Cyber Security

Cyber Security

Problems of computer hacking revolve around information in the individual, corporate, and government organizations. Hackers steal information about financial statements, business ideas, and plans, state secrets, bank, and insurance card details, to list a few (Vacca, 2012). However, the most crucial one is state security, which when hacked can cause massive dangers and unthinkable catastrophes. H, Prunckun, W, Prunckun (2013) agree with Vacca (2012) that in most of these cases, security bodies and intelligence hastes to correct the flaws and remain alerted on the potential repercussion. In the same line, the case of American systems and Russian hackers is unavoidable in the recent years. There are claims that Russian hackers intruded into the American system as early as 2015 with the escalation of the news in 2016 during the elections (Lipton, Sanger & Shane, 2016). Whether this is true or false, it raises questions to the national security and intelligence bodies. For more details, this paper focuses on the DNS computer hacking in 2015, analyses the effects of to public safety and operations of the security institutions and an opinion about the same. 

In 2015, an FBI special agent gave notice about a possible compromise of a DNC (Democratic National Convention) computer. The suspected hackers had links to the Russian government. Their information source called ‘dukes’ sent messages to the White House and state departments, according to the investigations done by the FBI in the past (Lipton, Sanger & Shane, 2016). Unfortunately, Tamene, a DNC contractor in information systems had no idea about the said intrusions and was forced to check from Google what that was all about. As Lipton, Sanger, and Shane reported in 2016, subsequent investigations showed networks to alleged election hacking in a years’ time, with the mission of favoring Donald Trump against Hillary Clinton and interconnected to previous trials in earlier years of American independence. 

During investigations, the Obama administration and other specialists did their best to find the source of this malpractice by inference and links to ascertain the conduct of involved parties. Due to weak responses and ignorance of most people involved, the investigations were unsuccessful (Lipton, Sanger & Shane, 2016). These were evident from the fumbling of the world’s most sophisticated and brilliant investigative body, the FBI, on this matter. With the FBI’s failure in the investigations, the hopes of revealing secrets die. A year later, emails of prominent political figures from the Democrats leaked frequently, confirming the earlier allegations (Lipton, Sanger & Shane, 2016). With the tactics of hackers changing often, these issues become a concern to the Americans and security departments.

Hacking individual and organizational information pose risks that the intelligence must take seriously and act. The security body must be swift, to not only protect the citizens and organizations but also work to ensure it is also safe from such attacks. One of the reasons for this is the knowledge of the world that America is the most protected country and the most vulnerable in equal measure (Perez & Procupecz, 2015). America must be quick to restore that trust. Leaked information is used against the government and the state officials. The case of Hillary Clinton’s private emails leaked to the public shows the threat of these hackers and extends to the election malpractices that cause political animosity among people from different political divides (Perez & Procupecz, 2015). 

Investigations into the issue were not successful. However, after a year of claims and counterclaims, the dots connected to the origin of these matters and points to Russia. The Security department must not take these lightly because of their failure to find the right information (Vacca, 2012). The enemy might use this trick to access information within the state. With the electoral system, which is one of the most secured, possibly hacked and compromised, there is no doubt the security departments and the country are vulnerable to analogous dangers. Hacking the security website can be the riskiest trial on the government. With the rise of insecurity and terrorism, such information can leak to criminals and affect the determination to keep the state safe (Vacca, 2012). The government must act speedily to correct these flaws affecting the safety and other related issues.

The effects above raise questions on the enthusiasm with which the government works to protect the nation and itself from cyber threats. Cyber insecurity cases rise daily, and the government is in great alarm over the issues. Failure of FBI and other organizations to investigate the hacking claims successfully points more risks to the state and security (Prunckun H, & Prunckun W, 2013). The government must take all the steps to convince the people that their efforts to protect them from similar risks are at top gear by improving on their investigation skills. 

In conclusion, it is highly likely that the government that hackers are intruding into the American systems in ways that are causing concerns within the security bodies. In several occasions, Russian hackers link to the 2015 DNC and government official’s emails. The release of emails from top government officials and members of the Democrat party prove these claims. It is absurd that the investigative bodies failed to demonstrate these issues, and raised the questions over the preparedness and ability of the government to protect the people from hackers. As a result, most people are in fear over these occurrences and hope that the government will improve their systems to protect them from hacking by dealing with the culprits.


Lipton, E., Sanger, D., & Shane, S. (2016, December 13). The perfect weapon: How Russian cyberpower invaded the U.S. Retrieved from

Perez, E., & Procupecz, S. (2015, June 24). First on CNN: U.S. data hack may be 4 times larger than the government originally said. Retrieved from 

Prunckun, H., Prunckun, W. (2013). Intelligence and private investigation: Developing sophisticated methods for conducting inquiries. Springfield, IL. Charles C. Thomas Publisher.

Vacca, J., (2012). Computer and information security handbook. Waltham, MA. Newnes. (2 Ed).

Leave a Reply

Your email address will not be published. Required fields are marked *