StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Crime: Edward Snowdens leaks - Essay Example

Cite this document
Summary
In the paper “Cyber Crime: Edward Snowden’s leaks” the author analyzes the unauthorized disclosure of the classified information on the National Security Agency (NSA) surveillance. The actions of Snowden acted as a whistleblower on the agency…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
Cyber Crime: Edward Snowdens leaks
Read Text Preview

Extract of sample "Cyber Crime: Edward Snowdens leaks"

Cyber Crime: Edward Snowden’s leaks The unauthorized disclosure of the classified information on the National Security Agency (NSA) surveillance was illegal and an act of treason. The director of the agency Keith Alexander during congressional hearings said that the leakage had caused profound and irreversible damage to the interests of national security (Forbes 2013, September). Due to this, the president and the government branded him a threat to national security. However, the actions of Snowden acted as a whistleblower on the agency and encouraged the public demand for increased transparency around the foreign and domestic surveillance. Edward Snowden worked for the NSA for a few years. He realized that the government had breached the FISC rules in 2009 regarding the surveillance of phone numbers without suspicion. In his defense, Snowden says he hacked into the NSA and released sensitive information to the internet in order to show the public what the government was doing so that they would decide for themselves whether or not these policies and programs were justified (Aly, 2013, October). He believed that if he had chosen to report his concerns through an internal reporting mechanism the government would have silenced him and buried his message. In his opinion, reporting wrongdoing to the perpetrators responsible for it just meant the system would not work to address his issues (Pilkington, 2013, October). As a result of his whistleblower actions, there has been a public demand for the transparency of the rulings of the Foreign Intelligence Surveillance Court (FISC) as well as other reforms in the agency. In my opinion, Snowden’s actions brought more good than bad. While his actions were criminal, his intentions were for the good of the public. He should be tried fairly for the release of sensitive government information but should be protected by whistleblower legislation. This is because despite doing the right thing, he used illegal means and posed a national security. References Aly M., 2013 (October 26). Snowden's Secrets. Retrieved from http://prezi.com/yyaemtwr2sk3/snowdens-secrets/ Pilkington E., 2013 (October 20). Edward Snowden: US would have buried NSA warnings forever. New York, NY: Retrieved from the Guardian UK: http://www.theguardian.com/world/2013/oct/18/edward-snowden-us-would-have-buried- nsa-warnings-forever 2. The most dangerous threats a) Malware shopping spree. This threat to mobile devices entails the action of criminals of automating a profit-making technique such as a Trojan horse program that buys apps from the app store without the permission of the user. These criminals develop mobile worms that without necessarily installing them provide the platform for malware that buys these apps. This problem causes a concern for all phone users since the automation of these criminal activities reduces the interaction of the user making it difficult to prevent the mobile worm from shopping using the mobile. b) The availability of malware kits. The underground market has provided a large amount of windows-based malware to cybercriminals. Their easy availability places windows users at a risk since they make it easy for criminals with basic knowledge about operating systems to access information stored on computers through public networks and by hacking into the computers. c) Ransomware. This system of malware does not depend on the use of infected systems by the victim to conduct financial transactions in order to prey on them. These criminals hijack the victim’s ability to access data or communicate and they prevent the victim from accessing the system completely. Thus the victim is forced to pay a ransom in order to regain access. This is a risk to all users of online accounts either on phone or computers. d) Big scale attacks. This entails the implementation of an attack using worms to cause as much damage to a company system or a public system. The installation of destructive malware on a large number of machines can be devastating for the users since they may lose important data stored on the local machines. e) SMS spam. Cell phone providers rely on forwarded messages from their consumers to block the numbers sending the spam. However, spammers infect phones to send the spam text messages. The victims face the problem of having their accounts blocked by their providers. This could be a great inconvenience to anyone especially since the victim wouldn’t know the reason for being blocked. 3. Cybercrime case. (Reuters, 2013, May 9) In a bloodless bank heist that impressed cyber experts, perpetrators the US hacked into bank accounts with advanced technical sophistication changing the bank balances and making away with more than 45 millions dollars. A small team of skilled hackers erased withdrawal limits on prepaid credit cards and stole account numbers. Handheld devices were used to alter the information on the magnetic strips of used credit cards stolen form the Middle Eastern banks and these were used to carry out theft at ATMs in 27 countries. This story is important to me since it shows the vulnerability of the customer with a bank account since the criminals were able to hack into the bank system and change the account balances with the stolen account numbers. (Ashford W. 2012, August) A hacking group known as D33D Company hacked into Yahoo and stole an unencrypted file that contained the login details for Yahoo accounts as well as others such as Gmail and Hotmail. Jeff Allan a Yahoo user from New Hampshire, filed a complaint in a federal court in San Jose complaining of the lack of the email provider to secure his personal information. He was seeking compensation for himself as well as for other users for account fraud and for having to undertake personal measures to protect his account which should have been the responsibility of Yahoo. This story is of importance to me since I am a frequent user of Yahoo and other email providers in my daily activities and a breach of this confidentiality is an eye opener that the internet is not as safe as I perceive it to be. (Tangel, 2013, January) the US prosecutors brought before a court in New York a cybercrime case against three suspects, a Russian, a Latvian and a Romanian. They were alleged to have created and distributed a computer virus called Gozi virus that infected thousands of computers in the United States in a bid to steal the bank account data of victims. The virus was used to steal millions of dollars. Risks such as this are eye openers and they increase the fear of customers banking online. References Ashford W. 2012(August 2). Yahoo user sues over personal data breach. Available at http://www.computerweekly.com/news/2240160748/Yahoo-user-sues-over-personal-data-breach Reuters, (May 10). US Charges 8 in $45 Million Cyber Crime Scheme. Voice of America. Available at http://www.voanews.com/content/us-cyber-crime-eight-scheme/1657912.html Tangel A, 2013 (January 23). Cyber-crime ring targeted U.S. bank accounts, feds say. Los Angeles Times. Available http://articles.latimes.com/2013/jan/23/business/la-fi-mo-cybercrime-ring-targeted-us-bank-accounts-feds-say-20130123 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Crime: Edward Snowdens leaks Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Cyber Crime: Edward Snowdens leaks Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1489588-journals-about-computer-technology-crimes
(Cyber Crime: Edward Snowdens Leaks Essay Example | Topics and Well Written Essays - 750 Words)
Cyber Crime: Edward Snowdens Leaks Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1489588-journals-about-computer-technology-crimes.
“Cyber Crime: Edward Snowdens Leaks Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1489588-journals-about-computer-technology-crimes.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Crime: Edward Snowdens leaks

