Preview

Should we prohibit the development of the cyber command?

Good Essays
Open Document
Open Document
1665 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Should we prohibit the development of the cyber command?
Cyber warfare
Cyber warfare has been defined as any hostile measures against an enemy designed“ to discover, alter, destory, disrupt or transfer data stored in a computer, manipulated by a computer or transmitted through a computer.” Examples of hostile use include computer attacks on air traffic control systems, on oil pipeline flow systems and nuclear plants.

Cyber Weapon
Cyber weapons includes computer viruses and software that can be used to penetrate enemy networks. Defining these tools as weapons, as opposed to systems or processes, allows the military to apply the same authorisation controls as they apply to conventional weapons such as guns and tanks.

Cyber command
Cyber command has been defined as a command for network which subordinate to the state.They have three tasks, attack, defence and development. Lets use the first establishment of cyber command, the US Cyber Command, to be an example to explain. US Cyber Command centralizes command of cyberspace operation and organizes existing cyber resources, these can help for the network developmant. In the defence side, US Cyber Command synchronizes defense of US military and the US government services networks, to comfirm that US will be safe under any situations.
In the attack side, it also include that the background why Cyber Command had aroused the international concern. In 2010, It has waged cyberwar. US Cyber Command postponed the development of nuclear weapon of Iran. It involves hacking and attack. This aggressive action had aroused international concern.

Why
We chose this topic because of Edward Joseph Snowden. He was an NSA system administrator. He was wanted by USA because he published th of the U.S. classified intelligence to public. He came to Hong Kong to publish these secret file. This action had aroused international concern, including us. He had published the PRISM project which U.S. is preparing to do. U.S. can through PRISM to get all the data about us, like e-mail,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime refers to criminal use of a computer and the internet. Cybercrime as credit card scams, identity theft, unauthorized access to computer and if a company that has a website is convicted of a cybercrime then the company will lose money. The cyber law are one of the newest form of global law, escorting in the greater regulation of the Internet related legal guideline worldwide to lodge e-commerce, globalization, and the extent of western independent ideals. The correct trademark can protect a business or company against cyber infringement, patent issues in cyberspace. Some fear that the cyber law will profit the welfares of large, international industry and constabularies’ observation. Cyber jurisdiction is a law that impact over activities taking residence on the internet.…

    • 343 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Edward Snowden Argument

    • 1168 Words
    • 5 Pages

    Edward Snowden was a hot topic in the news in 2013 after he released classified information from the National Security Agency (NSA) to the media. This leak contained information about global surveillance performed by the United States, which involved monitoring email, tracking cell phones, and logging phone calls. Not only did this action force him into asylum overseas to avoid arrest, but it ultimately caused an uproar in the media and amongst the American public. The controversy surrounding Snowden involves the rights of the public vs. the surveillance programs performed by the U.S. While many condemn Snowden for betraying the national security of his country, many applaud him for exposing the…

    • 1168 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    Government Surveillance

    • 1146 Words
    • 5 Pages

    The first issue is that the government has been observing both Americans and foreigners for decades, without our knowledge or regulation of anyone. The NSA was established in 1952; its existence was not admitted to the American public until 20 years later, and still, its configuration and activity are largely unknown, even to members of congress and government. It is the biggest surveillance agency in the world. (MacAskill, Borger and Greenwald par. 8) In the 1970s, extreme far-reaching disclosures about the NSA led to senate hearings, which revealed stunning transgressions, with assassination plots, illegal mail opening, massive military spying. (Heuvel par. 10) In 1975, Democratic US Senator and former NSA employee Frank Church alerted us that the NSA's extending reach could be turned inwards on the American people.…

    • 1146 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Before we address any issues relating cyber-security, we must look at the definition of the term in the first place. According to Wikipedia, cyber-security is called as computer security which is described as information…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Satisfactory Essays

    Nearly three years ago, in 2013, Edward Snowden – a former American National Security Agency (N.S.A.) contractor – leaked anywhere from a hundred to two hundred thousand classified documents, that proved the existence of massive global surveillance, including of American citizens as well as top world leaders, run by the USA with the active cooperation of many allied governments as well as telecommunication and technology companies.…

    • 694 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    [15]Edward Snowden is the person who leaked the information about large amount of data collected by the National Security Agency and many other intelligence groups in United States over phone and internet. His revelations were made to The Guardian and The Washington Post. [16] This created strong debates in US regarding information privacy and national security.…

    • 1569 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Stuxnet

    • 749 Words
    • 3 Pages

    United States Computer Emergency Readiness Team (US-CERT) is the Department of Homeland Security’s (DHS) primary effort to contend with cyber security issues, disseminate threat information to the public and private entitites, and ensure Constitutionaly rights are respected in those efforts. US-CERT is subordinate to the DHS’s National Cybersecurity and Communications Integration Center (NCCIC) and monitors these threats on a 24-hour basis. US-CERT collections information on incidents and works with private and public partners that control industrial and commercial infrastructure to respond to incidents and reinforce U.S secuity in the industrial realm. (US-CERT, 2014)…

    • 749 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In recent discussions of Edward Snowden, a controversial issue has been whether or not he was wrong for leaking government information. On the one hand, some argue that he is an American hero. From this perspective, it is a good thing that he exposed the inappropriate surveillance tactics of the American government. On the other hand, however, others argue that he is a traitor. From this perspective, he betrayed his country by leaking information to other countries. In the words of President Barack Obama, “If any individual who objects to government policy can take it into their own hands to publicly disclose classified information, then we will not be able to keep our people safe, or conduct foreign policy” (Mason). In sum, then, the…

    • 1669 Words
    • 7 Pages
    Good Essays
  • Better Essays

    In 2013, former National Security Agency (NSA) worker Edward Snowden left to Hong Kong, China. There, he leaked information about the NSA to reporters. A few weeks later, the information Snowden gave was released to the public (Biography). What Snowden leaked revealed that the NSA collected data from companies like Facebook and Google, that the NSA was hacking computers in Hong Kong and China, and much more (Business Insider). After Snowden leaked the information about the NSA, it has made people in America and around the world aware of the NSA’s actions. Snowden has changed the world by releasing the information about the NSA (Sledge). Without Snowden, the surveillance…

    • 1676 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    The US mass spying system was initially unveiled in 2013 by NSA temporary worker Edward Snowden the office which brought it under cruel feedback both in the US and around the globe.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber terrorism is terrorist activities intended to damage or disrupt vital computer systems (Merriam-Webster). Cyber Terrorism is a form of fear and is very similar to physical terrorism, except terrorist use computers to wreak havoc on innocent people. An example of cyber terrorism would be putting a virus on business computers which allows them to hack into their databases stealing or changing information. They could also steal money from the business. Terrorist groups also use cyber warfare for modern communications like planning, recruiting, propaganda purposes, enhancing communications, command and control, fund raising and funds transfer, and information gathering. The…

    • 519 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Forensics

    • 322 Words
    • 2 Pages

    Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.…

    • 322 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    A good case example to showcase US actions in virtual warfare took place in 2014 with the alleged hacks by North Korea on the US companies Sony Pictures. Although not committed on the US government directly, the 2014 Sony Hack represents an indirect virtual attack on US interests. This episode of virtual conflict is one of many that the US has played a part in. An offensive example showcasing the US’s alleged engagement in virtual attacks against Iranian Nuclear facilities with the military grade Stuxnet virus. Stuxnet had much more serious political implications, but the Sony Pictures Attack serves to exhibit how the US is limited in its available responses to certain virtual attacks, from the high threshold it sets based on its allegiance to international law. Other states that do not share the same perception take advantage…

    • 1738 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    In many ways, the computer network will be the face of government. For instance, the Army has begun to develop a uniform that is a networked computer that not only will provide protection from biological and chemical weapons but also will provide a constant stream of information through conductive fibers woven into the uniform’s material.…

    • 730 Words
    • 3 Pages
    Good Essays