platform of Internet especially for crime and illegal activities. The constant efforts indicate the commitment of the government to provide a safe, secure and prosperous cyberspace to the citizens of the country. Indeed the government is also working on legislations that can update and revise the law enforcement's investigative powers that can ensure technological innovations are not being used to evade or avoid lawful interceptions of communications supporting criminal activity (Public, 2011).

Problems being faced due to Cyber-Crime in Today's World

Since the globe has transformed into the technological era, the primary means of communication, interaction, transfer and sharing of information is becoming confined to technological mediums such as internet. The technological advancements on one hand has created easy ways and means of data sharing, while on the other hand, it has created more opportunities for the criminals to commit crimes over the internet. This undoubtedly indicates that an individual is likely to be expected to release their personal information on daily basis in order to receive benefits, perks and services. However, this communication and transfer of information over the internet is making more vulnerable to 'identity' theft and cyber crimes (Westby, 2003).

What is Identity Theft?

Identity theft is gaining access to someone else's identity with the prime motivation to using his or her personal and confidential information (that include credit details) in order to damage the person's name and reputation. The victim is usually the person whose information has been used by the identity theft. As an outcome of identity theft, the victim is highly prone to suffer from adverse and difficult outcomes in conditions when they are held accountable or guilty for performer's actions. These types of crimes are usually committed when an individual steals the personal information (without their consent) like name, social security number, credit card number and any other private information in order to commit fraud or related crimes (Hanel, 2010).

It is rather more challenging to determine the identity threat because the victims are usually unaware of the fact that how their personal information was stole by the identity theft. In fact, it has been observed that identity thefts are not always discovered or detected. Furthermore, the evidences have elucidated the fact that cyber attacks and crimes are…

Sources used in this document:
References

Balkin, J.M. (2007). Cybercrime: Digital Cops in a Networked Environment. Edited Version. New York, USA: NYU Press.

Brenner, S.W. (2010). Cybercrime: Criminal Threats from Cyberspace. USA: ABC-CLIO.

Burgess, A., Regehr C., & Roberts, A. (2011). Victimology: Theories and Applications: Theories and Applications. USA: Jones & Bartlett Learning.

Clough, J. (2010). Principles of Cybercrime. 1st Edition. New York, USA: Cambridge University Press.
Public Safety Canada (2011). 'Canada's Cyber Security Strategy.' Public Safety Canada. Retrieved from http://www.publicsafety.gc.ca/prg/ns/cbr/ccss-scc-eng.aspx
Public Safety Canada (2012). 'Building resilience against terrorism: Canada's counter-terrorism strategy.' Public Safety Canada. Retrieved from http://www.publicsafety.gc.ca/prg/ns/2012-cts-eng.aspx#s5
Cite this Document:
Copy Bibliography Citation

Related Documents

Canadian National Security and Privacy
Words: 2773 Length: 10 Document Type: Term Paper

" One of the largest issues between the two nations is the issue of truck passage. In the past trucks carrying goods or cargo had enjoyed a cursory glance as they crossed into the other nation however, after the World Trade Towers came down border agents on both sides of the border began to investigate trucks with much more scrutiny than ever before. Historic allies, Canada and the United States agreed following

Narcoterrorism and the Future
Words: 18088 Length: 70 Document Type: Capstone Project

Mexico faces an array of drug-related problems ranging from production and transshipment of illicit drugs to corruption, violence, and increased internal drug abuse. Powerful and well-organized Mexican organizations control drug production and trafficking in and through Mexico, as well as the laundering of drug proceeds. These organizations also have made a concerted effort to corrupt and intimidate Mexican law enforcement and public officials. In addition, the geographic proximity of

Post War Iraq a Paradox in the Making Legitimacy Vs. Legality
Words: 14187 Length: 35 Document Type: Term Paper

Post War Iraq: A Paradox in the Making: Legitimacy vs. legality The regulations pertaining to the application of force in International Law has transformed greatly from the culmination of the Second World War, and again in the new circumstances confronting the world in the aftermath of the end of the Cold War. Novel establishments have been formed, old ones have withered away and an equally enormous quantity of intellectual writing has

Is the "New Terrorism" That Much Different From the "Old Terrorism" ...
Words: 3803 Length: 11 Document Type: Essay

New Terrorism -- Risk Management In the aftermath of the carnage created by terrorists on September 11, 2001, in which 2,977 people were killed (in the World Trade Center, the Pentagon, and in hijacked commercial jetliners), the United States government initiated a "war on terror." That war has yet to be won, and may never be won because terrorists have found new ways of launching attacks and where there once was

Cyprus Problem Ancient History Establishment of the
Words: 15734 Length: 55 Document Type: Dissertation

Cyprus Problem Ancient History Establishment of the Republic of Cyprus Intercommunal Conflict Establishment of the UNFICYP Turkey Bombs Cyprus Turkey Rejects UN s Mediator on Solution of Cyprus Problem New Round of Intercommunal Talks Military Junta Takes Over in Greece Kofinou Crisis Reinforced Talks with Constitutional Experts Formation of the EOKA B. And Civil Strife Junta Coup d'Etat and Turkish Invasion The Aftermath Restoration of Communal Order Great Britain Greece Turkey Greek Cypriots Turkish Cypriots Sovereignty EU and the Cypress Problem Struggle for Justice and Compromise Where Should the Solution Line be Drawn? POLICY

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now