Menu

Cyber Crime Edward Snowdens leaks

0 Comment

Edward Snowden worked for the NSA for a few years. He realized that the government had breached the FISC rules in 2009 regarding the surveillance of phone numbers without suspicion. In his defense, Snowden says he hacked into the NSA and released sensitive information to the internet in order to show the public what the government was doing so that they would decide for themselves whether or not these policies and programs were justified (Aly, 2013, October). He believed that if he had chosen to report his concerns through an internal reporting mechanism the government would have silenced him and buried his message. In his opinion, reporting wrongdoing to the perpetrators responsible for it just meant the system would not work to address his issues (Pilkington, 2013, October). As a result of his whistleblower actions, there has been a public demand for the transparency of the rulings of the Foreign Intelligence Surveillance Court (FISC) as well as other reforms in the agency. In my opinion, Snowden’s actions brought more good than bad. While his actions were criminal, his intentions were for the good of the public. He should be tried fairly for the release of sensitive government information but should be protected by whistleblower legislation. This is because despite doing the right thing, he used illegal means and posed a national security. References Aly M., 2013 (October 26). Snowden’s Secrets. Retrieved from http://prezi.com/yyaemtwr2sk3/snowdens-secrets/ Pilkington E., 2013 (October 20). Edward Snowden: US would have buried NSA warnings forever. New York, NY: Retrieved from the Guardian UK: http://www.theguardian.com/world/2013/oct/18/edward-snowden-us-would-have-buried- nsa-warnings-forever 2. The most dangerous threats a) Malware shopping spree. This threat to mobile devices entails the action of criminals of automating a profit-making technique such as a Trojan horse program that buys apps from the app store without the permission of the user. These criminals develop mobile worms that without necessarily installing them provide the platform for malware that buys these apps. This problem causes a concern for all phone users since the automation of these criminal activities reduces the interaction of the user making it difficult to prevent the mobile worm from shopping using the mobile. b) The availability of malware kits. The underground market has provided a large amount of windows-based malware to cybercriminals. Their easy availability places windows users at a risk since they make it easy for criminals with basic knowledge about operating systems to access information stored on computers through public networks and by hacking into the computers. c) Ransomware. This system of malware does not depend on the use of infected systems by the victim to conduct financial transactions in order to prey on them. These criminals hijack the victim’s ability to access data or communicate and they prevent the victim from accessing the system completely. Thus the victim is forced to pay a ransom in order to regain access. This is a risk to all users of online accounts either on phone or computers. d) Big scale attacks. This entails the implementation of an attack using worms to cause as much damage to a company system or a public system.