Name:
Course:
Instructor:
Date:
School:
Cyber crime is the most exceedingly problem in the world. The generalized definition of cyber crime may be unlawful act where computer is used as the tool in various crime activities such as financial crimes, pornography, sales of prohibited articles, online gambling, cyber defamation, email snoofing, selling of property crime and cyber stalking among others(Roderic, 2005). There are reasons why computer is used as a tool in cyber crime. These include: the fact that computer has unique characteristics that store data in small space. The information may be removed much easier when the criminal does not want to be recognized. Computer is complex and its operating system is composed of countless codes. Human mind on the other hand, is fallible and there is likelihood of it not lapsing information at any given time (Reyes, 2007). For this fact, cyber criminals take advantage thus penetrating into computer system. Computer has no evidence that the crime took place. Loss of evidence is a common problem where criminals destroy all data and further collection of data may not exist in crime investigation. Cyber criminals are in different categories. The first category is of Children and adolescents that are between the age of six and eighteen years. The reason for their involvement in this behavior may occur when explores things, proving to be most outstanding among other children or a time may be psychological. The second category consists of discontented employees who include the sacked and the employees that are not satisfied by their employees. They may hack the system of their employees. Cyber crime may therefore be classified in three groups that include crime against individuals, against organization and against individual property (Reyes, 2007).
Discuss whether or not the breach of the U.S. classified network warrants the extradition and trial of Wikileaks’ founder Julian Assange in the United States.
The legal and political forces that worked against Wikileaks scored two major financial blows that were in opposition to whistleblower site. According to associated press, her visa suspended on Tuesday morning and in Monday evening US classified network attempted to block his payments arguing that US rule prohibited individuals in engaging into any illegal action. Visa along with MasterCard’s represented the most severe financial problem in the trial of Wikileaks in that it was announced in freezing Assange accounts. This resulted to both PayPal along with post finances facing problems as a result of their decision on cybercrime. Payback had taken credit on floods for junk web traffic that was temporally taken down to both Swiss banks website along with PayPal’s blog ((Reyes, 2007).
Wikileaks continued to get donation from Swiss credit card through processing firm data cell by means of credit card payment. His site accepted bank transfers to two accounts. When financial net around Wikileaks got closed, he was arrested to face financial trial charges on visa and MasterCard. Despite of the crime he was faced with, the U.S. classified network warrants never revealed their political pressure behind their move to cut off Wikileaks offences on visa or MasterCard. The two firms without doubt felt the pressure from the approach of the political aisle which the Attorney General (Eric Holder) had promised to investigate all legal options against Wikileaks. In early 2011, the two credit cards may have experienced challenges from their banking partners given that Assange had assured to disclose ten thousands documents from US bank. British judges denied Wikileaks who told the London Court that he intended to fight sex crime allegations. The hearing took place after which he was arrested on Swedish warrant over sexual assault even though Assange denied the allegations (Star, 2002)
The U.S. classified network warrants was not justice in that it was a political stunt where he would face espionage charges. According to cross, 2008 United State has an extradition treaty that has taken place since 1963, but never covers the crime spying. All generations should be given their rights to impose ideas that may be beneficial in future. Wikileaks charges on sex obligation was not fair in that all U.S federal government staff was been blocked from viewing Wikileaks along with banning Wikileaks on government computers tampered with his work that was to expose oppressive regimes within Asia, Sub Saharan Africa, the former Soviet in additional to middle east. This would not be successful without support from all regions that wished to reveal unethical behavior in their corporations and government (Cross, 2008).
E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork?
Yes there is in that, one requirement of Federal Information Security Management act is to implement agency-wide information so as to ensure that an information system of agency is secured. Security of federal systems ensures that information on security policies together with its procedures is being place in order so as to reduce risk in paper work. In Early 2005, E government surveyed in about seventy federal systems information and found that, only forty percent of them saved the cost savings (Congress, 2001).
With full information technology securities, the E government has created significant inducement for protection of information along with information systems that is within Federal agency. In addition, “Natural institute of Standard and Technology Computer security” can result to be graded on the essence of serious security breaches in any of their systems (Subhash, 2004). A major benefit of system is that it enables measurement of service levels in paper work
References
Congress R, (2001) Congressional Record. New York: Government Printing Office publisher
Cross M (2008) Scene of the Cybercrime. New York: Syngress publisher
Reyes A, (2007) Cyber crime investigations: bridging the gaps between security professionals, law enforcement, and prosecutors. New York: Syngress publishers.
Roderic G, (2005) Cyber-crime: the challenge in Asia. China: Hong Kong University Press
Subhash C, (2004) E-government: from vision to implementation: a practical guide with case studies. New York: Sage publisher
S tar A, (2002) Open Secrets: Wikileaks, War and American Diplomacy. New York: New York Times publisher
Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.
[order_calculator]