You are on page 1of 5

Abstract:

Technology is involved with most of what we do every single day. Millions of people in
the United States have cell phones, computers, and internet access. We also own devices that are
connected to computers, such as cars or credit cards. With the widespread use of technology,
however, we are exposed to new threats, risks, and vulnerabilities like never before. We face the
threats of hackers and cyber-attacks through almost every device that we own. These
vulnerabilities pose intriguing questions about our safety as individuals. What kind of specific
threats do we face? How is our government protecting us from these threats? What more does the
government need to do in order to ensure our protection from threats and risks? In this essay, we
will look deeper into the risks that we are exposed to from our dependence on technology, and
we will turn to the government for protection from these vulnerabilities.

Works Cited
Ainsworth Vincze, Cameron. "The Coffee Shop Hackers.(TECHNOLOGY)." Maclean's 123.46
(2010): 34.
This article in a reputable Canadian newspaper explains the vulnerability of citizens as they
use the internet in coffee shops. Internet access leaves people vulnerable to being hacked.
With a browser plug-in tool called Firesheep, hackers can easily access citizens accounts
and information by being on the same network as them, like in a coffee shop (1). The author
shows citizens how easy it is for them to be hacked and how vulnerable they are to such
threats. The arguments made about the ease of hacking is clearly seen through the Firesheep
plug-in. In addition to the explanation of Firesheep, author Cameron Ainsworth-Vincze
further explains the increase in cybercrime against individuals. This source will work with
other sources to provide yet another example of the ease of hacking and how at-risk citizens

are. Although the article is short in length, it should be useful in explaining the
vulnerabilities that we face, such as at a coffee shop.

Chen, Thomas. Cyber Terrorism After STUXNET. Dept. of the Army, 2014.

Cyber Attack is the Government Safe? : Hearing before the Committee on Governmental Affairs,
United States Senate, One Hundred Sixth Congress, Second Session, March 2, 2000., 2000.

Cyber Insecurity Hackers are Penetrating Federal Systems and Critical Infrastructure : Hearing
before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology
of the Committee on Homeland Security, House of Representatives, One Hundred Tenth
Congress, First Session, April 19, 2007., 2009.
This source is a government hearing on threats to cybersecurity with regards to federal
systems. The statements are meant to argue that the government is not safe to cyber-attacks.
The speakers are experts in their field that almost all currently hold government positions.
They are speaking to a subcommittee, arguing the vulnerabilities of government and private
computer systems to hacking. The purpose of the hearing is to point out the flaws of
technological government systems currently in place. The argument is that several areas of
technology in the government have low levels of security, and security in those areas must
be updated for protection from hacking and cyber-attacks. This source connects with two of
my other sources that are government programs, as this source assesses the effectiveness of
those government programs, US-CERT and FISMA. This hearing will be very useful in my
argument on whether or not the government is safe technologically. This hearing discusses
that the government is not safe, citing specific examples where government systems have
been hacked into.

Droege, Cordula. "Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the
Protection of Civilians." International review of the Red Cross 94.886 (2012): 533-78.
In this article in in the summer 2012 International Review of the Red Cross, journalist
Cordula Droege discusses cyber security, cyber warfare, and international humanitarian law
in relation to cyber warfare. Cyber warfare is looked at with regards to international
humanitarian law in this article. Different actions have been taken by the United States and
others to help protect themselves from cyber warfare. The article goes on to discuss the risk
that civilians face due to potential attackers. This article connects with several other articles
that talk about the safety of the United States government and the potential risks that they
face along with the level of security that they have regarding cyber-attacks. The article adds
to the topic due to its specific humanitarian concerns. It will be very useful in discussing
further steps that the government must take to protect itself and its citizens from cyberattacks, and why the government much be protected in the first place.

Greenberg, Andy. "Digital Carjackers.(Charlie Miller and Chris Valasek Testing Cars' Security
Vulnerabilities)(Technology / Security)." Forbes 192.2 (2013): 44.
This article from Forbes magazine shows how easy it is for hackers to break into and control
may aspects of a car. As they experiment in South Bend, Indiana, journalist Andy
Greenberg brings two hackers with him, and the hackers show what they can control, aimed
to inform the public of these gaping holes in security. Although it is just meant for research
purposes, it shows the dangers of having so many computers in cars. The hackers could
control several aspects of the vehicle, such as its breaks, horn, engine, and headlights.
Although they hacked the car in person, it is already known that this can be done wirelessly
(1). This source will provide a useful example of the vulnerability that individuals face

because of dependence on technology. Cars are now another area that can be hacked into
and controlled by others, leaving individuals at great risk, which supports my argument.

"GSM Networks Vulnerable to Hacking: Researcher." Information Company (2011).

Schell, Bernadette Hlubik, and Clemens Martin. Cybercrime: A Reference Handbook. Santa
Barbara: ABC-CLIO, 2004.

Social Security Numbers Internet Resellers Provide Few Full SSNs, but Congress should
Consider Enacting Standards for Truncating SSNs : Report to Congressional Requesters.,
2006.
This source is a report by the United States Government Accountability Office. The GAO
set out to find how easy it was to find peoples social security numbers from internet
resellers. Their goal was to investigate the internet resellers and the data, specifically social
security numbers, that they were able to access. In short, the study found that out of the 21
websites that they tried to buy SSNs from, they were able to receive one complete SSN and
four truncated SSNs (3). They found that there were, in fact, easy ways to access someones
social security number. The report also talked about ways that the government could help to
make the SSNs of people to be more secure by providing real solutions, such as standard
truncating of SSNs. This report has similar findings as other reports and articles on the ease
of access to peoples personal information. It also provides a counterargument for
government sources arguing that peoples information is secure. This source will be very
useful in analyzing the safety of peoples information and steps that the government can
take to further protect its citizens from vulnerabilities.

"US must Adopt Cyberattack Law, Says NSA Chief the US must Adopt a Law to Protect the
Country from Cyber-Attacks, the Head of the National Security Agency Said on Monday,
Insisting that it would Respect Privacy.(NEWS)." Telegraph Online (2012).

You might also like