Impact of Revelations of Edward Snowden on Public Image of GCHQ

A case of revelations of an employee of an intelligence agency occurred when edward Joseph Snowden revealed the activities the United States National Intelligence Agency... Many stakeholders in the current generation are focusing on ways that can improve the level of security within their environment and the general territory i....
17 Pages (4250 words) Essay

Edward Snowdens NSA Leaks

A paper "Edward Snowden's NSA leaks" claims that the manner in which these agencies work to undermine security standards that commerce, banking, and internet rely upon were revealed.... How the Events Could have been preventedThere are a number of measures that should have been ensured to prevent Snowden's leaks.... However, the leaks had far-reaching effects.... hellip; edward Snowden is well known for his role in revealing a number of surveillance programs undertaken by GCHQ and NSA....
2 Pages (500 words) Assignment

Application of Data Mining

The information which is extracted from the data can be used for different purposes.... Data mining is used to generate revenues, cut costs, or get an insight… Recently, it has been revealed that the government has also been using an advance form of data mining where they are able to get the complete information about any individual....
5 Pages (1250 words) Essay

Cyber Intelligence and Privacy Breach

It largely observes and conducts surveillance activities on online traffic and via phone calls recording.... This has led to questioning with regard to… The pertinent question is to ensure maximum security, and at the same time ensure that the privacy is not breached. Owing to this concern, number of citizens moved the pleas presented were based on the fact that privacy is being eroded....
6 Pages (1500 words) Essay

Fundamentals of Information Systems Security

This is where technology is protected from crime such as unauthorized use.... cyber attacks are rampant nowadays, therefore, the IT specialists are required to keep this information as protected as possible as the crimes may breach critical information especially in the government or private sectors (Kanade & Dorizi 2012, 21)....
7 Pages (1750 words) Term Paper

The Privacy and Surveillance in Relation to the Internet

The radical increase of privacy violations for Internet users worldwide has led authorities to concerns regarding the effectiveness of existing legislation regarding Internet use.... Gaps have been identified both as the prevention of privacy violations and the punishment of these activities.... hellip; As a result, criminal behavior on the Internet has become quite challenging to control, a problem related to various factors....
5 Pages (1250 words) Case Study

Edward Snowden: A Global Hero

This paper “edward Snowden: A Global Hero” takes its stand on the debate and discusses why Snowden should be treated as a hero whose bravery can be matched by few in his generation.... An example is a leak on institutions that the government had marked for cyber attacks, a process that would impair the institutions' operations and possibly inconvenience citizens who are clients to the organizations....
6 Pages (1500 words) Assignment

Technical Specifics of AI in the Real World

… Artificial Intelligence (AI) is a science of intelligence.... It is the intelligence that machines or software exhibit.... As an academic field of study, it seeks to establish the perceptive and cognitive nature of so-called intelligent systems.... It also Artificial Intelligence (AI) is a science of intelligence....
10 Pages (2500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us