Politicians want to show that they have made progress in addressing certain problems while in office, and the crime problem is no exception. The president of the United States has appointed you to lead a crime task force. Your mission is to design a strategy to address two crime problems:
1.the most difficult crime problem to address
2.the easiest crime problem to address
The president wants to show his effectiveness by solving at least one crime problem, hence, his interest in solving the easiest crime problem. The president believes that this will increase perceptions of his success in office. At the same time, the president recognizes that the most difficult crime problems to solve are often the most serious, and wants to communicate his commitment to trying to address these problems as well, hence, his interest in developing a plan to deal with the most difficult crime problem, a plan that the president can describe to the American people as part of an ongoing effort.
You will write a report in which you present your recommendations to the president. Think about the information on the different crimes and select one crime that you believe is the most difficult to address and one crime that you believe is the easiest. Your report should consist of the following elements:
Introduction (Introduce the topic and mission of the report.)
Crime #1 (Describe the characteristics of the crime you believe to be the most difficult to address: prevalence, trends, costs, etc. Be specific in presenting information on this crime.)
Plan to Address Crime #1 (Describe the plan you are presenting to the president to address this particular crime problem. Again, be specific in describing the steps that will be taken (who will do what, for how long, with what resources).
Crime #2 (Describe the characteristics of the crime you believe to be the easiest to address: prevalence, trends, costs, etc. Be specific in presenting information on this crime.)
Plan to Address Crime #2 (Describe the plan you are presenting to the president to address this particular crime problem. Again, be specific in describing the steps that will be taken (who will do what, for how long, with what resources).
Conclusion (Summarize what you have presented in the body of the report.)
The sources you use for this assignment should include the textbook, and two peer-reviewed journal articles from Project 1. Significant amounts of information from the peer-reviewed journal articles and textbook sources from Project 1 should be incorporated into your paper.
In addition to presenting information from your sources, demonstrate your critical thinking skills in applying the course material and the information from the peer-reviewed journal articles to your plans to address the two crimes you selected.
In a survey done by Gallup in 2013 on the level of crime in America, 55% of Americans stated that crime is a very serious issue in America (Dugan, 2013). As such, crime in America needs urgent measures to curb it, in order to restore public confidence. The paper presents recommendations to the President of the United States on strategies to address two forms of crimes, the most difficult to address, and the easiest crime to address. All crimes are difficult to address, that is why they keep happening. Determining which is the most difficult or least difficult to address is never that conclusive, but based on figures, statistics and geographical capability of the crimes can point to which crime could be considered difficult or easy to address.
Most difficult: Cyber Crime
Cybercrime can be considered the most difficult crime to address. Cybercrime as commonly termed refers to computer crime. Through a computer one can commit a crime or be targeted by another person. According to (Halder & Jaishankar, 2011) cybercrime constitutes offenses done against individuals, these offenses have a criminal intention and are meant to bring distress and harm to the victim. Cybercrimes are committed through the use of information and communication technologies such as the internet and telecommunication networks.
Cyber Crime has been on the rise especially with the growth and adoption of the internet only as a communication tool, but also as a platform for business, teaching, and facilitating financial transactions among other functions. According to (Center for Strategic and International Studies , 2014), cyber-crime costs the world economy losses amounting to more than $400 billion per year. In the United States companies lost more than $525 million through cybercrime most of this loss is mainly denial of service and malicious code (Center for Strategic and International Studies , 2014).
In America, 2012 data by Justice Statistics established cyber-crime resulted in a financial loss of $ 24.6 billion through cyber theft as shown in the table below (Dugan, 2013).
The internet has made the world interconnected; this brings about challenges to policing. As such solving cybercrime is filled with uncertainties. As noted by PWC (2014) solving cybercrimes calls for domestic solutions and interventions. The figure below shows cybercrime incidents based on different sectors of the economy in the United States (PWC, 2014).
To address cybercrimes in America, will require multi-national organizations working together and sharing intelligence .Currently organizations like Commonwealth of Nations, The Interpol, Organization for Economic Co-operation and Development to mention but a few are actively involved in the war against cybercrime. There is also need to harmonize the global reporting and prosecution of crimes tagged as being cybercrimes.
As shown in (PWC, 2014) to solve cyber crime calls for adopting two types of measures those that deter cyber criminals and those that detect them .among the policies that deter criminals include vulnerability management, using white hat hackers among others.
To detect and stop cyber criminals requires a number of policies and procedures such as having an incidence response team in place, undertaking computer forensics, partnering with public law enforces among others.
Easiest crime: Wildlife Crime
The second crime this report will cover is the wild life crime which is defined by (Wilson-Wilde, 2010) as consisting of trading illegally in animals, plants and things derived from animals and plants. There is increased demand for products from wild flora and fauna which are acquired illegally. For example, poaching of rhino and elephant for their tusks is on the increase in many parts of the world. Wildlife crime ranks among some of the major sources of revenue for criminals. It ranks in the same region as human, drug and arms trafficking. Wildlife crime makes up an illegal wildlife trade amounting to between US$50-150 billion a year. Fish caught illegally globally amounts to US$10-23.5 billion a year in addition logging of special tress and their processing ranges between US$30-100 billion.
To address instances of wild life crime calls for the existence of local, regional and global bodies and agencies that will seek to protect wildlife under threat. As noted by Pires & Moreto (2011) ways through which wildlife crime can be prevented include:
DNA analysis: This is critical in wildlife investigation because it helps show the sources of various animal products being trafficked as such security can be distributed to those areas that are at higher risk.
Acoustic traps: This involves usage of cellphones that have been recycled .The phones have sensors which collect and spread sounds that shows any illegal activity taking place ,this include things like explosions ,chainsaws among others .
Digital radio: This is better than the two way radio which is susceptible to interference and it also does not have any security features , digital radios makes it possible for rangers to talk securely despite their distance ,through proper coordination they can act faster when crime against wildlife is taking place.
Smartphones, GPS Trackers and Cameras: Wild animals can be fitted with GPS trackers which are used to track their locations and tell whether such animals are alive or not .The cameras can also take photos of the surrounding areas and coordinates to show the exact location of the animals, which ensures adequate protection. When animals have GPS trackers, animal –human conflict is limited as before the animals invade people’s farms its position can be tracked and the animal is protected from poaching or any other harm.
These solutions are easy to implement as they make use of currently existing technologies and innovations, there are many other tools that can be used to ensure protection of animals and wildlife.
This report looked at two types of crimes, one being the hardest to solve and the other the easiest to solve. The report focused on each crime giving information such as the trends, statistics and costs associated with such crimes. Finally the report highlighted ways through which such crimes can be solved for the benefits of the people. As stated in the report, the most difficult crime to solve is cybercrime due to its wide geographical reach the ability to solve it is far-fetched due to high costs and limitation in resources. The main way to address cybercrime is working to deter or detect people with criminal intent. Accordingly, Wildlife crime is the easiest to solve. Possible solutions to deal with this crime include the use of digital radios, acoustic traps, smartphones, digital trackers among others not mentioned.
Center for Strategic and International Studies . (2014). Net Losses: Estimating the Global Cost of Cyber Crime Economic impact of cybercrime II. Intel Security.
Dugan, A (2013). More Say Crime Is Serious Problem in U.S. Than Locally: Retrived from: http://www.gallup.com/poll/165677/say-crime-serious-problem-locally.aspx
Halder, D., & Jaishankar, K. (2011). Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global. .
Pires, S. F., & Moreto, W. D. (2011). Preventing wildlife crimes: Solutions that can overcome the ‘Tragedy of the Commons’. European Journal on Criminal Policy and Research, 17(2), 101-123.
PWC. (2014). US cybercrime: Rising risks, reduced readiness Key findings from the 2014 US State of Cybercrime Survey. PWC.
Wilson-Wilde, L. (2010). Combating wildlife crime. Forensic Sci Med Pathol (2010) 6:, 6, 149–150. doi: 10.1007/s12024-010-9179-4