Order For Custom Writing, Similar Answers & Assignment Help Services

Fill the order form details in 3 easy steps - paper's instructions guide.

Posted: September 6th, 2022

Alleged computer hacker Gary McKinnon

Alleged computer hacker Gary McKinnon of the United Kingdom has publicly admitted to compromising computer systems belonging to NASA and the Department of Defense. Using information from your classroom, additional materials provided by your instructor, and your own independent research, discuss the impact of these widespread intrusions, and comment on McKinnon\’s self-proclaimed motivations. Describe McKinnon in the context of the frameworks and theories of cyber-crime and cyber criminals discussed in the classroom. Are the efforts to extradite McKinnon to the United States simply a political stunt, or are they an important precedent in prosecuting international cyber-crimes? Finally, share what you know about computer security and best practices to make recommendations to prevent similar incidents in the future.
Your submission should be a minimum of four pages in length, and it should conform to APA formatting and citation standards. A title page and reference list (APA style) are mandatory, but they will not count toward the four-page requirement.

Alleged computer hacker Gary McKinnon

Student’s Name
Institutional Affiliation
Course
Professor’s Name
Date

Alleged computer hacker Gary McKinnon
Introduction
Gary McKinnon is one of the people who successfully hacked NASA and other military systems in the United States. The incidence shows the effects of intrusion that include loss of data and a negative reputation. McKinnon’s behavior can be analyzed using social learning theory and moral disengagement theory. It is important to appreciate that more hacking attempts are likely to occur in the future. Therefore, governments and organizations should take various measures to prevent intrusion (Kouttis, 2016). The purpose of the paper is to analyze the alleged computer hacking by Gary McKinnon, the negative impact of intrusions, theories describing the behavior of hackers, and the recommendations to prevent hacking.
Impact of these Widespread Intrusions
Intrusions cause a negative impact on individuals, businesses, and governments. One of the common impacts is the loss of reputation in public. Websites that are hacked are deemed as weak or less competent to withstand cybercrime (Kouttis, 2016). For example, when NASA was hacked among other military computers, the people were concerned about the commitment of the government to stop cybercrime. Intrusions can also lead to loss of important data that hackers can use against government or owner. In the example of Gary McKinnon, it is alleged that he copied various files and deleted others (Kouttis, 2016). They can also cause conflict between two nations and suspicion about their commitment to fighting against cybercrime. For example, in the case of Gary McKinnon, he was not punished in the way the United States government expected. Therefore, in the future, countries become suspicious of each other.
McKinnon proclaimed that his intension of hacking into the United States military and NASA systems was to look for evidence of free energy suppression. However, committing such an act cannot be justified with a mere claim (Kouttis, 2016). Hackers also may defend their actions with different types of excuses. The bottom line is that he caused harm and thus justification is not necessary (Kouttis, 2016). The proclamation is a reflection of various arguments hackers use to intrude into systems, but they are not justifiable.
Frameworks and Theories of Cyber-Crime and Cyber Criminals
The case of McKinnon can be explained using the moral disengagement theory. The theory states that individuals engage in activities that are against the moral code of conduct but try to justify their actions (Der Walt, 2017). Similarly, after committing crimes against the United States government he would attempt to justify his actions. The actions of McKinnon also align with the arguments of social learning theory. The theory states that people engage in activities they have learned or acquired from other people. It also claims that people will engage in criminal activities due to various motivations (Der Walt, 2017). Another theory that explains the actions of McKinnon is the social control theory. The theory indicates that due to online anonymity people believe there is permission to engage in deviant behavior (Der Walt, 2017). McKinnon did not interfere with the security systems of his country the United Kingdom but would attack a foreign country due to the permissiveness of online anonymity.
The different theories explain the circumstances under which people commit online crimes such as intrusion. McKinnon was not justified in all his actions (Der Walt, 2017). He did not convince the government and the justice system that he was merely looking for evidence. Additionally, due to the anonymity, he left anti-American messages that he would continue attacking the systems (Der Walt, 2017). He also condemned their systems calling them ‘crap.’ Therefore, he had further intentions to carry out other online criminal activities against the United States.

Prosecuting International Cyber-Crimes
The proceedings to extradite McKinnon were merely a political stunt that did not deliver justice according to the law. Theresa May who was then the Home Secretary announced that the extradition had been blocked due to the health conditions of McKinnon (Der Walt, 2017). Theresa May indicated that extraditing McKinnon was against his human rights due to his medical condition. Therefore, the suspect would end up taking his own life or dying in a foreign country. The actions of the government indicate the commitment to pursue justice.
The action of the United Kingdom is an indicator of how governments still operate when their citizens are accused of cybercrimes. Governments may be a party to international treaties that support the extradition of criminals but they do not obey the stipulations (Shin et al., 2018). It is an important precedent that the United Kingdom established of not extraditing McKinnon for appropriate punishment in the United States. It is thus a way of encouraging other criminals to continue hacking government systems. The precedent shows that governments should consider their commitment to international justice (Shin et al., 2018). The commitment should be demonstrated by the actions of extraditing individuals or punishing severely to ensure justice and prevent similar incidences in the future.
Recommendations to Prevent Similar Incidents in the Future
Intrusions are likely to happen in the future, but governments and organizations can adopt various measures to secure their assets. One of the best approaches is to encrypt their data using the best technologies available today (Shin et al., 2018). Encryption allows systems to develop codes that ensure hackers cannot benefit from data even if they gain access to it (Shin et al., 2018). One of the reasons the massive hacking was rampant in early 2000 is the poor adoption of encryption.
It is important to track user behavior or systems to detect any suspicious activities. For example, users who log in for a long time or log in several times within a short time should be investigated. Hackers also can spam a system thus making it inoperable (Shin et al., 2018). Governments must invest in tracking devices that will block all users who try to spam their sites. Tracking systems are also necessary to detect people who are transferring huge amounts of data. NASA and military systems require frequent updates to ensure they are equal to the task of preventing attacks (Shin et al., 2018). Updating the systems includes investing in strong security systems that will prevent such attacks from occurring in the future.
Conclusion
McKinnon is one of the people in history who have carried out massive hacking leading to loss of data. The incidence is a great lesson that governments can learn on how to prevent such attacks and how to deal with cybercriminals. Governments and organizations should take strict measures since instructions lead to loss of data, negative reputation, and foreign crisis. The case of McKinnon can be analyzed using social learning theory and moral disengagement theory. Although the behavior of McKinnon cannot be justified, the United Kingdom did not extradite him for prosecution in the United States. Therefore, to prevent such incidences from occurring in the future, governments should take various measures such as encrypting their data and analyzing activities to block suspicious users.

References
Der Walt, C. (2017). The impact of nation-state hacking on commercial cyber-security. Computer Fraud & Security, 2017(4), 5-10.
Kouttis, S. (2016). Improving security knowledge, skills, and safety. Computer Fraud & Security, 2016(4), 12-14.
Shin, Y. Y., Lee, J. K., & Kim, M. (2018). Preventing State-Led Cyberattacks Using the Bright Internet and Internet Peace Principles. Journal of the Association for Information Systems, 19(3), 3.

Order | Check Discount

Tags: Alleged computer hacker Gary McKinnon

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing.StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00