Verified Document

America Isn't Ready For Real Digital Protection Of Its Infrastructure Essay

Combating Digital Crime & Digital Terrorism "Describe the overall impact (e.g. economic, social, etc.) of utilizing technologies in combating digital crime and digital terrorism"

It has become very obvious over the past few years that the United States' technologies that are supposed to combat cyber attacks on corporate, personal, and government computers are enormously ineffective. Some would say that is an understatement. This paper discusses ways to combat cyber crime and cyber terrorism. There is good reason why this subject needs addressing not just in college research papers but by the agencies that are supposed to protect Americans and the U.S. government and its employees (including the Department of Homeland Security, the U.S. Secret Service, the U.S. Immigration and Customs Enforcement, among others).

Why better digital crime prevention is imperative

In fact one of the most devastating digital attacks on U.S. government computers occurred earlier in June, as hackers linked to China gained access "... To the sensitive background information submitted by intelligence and military personnel for security clearances" in the Office of Personnel Management (Reynolds, 2015). It was a cyber crime of enormous proportions, and in addition to the regular personnel records of federal employees -- which may lead the cyber criminals to attempt to blackmail, intimidate workers and steal their identities -- the hackers stole a "trove of military and intelligence records that could be even more valuable" (Reynolds, p. 1). The forms that were stolen by the criminals were "Standard Form 86," which lists employees in very sensitive positions and their "weaknesses, past arrests, bankruptcies, drug and alcohol problems" (Reynolds, p. 1).

In addition, thieves stole personnel information from current and former employees including issues linked to divorce information, social security numbers, and private information on roommates, spouses, relatives and friends, Reynolds explained. So, following this successful digital attack, there are nearly 14 million present and former federal employees who are in a "collective panic over the loss of their information" (Reynolds). This brazen security breach is being called a "cyber Pearl Harbor," which may be a stretch, but even though no bullets or bombs have been used, China has accomplished...

personnel information.
What should the U.S. be doing to thwart cyber criminals?

Reynolds writes that the federal government is offering those 14 million employees (and former employees) "free identity-theft protection," but it's like putting a "band-aid on a severed limb," Reynolds writes on page 2. But looking at the problem and what to do, James Jay Carafano explains that the kind of theft that the Chinese pulled off didn't necessarily require "ninja cyber skills" because entrance into so-called protected servers and computers can be done with "phishing" -- gaining entry through passwords by "tricking legitimate users into handing them over" (Carafano, 2015).

It is "unforgivable that the feds couldn't stop the hackers from taking so much out and running their vacuum cleaner operation for so long undetected" (Carafano, p. 1). Washington spends too much time trying to tell the rest of the world what to do and too little time getting its own house in order" (Carafano, p. 1).

The existing challenges based on the independent nature of law enforcement agencies include: a) ensuring cyber crime is being reported; b) ensuring adequate analytical and technical capabilities for law enforcement; c) working in "a borderless environment with laws of multiple jurisdictions"; and d) raising awareness and putting into place "information security practices" (Wolf, U. 2009).

What the United States needs to focus on -- and this is a huge challenge based on the vulnerability America has clearly shown in terms of failing to protect its government resources and infrastructure -- is protecting the "networked critical infrastructures" (NCIs). In a peer-reviewed article in the journal Communications of the ACM, the authors explain that NCIs include "transportation systems, electricity grids, and telecommunications networks, which, if seriously compromised, would disrupt the American economy and "the lives of all citizens" (Siaterlis, et al., 2014).

The past few years have seen a "dramatic increase in the use of information and communication technologies (ICTs) within the NCIs," and the main purpose of those increases has been to "reduce the cost of industrial installations and implement new services" (like maintenance of infrastructures and monitoring of energy markets)…

Sources used in this document:
Works Cited

Bennett, B., and Diersing, C. (2015). Hacked U.S. files not encrypted. Los Angeles Times.

Retrieved June 17, 2015, from http://www.latimes.com.

Bissell, K. (2013). Fighting Cybercrime with Collective Intelligence and Technology.

The Wall Street Journal. Retrieved June 17, 2015, from http://deloitte.wsj.com.
Carafano, J.J. (2015). In cyberattacks, blame the victim: Column. USA Today. Retrieved June 17, 2015, from http://www.usatoday.com.
USA Today. Retrieved June 17, 2015, from http://www.usatoday.com.
Criminals. Govtech.com. Retrieved June 17, 2015, from http://www.govtech.com.
Cite this Document:
Copy Bibliography Citation

Related Documents

Digitization of the U.S. Military
Words: 1732 Length: 4 Document Type: Thesis

Brian Winston, "9 'smell the Tulips': the Internet, Neo-Liberalism and Millenarian Hype," in Access Denied in the Information Age /, ed. Stephen Lax [book online] (New York: Palgrave, 2001, accessed 10 December 2008), 166; available from Questia, http://www.questia.com/PM.qst?a=o&d=102376364;Internet. Stephen Lax, ed., Access Denied in the Information Age / [book online] (New York: Palgrave, 2001, accessed 10 December 2008), 5; available from Questia, http://www.questia.com/PM.qst?a=o&d=102376197;Internet. Michael H. Hoffman, "Corporate Warriors: The Rise of the

Weapons of Mass Destruction WMD Antifa
Words: 3787 Length: 13 Document Type: Research Paper

Weapons of Mass Destruction 1 An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is the reliance of modern business upon the digital infrastructure. Thus, considering an EMP attack is something that government should take very seriously. As more and more of the world becomes dependent upon cyber infrastructure for the maintenance of other systems, the complexity of the security services of a

ERP and Information Security
Words: 8373 Length: 26 Document Type: Term Paper

ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been

E-Banking Its History and Current
Words: 12488 Length: 50 Document Type: Research Proposal

Third is a series of passwords and personal information chosen by the customer. On top of this they guarantee customers that if they are victims of fraudulent activity on their Egg accounts, any losses are covered in full. "This has never happened," says Andrew. "There has never been any breach of internet security." ("- -- : Safety Net for" 2001:44) Again internet and bank security are largely overexagertated yet they

Strategic Plan for AOL
Words: 5783 Length: 14 Document Type: Term Paper

Strategic Plan for AOL What is the meaning of progress? In general it means that the group of individuals or organization is being able to keep pace with the changes that keep coming in with time. AOL was a very large and important unit in the Internet services before the broadband access concepts came in. Today, their technology is backdated and they are trying to come in with new technology. At

Designing XML Databases
Words: 7877 Length: 20 Document Type: Term Paper

Designing XML Databases What exactly is a 'web-enabled database? The World Wide Web, as everyone knows, provides the user with a host of tools with which he cane gain access to information and knowledge on the Internet and browse for information using web browsing technologies. Numerous people also use web browsing in order to deliver marketing messages, advertising information, promotional material for any products, and so on. However, what is most

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now