CyberAlsoaDomainofWarandTerror.pdf

FIND A SOLUTION AT Academic Writers Bay

16Mar 2022 by
Full Terms & Conditions of access and use can be found athttps://www.tandfonline.com/action/journalInformation?journalCode=rsan20Strategic AnalysisISSN: 0970-0161 (Print) 1754-0054 (Online) Journal homepage: https://www.tandfonline.com/loi/rsan20Cyber: Also a Domain of War and TerrorSuryakanthi TripathiTo cite this article: Suryakanthi Tripathi (2015) Cyber: Also a Domain of War and Terror, StrategicAnalysis, 39:1, 1-8, DOI: 10.1080/09700161.2014.980549To link to this article: https://doi.org/10.1080/09700161.2014.980549Published online: 14 Jan 2015.Submit your article to this journalArticle views: 2533View related articlesView Crossmark data
CommentaryCyber: Also a Domain of War and TerrorSuryakanthi TripathiIndia, the IT nation, did not make a news splash at CyberTech 2014. That is worth apassing thought. Because cyber is the fifth and new domain of warfare, after land,sea, air and space.CyberTech 2014 took place in Tel Aviv in January, and displayed Israel’s prowessin cyber-defence. Israel’s National Cyber Bureau, which played a major role inorganising the event, defines its goals as drawing up cyber-defence policies, deve-loping cybersecurity legislation and turning Israel into a global cyber incubator. TheIsraelis say that as hackers keep getting more sophisticated, the brightest digitalsecurity minds from around the world will need to come together. And CyberTech2014 did do that, bringing together some 500 heads of industry, representatives ofcybersecurity agencies from across the world, as well as a large US delegation fromthe White House and their Department of Homeland Security. Many agreed thatIsrael’s experience in foiling thousands of cyber-attacks each day and the quality oftheir cyber start-ups could be very lucrative for business within and outside itsborders.According to a 2013 UN document,1 by the year 2017, mobile broadbandsubscriptions will cover 70 per cent of the world’s total population. By 2020, thenumber of networked devices (the ‘internet of things’) is expected to outnumberpeople by six to one, transforming current conceptions of the internet. In this hyper-connected world, the document says, it will become hard to imagine any crime notlinked with cyber-connectivity.It is said that roughly 80 per cent of cybercrime acts originate not as individual butas some form of organised activity, which, in its diversification, keeps attracting newactors, including those with relatively modest skills.2 Cybercrime is now a businessopportunity, driven by profit and personal gain. McAfee, the computer security soft-ware firm, estimates that cybercrime now costs the global economy about $500 billionannually. Even so, cybercrime is still in its infancy and, according to an expert in theEuropean Cybercrime Centre, ‘You ain’t seen nothing yet’.3The data breach of the US retailer giant Target, in which around 80 millioncustomer accounts were compromised during the 2013 holiday season, was a harshwarning. Estimates suggest that the cost to Target and its shareholders may exceed$1 billion.4 It has generated fears of cyber-fatality, something that could happen whenSuryakanthi Tripathi is a former diplomat and her last posting was as India’s ambassador to Spain.She is the Managing Trustee of India Foundation, a non-political trust that is engaged in social andcultural activities.Strategic Analysis, 2015Vol. 39, No. 1, 1 8, http://dx.doi.org/10.1080/09700161.2014.980549© 2015 Institute for Defence Studies and Analyses
a security breach is so extensive and damaging that the company simply cannotrecover from it.After the attack on Target, at the end of February 2014 the cybersecurity firm HoldSecurity LLC announced that it had discovered the data of some 360 million accountcredentials that were available for sale on a cyber black market site. It is being calledthe largest single data breach ever and, of the total account credentials, 105 millionseem to have come from a single attack. Apparently, hackers only have to installmalware on point-of-sale devices, and then the credit and debit card details comestreaming in.Understandably, cybersecurity companies and stock valuations are on the rise. Ascybersecurity no longer remains just a matter of corporate choice, its budgets areescalating. Forecasts indicate that the global cybersecurity market will increase from$80 billion at present to over $140 billion by 2017. Entrepreneurs rake in profits inaddressing these risks, although building effective security strategies does need a highlevel of expertise and funds. According to the research firm CB Insights, venturecapitalists are investing record highs in cybersecurity companies, from mobile-appsecurity platforms to online authentication infrastructures.A further incentive is that cybersecurity start-ups generally exit rather quickly,either through acquisition or an Initial Public Offering (IPO) and, according to somereports, with some tenfold return on investment.6 FireEye’s IPO, for example, inSeptember 2013 raised about $304 million, and just five months later had a marketcap of $10 