social justice assignment
DESCRIPTION
TRANSCRIPT
![Page 1: Social justice assignment](https://reader030.vdocuments.us/reader030/viewer/2022013011/548167dcb4795941578b48b2/html5/thumbnails/1.jpg)
SOCIAL JUSTICE ASSIGNMENT
BROOKE CONNELLY
SIENA COLLEGE
SOCIETY IN THE INFORMATION AGE
APRIL 29 , 2013
Cyber Terrorism
![Page 2: Social justice assignment](https://reader030.vdocuments.us/reader030/viewer/2022013011/548167dcb4795941578b48b2/html5/thumbnails/2.jpg)
Cyber Terrorism
“Terrorist activities intended to damage or disrupt vital computer systems.”
May include: Computer and cell phone infrastructure Government agencies, universities and banks
Advancements in Information Technology
![Page 3: Social justice assignment](https://reader030.vdocuments.us/reader030/viewer/2022013011/548167dcb4795941578b48b2/html5/thumbnails/3.jpg)
Chinese Cyber Attacks
American military and technological secrets
Harm government and financial services
Mandiant People’s Liberation Army General Staff Department
(Unit 61398) Network security Digital signal processing Covert communications English linguistics
![Page 4: Social justice assignment](https://reader030.vdocuments.us/reader030/viewer/2022013011/548167dcb4795941578b48b2/html5/thumbnails/4.jpg)
Effects of these Attacks
National security and economic competiveness
Classified information
Three Steps: 1. Recognize the threat cyber-attacks pose to
international trade and its relationship with the U.S. 2. Put a stop to these activities 3. Engage in a constructive direct dialogue to
establish norms of behavior in cyberspace
![Page 5: Social justice assignment](https://reader030.vdocuments.us/reader030/viewer/2022013011/548167dcb4795941578b48b2/html5/thumbnails/5.jpg)
Who is Effected?
U.S. Citizens National Security
Bank Accounts
Trade Secrets
![Page 6: Social justice assignment](https://reader030.vdocuments.us/reader030/viewer/2022013011/548167dcb4795941578b48b2/html5/thumbnails/6.jpg)
Technology’s Role
Information Technology rapidly developing
Records are now stored on computers
Changed the way criminals commit crimes
![Page 7: Social justice assignment](https://reader030.vdocuments.us/reader030/viewer/2022013011/548167dcb4795941578b48b2/html5/thumbnails/7.jpg)
What is being done
Current domestic and international laws are not up to date
February 2013 – Executive Order
![Page 8: Social justice assignment](https://reader030.vdocuments.us/reader030/viewer/2022013011/548167dcb4795941578b48b2/html5/thumbnails/8.jpg)
What needs to change
New federal strategy should be implemented by the US Include military computer network operations
Further secure US networks
![Page 9: Social justice assignment](https://reader030.vdocuments.us/reader030/viewer/2022013011/548167dcb4795941578b48b2/html5/thumbnails/9.jpg)
Conclusion
Cyber terrorism is a global threat
New federal strategy should be implemented to protect US citizens
![Page 10: Social justice assignment](https://reader030.vdocuments.us/reader030/viewer/2022013011/548167dcb4795941578b48b2/html5/thumbnails/10.jpg)
Sources
Perlroth, Nicole. "Hackers in China Attacked The Times for Last 4 Months." The New York Times. N.p., 30 Jan. 2013. Web. 18 Mar. 2013. <http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?hp&_r=0>.
Beijing, T.P. "Hello, Unit 61398." The Economist. N.p., 19 Feb. 2013. Web. 18 Mar. 2013. <http://www.economist.com/blogs/analects/2013/02/chinese-cyber-attacks>.
Brennan, John W. “United States Counter Terrorism Cyber Law and Policy, Enabling or Disabling?’ 15 Mar. 2012. Print.
Browdie, Brian. "White House Official Calls on China to Halt Cyberattacks." American Banker 178.39 (2013): n.pag. ProQuest. Database. 24 Mar 2013.
"US Warns China on Cyber Security ." Computer News Middle East (2013): n.pag. ProQuest Computing . Database. 24 Mar 2013.