The Role Of Cyber-Terrorism In The Criminal Justice System

Improved Essays
Cyber is an adjective defined as “of, relating to, or involving computers or computer networks,” and terror is a noun defined as “a very strong feeling of fear” or “something that causes very strong feelings of fear: something that is terrifying,” (Merriam-Webster.com, 2015). One can logically conclude that cyber-terror is a form of fear involving computers. As technology continues to evolve and everyday life becomes more dependent on technology, terms like cyber-terror and cybercrimes become further intergraded in our vernacular thus our understanding of those terms and what they mean to ordinary citizens must be developed with it. The issues of, both surrounding and created by, cybercrime and cyber-terror have and will continue to reach all …show more content…
Nearly 150,000 viruses and malicious codes circulate through cyberspace infecting over 148,000 computers daily, (KPMG International, 2011). The cost of information lost to cybercrime in 2008 ($265 million) doubled in just a year when measured at the end of 2009 in the amount of $560 million within the US alone, (KPMG International, 2011). Cybercrime along with the targeted victims have grown in complexity as well. In 2000, the first documented cybercrime (the “I Love You” worm), was a spam email that affected 45 million users would wide. Ten years later, the Stuxnet worm was used as a weapon aimed at Iran’s nuclear facilities and destroyed a fifth of the countries’ nuclear centrifuges, (KPMG International, 2011). The fact that the sophistication of these programs have evolved to the form of weapons mean that the possibilities are endless and will only continue to grow in …show more content…
It is reliant on the general population to understand what problems these agents of cyber-warfare create and what it means to society. It will be difficult to determine what will and will not work in facing this new age problem. One way of measuring the progress of implemented programs is by looking at the numbers. The 2013 Norton Report issued by Symantec, which records consumers’ online behaviors and the financial impact of cybercrime, revealed that the annual global cost of cybercrime is $113 billion; roughly $298 per victim which is a 50% increase from 2012 (Paganini, 2013). The goal of every online user should be to see those numbers drop rather than

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    These discussions (cyber deterrence) are not scaring, nor deterring anyone. Attribution is a rather mystical thing when it comes to cyber-attacks. “Cyber related” companies offering response based services - incident response, investigations - know this very well and play up the fear to continue to sell their services. As an offensive penetration tester, I have many tricks up my sleeve that…

    • 1639 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Introduction In 2017, there have been several high profile cyber-attacks that have affected various systems across the country and the world. Among these cyber-criminals is the group known as the Shadow Brokers who debuted in August 2016 after claiming to have breached the spy tools of the Equation Group, an elite NSA-linked operation. In April 2017, the Shadow Brokers released what is said to be significant NSA tools which individuals have used to infect computer systems with ransomware. As a result of the Shadow Brokers’ breach, one strain of ransomware, WannaCry, spread worldwide in May 2017 hitting several targets that included public utilities and large corporations. It even attacked National Health Service facilities in Great Britain,…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In his revealing book Future Crimes, Marc Goodman shows us the threat that we, as inhabitants of this new technological world, either are facing or going to face in future years. Goodman started his cybercrime resume with the Los Angeles Police Department. After the LAPD, he spent years working for federal agencies such as the FBI and the secret service with on their computer crime units. When he began working with the computer crime units, cybercrimes were still in their infancy, now he has seen the eruption of cyber terrorism and Crime Inc. Goodman’s book shows the American public the vulnerabilities of their social media accounts and how the information obtained from them can be used against them. He also reveals how large the Dark Web really is and how it is already causing threats because of the unregulated sale of every product imaginable.…

    • 494 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    A digitalized mode of terrorism known as cyber-terrorism has been devised. Cyber-terrorism is performed to destroy a computerized network system. These attacks target major corporations causing adverse effects on the corporation and all its stakeholders. Recruitment by terrorists targets the staff at these corporations who have…

    • 951 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    However, with every advancement comes the criminal exploits of vulnerabilities. This criminal element help create the notion of “policing” cyberspace, which enviably lead to the development of new tactics and techniques to secure…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Today's technology is evolving at an unprecedented rate making the use, and misuse, of cyberspace easily accessible to anyone with access to a computer, smartphone, and the internet. Many governments realize how invaluable of an asset the internet is and have integrated it as an integral part of their nation's infrastructure and society. Unfortunately, whether it be by way of an individual person or a national institution, it is not uncommon to have enemies' attempting to exploit weaknesses. Having an accumulated 18 years of service in the military; and seeing first-hand the integration of the internet for military communication and coordination, I have witnessed numerous cyber-attacks on our nation and individuals over the span of my military…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity In America

    • 899 Words
    • 4 Pages

    United States cybersecurity is arguably as important, if not more so, than the US Military. The private sector, civilian businesses and personnel, lost more than $1 trillion in 2008 as a result of cyberattacks. The $4.5 million Predator military drone, had its camera feed hacked by a $26 dollar piece of software widely available on the Internet (Marshall,1). Neither the government nor the private sector is immune to security breaches, but which group is better equipped to protect America’s interests?…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    There are many ways in which a criminal could use electronic means to incite fear and violence. It's far less expensive to purchase a computer than to access guns or bombs, making this approach appealing for many potential criminals worldwide. It can be anonymous and conducted at a great distance away from the target. Experts in cyber terrorism have pointed out that the potential harm posed by these threats may be exaggerated, but there is some disagreement. If it was to succeed, our outdated computer networks owned by the national government could be comprised.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    1. Your research paper is due at the end of this week. What did you learn about your research topic? Share your major findings with the class. I learned many things from my research topic that about terrorism and its effects domestically & abroad from many respects (impact on nations, financially, policy, etc.)…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cyber warfare may very well be the upcoming new version of conventional warfare. Before this year, a cyber-attack was not something companies would look forward to, but it was also not something that countries would threaten war over. But today, cyber-attacks cause much more damage and are more detrimental to a company than before. Sony is proof that not only are companies affected by cyber-attacks, but now our entire nation can be affected. If technology continues to advance in this way, and cyber-attacks become more common, then it could be possible for a cyber-attack to take down an entire country with the press of a button and without a single bullet being…

    • 945 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Dangers Of Cybercriminals

    • 735 Words
    • 3 Pages

    Cybercriminals us malware short for malicious software to attack our systems to steal data, obtain personal information such as credit card information, social security number, or even where you live, they can also install monitoring programs, they can even take control of your system via the internet and lock your computer out demanding that you have to pay a certain amount to unlock it, or use it to create a botnet. A botnet is a large number of computers used at once to attack a server to bring it down temporarily, and example of this would be when a botnet was used to bring down the popular pay website PayPal, many customer…

    • 735 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays