Get help now
  • Pages 3
  • Words 528
  • Views 116
  • Download


    Verified writer
    • rating star
    • rating star
    • rating star
    • rating star
    • rating star
    • 4.9/5
    Delivery result 4 hours
    Customers reviews 247
    Hire Writer
    +123 relevant experts are online

    Computer Crimes Essay (513 words)

    Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get help now

    124 experts online

    Computer crime is any illegal act that involves a computer system, whether the computer is an object of a crime, an instrument used to commit a crime, or a repository of evidence related to a crime. Telecommunication crime is the fraudulent use of any telephone, microwave, satellite, or other telecommunications system. Many telecommunications systems are computers, and therefore, in some instances, offenses against a telecommunications system can also be considered a computer crime. Computers and telecommunications have become critical parts of the daily lives of Canadians, and criminals have taken advantage of this technology.

    The Royal Canadian Mounted Police is responsible for investigating all computer crime offenses within its jurisdiction. It also investigates such crimes where the Government of Canada is the victim, regardless of primary jurisdiction. Additionally, the RCMP can investigate offenses involving organized crime or offenses related to the national interests of Canada.

    There are RCMP Commercial Crime Sections in every major city in Canada. Each of these units has at least one investigator who has received specialized training in the investigation of computer crimes. These investigators are supported by the RCMP Computer Investigative Support Unit (CISU) located at RCMP Headquarters in Ottawa.

    CISU can provide technical guidance and expertise to all Canadian police departments and federal government agencies in relation to computer and telecommunication crime investigation. In Canada today, the main types of computer and telecommunication crime are unauthorized access to computers (hacking), mischief to data, theft of telecommunications, and copyright violations of software (illegal copying and distribution of software). In addition, computers are commonly found in many other types of investigations and these systems must be examined for evidence. Types of crime where computer evidence has been located include murder, fraud, stock market manipulation, pornography, proceeds of crime, and drug importation. The term computer hacker” refers to an individual who circumvents computer security and breaks into a computer system. “Hacking” could be roughly equated to a break and enter.

    A hacker” can steal data, sabotage information, or do nothing but browse. The scope of the problem is owing to the technical nature of computer and telecommunication crime. Law enforcement personnel must be properly trained to conduct such investigations. The Canadian Police College offers three different computer crime courses covering everything from search and seizure of computer systems to examination of computers for evidence. These courses are available to any police agency in Canada as well as to some foreign investigative agencies.

    Computer and telecommunication crime is a global problem. Offences can transcend national boundaries and often do. For this reason, the RCMP maintains contact with computer crime investigators around the world, including investigators in the United States and Great Britain. Statistics on computer crime and telecommunications crime are difficult to accumulate primarily due to victims’ reluctance to report such crimes and the many different jurisdictions in Canada.

    However, with growing economic losses to victims, more crimes are being reported to the police. Recent losses in relation to telecommunications crimes have been very large. Some computer criminals operate on an international scale and in an organized fashion. These criminals can route their activities through countries where jurisdictional processes and legal problems can make investigation difficult.

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need custom essay sample written special for your assignment?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    Computer Crimes Essay (513 words). (2019, Jan 07). Retrieved from

    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper