Top Banner
SOCIAL JUSTICE ASSIGNMENT BROOKE CONNELLY SIENA COLLEGE SOCIETY IN THE INFORMATION AGE APRIL 29, 2013 Cyber Terrorism
10

Social justice assignment

Dec 04, 2014

Download

News & Politics

brookeconnelly

 
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Social justice assignment

SOCIAL JUSTICE ASSIGNMENT

BROOKE CONNELLY

SIENA COLLEGE

SOCIETY IN THE INFORMATION AGE

APRIL 29 , 2013

Cyber Terrorism

Page 2: Social justice assignment

Cyber Terrorism

“Terrorist activities intended to damage or disrupt vital computer systems.”

May include: Computer and cell phone infrastructure Government agencies, universities and banks

Advancements in Information Technology

Page 3: Social justice assignment

Chinese Cyber Attacks

American military and technological secrets

Harm government and financial services

Mandiant People’s Liberation Army General Staff Department

(Unit 61398) Network security Digital signal processing Covert communications English linguistics

Page 4: Social justice assignment

Effects of these Attacks

National security and economic competiveness

Classified information

Three Steps: 1. Recognize the threat cyber-attacks pose to

international trade and its relationship with the U.S. 2. Put a stop to these activities 3. Engage in a constructive direct dialogue to

establish norms of behavior in cyberspace

Page 5: Social justice assignment

Who is Effected?

U.S. Citizens National Security

Bank Accounts

Trade Secrets

Page 6: Social justice assignment

Technology’s Role

Information Technology rapidly developing

Records are now stored on computers

Changed the way criminals commit crimes

Page 7: Social justice assignment

What is being done

Current domestic and international laws are not up to date

February 2013 – Executive Order

Page 8: Social justice assignment

What needs to change

New federal strategy should be implemented by the US Include military computer network operations

Further secure US networks

Page 9: Social justice assignment

Conclusion

Cyber terrorism is a global threat

New federal strategy should be implemented to protect US citizens

Page 10: Social justice assignment

Sources

Perlroth, Nicole. "Hackers in China Attacked The Times for Last 4 Months." The New York Times. N.p., 30 Jan. 2013. Web. 18 Mar. 2013. <http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?hp&_r=0>.

Beijing, T.P. "Hello, Unit 61398." The Economist. N.p., 19 Feb. 2013. Web. 18 Mar. 2013. <http://www.economist.com/blogs/analects/2013/02/chinese-cyber-attacks>.

Brennan, John W. “United States Counter Terrorism Cyber Law and Policy, Enabling or Disabling?’ 15 Mar. 2012. Print.

Browdie, Brian. "White House Official Calls on China to Halt Cyberattacks." American Banker 178.39 (2013): n.pag. ProQuest. Database. 24 Mar 2013.

"US Warns China on Cyber Security ." Computer News Middle East (2013): n.pag. ProQuest Computing . Database. 24 Mar 2013.