Obviously, if law enforcement is unaware of some of the methods criminals are using means that crime is going to go undetected and individuals will not be prosecuted. People are committing cybercrime from the comfort of their own home, so it’s not easy for law enforcement to recognize that crime is occurring compared to a person breaking the law in public. Nowadays, almost every home has devices such as a desktop, laptop, iPad, and/or iPhone that allow access to the Internet, which makes it difficult to catch cybercriminals. Some victims may not even know they were affected by cybercrime or may not report incidents to law enforcement. It’s important for law enforcement to know as much as possible regarding the usage of technology, software, and information to better detect any criminal activity (Maras, 2015). In order to prosecute, first comes detection. It is possible for law enforcement to establish the IP address from the computer that is committing cybercrime, but at the same time there could not be enough evidence to prosecute. Sometimes, criminals will alter their IP addresses to remain anonymous or use what are called proxy servers to prevent their IP addressed from being detected (Maras,
Obviously, if law enforcement is unaware of some of the methods criminals are using means that crime is going to go undetected and individuals will not be prosecuted. People are committing cybercrime from the comfort of their own home, so it’s not easy for law enforcement to recognize that crime is occurring compared to a person breaking the law in public. Nowadays, almost every home has devices such as a desktop, laptop, iPad, and/or iPhone that allow access to the Internet, which makes it difficult to catch cybercriminals. Some victims may not even know they were affected by cybercrime or may not report incidents to law enforcement. It’s important for law enforcement to know as much as possible regarding the usage of technology, software, and information to better detect any criminal activity (Maras, 2015). In order to prosecute, first comes detection. It is possible for law enforcement to establish the IP address from the computer that is committing cybercrime, but at the same time there could not be enough evidence to prosecute. Sometimes, criminals will alter their IP addresses to remain anonymous or use what are called proxy servers to prevent their IP addressed from being detected (Maras,