Cyber-Crime: Homeland Security Force

1189 Words5 Pages
Cyber-Crime Susan Kinkead CJA/394 May 12, 2013 Michael S. Hudson Cyber-Crime Since 2012 the Pentagon is ramping up its forces to be ready to fight on a digital battlefield. The Cyber-Command staff for the homeland security force is a working staff of 900 to 4,900 strong that combines both military and civilian personnel working together as one unit. This cyber-protection force will guard the pentagon’s computers to combat global crimes, and cyber-injustice (Russell, 2013). Terrorism has been at the forefront of the crime, just this month the United States had a bombing in Boston devastating to the nation. According (Russell, 2013) a warning about Tamerian Tsamaey had been issued nine months before the Boston bombing. The…show more content…
In social networks people make “friends” without knowing the person and make personal information easily available” (Sauter, Poltrack, & Allen, 2012, para. 2). Criminals using social media use tools that will go through a dictionary on the Internet searching for common passwords. Facbook users can be victims of this type of hacking because many of the passwords used are common. Another way criminals use Facbook is a way to commit cyber-crime by profile cloning. Criminals will take images from a users account as well as private information and re-create a profile. Once this is complete the hacker can request to be friends with everyone that was on the victim’s friends list. Anyone who accepts the friend request from the cloned profile is a target as well. Internet security analysts warn that Facebook is a hotbed for online crime (Sauter et al.,…show more content…
Criminals are turning to cyber-crime because of the speed and convenience. Cyber-crimes include attacks against computer data and systems, identity theft, Internet fraud, e-mail scams, and phishing. In addition the threat of terrorism forces authorities to address security vulnerabilities related to information technology infrastructure such as power plants, electric grids, information systems, and the computer systems of government and major companies. References Cantor, M. (2013). Pentagon on cyber security force: Quintuple it. Retrieved from http://www.newser.com/story/161761/pentagon-on-cybersecurity-force-quintuple-it.html McGregor, R. (2013, May 07). US say China is tapping up cyber-war. . Retrieved from http://www.ft.com/cms/s/9/411930e6-b69ba-11e2-93ba-00144feabdc0.html Reston, M. (2013, March 29). Ransomware computer virus attacks on the rise, authorities warn. Retrieved May 6, 2013, from http://articles, latimes.com/2013/mar/29/local/la-me-in-ransonmware-virus-warning-20130329 Russell, M. (2013). Yet another Tsarnaey warning went ignored. Retrieved from
Open Document