Stuxnet Persuasive Speech

Improved Essays
“We are anonymous. We are a legion. We do not forgive. We do not forget. Expect us.” There’s no bomb going off, shots are not being fired, but they say they are fighting a war, daily. Anonymous, their battleground is the internet, they support human rights and freedom. Their attacks have taken down, a website like the Central Intelligence Agency (CIA), Corporations, foreign governments, including the Federal Bureau of Investigation (FBI). What happens behind the curtains, for governments that want information to be on the top of the chain of command, to stop a movie release that showed their leader assassinated. Who are they? and what happens next?
Who are they? They are people with knowledge of information technology. There are many types
…show more content…
n.d, p. 5). “It was like a computer trojan or virus, which infected the system in Iran, and simply damaged the systems and would simply destroy it.” stated Eugene Kaspersky from Kaspersky Lab (as cited in Zetter, K. n.d. p. 34). People believe the Stuxnet was created by Israel and United States to infiltrated the Iranians nuclear program. Stuxnet took over the control of centrifuges that spin nuclear material at Iran’s enrichment facilities (Zetter, K. n.d, p. 23). On November of 2010, the International Atomic Energy Agency said “Iran has suspended all work at its nuclear facilities without explaining why.(as cited in Zetter, K. n.d. p. 45)” Many intelligence agencies accredited to Stuxnet. Iran responded to the hack by assembling the Iranian Revolutionary Guard making it the 2nd largest online army (Clarke, R. A., & Knake, R. K 2010, p. …show more content…
United States accuses China of hacking companies, NASA operations and take total control of The New York Times (Andress, J., Winterfeld, S., & Rogers, R. 2011, p.5).. This century the best weapon is information, who ever uses it has the upper hand. On November of 2011, a group of hackers from China hacked their way in to Jet Propulsion Laboratory, and took over control of 23 space missions some of the destinations include Mars, Jupiter, and Saturn. In March of 2011, the Department of Defense (DOD), revealed 24,000 documents were copied by hackers. Private companies like The New York Times, was the target of hackers after publishing an article of how wealthy, the family of the Prime Minister of China Weng Hei Bau (Andress, J., Winterfeld, S., & Rogers, R. 2011, p.65). The company hired Mendicant for their services, a company that offers cyber security, the company confirms the origin of the attack came from a municipal building in China, which is home to People’s Liberation Army of China Unit 61389 (Andress, J., Winterfeld, S., & Rogers, R. 2011,

Related Documents

  • Decent Essays

    Do you like sorting through trash? Going green for Gatesburg idealizes that you should. Recycling for the most part is to hard with the way meterials are made in todays society. I believe we should not have to worry about our trash. Americans recycle 95% of lead-acid batteries and 70% of steel cans and newspapers, according to Opposing Views on the GatesburgGoGreen Initiative.…

    • 189 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Deadened previous Olympian Jamie Nieto strolls spouse down walkway Donning News Sporting NewsJul 23, 2017, 5:14 AM Deadened previous Olympian Jamie Nieto strolls spouse down walkway Nieto made around 130 strides with no help and strolled his significant other Shevon Stoddart down the walkway at their wedding on Saturday. More Jamie Nieto made an eager guarantee to his fiancee and kept it as the couple marry this end of the week.…

    • 275 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    This author himself is a highly educated, college professor. Even with that perspective of being a scholar in this field of study for more than 5 years, Herb does not frame this article to be viewed by other highly educated university professors in his similar field of study. As I mentioned before he aims this article at a more general population. The actual audience of this piece would be subscribers to the Washington Post where this article was published. In addition to the subscribers, the ideal audience would include individuals in care about the Equifax hack or cyber space policy and security.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Tucson Persuasive Speech

    • 453 Words
    • 2 Pages

    448 Thanks for being a frequent visitor to tucson.com. You have now viewed of your FREE premium pages this 30-day period. After you have viewed FREE pages, we will ask you to purchase a subscription. Thank you for reading and relying on tucson.com for your news and information. You have now viewed your 30-day allowance of FREE pages.…

    • 453 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    In the case of the Cuban Missile Crisis, the NSA-CSS’s codebreakers and makers helped track Soviet intentions when the crisis threatened nuclear war. The NSA/CSS played a major role in the crisis by using Signals Intelligence and by gathering intelligence and providing it to the Central Intelligence Agency, the Department of Defense, and the executive branch before, during, and after the crisis. Not many of the United States Signals Reports have been declassified since the agency places concerns for its interpretation of “national security interests” above public discloser. But some of the reports from the Cuban Missile Crisis have been released so the people of the United States can gain a better understanding…

    • 1143 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Just a reminder, there will be a meeting today in the Main Building at 5:30PM, Room 0.106 I hope to see all of you there. We have a special event coming up on March 10, 2016.(Congressman Joaquin Castro will be in attendance). Lot's of preparation will be needed, which will mean lots of help will be needed as well. Please come out and show some support to our meeting today and to our event on March 10,…

    • 78 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Newseum Persuasive Speech

    • 1189 Words
    • 5 Pages

    If the Newseum is torn down, the first amendment will not have a place to be celebrated just for itself, so there will be no place to celebrate the first American Constitutional freedom. President Trump is pressuring Congress into passing a bill that will start a project to make room for new monuments. The project will consist of tearing down monuments that the government feels are unnecessary. The project will ruin DC and the American spirit. If the bill does pass, the Newseum should definitely not be torn down since it is a reminder of what America is, it will have horrible economic effects on the country, and tearing it down will diminish the American spirit.…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Fear appeal is an emotional strategy that creates fear in the audience to motivate them to agree with the rhetor and take action. A fear appeal draws on basic needs that the audience cares for, and presents it as something at risk that can be solved with the rhetor’s idea and direct action. The appeal is an attempt to scare the audience that something bad will happen to their needs if they don’t create change. A fear appeal used on the subject of binge drinking can show that a person could die from alcohol poisoning.…

    • 235 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    Anonymous Court Case Study

    • 1946 Words
    • 8 Pages

    Not long ago it would have been unimaginable that a group of random people working remotely from anywhere in the world would be able to band together to electronically fight common enemies. However, recently a hacktivist group identifying as Anonymous has risen in power and size with the goal of fighting anyone they deem threatening to innocent people. Their operations and tactics range from gathering and leaking sensitive and/or restricted information from large corporations, to hacking Google Search in order to produce skewed (and negative) results when people searched topics related to their enemies. This type of hacktivist group is a relatively new idea and there is no set precedent for how the American government should deal with such…

    • 1946 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    Hello, fellow Lexington resident. I think both of our post highlight the amazing things that Lexington does to keep itself green. I wasn't aware just how incredible these things were, until I learned that other cities don't provide their residents with them. Do you think that all this expansion will hurt us in the green category though? It saddens me just to think about all the destruction of beauty that is happening to expand our city!…

    • 157 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In everyone’s life, there will be trials they will undergo. Revelation 2:10 says, “Do not be afraid of what you are about to suffer. I tell you, the devil will put some of you in prison to test you, and you will suffer persecution for ten days. Be faithful, even to the point of death, and I will give you the crown of life. A great number of people are able to persevere through the trials they face and continue living their lives.…

    • 1068 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Even today hackers and even terrorists continue to manipulate nuclear…

    • 1350 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Secondly, all the powers have very clear problems. One big problem with soft power is that it is difficult to incorporate into government strategy due to its dependency on credibility, and also results often take a long time and the resources used in soft power are not under full government control (83). An example of why soft power may not be successful if implemented in government strategy is with the issue of North Korea’s nuclear weapons because North Korea cannot be stopped with soft power (84). Any country would need hard power if they were to dispute this issue, not soft power because the use of culture or values would not be able to deter the use of weaponry. Soft power in government is also a problem because governments rarely have…

    • 1535 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    From 2012 -2016, Businesses – Other (BSO) industry has a total of 85% data records affected compared to any other organizations. Businesses - Retail/Merchant (BSR) were at 5%, Government (GOV) at 2%, Medical (MED) at 1%, Businesses - Financial/Insurance Services (BSF) at 7% and Education (EDU) and Non-profit (NGO) organization reveals at 0%. Even though, Education and Non-profit organization resulted at 0% that doesn’t mean that these two organizations had been spared from data breaches. Their overall data records breached were 4,207,097 and 312,462 respectively. The result was very much lower that the average were only in the range of 62,492 to 841,419 compared to other organization’s million average of data records being breached in the last five years.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays