StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Espionage Crime - Report Example

Cite this document
Summary
According to research findings of the paper “Cyber Espionage Crime”, the US government should establish trade links and proper relationship with countries such as Russia and China as well as other international communities. Such links may help to reduce cyber espionage crimes and promote cohesiveness. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Cyber Espionage Crime
Read Text Preview

Extract of sample "Cyber Espionage Crime"

Topic: CHINESE MILITARY ANALYSIS Introduction Cyber espionage entails un ized access of information in a secretive manner via the use of networks such as extranet, internet, LAN among other networks. The information obtained is used to destroy the critical infrastructure of the government, organisation and individuals. An organization such as military, government or even against an individual. United States government and other countries had been losing substantial amount of money through cyber espionage. Most of the cyber criminals are terrorist cyber groups from China whose objective is to access illegally and vandalize country digitalized property. The primary motives of cyber terrorist groups are to destroy the US intelligence powers and in return further theirs as well as boost their prestige. Various countries across the globe had been experiencing significant challenges attributed to cyber espionage. The crime has destroyed the united state technological infrastructure whereby, exposing the government, military, and business to great risk (Bucci, Rosenzweig and Inserra, paras.1-5). Exposing One of China’s Cyber Espionage Units, For the first time, the United State Department officials held unprecedented meeting with officials from Beijing. The US officials had a confrontation with Chinese officials over the persistent hacking of the US firms. The US officials presented evidence to substantiate their accusation over frequent hacking of the American companies by Chinese People Liberation. However, the Chinese officials denied the claims. The US planned to apply indictments to remedy the situation which Steinberg James reported that it might not work (James, pp.31-32). However, despite the accusation made by US Department officials over People Liberation Army (PLA). The PLA plays a significant role not only for the wellbeing of Taiwan but also for the benefits US and other parts of the world. Among the roles played by PLA include; humanitarian assistances, keeping of peace, defending the border and fighting terrorism to mention just but a few roles played (Andrew, David and Kamphausen, para.1-2). The People Liberation Army utilizes its sophisticated Computer Networks to coerce Taiwan to be part of China and at the same time to frustrate united state military efforts against cyber espionage. The PLA view uses computer Network operations and Information operation as tools for executing their military objectives (Andrew, David and Kamphausen, pp.259-286). Key elements of the problem The Key elements of Cyber Espionage crime may be understood by answering a number of questions such as where does cyber espionage exist in the technological world. Secondly, what kind of technology is employed to carry out cyber espionage crime? Thirdly, who are involved in the execution of cyber espionage crimes? The answers to the above three questions constitute the elements of cyber espionage. Cyber crime espionage crime constitutes the ancient and the classical versions of crimes that are now executed using digitalized technology. Research indicates that the main motivation of Chinese cyber espionage criminal is to vandalise critical technological infrastructure of the United Sates government and to prove their power over the US government (David and Philip, pp.336-346). The other element of cyber espionage crime is a challenge involved in identifying criminal’s location, identity and motives. Law enforcement agencies find a difficult time in their efforts to investigate whether the cyber criminals are terrorist or are just Chinese government actors posing Security threats to the US government (Michael and Philip, pp.136-154). However, the US government failed to combat cyber espionage because of a number of issues. First failure to understand what constitute cyber espionage acted as one of the most significant barriers to combating cyber espionage crime. Secondly, cyber crime tends to overlap with other crimes that make it difficult to identify and to tackle the crime. Thirdly, cyber crime is very dynamic as compared to other forms of crime and hence, making it quite challenging to address it. Therefore, the US government failed to understand the above elements of cyber Espionage that in return made their effort of combating cyber espionage unsuccessful. The US government employed legislative measure alone such as amending the law to curb cyber espionage. The legislative measures turned out to be unsuccessful because cyber espionage is a dynamic crime in the sense that it is based on application of information technology which keeps changing (Dennis, p.167). Private companies are also a key target of cyber espionage Research indicates that private companies are also a target for cyber espionage. For instance, 4 private companies that are based in Pennsylvania were hacked by a group of 5 army officers from China. The officer managed to hacked sensitive trade secrets and vital information regarding the four firms. The other private company that was being target was the solar world company that is based in Pittsburgh. Research indicates that those companies had some trade links with Chinese companies which exposed them to the risk of being hacked. The US government, China United Nations and China should lay down strategies to combats Cyber espionage crime. The first response to cyber espionage is to create awareness through education and training. United Nations, China and the US government should carry out the awareness, education and training that may help to equip its security forces and members of the public with the necessary knowledge on how they can detect, identify and combat cyber espionage crimes. The second response/strategies that should be put in place are to come up with the new cyber security concept. The cyber security concept will include developing secured computer programs that safeguards companies and government data. The concept may help to safeguard the Department Of Defence network and other sensitive government networks (U.S. Department of Defence, para.3-6). The third response that the International community should employ is to create proper coordination with all its agencies, departments private and public sectors. Fourthly, the US government should focus at building proper working relationship with other countries such as Russia and China (Michael Kiselycznyk and Philip Saunders, p.104). Policy recommendations The US government, UN and International community should employ various policies and respond to the Chinese cyber espionage. Some of the recommended policies include dynamic information strategies. This involve coming up with new information security measures that changes with time. For instance, the systems used in the information sharing should be modified in a manner to protect organisation data. Further, the following seven key policy recommendations may are important and therefore the government should consider them. The first recommendation is to make amendment on the information technology and education system in order to integrate important information security measures. The recommendation may help to educate students on how they can safeguard their information as well as how they can report any perceived acts of cyber espionage to the relevant authorities. Secondly, the government should create information security awareness programs to train its people and companies on online security. The program may help individuals and companies to detect and prevent the incidence of cyber espionage. Further, liability management systems such as insurance should be developed to prevent, control, and manage risk attributed to cyber espionage. This recommendation may help to provide cover/reimbursement on the loss incurred as a result of cyber espionage. The other recommendation is that, the US government should promote trade investment links through Trans-Specific-Partnership that eliminate trade embargos and ensure that there is free trade between China and US (Robert et al, 2-10). Removal of such barriers may help to create proper social rapport between the two nations as well as eliminate fear/threat between them. In addition it may help to promote the economic growth of both countries. However, this strategy has a disadvantage because it may expose US to more cyber espionage threats due closer trade relationships. Summary Cyber espionage entails accessing information without the permission of the owner through secretive means. It involves use of a wide range of Networks such as; Local Area Networks, Extranet internet to mention just but a few. The key elements of cyber espionage include; unlike other virtue crimes, cyber espionage is a dynamic virtue crime due to changes in technology. The other element of cyber espionage is that the motives of the offenders are to destroy the country critical infrastructure. In addition, it is not easy to identify cyber espionage crime since it’s a virtue crime. Further, the responses on cyber espionage crime have been discussed as well as policy recommendations. Some of the recommended policies include; establishment of dynamic information strategies and education awareness on information security. Moreover, the government should establish liability management system to mitigate risk associated with cyber espionage. Conclusively, the US government should establish trade links and proper relationship with other countries such Russia and China as well as other international communities. Such links may help to reduce cyber espionage crimes and promote cohesiveness. Works Cited Andrew, S.David.L and Kamphausen.R. Beyond the Strait: PLA Missions other than Taiwan. June. 2010. Web.15.10.2014.. Bucci.P.S, Rosenzweig and Inserra.D.A Congressional Guide: Seven Steps to U.S. Security, Prosperity, and Freedom in Cyberspace.01.04.2014. Web. 22.09.2014. . David M. Finkelstein, China Reconsiders its National Security: The Great Peace and Development Debate of 1999, The CNA Corporation, Alexandria, VA, December 2000,http://www.cna.org/sites/ default/files/D0014464.A1.pdf David C. Gompert and Philip Saunders. The Science of Military Strategy, Beijing: Military Science Press, 2005.Print. Dennis J. Blasko. The Chinese Army Today: Tradition and Transformation for the 21st Century, Routledge, 2012, pp. 20-43, 80-114 James C. Mulvenon. Exposing One of China’s Cyber Espionage Units. 22.05.2014. Web.15.10. 2014. . Kevin Pollpeter. Paradox of Power: Sino-American Strategic Restraint in an Age of Vulnerability, National Defence University Press,2011.web.15.10.2014.. Michael Kiselycznyk and Philip Saunders. Civil-Military Relations in China: Assessing the PLAs Role in Elite Politics.INSS China Strategic Perspectives 2, Washington, DC: National Defence University, 2010, 1-39, http://www.ndu.edu/press/lib/pdf/china-perspectives/ChinaPerspectives-2.pdf Robert G. S., Michael.E.B, Timothy J. A., Mike M.M and Deepa.O.Balancing Acts: The U.S. Rebalance and Asia-Pacific Stability. 01.08.2013. Web. 23.09.2014 :< http://www2.gw u.edu/~sigur/assets/docs/BalancingActs_Compiled1.pdf> U.S. Department of Defence. Military and Security Developments Involving the People’s Republic of China 2013, Washington, DC, May 2013, Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cyber Espionage Crime Report Example | Topics and Well Written Essays - 1250 words, n.d.)
Cyber Espionage Crime Report Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/politics/1839673-chinese-military-analysis
(Cyber Espionage Crime Report Example | Topics and Well Written Essays - 1250 Words)
Cyber Espionage Crime Report Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/politics/1839673-chinese-military-analysis.
“Cyber Espionage Crime Report Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/politics/1839673-chinese-military-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Espionage Crime

Should the Theft of valuable Secret Business Information Be Considered Legally

cyber espionage has made U.... Since it is considered a crime by most of the nations to have military knowledge, attack or defense maps being stolen, and yet they have extremely few in terms of returns, the theft of business plans and ideas should also be considered a crime.... commerce secretary, many business corporations face risks of cyber security attacks unless legislations are enacted to control such crimes.... cyber attacks have targeted every sector of U....
5 Pages (1250 words) Essay

Advantages and Disadvantages of Future Cyber-Warfare

Major Powers of the world are preparing for cyber warfare and espionage by developing lethal cyber weapons in the shape of viruses through trained hackers.... The paper presents the cause of future cyber warfare.... World has not seen real hot cyber warfare but nations are working on raising cyber capability.... Increasing interconnectivity through the World Wide Web and easy availability of cyber warfare tools makes it difficult to differentiate between domestic or foreign source of cyber warfare....
1 Pages (250 words) Assignment

Role of the FBI in the United States Criminal Justice System

Secondly, the police help prevent he crime, protect the innocent and do minor detective work on local cases, while the FBI does not function as a preventive unit for the local government unit.... Fourthly, although the police may do dangerous and specialized tasks like those done by the bomb squad units, cyber crime investigators, homicide investigators, and other specialized police units, the fact remains that the FBI arrives at the scene only if the situation becomes a matter of national concern or if the victims are from another state or another country....
2 Pages (500 words) Research Paper

Cyber Crime

Moreover, FBI Director aggravates the seriousness of the issue by showing how cybercrime and cyber espionage pose fundamental risks to Americans (Pelley 1).... As such, there have CIR#2-Cyber crime The recent industrial growth has led to technological innovations (Healy The growth in technological innovations have led to increased cyber-attacks as cyber criminals gain the knowledge and skills to access other people's information without authorization.... The growth in technological innovations have led to increased cyber-attacks as cyber criminals gain the knowledge and skills to access other people's information without authorization....
1 Pages (250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us