Cybercrimes: A Rising Concern for United States Citizens How would someone like to go shopping this holiday season and go to checkout just to find out that your credit/debit card are being declined? As they begin to investigate, they start to realize that the problem is much more than they expected because their identity and personal information was stolen. Cybercrimes have become a main concern for the United States. Therefore, cybersecurity should be one of the main concerns of security in this day and age. With cybercrime, a person can be attacked anytime, any day, and anywhere, where there is internet access. These attacks affect just about every American in one way or another. Cyber-attacks are generally conducted by foreign countries to hack into United States companies to gain access to Americans’ personal information for malicious reasons, disrupt the functionality of the government, and to impose their agenda against the United States.
According to the Bureau of Justice Statistics, the three general types of cybercrime are “Cyber-attacks are crimes in which the computer system is the target. Cyber-attacks consist of computer viruses (including worms and Trojan horses), denial of service attacks, and electronic vandalism or sabotage. Cyber theft comprises crimes in which a computer is used to steal money or other things of value. Cyber theft includes embezzlement, fraud, theft of intellectual property, and theft of personal or financial data. Other computer
* • Cyber Crimes: Any act directed against computers or that uses computers as an instrumentality of a crime.
There are many types of Cyber Crimes. The most common Cyber Crimes are: Hacking, Theft, Cyber Stalking, Identity Theft, Malicious Software and Child Soliciting and Abuse.
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, software programs and data from unintended or unauthorized access, change or destruction. Post 9/11 and other terrorist attacks, the United States grows its endeavors to repulse cyberattacks, U.S. corporate organizations and the government agencies wind up in strife over how to adjust to new methods of security and privacy. The current state of security measure protocols and privacy policies placed by the US government in cyberspace raises concerns for the 99%. This is due to the recent cyber-attacks on American corporate organization systems and government alike, where their digital information and network infrastructures within the systems were compromised, and personal data was hacked and stolen.
Cyberterrorism is a critical threat and is the most definitive characteristic of the U.S. contemporary security environment. For years, the American people have been victimized by cyber-attacks by having their personal information, emails, credit card, and banking information stolen by an invisible enemy named cyberterrorism. These types of attacks seem insignificant however; they are small examples of the vulnerabilities that our cyber world is experiencing. Our vulnerabilities are leaving our public officials in significant danger from cyber-attacks, as they are vulnerable to such things as the release of personal information and home addresses.
Times have changed what was known as organized crime has been replaced by Cybercrimes (Heists: Cybercrimes with Ben Hammersley). Cybercrimes have risen dramatically in recent years and have become a major issue the United States and company’s face today jeopardizing as well as threatening the critical infrastructure of America (Cyberwar Threat, 2005). Sadly, the status quo of cyber security is very unstable with the advancements and growth which has put most individuals and businesses into an enormous threat (Agustina, 2015).
The article “Defending America in Cyberspace” in the journal The National Interest authored by Keith Alexander, Emily Goldman, and Michael Warner taught me much about how the Department of Homeland Security handles America’s cyber threats. The Department of Security is the lead agency in protecting America from domestic cybersecurity incidents. It stated how America fights Cyber crime and security threats. In this day and age, countries are very vulnerable to skilled hackers. Some of them not even under the age 18.
There are four major categories in computer crime. The first is the computer as a target. Then would come the computer as an instrument of a crime. Followed by computer as an incidental to a crime. Not to mention crimes associated with the prevalence of computers. These four major categories are what contributes to digital crimes, involving the worldwide web.
Cybercrime is known as any type of violation to the federal or state laws that is committed through the use of a computer or another technological device. Common types of cybercrime described by the Federal Bureau of investigation (FBI) include: Internal cybercrime. These crimes are also known as Malware, and they include the creation of viruses and other malicious software with the intention to damage someone else’s computer. Second category is Internet and Telecommunication Crimes. Such crimes include making pranks over the phone, illegal internet-based gambling, dissemination of illegal material, such as child pornography, theft of telecommunications systems, among others. The third category of cybercrime stated by the FBI is known as Support
Cyber Crime is described as criminal activity committed via use of electronic communications with respect to cyber fraud or identity theft through phishing and spoofing. There are many other forms of cyber-crime also such as harassment, pornography etc. via use of information technology.
These days cyber-attacks are one of the top crimes in the world. We all connected online in some way. I have personally been a victim of a cyber hack when my bank card was stolen and sold on the dark web. In a matter of minutes my card made multiple purchases in several different states. This has made me more aware of my digital footprint. Based on my own actions and the actions of the institutes I choose to occupy. Cyber security and surveillance has become a constant challenge for any person, company, institution and country. Even our own government has taken measures to protect the nation’s information.
In this day and age, the risks of cyber-attacks have seemingly become more prevalent through aggressions done by both foreign and domestic terrorists acting out in response towards either religious, political, or financial consciences. These attacks consist of hackers possessing abilities that can alter digital perspectives of banking and also the capability to adjust physical aspect like water systems and even nuclear power plants. The relevance in emphasizing the importance of cyber-security is directly related to the growing number of foreign attacks done unto the American people and how these attacks must be further met by improved security in order to combat cyber termism from causing any more harm. To begin researching on how these attacks may be vanquished, one must first relate back to the source of these strikes− this pertain to either the countries or groups responsible−as well as the effects of these attacks of American lifestyles and the potential human security faults that correlate with them. Lastly, the role in both Government and private business must be looked at as well in order to make sure that the privacy among American citizens and their identity are being handled safely and with the utmost security available in order to counter attacks done by these elite hacking groups.
People across the world are becoming disproportionately dependent on modern day technology, which results in more vulnerability to cyber-attacks including cybersecurity breaches. Today, the world continues to experience inordinate cases of cybersecurity meltdowns. There is a rapid growth in complexity and volume of cyber-attacks, and this undermines the success of security measures put in place to make the cyberspace secure for users. Cyber-attacks on both private and public information systems are a major issue for information security as well as the legal system. While most states require government organizations and certain federal vendors to report incidences of data breaches, no equivalent legislation exists to cover private entities.
Since 2010 there have been over 13 major cyber attacks in the US, the FBI categorizes the severity of the attack based on what could possibly be at stake such as information on US citizens or hijacking of critical information . Cyber attacks are classified as crimes committed with the aid of a computer. Cyber crimes are considered felonies, however most people who commit the crimes can usually not be found. Recently there has been an uprising in cyber crimes, in the year 2017 alone 9 minor incidents have occured (minor attacks can consist of malware and internet “trolling” which is a form of cyberbullying) and 4 major crimes have been committed. Most crimes consist of identity theft, robbery, and hijacking private information. Recently programmers have been able to build security systems that can detect a threat almost immediately. With a growing expansion of technology protecting information gets harder day by day. Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
The advancement of cyber-based technology has led to an increase in cyber-crimes that procreate financial disasters. Hackers and scammers are now finding it easier than ever to carry out these heinous crimes. For example, “[…] in July 2014, the U.S. Computer Emergency Readiness Team issued an advisory that more than 1,000 U.S. businesses have been affected by the Backoff malaware, which targets point-of-sale (POS) systems used by most retail industries” (Walters). This quote clearly demonstrates that hackers are taking advantage of both people and companies, causing financial loss on both sides, as well as the distrust in companies and credit card providers. The development of technology has made it simple for criminals to commit theft in the comfort of their own homes in the form of cyber-scamming and hacking. These outbreaks of hacking related incidents establish
Today our society has evolved beyond the expectations of our founding fathers. Humans flying through the air from destination to destination, being able to send information almost instantaneously, to receiving high definition photos of the furthest celestial bodies known in our solar system, our technology has literally and figuratively rocketed the human race into the future. While our technology becomes increasingly more advanced so does the ability to steal information from these systems. Cyber Security is one of the biggest threats our nation faces as we become more dependent on the use of technology in our day to day lives.