Essay On Cyber Terrorism In China

Improved Essays
Today as technology continues to advance, the growing concern of cyber terrorism has became an essential factor to the United States infrastructure and US-CERT (United States Computer Readiness Team). Presently, China is the leading force of these attacks against the United States in attempt to steal top secret information and data to improve their economy. In his article “ The code not taken: China, the United States, and the future of cyber espionage,” Adam Segal (2013) writes about the growing problems the United States have come to face with China’s attempts at hacking the United States infrastructure, military blue prints, and top secret government files. For example, China targeted defense contractors and subcontractors at the pentagon …show more content…
Segal continues, in detail of how President Obama and Chinese President Xi have had negotiations in attempt to resolve the issue. President Xi claims that China is also a victim of the attacks, but I find hard to believe if the NIE proved that China “is the most aggressive” in cyber espionage. Notwithstanding, Segal provides readers specific examples how China is very dangerous and a threat when it comes to cyber espionage; through their encoding information from the United States. This article is very reliable and has many facts that lead readers to believe that China is a growing enemy seeking power.
In Conclusion, “ The code not taken: China, the United States, and the future of cyber espionage” by Adam Segal is a very factual article that shows readers China is a growing threat to the United States because of the amount of cyber attacks. Segal explains that even though China has tried to resolve the situation with the United States numerous amount of times, they are still very untrustworthy. The conceivable impact of hacking, cyber terrorism and/or cyber espionage (whatever label you want to use) continues to be of great concern; as the great potential economic consequences are

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The relationship between China and the United States has had a strain on their relationship do to the fact that the west is known to bulldoze their way around in belief that the subordinate country should be accepting of this…

    • 1368 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    This author himself is a highly educated, college professor. Even with that perspective of being a scholar in this field of study for more than 5 years, Herb does not frame this article to be viewed by other highly educated university professors in his similar field of study. As I mentioned before he aims this article at a more general population. The actual audience of this piece would be subscribers to the Washington Post where this article was published. In addition to the subscribers, the ideal audience would include individuals in care about the Equifax hack or cyber space policy and security.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    "In this day of age, we have dedicated large portions of our lives to the internet and staying connected. This allows a wide variety of knowledge and entertainment to be brought into every home. However, the vast amount of resources available online can possibly be a bad thing. Countless organizations of crime and terrorism roam the online world with a sense of anonymity and the resources to mass spread their ideologies across the world. This has led to the creation of governmental organizations such as the National Security Agency (NSA) that hold the main goal of trying to prevent terrorist and crime organizations from carrying out evil and violent attacks on the people of the United States and the world.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Finfisher Case Study

    • 1271 Words
    • 5 Pages

    One hacker was able to get his hands on 40 gigabytes of information about Gamma Group 's customers and what software they are able to infect while remaining undetected. Since 2009, many countries including China, United States, and Australia have been active users of this software (Blue, 2014). These countries range from communist regimes to democratic countries that supposedly assert human rights such as privacy. Although surveillance generally does not hurt others, public interest values privacy a lot more than many governments do. Shedding light on the fact that countries do in fact spy on their own citizens can cause public backlash and hurt the stability of a nation.…

    • 1271 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    The lack of major U.S. presence in international economic issues causes many nations to collapse as well. The continent of Africa is the center of gravity for these failed states and radical groups.2 Major powers, such as China, are problematic as they aggressively claim areas surrounded their country. The United States focused on itself for the last decade and a half, but now faces the realities of looming national security threats from both state and non-state actors. The United States needs to refocus itself on the myriad of potential attacks that could endanger the country, including Iran and North Korea’s nuclear capabilities, terrorist attacks, cyber-attacks, and China’s strategy concerning aggressive land claims. The United States saw a departure from its role as “global policeman” with the election of…

    • 2250 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    China’s current GDP growth is 6.9 percent, about three times as high as the United States’. Yet, just like the United States did, China is experiencing rapid growth as it industrializes. Americans seem to forget that the standard of living in the United States is far higher than that of China. The United States has 221 times as many secure internet servers per one million people than China does. The people of the United States are more likely to have enough food, electricity, less likely to die at birth or of HIV and more likely to live to an old age.…

    • 1797 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Immigration Reform

    • 919 Words
    • 4 Pages

    Rapid development of technologies and information, computer and the other sciences made this economy war tougher than before in recent years. China is a good example of these fast changes and developments. So many experts believe the second most powerful economy in the word is a real threat to United States economy, not in timeline of the far future. One of the features of fast growing china’s economy is the number of workers and labors. Especially about cheap labors and low skilled workers.…

    • 919 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In 2013 In the Obama administration’s most direct confrontation with China over its theft of corporate secrets, the Justice Department on unsealed an indictment of five members of the Chinese People’s Liberation Army and charged them with hacking into the networks of Westinghouse Electric, the United States Steel Corporation and other companies. These hackers stole nearly 700,000 pages of emails and also some from the chief executive.…

    • 68 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    China is slowly becoming more powerful and some may fear that they could potentially pose a threat to the United States. With this being said the United States needs to figure out how they will respond and what needs to be done to protect…

    • 1003 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    The idea that China is a competitor for the power of Asia will further portray tension between the main superpower, America, and the rising super power, China (Hurrel, A.…

    • 1375 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Too much investment on high technology can lead to failure to invest in other necessities such as military training, military police and linguists (37). Linguists are needed as a way to communicate with people of countries where a power has military presence such as the United States in Afghanistan. Hard power used in cyber information can do damage to physical targets in another country destroying the soft power that cyber information can create to attract citizens to that country. An example of this is when malicious software is used by modern companies to shut down processes such as the Stuxnet worm virus inserted into Supervisory Control And Data Acquisition (SCADA) systems that instructed Iranian nuclear facilities to shut down in 2010…

    • 1535 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays