The most important cybercrime law that is available today is that pertaining substantive cybercrime. These are the laws that do prohibit individuals in undertaking online identity theft. This is the section 18 U.S.C & 1028A (Casey, 2011). The law states that this is the laws that is concerned with fraud or related activities like documents that are used for identification, features that are used for identification, and information (Casey, 2011). This is an important cybercrime law because, if implemented well, will help fraudsters from using other people information and identification to defraud the internet users. Many of the cybercrime is committed due to the ability of the cybercrime offenders to impersonate some real entity and defraud internet (information systems) users. This should be enforced to eradicate this type of cybercrime. This cybercrime law targets the people who impersonate an entity with the intention of getting a favor that they would otherwise not get without this identification (Casey, 2011).
One of the most damaging corporate computer crime is that of cyber espionage. This is where intellectual property of a company is stolen. Trade secrets of a company are the main target of many computer attackers. They are interested in the secrets that a company uses in their business. Information is a very crucial element or asset to any given organization across the whole world. It is the information that keeps the organizations moving and successful as well. Lack of information security leads to a harm and distress to both the organization and individuals and lives may even be put to risks (Atallah, 2001). These harms are caused by the loss or abuse of facts and figures which belong to individuals or the firm. One of the examples of cyber espionage is an attack on the International Monetary Fund organization. One of the staff here opened an email which was from an attacker and important documents were stolen. Another example is that in the Office of His Holiness the Dalai Lama (in Beijing Olympics 2008). The office started suspecting they were under cyber surveillance after an email invitation to a foreign diplomat. This was found out to be a way of getting important information between China and the office.
References
Atallah, M.J. (2001). Information security and assurance. New Jersey, (NJ): Pearson Prentice Hall.
Casey, E. (2011). Foundations of digital forensics. In Digital evidence and computer crime: Forensic science, computers, and the Internet (3rd ed.). (pp. 3-34). London, England: Academic Press.