billion, highlighting the booming real-time virtual security sector.Although its stock dropped thereafter, the increased demand for the highest qualitycybersecurity software continues. It is said that FireEye operates a network of morethan two million virtual machine-based security platforms, which constantly evolve toidentify advanced threats that might have gone unnoticed by older technologies. In2014, FireEye also acquired Mandiant whose core business is forensic cybersecurityand is said to be best known for unveiling a Chinese set-up believed to have beenbehind a series of hacking attacks in the US. Other deals include Cisco’s $2.7 billionpurchase of network security firm Sourcefire, and IBM’s purchase of Trusteer, anIsraeli start-up, for $800 million. Even Google has been active in acquiring cyberse-curity start-ups.RSA, a well-known US electronic security company, presents a scenario in whichcybercrime will continue to improve its techniques—hacktivism will target enterprisesand cyber-criminals will leverage Big Data principles to improve effectiveness.Mr. Preet Bharara, familiar to many in India thanks to the India US discomfitureover the wage tangle of an Indian diplomat and her domestic help, had this to sayabout cybercrime: ‘As the United States attorney in Manhattan, I have come to worryabout few things as much as the gathering cyber threat’.7The cybersecurity world is currently divided into two types of companies. Thereare the established companies such as Kaspersky, Checkpoint or Symantec, whoprovide solutions for individual users as well as enterprises. Next are the recentbreed of start-ups that develop cyber-defence strategies, adopting quicker heuristicapproaches or crowd-sourcing to solicit ideas from a larger online community.The American responseAccording to President Obama, the economic prosperity of the USA, its nationalsecurity and individual liberties depend on them securing cyberspace. Only then2 Suryakanthi Tripathi
would the internet also remain an engine for economic growth and a platform for thefree exchange of ideas.Calling cyberspace a ‘new domain of warfare’ in 2011, the US Department ofDefense has set up the US Cyber Command, apart from cyber commands for its army,air forces and ocean fleet, for ‘defending US and allied interests in cyberspace’, and‘working together to make that inherently collaborative, adaptable environment … formilitary command and control’.8 Cyber Command has been called the newest globalcombatant and its sole mission is cyberspace, outside the traditional battlefields ofland, sea, air and space.The US Congress, for its part, has under consideration the National Cybersecurityand Critical Infrastructure Protection Act that will amend the 2002 Homeland SecurityAct. It would require the Department of Homeland Security to conduct cybersecurityactivities on behalf of the federal government and would also codify the role of thedepartment in preventing and responding to cybersecurity incidents involving federalcivilian agencies and critical infrastructure in the United States. Since 95 per cent ofthe American cyber infrastructure is reportedly private sector owned and operated, thebill aims to establish a threat information-sharing partnership between HomelandSecurity and the private sector.Hacker attacks against JPMorgan Chase and nine other US financial institutions inrecent months have caused alarm and the US administration is seeking to enhance thelegal authority of the Department of Homeland Security to fight cyber-terrorists.JPMorgan is also now set to double its $250 million annual computer security budget.This is expected to improve firewall protection, internal protection, vendor protectionand everything that links to a client or customer. In August 2014, the giant companydisclosed that it had been attacked by hackers, and subsequently announced that thecontact information of 76 million households and seven million small businesses hadbeen exposed. The reassurance, however, was that despite the hacking having goneunnoticed for about two months, there was no evidence that financial information,such as passwords, dates of birth, social security numbers or account numbers, hadbeen compromised.After the vulnerability of the most heavily fortified American financial institutionshad been laid bare, the FBI is reported to have initiated a criminal inquiry into theseattacks. But what appears worrisome to the American authorities is the scale of theattack, combined with the lack of clarity about the hackers’ identity or motives.According to industry experts, despite huge sums invested in detection technologies,it is becoming very difficult to trace an attack to its source and, hence, it will bealmost impossible to deter one.9The Obama administration has been working to address the weakness of pass-words via the National Strategy for Trusted Identities in Cyberspace. The WhiteHouse cybersecurity coordinator, Michael Daniel, at a recent news event said thathe would like to kill the password dead since it could no longer ensure security. Usinga password to access a bank account or mobile phone would soon be a thing of thepast, according to him.10 Instead, he recommended the use of biometric securitymeasures to access computers and smartphones or facial recognition security throughthe device’s camera. Even a selfie could be a security measure instead of just beingused for posting on Facebook. The idea was multifactor authentication to makehacking that much more difficult.On the other hand, this also has to be seen in the context of the current frictionbetween the US Justice Department and a company like Apple, which has introducedStrategic Analysis 3
