Introduction
In today’s world, the use of the internet has become extensive with more people adopting the digital platform in their personal and business interactions. In fact, it is clear that very soon the digital users will find the world as a global village. Nonetheless, although the digital world promises a more globalized universe, the same arena has demonstrated some shortcomings where instead of people using technology appropriately, it is being used to perpetrate cybercrime. However, due to the increase in digital crime cases, the vigilant approaches are now being used to hamper further destruction. Therefore, the respond to the opinions of people on cyber crimes, examples of cases within various categories, an outline on which criminal approaches should be prioritized and biblical insights to digital harassment are the main concerns raised for investigation.
Part 1
In response to Chief McClelland’s opinion on cybercrime, it is palpable that from the onset the crime on the internet has not been prioritized. Considerably, both security agents and the digital users slightly understand the concepts relating to cybercrime where security representatives tackle them as the old school type of crimes (Singleton, 2013). Moreover, misconduct on the internet becomes confusing as authorities do not understand that an individual can perpetrate crime without requiring an entire network. Besides, cyber crime does not require the presence of a criminal on a crime scene. On the other hand, security agents lack the knowledge that cybercrime can take place anywhere in the world. Therefore, criminals are not afraid of being punished by the authorities in the countries they are perpetuating their illegal activities (Singleton, 2013). On the other hand, cybercrime lacks priority because people do not recognize it because the evil happens on a more personalized level while old school crimes occur in public where somebody can notice.
Part 2
Cybercrime takes different dimensions. For instance, cyberstalking, threats, and theft are some of the many crimes happening on the internet (Singleton, 2013). Cyber theft entails stealing through technology and perpetrating robbery on the web related activities such as embezzlement, unlawful appropriation, hacking, fraud, plagiarism, DNS cache poisoning, and piracy. For instance, several US companies in 2013 were embezzled close to 300 million dollars through hacking. In addition, five men from Ukraine and Russia hacked into Visa Inc., JetBlue Airways Corporation, NASDAQ, J.C. Penney Company, and Carrefour SA where they stole and sold more than 160 credit cards to unsuspecting clients (Post, 2013). Cybervandalism is another major type of delinquency where criminals destroy and misuse resources. In most cases, the offenders ensure that a network either stops working or experiences disruption (Singleton, 2013). As a result, the owner of the system and other authorized users are denied the services they require. For example, in 2014, Bitcoins Company experienced distribution and denial of service (DDoS) attack while the cybercrime perpetrators had already managed to extort at least 26,000 US dollars from the firm (Ashford, 2015).
Cyber stalking is also one of many other types of criminal activities perpetrated through the internet. In this case, the digital platform is used to either stalk or harass individuals or groups. In fact, cyberstalking takes various forms, including solicitation for sex, defamation, libel, false accusations, and slander (Singleton, 2013). For instance, in 2013, James Allen from Michigan was tried with 18 counts of cyber stalking and production of child pornography (FBI, 2013). According to the prosecutor, Allen used his cell phone to stalk 18 women in New York with many of them being minors. Further, he used threats to solicit them for nude pictures and engage in a sexual session with him through Skype.
Part 3
While cyberstalking, threats, and vandalism are a priority for all law enforcement agencies; it is critical that investigators look into digital terrorism and trespass. In essence, today’s world is facing the menace of terror attacks on a regular basis which are perpetrated and planned on the internet. Therefore, it is imperative for investigators to scrutinize the activities of cyber users as one way of eliminating terror activities globally (Singleton, 2013). In addition, cybertrespass should be explored in depth because despite the innocence attached to snooping on other people’s property, eventually, such perpetrators may resolve to disrupt, damage, and misuse sensitive data.
Part 4
In the St. Paul’s doctrine of Colossians, Jesus Christ is cited as the first born of the invisible God of all creation. Consequently, Jesus Christ being a human representative of God reigns in authority over all human beings (New King James Version, Col 1:15-16). Moreover, due to his supernatural nature, Jesus sees everything and judges everyone. Under those premises, Paul establishes that Jesus is the human agent of God, and every creation should follow his words because everything, including thrones and powers have been created by his will. Therefore, Jesus understands people’s actions and punishes the sinners, including crime perpetrators on the internet. Moreover, Jesus paves the way for the human authorities to punish those who perpetrate crime. In addition, the Christ leads security agents to find ways of bringing to trial criminals because he is the prince of peace, and he loves a just world. Therefore, every human being is Christ’s priority, thus the need to both protect the innocent and punish the perpetrators.
Conclusion
In essence, the above discussion has averred that cybercrime is a real threat in today’s world. Agreeably, Chief McClelland’s opinion on the lack of priority to cybercrime is brought about by the lack of knowledge, resources, and time to combat digital criminals. In addition, it is evident that crime on the internet takes different approaches where theft, stalking, and vandalism are often perpetrated. Nonetheless, cyber terrorism and trespass should be prioritized because they are equally dangerous. Besides, the Bible establishes that Jesus as the firstborn of God prioritizes in protecting the innocent and punishing the wrongdoers. Therefore, Christ’s earthly representatives, including security agents should help in maintaining order in the society.