Cyberspace Privacy and Security

CyberspacePrivacy and Security

Cybercrimeis an offense area that has radically spread in the contemporarysociety. A large number of criminals are exploiting the advancementin technology, speed, and the accessibility of the internet toventure into unlawful acts. The vice is not limited to physical andvirtual boundaries and has alarmingly posed a threat to unsuspectingvictims worldwide (Filshtinskiy 28). The nature of cyber offence isevolving every day. Initially, it was mainly carried out byindividuals or small sects. Currently, complex networks have beenestablished to bring together people from different areas in actualtime to commit criminal practices on an extraordinary scale. I am ofthe opinion that cybercrime against national institutions is more ofa threat than that directed to individuals and the private sector.

Cybercrimeon Institutions

Publicfacilities are prone to computer hackers, who are in dire need toaccess sensitive records, carry out financial fraud, and commit cyberterrorism. All levels of state bodies are at risk of the offense(Alexander et al. 18).For instance, in the month of June 2009, theCounty of Bullitt, the government of Kentucky was robbed $415000 by asyndicate of cyber delinquents. The most scaring bit of the happeningis that it was corporation between criminals of US origin andUkrainians. The brains that directed the ordeal were based in Ukrainewhile their counterparts here only played a supportive role. As perthe unidentified body that carried out the investigation, thecriminals stole the funds with the aid of a custom variant of akeystroke classification Trojan referred to as Zeus. It is also knownas Zbot.

Oneparticular aspect of cybercrime that targets national entities iscyber terrorism. This practice is a dominant platform as it can existin relative privacy across the whole globe. This concept has mutualsimilarities to other cybercrime traits. However, it tends to laymuch focus on interrupting computer systems and intimidation orcoercion of individuals so as to stamp particular political orreligious ideologies.

Unlikein the ancient times, the modern institutions are based significantlyon computers. The financial structures, aviation departments, andseveral sensitive areas on national security data saved in publicbodies networks are prospective targets of this form of terrorism(Filshtinskiy 30).

Themajor frightening part of the potentialities of cyber terrorism isthe mere idea of it, which drives fear and anxiety not only amongindividuals but also the state officers. It is a real threat in thecontemporary United State of America.

TheUSA and Cyber Warfare

Itis clear that cyber-attacks are on the rise today (Alexander et al.18). Enemies of this country are continuously wreaking actual damageto the national firms’ security and the country’s economy ingeneral. Unfortunately, the Government looks unprepared to tacklethis threat the same way it has put up mechanisms to deal withcriminal activities in other sectors. In 2015, within a span of twomonths between June and July, a lot happened as a result ofcyber-crimes. In June, a disclosure indicated that strong attack hadcompromised individual information of approximately 4 million ofthose employees who still under service and the previous employees.Hackers also managed to steal social security codes from over 20million citizens.

In2011, when the US drone came down in Iran, it was reported that itwas due to a technical problem by the government officers(Filshtinskiy 29). However, the intelligence reports by Israel showedthat it was as a result of cyber-attack that disrupted thecommunication system. Currently, the ISIS movement usessophisticated technology to carry out its activities. I believe thegovernment has a lot to do to match the ever changing technologies.

WorksCited

Alexander,Keith., Emily, Goldman., and Michael Warner. “Defending America inCyberspace.” NationalInterest.128(2013): 18-24.

Filshtinskiy,Stas. “Cybercrime, Cyberweapons, Cyber Wars: Is There Too Much ofit in the Air?”Communicationsof the ACM.56.6(2013): 28-30.