new privacy features for its iPhones and iPads. Features like fingerprint scanners onphones are becoming popular because consumers believe they will also be betterprotected from the government intruding on their private data. The FBI is consider-ably upset with these tech companies for ‘marketing something expressly to allowpeople to place themselves beyond the law’.11US cyber resilience policy also includes their voluntary Cybersecurity Framework,announced in February 2014, for providers in 16 critical infrastructure sectors. Firstintroduced in the US president’s 2013 State of the Union address as a key deliverable,it has been developed by companies, federal agencies and international contributorsworking together, and is a reference guide for the private sector and government tojointly face a shared challenge. It comprises a set of cybersecurity activities that coveridentifying, protecting, detecting, responding to and recovering from cyber intrusions,and also provides for an organisation that will gauge its cyber effectiveness, weak-nesses and strengths included.China awakensChina has the largest number of internet users—more than 600 million—and wasonce listed as the second most cyber-targeted nation. Chinese leaders accept that theirIT abilities are lagging and want to transform China into a cyber power. President XiJinping, in his first year in office, began presiding over a new group on cyber andinformation security. Its mandate is to draft strategies for protecting national secretsand developing digital defences, viewing it as a most pressing strategic concern.The Obama administration asserts that there are cyber-attacks by Chinese hackerson Americans and American companies doing business in China, some of thempossibly even state-sponsored. Beijing, in its turn, says that it is a frequent victimof attacks of American origin. Talks between the two countries over cyber-attacks andnational security leaks have become complicated after revelations that the USNational Security Agency has been spying around the world, even on American allies.Israel’s innovationIsrael has invested heavily in cybersecurity and supplies—over 10 per cent of globalIT security products, significantly disproportionate to its size. This is also impressivebecause of the export restrictions that their businesses have to contend with. Hopingto consolidate its position as a world leader, Israel depends on a cutting-edge talentpool capable of rapid innovation. Israel has also created a new cyber-defence author-ity to defend Israel’s civilian networks and help bridge the public private cyberdivide.At the World Economic Forum in January 2014 in Davos, Switzerland, IsraeliPrime Minister Netanyahu, before addressing international issues, talked of hisnation’s high-tech abilities and its intention to become one of the top three countriesin cybersecurity. On the heels of Davos, at CyberTech 2014, he said: ‘Foreigncountries want three things—Israeli technology, Israeli technology and Israeli tech-nology’. He also called on tech giants and Western powers to band together to protectthe world from cyber-attacks, promising to relax export restrictions on Israeli security-related technologies.12This may be a little problematic since tech companies and intelligence agencieswould be loath to trade secrets with each other or reveal their own vulnerabilities.4 Suryakanthi Tripathi
While Israel is currently formulating export regulations, some Israelis see a securitycompromise in allowing cyber companies, mostly formed by graduates of their ownstealth security units, to export advanced technologies that could then be turnedagainst Israel itself. There are concerns about safeguarding their technology advan-tages and limiting the access of potential hackers to their cybersecurity research andsolutions. Israeli intelligence is also guarded as it does not want to help its enemiesbetter protect their own systems by using Israeli skills. However, in cyberspace it isdifficult to wall up technology, since it eventually finds its way to the marketplace.According to experts, Israel faces roughly 100,000 cyber threats a day, and wasthe victim of an average of 1.5 serious cyber-attacks an hour in 2013. These attacks,they claim, have been turned into a source of strength as Israel was pressurised intoadvancing its technology and knowledge. It is now being called the nation ofcybersecurity start-ups, with these start-ups getting tax incentives through theirNational Cyber Bureau.13 US companies Lockheed Martin and RSA Securityannounced that they would invest in Israel’s national cyber complex in Beersheba,joining