Weapons Of Mass Destruction Essay

Improved Essays
The Latest Weapon of Mass Destruction: Technology
As a result of humans being intelligent and resourceful, the technology age began with the invention of simple stone tools to survive in nature. Over time the discovery of fire progressed to candles and ultimately to electricity. Communication evolved from pictographic writing to the telegraph and now to smart phones and computers. Medical advances such as x-rays and MRIs are essential in health care, and the internet offers digital information about virtually every topic. With the transformation from simple tools to modern technological devices in every industry, technology has made life easier and more productive. Additionally, technology changes society, culture, and behaviors. The new generation
…show more content…
For example, in Houston, Texas a woman describes how she was harassed by her ex-husband. "He had every text, every picture. He knew exactly where I was all the time. It was infuriating, I had no idea this type of obsession and anger was inside of him” (Willey, n.p.). A digital forensic specialist determined her ex-husband had sent tracking software to her phone through an email. Even though this case involved implantation of a tracking device, 20% of victims are tracked through social networks, compared to 4% who are targeted via dating sites (Smith, n.p.). In this case the stalker had a personal connection to the victim; nevertheless, if the stalker is unable to make contact with one device such as the victim’s cellphone then the stalker will utilize emails, GPS, or social media websites to acquire the necessary information. Cyberstalking can last for a long time; Kaitlin, a former business analyst, was abused for six years. She recalls her experience, “each time she confronted the colleague about his behaviour, she experienced a backlash via strange activity on her computer, including unauthorised remote desktop control and invasion of her social media networks and software programs” (Rawlinson, n.p.). Even though Katlin confronted the police, they did not take her claim seriously and proceeded to do nothing because many police …show more content…
Currently, forty-seven states have laws against cyberstalking (Anderson, 20); these laws are created by the states for the states; on the other hand, Congress has only created a few federal policies. “In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA). This law has been amended and expanded as internet technology has advanced, and it continues to form the basis for federal prosecutions of computer-related criminal activities. Other relevant federal statutes include the Electronic Communications Privacy Act (ECPA), the Identity Theft Enforcement and Restitution Act of 2008 (ITERA), and certain provisions of the USA Patriot Act” (Computer Crime Law, n.p.). Although these policies have been created, they are not effective in halting cyberstalking. Even a police official admits, “they still lack the legal tools to combat it” (Quarmby, n.p.). E-crimes are such a new issue that the current laws do not grant the police the ability to act or provide formal punishment for the cyber criminals; therefore, many criminals escape being apprehended and get away with their injustices. The internet masks the true identity of the person responsible; furthermore, “proving that a person is a victim of cyberstalking is the biggest issue faced by the courts and the victims (Anderson,

Related Documents

  • Superior Essays

    Bullying in the World I am sure that people are aware that not everyone gets a great start to life, like Jeanette Walls in The Glass Castle. Many people across the world struggle with all kinds of hardships. Others think they understand these hardships, but I believe that no one can ever truly understand until they go through it themselves. People who grow up in a better situation could never really know the feeling of being in such a poor situation. One of the major causes of these hardships nowadays is bullying.…

    • 1304 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Nicholas Carr vs Kevin Kelly Imagine a world where the internet, electronic devices, smartphones, or any type of technology that you have ever known, did not exist. How could you live without these tools? Technology has been innovating society for the past centuries. People all around the world have been benefited by the new products that technology has to offer. It is almost impossible to imagine a society without technology.…

    • 817 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    There are many ways that technology shapes our day-to-day life. It’s our future, and the less someone knows about it, the more likely they are to fall behind in society. While technology has its ups and downs, it is a gateway to the future and is continually changing our culture. In Kara Alalmo’s article “7 Ways the iPhone has made life worse” she states that “While we're busy on our phones, we're ignoring the world around us” (Alalmo).…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    America’s Gift To My Generation The gifts America has given us aren’t ordinary, they’re legendary. To be cherished to posses. However, America has given us gifts, to treasure. They have given us technology, freedom, and education.…

    • 402 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nobody would argue that the use of technology has dramatically increased over the past decade, let alone over the past century. Need an example? By looking at our everyday lives, countless examples exist from cars to computers. Technology has impacted and changed every aspect of our lives. Namely, one piece of technology in particular transformed people’s lives: the television.…

    • 1636 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    WW2 Was the US justified in dropping atomic bombs on Hiroshima and Nagasaki during the second world war? Discuss the benefits and costs that resulted. In 1945 the world changed.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    While some sites concentrate on laws that defend victims age 18 and under, Working to Halt Online Abuse is a help resource comprising of a list of up-to-date and unresolved cyberstalking-related in the United States federal and state laws. In addition, it lists those states that do not have laws yet and associated laws from other countries. The Global Cyber Law Database (GCLD) wishes to become the most inclusive and influential foundation of cyber laws for all countries.…

    • 1184 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Weapon of Mass Destruction are very important and could cause members from Emergency Management and Military to react to an attack. I will conduct research on all of the different types of categories for WMD. The research on WMD will consist of history of; chemical…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Technology-Assisted Abuse Stalking has been a controversial issue due to that the majority of the behaviors did not cause physical harm to the victim. It was not until recent years, after several high profile stalking cases, that laws regarding stalking come into existence. The growth of technology and social media as given perpetrators greater access to their victims. While digital technology and social media can be useful, even to the victims that have suffered abuse, perpetrators can also use the technology against their victims to stalk, harass or even bully, with an access to their victims that traditional stalking never provided. Technology-assisted abuse is the use of technology by perpetrators to intimidate and torment their victims.…

    • 610 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Jeri JanzTechnology and Autism What is Autism? Have you or anyone you know been diagnosed with Autism Spectrum Disorder? “Autism, or autism spectrum disorder, refers to a range of conditions characterized by challenges with social skills, repetitive behaviors, speech and nonverbal communication, as well as by unique strengths and differences” (What is Autism?).It is actually not uncommon to be affected by Autism, whether it be from yourself or a family member. “The Centers for Disease Control and Prevention (CDC) estimates autism’s prevalence as 1 in 59 children in the United States. This includes 1 in 37 boys and 1 in 151 girls.”…

    • 1119 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Virtue Private Technology

    • 713 Words
    • 3 Pages

    Have one ever imagine living the life when technology was not advanced in the old days? Where people rode horses just to get from one place to another, or how they message and communicate with families and friends over long distance. Going back to them days, technology was poor until people started coming up with new ways to make life easier. It did not change much because the knowledge of researchers was not there yet.…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Bullying can be traumatizing and the effects can be devastating. As technology today improves, cyberbullying becomes more and more common. Cyberbullying is repeated and hostile, and has “severe intent to threaten, embarrass, or harass”. Now with all of the new technology this harassment is virtually inescapable. Because of the negative effects that cyberbullying creates, it has become a largely debated issue whether an individual’s actions online should be prosecuted.…

    • 981 Words
    • 4 Pages
    Improved Essays