Digital technology has come to pervade almost every aspect of human interaction in present day communities. It shapes how individuals share information, how they bank, and even how they commit crimes. Today’s high-tech environment and “the deep web” present new, and arguably the most pressing challenges to law enforcement and the justice system as electronic crime is growing in substance and volume worldwide.
The Federal Bureau of Investigation has been in the media spotlight recently for catching the owner and administrator of the Silk Road, the online marketplace established in 2011 that was often used to buy and sell illegal drugs, false identification records, handguns and the like. The marketplace utilized Tor technology to create a completely anonymous portal for buyers and sellers to conduct their transactions and used Bitcoin currency to keep financial transactions virtually untraceable.
Media attention on this high-profile case has shed some light on the legal and technological gaps that exist in law enforcement’s ability to cope with and respond to electronic and cyber crime. Research Director at the National White Collar Crime Center (NW3C), Gerald Cliff, said that while research centers such as NW3C are developing training coursework for computer forensic analysis for electronic devices that use the web to proliferate crime, these advances in responsive law enforcement almost always get tangled in legal questions regarding “right to privacy” and “right against self-incrimination.” Aside from the $37 million worth of bitcoin currency that the FBI has already captured, there remains an estimated $80 billion of password-protected, and therefore, untouchable, money.1 It is currently under question whether the sole possessor of the password, Ross Ulbricht, can be legally compelled to foreclose the password to law enforcement authorities.
In addition to this legal barrier, law enforcement are often forced to police in a rapidly evolving age of Internet and digital technology using static, and outdated laws. The two most common legal mechanisms by which law enforcement agencies and personnel are able to pursue electronic evidence and to police computer crime are the Communications Assistance for Law Enforcement Act, which governs law enforcement’s warrant process and the Computer Fraud and Abuse Act, which simply makes it unlawful to gain unauthorized access to a computer.
Law enforcement agencies across the country have been responding to the new nature of these threats by expanding their knowledge of social media and utilizing it to solve crimes. Jeff Lybarger of the Internet Crimes and Complaint Center of the NW3C said in his address at IACP this year that social media continues to be a valuable investigative tool to aid law enforcement in tracking identities and news of crime proliferation.2 Even app-like software, such as SnapTrends, has emerged to better help agencies sift through mass amounts of online data and extract meaningful information from targeted searches. To help agencies develop a social media policy, the Criminal Intelligence Coordinating Council’s Privacy Committee developed guidance on Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities.
For now, FBI Cyber Division has identified three specific areas where law enforcement agencies should focus their efforts and can make the most tangible progress in reducing the threat to communities, businesses and individuals by electronic and cyber crime:3
Senya Merchant
Special Contributor
COPS Office
One on One With...Director Ron Davis | Spotlight on a Powerful Training Collaboration | 2013 National DEC Winners | San Diego and the Southwest Border | New Challenges for Law Enforcement