In order to understand cybercrime or in this case the provided hypothetical cybercrime scenario of the group of vigilante computer hackers this paper will use a theoretical approach to better outline some of the key elements that lead to motivation behind these criminal activities, weather there is a link or relationship between crime and technology in this case the internet as a platform connected to a global network accessible to anyone around the world. In order understand these key factors to explain online deviance and behaviour by examining self-control theory, whether an individual’s level of self-control has any relevance in their tendencies to engage in online deviant activities. In the research journal article …show more content…
In reference to the Convention on cybercrime which Canada is a part of the enacted legislations which grants police agencies the ability and power to compel internet providers to assist law enforcement in the release of ‘lawful access’ of personal data, traffic and general information needed for the purpose of investigation in response to a new internet data surveillance approach to tackle cybercrime (Huey & Rosenberg, 2004). The purpose behind this legislation was in response to online cybercrime deviant crimes and for law enforcement to have the ability to retrieve or access information such as identity, location, to track down individuals participating in deviant behaviour on the internet. Although this approach seemed to be focused more towards surveillances of citizens rather than the main idea of implementing effective policies to protect individuals from cyber-attacks. In the Cybercrime Convention part of the international cooperation common goals implemented to better tackle cybercrimes worldwide was to enhance law enforcement, judicial and international cooperation’s by establishing procedures such as detection, investigation and prosecution of individuals in relation to computer related crimes and the collection of evidence available to …show more content…
Some of these challenges outlined are key issues that make it tough to predict or detect cybercrimes, for instance finding out the identity of the hackers or hacker groups behind an attack is a problem, due to the mask of anonymity that conceals individuals true identities. Another factor is the idea that the perpetrator behind a computer crime can originate from around the world, thus the restrictive boundaries of space geographically and politically making it time and resource consuming for law enforcements to pursue any relevant leads or evidence. Also due to the ever increasing interconnection of various public and private companies’ reliance on their own privacy and interdependence, the sharing of information has made it challenging to track or locate individuals behind these cybercrimes who at times use similar tools developed for reliability for criminal purposes, therefore making it costly and difficult to deter such threats (Deloitte, 2008). One such initiative that was introduced was the Canada Evidence Act that provided new powers that gave police the ability to search and seize warrants that would ensure private internet providers and telecommunication firms reveal information as it relates to