Question
Business Law News: Student Response I want you tosubmit at least 2 responses to articles posted by others. Your comments/reflections must relate to class material
Business Law News: Student Response
I want you tosubmit at least 2 responses to articles posted by others. Your comments/reflections must relate to class material and your opinion on the posted Business Law News.Do not criticize their choices, but advance the conversation forward by adding your thoughts on similar or different options. Your posts have a long "length requirement". A follow-up reply of just "cool" or "wow", or any version of that isn't enough for credit. They need to be thoughtful & respectful responses.I need to know that you actually read your classmate's analysis and learned something new.
"Student: Bella Vlaicevic
The article she used: "3 Former U.S. Intelligence Operatives Admit Hacking For United Arab Emirates" URL:https://www.npr.org/2021/09/14/1037132503/us-charges-former-intelligence-operatives-hacking-for-uae
Analysis:
"Hacking operations have become a common criminal activity that occurs more frequently than anyone would like it to, especially with the constant growing reliance on technology. Our textbook defines a hacker as "a person who illegally accesses or enters another person's or a company's computer system to obtain information or to steal money"; but in order for a hacker to complete their attack, they typically need specific software/technology to get the access to what they're aiming for. In the recent news article, "3 Former U.S. Intelligence Operatives Admit Hacking For United Arab Emirates" published by NPR (National Public Radio), Jenny Kane reports on how three former U.S intelligence and military operatives admitted to supplying advanced computer hacking technology to the United Arab Emirates (UAE).
In their trial, the three men (Marc Baier, Ryan Adams and Daniel Gericke), are being accused of working as senior managers at a UAE-based company that did the hacking on behalf of the government. Prosecutors of the trial claim the men provided hacking and intelligence-gathering systems that were used on United States' computers as well as other places around the world. It was also said that by joining an Emirati company, they would receive significant increases to their salaries. Between 2016 and 2019, the trio expanded and increased the sophistication of operations given to the UAE. They had bought technology that's able to break into computers and mobile devices from companies around the world; this included something called a "zero-click" exploit that can hack into mobile devices without any user interaction. The three men are being accused of violating American laws related to export control and computer fraud, which were fears that have concerned many with the new hirings from foreign governments. The CIA of different foreign governments have been hiring former U.S. intelligence operatives in order to boost their own computer intelligence, protection, and spyware. This practice creates growing concerns for U.S. officials because it poses a risk of having U.S. secrets leaked.
The trial ended in an agreement of a required $1.68 million payment, cooperation in the Justice Department's investigation, as well as ending connections to any UAE intelligence or law enforcement agencies. Baier, Adams, and Gericke must comply with those terms for three years in order for further prosecution to end.
Computer crimes have become one of the top criminal activities due to our reliance on technology in the present, and I think this article really goes to show how none of our personal information is truly safe. Although companies try to keep up with their security software in their apps and companies, the hackers out in the world are working to keep finding ways around them. Even though we are taught to keep strategic passwords that other people would not be able to guess, and to have a different password for everything we use, it doesn't even seem like that will protect us from having our lives hacked. Of course, there are things like the Computer Fraud and Abuse Act and the Computer Crime and Intellectual Property Section of the Department of Justice to help keep the public safe, but I wonder if those are really enough to protect their privacy and personal information."
Need Help With My Reply:
Hi Bella Vlaicevic,
-I just finished reading your summary on the article, "3 Former U.S. Intelligence Operatives Admit Hacking For United Arab Emirates" and I think it was particularly articulate yet compendious.
-A part that stood out to me was when you explained, " "
-I noticed you explained/said/mentioned, " " and I agree with your idea because......
-To add to your work _
-I was unaware that _. I was under the impression that_.
-Furthermore,
-Overall, I think you did a good job analyzing the material. Keep it up for future inquiries!
Your Classmate, Sky
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started