Who are they? They are people with knowledge of information technology. There are many types …show more content…
n.d, p. 5). “It was like a computer trojan or virus, which infected the system in Iran, and simply damaged the systems and would simply destroy it.” stated Eugene Kaspersky from Kaspersky Lab (as cited in Zetter, K. n.d. p. 34). People believe the Stuxnet was created by Israel and United States to infiltrated the Iranians nuclear program. Stuxnet took over the control of centrifuges that spin nuclear material at Iran’s enrichment facilities (Zetter, K. n.d, p. 23). On November of 2010, the International Atomic Energy Agency said “Iran has suspended all work at its nuclear facilities without explaining why.(as cited in Zetter, K. n.d. p. 45)” Many intelligence agencies accredited to Stuxnet. Iran responded to the hack by assembling the Iranian Revolutionary Guard making it the 2nd largest online army (Clarke, R. A., & Knake, R. K 2010, p. …show more content…
United States accuses China of hacking companies, NASA operations and take total control of The New York Times (Andress, J., Winterfeld, S., & Rogers, R. 2011, p.5).. This century the best weapon is information, who ever uses it has the upper hand. On November of 2011, a group of hackers from China hacked their way in to Jet Propulsion Laboratory, and took over control of 23 space missions some of the destinations include Mars, Jupiter, and Saturn. In March of 2011, the Department of Defense (DOD), revealed 24,000 documents were copied by hackers. Private companies like The New York Times, was the target of hackers after publishing an article of how wealthy, the family of the Prime Minister of China Weng Hei Bau (Andress, J., Winterfeld, S., & Rogers, R. 2011, p.65). The company hired Mendicant for their services, a company that offers cyber security, the company confirms the origin of the attack came from a municipal building in China, which is home to People’s Liberation Army of China Unit 61389 (Andress, J., Winterfeld, S., & Rogers, R. 2011,