the likes of Deutsche Telekom and IBM. The market, in fact, is dominated bysmaller enterprises, demonstrating that technology ‘giants’ generally do not have thesecurity solutions that Israeli start-ups are offering. Israel is said to have the largestnumber of high-tech start-ups globally in absolute terms after the US.Israel’s state-of-the-art ‘Cyber Gym’ was opened in February 2014 by the IsraelElectric Company (IEC) to train its employees to defend against cyber-attacks. IEC,which alone receives around 10,000 attacks per hour according to its CEO, claims thatit has the unique capabilities to train other companies from around the world againstsystem hacking.14 Training consists of real-time defence by students against attacksby live instructor-hacks.India alertIt was the NSA leaks that revealed that American agencies were also spying onIndians and that India had no legal or technical safeguards in this matter. Thisprompted the Government of India to announce its first National Cyber SecurityPolicy in July 2013. The policy was expected to help build a secure and resilientcyberspace for citizens, businesses and the government, namely a cyberspace in whichall stakeholders within the country as well as the global community had confidence.The challenge of a cyber policy lies also in its operationalisation and implementa-tion. Critical infrastructure such as defence systems, power infrastructure, nuclearplants and telecom networks need to be protected. As far as India is concerned, thetraining of 500,000 cybersecurity professionals in the next five years is consideredkey, as is the verification of IT products and services used by government departmentsand enterprises. The last measure was apparently inspired by the NSA leaks thatindicated that US agencies had used technology companies to enhance their ability tospy on foreigners.After launching the policy, the concerned minister of state at that time, Shri MilindDeora, tweeted: ‘Unveiled India’s First Cyber Security Policy to safeguard individualprivacy, corporate data and sovereign virtual assets’.15 There were reactions to thispolicy, but few over the moon, the ministerial tweet notwithstanding. And there weremany questions. Is India’s cyber policy all words and no action? Where is theimplementation plan? Where are the details—where are the hows and whos? Whereare the manpower and tech resources? How will the policy make its way throughStrategic Analysis 5
academia and industry? Have we also announced a policy just because the worldhas one?Even so, it is better to start with a policy than have none at all.India’s online vulnerability is said to be immense but is not even remotelyquantified as there is no central body for reporting cybercrime. For example, anestimated 16.6 million Americans were defrauded in 2012. What is the figure forIndia? We will never know unless there is some mechanism to gauge the volume,variety and innovation of cybercrimes.The EC Council outlined its view about India in its report, published in two partsover 2013 2014, entitled ‘Talent Crisis in Indian Information Security’.16 It revealedworrisome gaps in India’s IT security, which could impact handling cyber threats inbanking, defence, information, energy and so on, and also highlighted that India’svulnerability lay in the shortage of talent.The EC Council, with almost 100 countries as members, is a top certification bodyfor information security professionals, and the owner/creator of the famous CertifiedEthical Hacker (CEH) and similar programmes. They say India is poorly equipped tohandle cyber intrusions owing to a ‘serious shortage’ of skilled professionals. In ninecrucial segments of information security, such as application architecture, code reviewand cryptography, Indian talent is said to be alarmingly low. Only 0.97 per cent ofIndian IT students reportedly have basic skills in information security, and only 13 percent have an understanding of concepts necessary for being trained. Setting an earliertarget even than the government’s, the EC suggested that India needed 500,000 cyberprofessionals by 2015, but that less than one per cent of future IT professionals werebeing trained in this field. The scenario is said to be bleak, and could impact the futureoperations of India’s government, businesses and individuals.17At a New Delhi roundtable in February 2014, Sanjay Bavisi, president of the ECCouncil, summarised the situation as follows: India is the software capital of theworld. However, the risks posed by vulnerabilities and information security threats tothe nation’s IT infrastructure across industries are disheartening. In an ever evolvingcybersecurity landscape, we need to respond to sophisticated threats immediately andthis, in turn, requires a trained talent pipeline. He thereafter told Press Trust of India(PTI) that India’s response to cyber-terrorism was disjointed, with no central cybercommand and a non-existent cybersecurity training programme.18Let us take an example. How well protected is the biometric ‘Big Data’ collectedby the Unique Identification Authority of India (UADAI) for the issue of uniqueidentification numbers? Do we