Federal Agencies and Digital Crimes

FEDERAL AGENCIES AND DIGITAL CRIMES 4

FederalAgencies and Digital Crimes

FederalAgencies and Digital Crimes

Theestablishment of independent intelligence agencies is the main stepby the United States to reinforce the fight against the digitalcrimes. However, the agencies such as FBI, Homeland Security, SecretService, National Security Agency and Federal Trade Commission facechallenges in their operation. The challenges for the agencies arenot only similar but also diverse, including administrative problems,limitations of resources and rivalry.

Oneof the challenges is competition that is portrayed by the tendency ofthe agencies to outdo each other while fighting digital crimes. Forinstance, an agency may try to displace another while handling acrime scene, leading to tensions and rivalry. In addition, someagencies enjoy superiority over others and are considered to besenior. This leads to limitations in cooperation while investigatingand handling digital crimes. In a bid to prove their competence, theagencies considered minor act independently, thereby risking acompromise of security.

Dueto their independent nature, they face challenges in the diversity oftheir primary role. Therefore, they lack full cooperation since eachfocuses on its primary independent role. For instance, the FBIfocuses on investigation and intelligence while the Secret Servicehas a financial crimes division that focuses on the high profilecomputer crimes that involve federal interests (Cole, et al, 2013).In addition, there is a challenge of poor coordination between theagencies, especially when a crime is handled by more than one agency.According to Tayloret al (2011),the independent agencies should have full exchange of ideas, shareintelligence and have clear intercommunication when handling cases.

Despitethe challenges, there are common factors that relate to each of theone of these independent agencies. Confidentiality is a common factorthat is maintained by all the agencies at all times. In this regard,none of the agencies are allowed to share or leak information aboutthe investigations of the crimes (Tayloret al, 2011).In addition, all these agencies use highly equipped and smartoperatives who are well trained with investigation and militaryskills. This factor gives the agencies the ability to get deep into acase to gather intelligence and investigate the dynamics of thecrime. Finally, the use of forensics to gather information duringtheir investigations is a common factor for these agencies.

Withthis capability and understanding of the challenges, the U.S canalign their efforts to improve the protection of the country fromterrorism and digital crimes. First, the United States should advancethe protection of the information stored in the databases of theseagencies. Database protection will protect the agencies from leakageof information due to computer hacking and cyber security compromises(Tayloret al, 2011).With such protection, the information gathered will remain asauthentic and relevant as it should be for the cases. Secondly, theU.S should promote sharing of intelligence between the securityagencies, but maintain the highest level of confidentiality.

Inaddition, the U.S should adopt advanced training and incorporate theuse of advanced technology that will surpass the technology ofcriminals and terrorists. With such advancements and increased depthof training for security operatives, investigation by the agencieswill be beyond the levels of the advancing criminals. Moreover, theUnited States government should promote cooperation between theindependent agencies. This will promote their operations and advancetheir investigative abilities by complementing each other in terms ofexpertise and resources. Finally, the United States shouldcontinually update its laws to promote the work of the securityagencies and facilitate information gathering.

References

Cole,G., Smith, C., &amp DeJong, C. (2013). CriminalJustice in America. Stamford:Cengage Learning

Taylor,R.W., Fritsch, E., Liederbach, J. &amp Holt. T. (2011). DigitalCrime and Digital Terrorism, Second Edition.Upper Saddle River, NJ: Pearson Education.