Cyber Crime Research Paper

Superior Essays
Cybercrime: The Easy Way to Commit a Crime
Cybercriminals are able to commit detrimentals crimes with a click of a few buttons. Cybercrime is the “unauthorized use or disruption of computer files...the theft of an electronic identity...the use of a computer to facilitate or carry out a traditional crime (Engdahl 100).” According to the author of the article “Cybersecurity,” cyber attacks are becoming more and more common. Now that all important or personal documents, including secret government documents are electronic, they often are protected by firewalls are complicated encryption codes. Though these technological advances are great to protect information and keep people safe, it has also become a problem since there are many intelligent
…show more content…
If the government databases, which are protected with the best kind of technology there is, are being attacked, then common civilian digital accounts and files are not secure at all. Based on an article by Keith Lordeau, a former FBI Special Agent, the hacking and tampering of government databases is called cyberterrorism. Cyberterrorism has become more common as the hackers and technology becomes more sophisticated (Lordeau). The explanation for this is that even though the technology is improving and become more advanced, it will not help against the terrorists, because they too are becoming more developed. Lordeau also expresses that “terrorist groups are increasingly adopting the power of modern communications technology for planning, recruiting, propaganda purposes...and the like.” This asserts that modern technology is being used as an aid in planning and everything else aforementioned, which will come back to potentially harm the safety and security of the United States and its people. Technology is being used to help people protect information and make keeping information easier, but is also being used to kill and terrorize. Computers are making it less difficult for terrorists to attack the country. This affects the Unites States as a whole because cyberterrorism is just a modern form of

Related Documents

  • Improved Essays

    Technology is a substantial benefit in life. The internet is used tons of times during the day, but eventually, technology has a detrimental outcome. Technology helps advance a society, but the lack of relationships and human communication, oppression by a large governmental or corporate institution, and use of futuristic technology caused by advancements is dangerous. Humans are using less social skills due to constant messaging with their fingertips. Governments and institutions are beginning to take total power because of the lack of knowledge in the community.…

    • 1124 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Technology is a wonderful thing at time but over the years it has proved itself to cause many problems. We have discovered that technology has many negative consequences that attempt to ruin our society. Some of the negative consequences of being too dependent on technology are that it has taught us to seek convenience rather than using our minds and doing something the way it is meant to be done. We have also allowed technology to influence our minds too much. Technology has been able to influence our minds too much, this is shown in both Fahrenheit 451 by Ray Bradbury and then article “Is Google making us stupid?” by Nicholas Carr.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    After the attacks of 9/11, nearly 263 government agencies were reorganized as well as the creation of the Department of Homeland security, which nearly doubled the intelligence budget from 2001 (Freedman, 2011). Much of the technology used in surveillance efforts is off-the-shelf and is lacking in innovation. Moreover, the technological boom in the private sector has afforded the Government many avenues in which to collect information on private citizen including social media, cell phone records, GPS information, financial records, medical information and other third-party services that are capable of storing gigabytes of information on an individual (Shamsi & Abado, 2011). This notion leads to the issues of that information’s security…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    9/11 National Security

    • 679 Words
    • 3 Pages

    After the event of 9/11 it catalyzed a nation wide awareness of national security. In the face of this devastation, a conversation began regarding the national security at the expense of privacy. As the years progressed this world of data mining and collection began to grow and extend beyond itself. With the fear of terrorism engrained into political topic, the encroachment of privacy became a concern for an average American. This world of interconnected compilation of information became a vast resource, one where the government didn’t have full control, and one where others had access.…

    • 679 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    User Liberties/Rights Assessment USCENTCOM and ultimately the 160th Signal Brigade is responsible for maintaining communications in a very dynamic and high risk environment. The mission is to maintain our human rights and defend against terrorism. This mission needs to transfer to defending rights on in cyberspace. Policies confronting challenges of preserving core rights and liberties is part of the commitment.…

    • 1749 Words
    • 7 Pages
    Brilliant Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    However, these same technological advancements have a history of bringing fear, social injustices, and larger economic crashes to the same populace; technology gives Americans the opportunity to help or hurt, and the two are not mutually exclusive. While human nature is very difficult to change, keeping the malicious potential of cutting edge technology is paramount to ensuring a safe and prosperous future for all Americans and the world…

    • 966 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Forms Of Digital Crime

    • 547 Words
    • 3 Pages

    1. Describe some of the most common forms of digital crime. The four most common forms of digital crime are Tax-refund Fraud, Identity Theft, Theft of Sensitive and Theft of Intellectual Property. I have been the victim of two of these and maybe all four because two of them can happen and connection with the other. For example, back in 2013, around tax time, I received a letter from the IRS office out of Georgia, stating that I owe states for 2012 taxes year.…

    • 547 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    The ability of the homeland security system to assess and respond to future threats can at times be uncertain. This is due to the ever evolving nature of the threats posed to the country. As new threats are addressed more is learned about resources are needed for each type of manmade or natural event. Since, September 11, 2001 many steps have been taken to address this country’s vulnerability to terrorist attacks and Hurricane Katrina demonstrated the need for improvements in the country’s ability to respond to natural or mass casualty disasters. The Department of Homeland Security was created to assess these threats and establish procedures to improve the resiliency of the country.…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Research has shown that criminals usually fall into stage one and two of moral development, where non-criminals usually fall in between stages three and four. In stage 1, children comply with authority out of fear. Leaving the assumption that something is viewed morally correct if punishment is avoided. Therefore, individuals that did not progress through this stage will think that their criminal behavior is acceptable as long as they go unpunished for the criminal act. In stage two children define what is right by having their needs satisfied; defining what is right if they are not punished for it (stage 1) and it satisfies their needs.…

    • 1361 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Cyberstalking is on the rise in the United States. It is just as serious as if someone was stalking you at your home or work. The problem with a cyberstalker is that you may not even realize you are being stalked until it gets too far out of hand. Also trying to catch a cyberstalker is more challenging than a normal stalker.…

    • 833 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    There are quite a few government and intelligence agencies including the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS), and also state and local law enforcement agencies. With modern day technology becoming so advanced, agencies must find new ways to stay ahead and on top of the security for the nation. The National Security Agency’s mass surveillance has expanded in the years since September 11, 2001. Many people happen to be against government monitoring only because they are unaware of how data is retrieved, analyzed, and stored by the government networks. The process is more than just collecting information from phone calls, emails, and other online communications.…

    • 729 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays

Related Topics