Term Paper Undergraduate 823 words Human Written

Anallyzing the Cyber Terrorism Phenomenon

Last reviewed: ~4 min read Crimes › Cyber Crime
80% visible
Read full paper →
Paper Overview

Cyber Terrorism What is cyber-crime? Cybercrime denotes an illegal action committed primarily by deploying technology (or, to be more precise, a computer and internet). America's justice department expands this definition to cover all illegal actions employing computers to store evidence of crime (Tech Target, 2016). What is cyber space? Cyberspace represents...

Writing Guide
Mastering the Rhetorical Analysis Essay: A Comprehensive Guide

Introduction Want to know how to write a rhetorical analysis essay that impresses? You have to understand the power of persuasion. The power of persuasion lies in the ability to influence others' thoughts, feelings, or actions through effective communication. In everyday life, it...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 823 words · 80% shown · Sign up to read all

Cyber Terrorism What is cyber-crime? Cybercrime denotes an illegal action committed primarily by deploying technology (or, to be more precise, a computer and internet). America's justice department expands this definition to cover all illegal actions employing computers to store evidence of crime (Tech Target, 2016). What is cyber space? Cyberspace represents a domain characterized by application of electromagnetic spectrum and electronics for storing, altering, and communicating information through networked structures and related physical infrastructures.

Basically, one may regard cyberspace as an interlinking of people by means of telecommunication and computers, with no connection with their physical geography (Rouse, 2016). Problems in prosecuting cyber-crime cases The internet, when it was first commercialized and made easily accessible and affordable to everyone (earlier, it was accessible only to the government and academicians), was a novel frontier. Akin to the old Wild West, the Internet was chiefly unregulated.

Lawmakers did not expect it to flourish at such a rapid pace, nor did they predict that new laws would be needed for protecting innocent internet users from the diverse types of unscrupulous online behaviors (Shinder, 2011). Prior to bringing jurisdiction into this discussion, identifying who and where the cybercriminal is essential for beginning any arrest action. This is one key issue with web-based crimes, as cybercriminals have numerous ways for concealing their identity.

Several services are available that effectively cloak the IP address of an internet user, by directing traffic across multiple servers, typically by paying some set fee, making it tough to trace these offenders (Shinder, 2011). Another aspect that hinders investigation of cybercrime and prosecution of cybercriminals, when compared to a majority of other crimes in the "real world," is the nature of evidence.

Digital evidence poses a chief problem, which is that it is, in fact, only a sequence of zeros and ones represented using means such as radio signals, light pulses, magnetization, etc. Such data is rather fragile, and may easily be modified or lost (Shinder, 2011). Jurisdiction Combating cybercrime is a costly affair. One can understand this better by noting the fact that the British government declared in a recent statement that this form of crime costs their economy an annual expense exceeding 43 billion dollars (i.e., 26.5 billion pounds).

Ever since, the British government has promised to allot over 88 million dollars (i.e. 54 million pounds) towards solving this issue. Still, the transnational jurisdictional challenges associated with stopping cybercrime cannot be resolved by simply allotting more money (Info Security, 2011). Senior attorney for the digital crime division of Microsoft, Richard Boscovich states that the key problem is the absence of a homogenous universal legislation, which is the work of nations.

He further states that there must be a related law in the nation from which one seeks information; when examining international treaties, one will understand that the crime must be perpetrated in both nations for laying one's hands on any evidence, or getting it back to one's own jurisdiction (Info Security, 2011). Among the greatest issues lies in the legislative scope within any given state.

Network security company, Damballa's Research Division Vice President, Gunter Ollmann, asserts that one can witness a vast range of laws; also, numerous nations do not have any legislation for basic aspects like malicious software installation or unauthorized computer access (Info Security, 2011). Chris Burchett of Credant Technologies believes that legislative bureaucracies typically move very slowly, while cyber attackers have displayed a remarkable skill for innovating and adapting (Info Security, 2011). Examples of cyber crime Hacking Hacking simply means illegal circumvention of security for accessing somebody else's computer.

While some hackers do so merely out of curiosity, they work their way through unknown systems as a challenge, they, go far enough to cause concern to the owners of the system they breach loopholes in security at times. Other hackers may have malicious motives -- information stealing, gaining control of systems to serve some personal end, or merely to wreak maximum possible havoc and.

165 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
6 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Anallyzing The Cyber Terrorism Phenomenon" (2016, January 18) Retrieved April 19, 2026, from
https://www.paperdue.com/essay/anallyzing-the-cyber-terrorism-phenomenon-2157236

Always verify citation format against your institution's current style guide.

80% of this paper shown 165 words remaining