Saturday, June 18, 2016

Discussion Week 2 - CIS170

Digital Terrorism and Criminology of Computer Crime

List at least three (3) major categories of cyber terrorism and / or information warfare. Among the chosen categories, determine the one (1) that should be the top priority for the federal government to address. Provide a rationale to support your response.

Three major categories of cyber terrorism and/or information warfare are:

1. Infrastructure Attacks
2. Technological Facilitation
3. Promotion

The first category listed is the one that should be a primary concern for the federal government to address. Top priority should be given because it is important to maintain security to ensure that the United States is up, running and protected at all times. Further because of the massive databases involved it is tantamount to “protect at all cost” all communicative and “think” software and hardware. Also, without these informational bases we are vulnerable and unprotected. We are past the arena of just telephone technology only.

Among the different psychological theories that are discussed in Chapter 3 of the textbook, identify at least two (2) that are relevant to digital crime.

Relevant to the study and manner of addressing digital crime are these two psychological theories as follows:

1. Choice Theory
2. Routine Theory

As used in an applicable fashion, Choice Theory allows the progressive examination of free choice and with that summarized conclusion it helps support the rationale that he or she knows the risks, benefits and have weighed the consequences and performs the digital criminal act anyway.

Routine Theory has a different approach in that digital crime committed is based on a motivated offender (person tempted by gravitational kudos, salutes and bravado (false machismo), a suitable target (ease of hacking into and difficulty (like Fort Knox) is a spurious thrill ride for some and with the absence of a preventive software shield this allows an “ok” to enter and conquer. The invader becomes the Trojan Horse and lets out all their unpleasant surprises upon the unwary victim.

Next, discuss the primary way in which society or an individual could use the psychological theories that you have identified to combat digital crime. Justify your response.

The primary way in which society or an individual could use the psychological theories that I identified to combat crime is 1) study the antics of hackers, 2) intrude on their turf, 3) surveillance cue of announcement (silent squealer), 4) pinpoint and track from entry to location of entry assault and where physically located, 5) warrant to seize and destroy, 6) apprehend subject, 7) scrutinize affiliates and repeat steps 1-6 and with this kind of relentless pursuit of digital crime offenders I feel they will think twice. Take them all down!.
(Name for this - Operation Blue Balls).

Reply to co-student

regarding the Choice Theory I disagree that deterrence would be total but I agree that it should cause some impact to send "signals out" that playtime is over.

As far as the Psychological Theory "Personality Disorder", I feel that the behavior exhibited is intractable, irascible and temperamental to be a significant threat and even harder to prove a criminal act and make it stick because of his/her possibly pleading lack of knowledge and understanding of the law etc. My recommendation is restriction of computer access if they are past phenomenal.

I also disagree about the Psychological Theory (limited - hard to pinpoint him or her), Electronic Warfare (limited - all material replaceable and repairable) but the Information Warfare is part of the protection of the Infrastructure. Attacking the Infrastructure is usually the target not just the Information databases...these usually have back-ups.

Thank you.

Felicia

No comments:

Post a Comment