The Internet is the defining feature of the current generation. All over the world, people are organizing and collaborating with the online community, with two billion members strong and growing (“Department of Defense Strategy for Operating in Cyberspace”, 2011). As our online presence increases, we are starting to see more and more crime take place using computers illegally. Cybercrime can take many forms, whether your computer downloads a virus, a news website gets defaced, stolen identities being sold through an online marketplace, or data breaches. However, who comes to help in these situations? Your county sheriff might care about a threatening Facebook post on your feed, but calling 911 won't ever help you take down your stolen …show more content…
An interesting approach to tackling crime, instead of taking a corrective or offensive measure to stop crime like finding and stopping hackers from attacking, Obama issued a defensive stance, using preventative measures like crime prevention. The main point of this framework is to increase intelligence sharing among the Government and private businesses so defenses against ongoing criminal attacks can be …show more content…
In China, they lead in patriotic hacktivism, aimed to defend their country (Yip, 2010). Large governments and world powers can have problems that can severely affect the operations of other governments around the world. International law is known to not be an easy topic, but there have been advancements made between been governmental bodies to identify the problem of cybercrime. To enhance cooperation between governments, the USA and others have signed the “Convention of Cybercrime” treaty. The first treaty of its kind, it is designed to bring up international laws and improve investigations and collaboration (“Convention on Cybercrime”, 2001). This treaty also helps to increase the offensive against cybercrime. By criminalizing illegal access, interference and misuse, and obscenities, governments now can deal justice. One case this treaty has been used in was a Nigerian spamming bust, when the leader of the project was expedited from South Africa to the United States for scamming and costing 500 thousand dollars to the public in