Cybercriminals and How Government Addresses Them

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Cybercrime activities have been on the rise following emergent technologies. From the analysis of “5 Most Dangerous Hackers of all Time” by Top trending, cybercrime appears to be an organized activity with adequate knowledge on the target (Top Trending, 2015). World governments seem to be the prime targets of cybercrime activities. This has been evidenced by theft perpetrated by myriad hackers, such as the Pentagon hack in 1994 by Mathew Bevan and Richard Price, among others (Top Trending, 2015).

Mathew Bevan and Richard Price contacted the U.S. agents in Korea and the Korean nuclear facility requesting nuclear material. Most cybercriminals use government systems to infiltrate information, as this permits them to enter into restricted areas. The Hacktivist group targeted the FBI, the CIA, and the Chinese government, for internet freedom and social justice. Astra navigated through the U.S. navy system and managed to steal weapon technology and software’s data later sold to Latino nations.

Prior technological advances have led to improvements in society while simultaneously creating an avenue for wrongdoing. The internet has made life quite easy as services such as shopping, news, education, and work can all be accessed at the comfort of one’s living room from any device that accesses the internet (Kader and Minnaar, 2015). Research conducted by Kaspersky Lab indicates that the channels that have been created to ease life can also be used to perpetrate criminal actions, phishing, and malicious activities (Kaspersky Lab, 2015). However, it is important to note that cybercrimes are initiated for different purposes.

For instance, some are done to hurt or disrupt normality, while others are made to gain money (Kaspersky Lab, 2015). Some of the environments that foster this type of criminality include online banking among other areas that are frequently visited. The government has enacted a cybercrime law where one has to present evidence. Other areas include ethical hacking where hackers act to prompt inefficiency of services offered by a provider. It is, therefore, appropriate to say that in one way or the other, everyone is at the risk of being a target of cybercrime since almost everyone uses the internet.

References

Kader, S., & Minnaar, A. (2015). Cybercrime investigations: Cyber-processes for detecting cybercriminal activities, cyber-intelligence, and evidence gathering. Acta Criminological: African Journal of Criminology & Victimology, 5, 67-81.

Kaspersky Lab. 2015. Consumer security risks survey – From Scared to Aware: Digital Lives in 2015.

Top Trending. (2015). 5 most dangerous hackers of all time. YouTube. Web.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now