Technology has changed the way the military operates, communicates, and caused the military to change laws and policies regarding how they handle information technology. The mobile and computer revolution has impacted the government in many ways. Information technology protection is not perfect in the United States. United States government computer servers and websites are vulnerable to hackers on a daily basis. Cellphone, Bluetooth, fitness trackers, viruses, hackers, and industrial espionage affect the way the government conducts operations every day. Terrorist also use social media to spread hate and to try and kill United States military personnel all around the world. One example, in the news recently talked about how the fitness tracking …show more content…
In this high technology age, a mobile device could be used to transfer secret or classified data if were placed in the wrong hands. The United States has teams of Information Technology specialist that advises and attempt to block hackers from our networks on a daily basis. Unfortunately, there are professional hackers in the world who take pride and hacking others as they see fit.
The hacking group Anonymous is one example of hackers that have caused harm to the United States government and their employees. They consider themselves to be the Robin Hood of the cyber world, and no one is regulating what Anonymus affiliates are doing, even some of their members do not agree with all the things they do. For example, Lauri Love a British hacker was charged with leading the 2013 attack on US government websites by Anonymous (Parkin, 2017. The US government chose to pursue him for cyber-attacks on NASA and the US army. They claim he stole personal data belonging to over 100,000 government
…show more content…
For example, WikiLeaks released top-secret CIA documents exposing spyware used by British and US spies (Telegraph.co.uk, 2017). The spyware they exposed was called Athens/Hera, and it allowed agents to be able to track targets around the world. A big concern with leaking that data was that the target with the spyware on their computer might be able to pinpoint the agent that put it on their computer which puts the agent's life in jeopardy.
Technology is changing the military through industrial espionage. Other nations have used hackers to steal United States military technical data from commercial defense contracts. All major nations participate in industrial espionage. It is how most of the powerful nations in the world stay up to date with the latest technology. Companies like Raytheon, Boeing, and Northrup Grumman all have contracts with the military to develop weapon systems. They are all targets by nations like China, Russia, and North