Verified Document

Internet And Crime Essay

Cyber Crime Critical infrastructure

There was an attempt of cybercrime on a MoD skynet military sate light by an undersized group of hackers, this brought about a security intrusion which officials could characterized as information warefare, this could be further elaborated as an enemy attacks in terms of military communication disruption. The authority was able to trace the group to as far as southern England. The group managed to gain access to the Mod skynet military sate light and succeeded in reprograming the system in charge of the control before they were discovered. The case was taken over by the joint team of Scotland Yard's Computer Crimes Unit as well as the U.S. Air Force.

It is without doubt that Satellites plays a major role in supporting the existing balance in the universal economy, society, as well as advanced militaries and this has made a number of nations to develop more recognition to sate light in terms of critical infrastructure. Sate lights make available a considerable function in terms of climate as well as monitoring in relation to natural disaster, communication, prior caution systems, worldwide broadcasting, meteorology, direction-finding, exactitude strikes, reconnaissance, remote sensing, observation, as well as the encroachment of science and understanding. According to GOA (2002), satellite services have also been able to play a leading role in relation to telemecine, mobile communication cargo tracking among others. As Space Security Index (2012) estimates, sate light brings about 200 billion dollars annually. As per the gargets availability, UCS Satellite Database (2012) reveals that by December 2012 there were almost 1046 working sate lights which were owned by around 47 nations. Further, Robertson, (2011) talks of close to 1,100 organizations in about 53 nations that also enjoy the services of the outer space (sate light).

This is to say that a considerable interference to...

On the other hand, the manner in which the discussion of interference of the outer space is treated with lack of priority sends very little signals, for instance 2011 Congress report of the United States -- China Economic as well as Security Review Commission did made the topic look cheap. It is understandable that the act of oversimplifying the information my perhaps be attached to some security reasons or even lack of concentration span in relation to intended audience. These sound very dangerous as some people may think that just with some few keystrokes, one can with a lot of ease penetrate the sate light making it look like a fiction and yet it is a matter that needs to be taken care of.
There are a good number of countermeasures that are capable of combating the cyber crime as well as increasing the security, only if they are brought on board in a very effective manner. However much the cyber adversaries potential are at an all-time high, fighting this demon has always remained a top most priority of the entire government.

The capability of the FBI, their statutory authority as well as, expertise in terms of resource combining across a number of programs renders it exceptionally placed in relation to investigating, collecting as well as disseminating intelligence on the subject of encountering cyber crime. They are also seen as a substantial unit of the Comprehensive National Cybersecurity Initiative which is the interagency with a priority mandate to take care of the digital infrastructure in terms of national security. Through this Comprehensive National Cybersecurity Initiative, the government along with its partners come together purposely to gather intelligence, acquire visibility on the adversaries there after facilitate dissemination of this valuable information to the relevant authorities for decision making. The United States government…

Sources used in this document:
Reference

2011 Report to Congress of the U.S.-China Economic and Security Review Commission. (2011). Retrieved on April 25, 2014, from http://origin.www.uscc.gov/sites/default/files/annual_reports/annual_report_full_11.pdf

GAO Critical Infrastructure Protection Commercial Satellite Security Should Be More Fully Addressed. (2002). Retrieved on April 25, 2014, from http://www.gao.gov/assets/240/235485.pdf.

Robertson, Ann E. (2011). Militarization of Space. New York: Facts on File. Retrieved on April 25, 2014 from http://epublications.bond.edu.au/cgi/viewcontent.cgi?article=1131&context=cm

Space Security Index 2012. (2012). Retrieved on April 25, 2014, from http://swfound.org/media/93632/SSI_FullReport_2012.pdf
UCS Satellite Database. (2012). Database, official names only. Retrieved on April 25, 2014, from http://www.ucsusa.org/nuclear_weapons_and_global_security/space_weapons/technical_issues/ucssatellite-database.html
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now