Cyber Terrorism Essay

1587 words - 7 pages

Truman R Miller
18 April 2014
Cyber Terrorism in the Age of Modern Technology
In June of 1983 a movie produced by MGM called, “WarGames” (1-1983) set off one of the most intriguing films based in what was considered the beginning of the age of home based computers. WarGames despite the obvious age of the technology, gives us an inside look into its paranoid Cold War opening tensions to the staggering moral climax. Directed by John Badham, this cyber-espionage thriller might also be considered a blueprint in cyber terrorism today.
In 1995 some 12 years later another movie directed by John Badham called, “The Net” (2-1995) would give us another look into the emerging age of cyber ...view middle of the document...

Bullying has taken on a new form of violence, gone are the days of school ground squabbles. “Although there is evidence that individuals involved in traditional bullying as victims, bullies, or both are often also involved in cyber-bullying.” (Li, Q. 2007) But is cyber bulling the same as cyber terrorism? Cyber bullying is carried on in a similar way, cyber bullying can be sent via instant messaging, e-mails, and social networks from any mobile media device. The same way that foreign terrorism uses cyber-space. "Cyber bullying is when someone repeatedly harasses, mistreats, or makes fun of another person online or while using cell phones or other electronic devices." (3-2014)
The United States is not the only country doing research on cyberbullying. Many countries have recently published articles examining cyber bullying within rural and urban schools. These studies examine the prevalence, impact, and differential experience of cyber bullying among middle and high school students. Of those finding, the surveys examined the use of technology, cyber bullying behaviors, and the psychosocial impact of bullying and being bullied. Cyber bullying establishes a power and control over the victim through intimidation, humiliation, social exclusion and damage to that person’s reputation. The anonymity of the person is often difficult to identify the perpetrator and leaves the perpetrator feeling empowered, protected from accountability and detached from the impact of their behavior. Simply put the perpetrators do not fear being punished. On the other hand, the effects on the victim are lasting. The victim’s academic performance, mental health, self-esteem and social outcast often go unresolved for fear that adults may overreact and the student will lose their computer privileges.
Children’s Social Information Processing
In light of numerous publicized cases of bully-related suicides in the past several
years, increased efforts have been made to identify and understand the factors that may
predict children’s involvement in bullying. Additionally, researchers and policymakers
have focused much attention on creating effective interventions aimed at educating
children about the harmful consequences of involvement in bullying. Nonetheless,
bullying continues to occur both in and outside of school, leading many children and
adolescents to experience long-term pain and emotional distress (Beran & Li, 2007).

The American Journal of Orthopsychiatry reported about 49.5% of these students indicated they had been bullied online and 33.7% indicated they had bullied others online. (5-July 2010) Most bullying was perpetrated by friends, and of those that were bullied they generally did not tell anyone about the bullying. When asked, those that were bullied said they felt angry, sad, or depressed after being bullied online. Although participants that bullied others online afterwards said they felt guilty or ashamed, however, most said that it...

Other Essays Like Cyber Terrorism

Cyber Crime Essay

1744 words - 7 pages reproduction of technology. The effect that cyber crime has on the economy and its victims is very drastic. In the 1990’s cyber crimes were estimated at 80 million dollars in damages caused by nationwide virus outbreaks. The most common committed types of cyber crime would be fraud, unauthorized computer access, cyber terrorism and copy right violations. Fraud has been titled “the broadest category of cyber crime”. According to the FBI’s Internet

Domestic Terrorism Essay

1663 words - 7 pages cyber-attack or virus. “Computer networks can be attacked with little or no warning and cascade rapidly such that victim’s may not have time to respond”. (Noftsinger, Newbold, & Delp, 2012, P.52) Their computer network has the minimal security measures to protect it against cyber terrorism. “Cyber terrorism is defined as the use or destruction of computing or information technology resources aimed at harming, coercing, or intimidating others in

Cyber Warfare Will Require a Rma

1774 words - 8 pages advantages. Warfare now is both asymmetrical and asynchronous. Foot Notes: Clay Wilson, “Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues”, Congressional Research Service, 20 March 2007. Warren Peterson, “Cyber Terrorism Today”, SCP Vault October 2007 "The National Strategy To Secure Cyber Space", GPO February 2003 John Lasker, “U.S. Military's Elite Hacker Crew”, Wired Magazine 2005, http

Cybersecurity Standards: a Case Study on Malaysian Banking Sector

1977 words - 8 pages disappeared EVERYTHING IS EVERYWHERE Organizations continue to move to new platforms including cloud, virtualization, mobile, social business and more ATTACK SOPHISTICATION The speed and dexterity of attacks has increased coupled with new actors with new motivations from cyber crime to terrorism to state-sponsored intrusions Copyright © 2013 CyberSecurity Malaysia What steps are taken by the Malaysian Government to keep

Noone Is Safe!

2187 words - 9 pages NO ONE ISNT SAFE! I. Introduction Are we safer Eight years later? The aftermath of freedom, safety, cost and society A. The history of Terrorism B. The political climate of yesterday and laws world wide C. Recruitment II. Eco-Terrorism A. locations of act and there environmental impact III. Cyber-Terrorism A. Types of attacks IV. Domestic-Terrorism A. Potential Targets V. International-Terrorist A. Past and

Position Paper Summary

4036 words - 17 pages developing countries to enhance cooperationin fighting cyber-terrorism based on the International Telecommunication Union (ITU). Canada Canada addresses the problems by international communities in a coordinated way and specific efforts could be taken to strengthen information security at the global level. (1) Set an agreement on the international principles for normative behavior in cyberspace. (2) Expand the international legal system’s

Analysis of Choicepoint

586 words - 3 pages and “advocate of using information technology to combat fraud, crime, and terrorism”- this was a nightmare turning into reality. The key challenge for the CEO of ChoicePoint was twofold. “Smith needed a plan to strengthen data protection within the company and a clear position on data-protection regulation….” The management team at ChoicePoint had begun reviewing potential changes to the organization’s business model after this security breach

Gloabal Perspeives Assments

1586 words - 7 pages , one of the concerns with globalization is in regard to illegal goods and activities brought into the country. The United States has continually fought terrorism, human trafficking, cyber-crimes, organized crime, money laundering, drugs, weapons, and illegal goods brought into the United States from other countries. With Civil Laws and Common Laws so different amongst all nations, this leaves room for error and many barriers. Additionally

Should Internet Activity Be Monitored

2357 words - 10 pages authorize the Bush administration to use surveillance to find terrorists operating inside the United States and stop them before they attack again?” Cyber crimes are increasing and will continue to do so as technology advances and are getting much harder to control and will continue to be difficult to control if something is not put into place. They include numerous types cyber crimes to include: fraud, such as: financial, computer, identity

Indian Sateilletes in Space

1094 words - 5 pages service attack, e-mail spoofing, intellectual property crime, or cyber stalking. Unauthorized access, also known as cracking as opposed to hacking, means gaining access to a system without permission of the users or without proper authority, generally done either by faking identity, or by cracking access codes. E-mail is bombing means sending a large number of mails to the victim resulting in the victims mail account (in case of individual) or

Terrorism And Fundamentalism

3297 words - 14 pages everyone can agree upon. However, the United States Department of Defense defines terrorism as "the calculated use of unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological." This definition focuses on three very important elements violence, fear, and intimidation and with each of these elements

Related Papers

Cyber Terrorism Essay

787 words - 4 pages . One main concern has been Cyber-terrorism and the criminals behind these acts. It is very difficult to prosecute some of these cases. If cyber-terrorism cases are taken out of the country, you might face lack of computer crime laws. It can take a couple of days for investigators to obtain a search warrant. You might have to persuade a judge to issue a search warrant on the basis of one possibility that the suspect is using cyberspace as a form of

Cyber Crime Trends Essay

1821 words - 8 pages /pati/pati_cybercrimes_dec03.htm Penalty for cyber crimes. (2011). Retrieved from Shinder, D. (2010). Profiling and categorizing cybercriminals. Retrieved from Snow, G. M. (2010). Statement before the house judiciary subcommittee on crime, terrorism, and homeland security. Retrieved from http

Cyber Crime Essay

558 words - 3 pages cyber crime related to crimes against government .cyber terrorism is one of the examples of this category. The medium of cyber space is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country and sometimes cracks into a government or military maintained websites .It is a terrible felling to know that a stranger has broken into someone's computer system without his or her concern

Cyber Crime The New Age Devil

1279 words - 6 pages , Firm, Company or a group of individuals. Again by way of unauthorized control/access over computer system, possession of unauthorized information, Cyber terrorism and distribution of pirated software etc. 3. Society at large: Cyber Crimes against Society at large include Pornography (basically child pornography), polluting the youth through indecent exposure, Trafficking, Financial crimes such as fake lotteries & promotions, Sale of illegal