He put his whole life and career at risk by being a whistleblower. He was able to divulge to the public the illegal activities of the NSA in the collection of many private information transmitted through the internet. His intention was to inform everyone about the violation of the NSA in the rights of every internet user for freedom. This so-called “internet- and telecommunications-liberty” was deprived when the US government launched the PRISM
According to Richards (2013), it is illegitimate and pernicious to establish an underground and comprehensive surveillance in the society. First, individual privacy, which should be granted and well protected by the law, is now violated. Under PRISM, personal details, including thoughts, movements, communication, transaction and health record, is being systemically and consistently collected without a permit from the owners. The right to hold these details is shifted from the individuals to the state. The state then can make use of the information for certain political purposes like filtering criminal/ terrorist-related suspects out of the government or even country.
Here are some privacy concerns you should watch out for. 1. Account hacking and impersonation Increasingly, spammers, hackers and other online criminals are targeting social networks. A compromised social media account makes for an appealing target: if they can get into your Facebook or Twitter account, they can impersonate you. Why are they interested in your social media accounts?
In the recent past, the use of internet and other media platforms has been familiar with a primary aim of spreading fear and affect the opinion of the public on terrorism. It has also been used as a means to acquire new members into the program. Some nations have been known to support terrorist to protect their interest as a nation. Not all terrorist strike for the same reason. The main reason that triggers terrorist activity is the selfish view of social, economic and political injustice.
Publically available data on internet are utilized for this purpose. Basically unauthorized access or hacking of data is not involved. More specifically, government agents who promote online news articles and positive comments fall under IO. Terrorist group who involve in false advocacy of information, embed hidden message, and attempt to recruit the followers also use IO. Shutting off portions of the internet, filtering/blocking websites, monitoring user activities are includes in IO.
Despite the fact that computers have become an important part in the lives of individuals and institutions, computers have indirectly opened a way for the existence of new unethical behaviors and different methods to commit abnormal acts and crimes using computers. We need to acknowledge how to protect ourselves from different computer crimes by having a security awareness .In this chapter we will discuss four common computer crimes, they are: 1. cyber stalk 2. Internet fraud 3. identity theft 4. online piracy 8.1: Cyber stalk Cyber stalk is a constant monitoring and harassment to the victim by using electronic communication. For example, publishing false accusations that affect victim 's reputation, sending anonymous e-mails for the purpose of threatening or scaring the victim, and tracking the victim 's IP address. Cyber stalking is sometimes referred to as cyber harassment or cyber bullying.
There is a lot of terrorism in the United States, no doubt about it. However, since the main purpose of a terrorist attack is to gain publicity, this will give them even more reason to. The terrorists will get more views if it’s on video and the government can release them and any other information they find about the terrorist. However, if the terrorist plans to stay undercover, they can disguise themselves by covering themselves up to not get caught on footage and then no one can trace who they are and their technology. All of this money will come out of American tax papers.
Threat of Cyber terrorism In the contemporary world, terrorist often use cyberspace to cause doubt. These terrorists fight against government and state institutions to attain their own goals. Notably, terrorists perform cyber-attacks in two forms; they attack data and interfere with control systems (Pereski & Bogdanoski, 2012). Stealing data and damage is the common type of computer and internet attacks. Cyber-attacks aimed at control systems disrupt or manipulate the physical infrastructure.
Internet fraud has been extremely successful that it continues to grow for scamming purposes. Cyberbullying also leads to serious even dangerous problems in the society such as increasing the number of suicides. Lastly, irresponsible posts are often very misleading yet become media to dividing the society. The US Department of Justice has advised that to take safety precautions by installing antiviruses, limiting personal data we put on our social media, having a better judgment of who to interact with online and using reliable sources of information. It’s better not to share posts which are probably hoaxes.
cyber-crimes against property these crimes target personal, government and private institution and aim to destroy the important document or special programs. Furthermore, there are several characteristics for cyber- crime such as difficulty to knowing the perpetrator of the crime only by using high-technology for security, the difficulty to know the damage from it because the damage is moral not tangible .Also easy the users fall into it because the lack of security control and easy of hiding and appearance the features of the crime and who is the criminal. (2)(3) Moreover, every crimes whether traditional or electronic crimes have motivations. Such as electronic crimes have goals like illegal material or immoral gain through information technology as fraud in credit card, hacking, destruction of websites and theft the financial account. Also, collecting information and confidential documents for institution, government, banking and personal to blackmail them.