have clear-cut answers? On the UIDAI website(www.uidai.gov.in) are pages relating to its mandate, vision, core values, technologydevelopment and so on, but, as far as one can see, nothing much is mentioned aboutinformation security. In any case, this project was taken up before the National CyberSecurity Policy was announced. Is this data then accessible to cyber-smart hackergroups or agencies in different countries? How valid is this Big Data since its collectionitself is said to have been poorly monitored? How is this data’s security kept constantlyupgraded against theft or sabotage, given the relentless advances in hacking techni-ques? What are the ramifications for national security if the system is compromised?With the threat landscape changed, cybersecurity is no longer just an IT issue, buta strategic business issue needing a cross-functional team. According to Deloitte,banks and financial services companies adopt innovations for growth and costoptimisation that, in turn, introduce new vulnerabilities and complexities in theirtechnology ecosystem.19 Cybersecurity thus needs to be integrated in the decision-6 Suryakanthi Tripathi
making process, even if it alters the very decision itself. The mainstream adoption ofcloud computing, ‘internet of things’ and Bring Your Own Device (BYOD) isexpected to increase attacker opportunities.Mobile phone use in India presents specific challenges. Large businesses in India—primarily banks that promote mobile transactions as being critical to growth—doseem to be gearing up. Corporate networks have to handle sophisticated, targeted andadvanced persistent threats (APTs) against data security. A challenging task is tomanage the vast range of mobile operating systems and platforms that amplifiesoverall security exposure. The use of unsecured internet connections on mobiledevices can corrupt the end point, which could then threaten the whole network.Banks, nudged by the Reserve Bank of India (RBI), are being compelled to revisittheir architecture and security mechanisms. Some banks, for example, adopt two-factor authentication of image and phrase, as well as an SSL protocol, an encryptedlink between server and client. As with internet banking, mobile transactions also gothrough different levels of security checks before a transaction can be completed.Companies are also introducing their own apps that offer customers greater flexibilityand functionality through an outside-in approach while also bettering the security oftransactions.During the Ukraine crisis in 2014, just before the Crimean referendum, NATOwebsites were hit in cyber-attacks, reflecting the region’s territorial tensions in cyber-space. While the alliance said that none of its essential systems had been compro-mised, it was reported that the main NATO website and the NATO-affiliatedcybersecurity centre in Estonia were affected by the so-called ‘distributed denial ofservice’ (DDoS) attack, in which hackers bombard websites causing them to slowdown or crash. The attack was claimed by a group calling itself ‘cyber berkut’, whosaid it was the retaliation of those Ukrainians angered by what they saw as NATOinterference in their country.20There are obvious military risks to computer and communications systems. Thereis also the vulnerability of critical civilian infrastructures to cyber-sabotage. Attackscould be from nation-states or non-state actors.Many future battles will shift to cyberspace. Cyber-terrorism, whose definitioncontinues to be debated, is essentially an internet-based terrorist attack causing large-scale disruption of computer networks. Eugene Kaspersky, founder of Kaspersky Lab,feels that ‘cyber-terrorism’ is a more accurate term than ‘cyberwar’, because intoday’s attacks, one is clueless about who did it or when they might strike again.He equated large-scale cyber weapons, such as the Flame Virus and NetTravelerVirus, with biological weapons, for they could be just as destructive in an intercon-nected world.21Cybercrime could make traffic lights freeze, garble aircraft communications,paralyse banks, erase satellite data and splinter military command-and-control sys-tems. The EC Council has a slogan: ‘Hackers are here. Where are you?’ That shouldtrigger a nation to frequently ask itself, ‘Where are we?’Where are we, India?Notes1. United Nations Office on Drugs and Crime, Vienna, ‘Comprehensive Study on CybercrimeDraft’, February 2013.2. Pierluigi Paganini, ‘The Impact of Cybercrime’, InfoSec Institute, Illinois, February 2013.Strategic Analysis 7
3. Holly Ellyatt, ‘The Threat from Cybercrime’, CNBC Report, 13 August 2013, at http://www.cnbc.com/id/100959481# (Accessed December 2, 2014).4. John Vomhof Jr, ‘Target’s data breach fraud cost could top $1 billion’, Charlotte BusinessJournal, Feb 3, 2014.5. PM lauds Israeli prowess at Cybertech 2014 Opening, The Times of Israel, January 27, 2014, athttp://www.timesofisrael.com/pm-lauds-israeli-prowess-at-cybertech-2014-opening/ (AccessedDecember 2, 2014).6. Bob Ackerman Jr., ‘Stealing the Show: Cybersecurity Stock Valuations on the Rise’, Specialto CNBC.com, March 9, 2014.7. Preet Bharara, ‘Asleep at the Laptop’, Op-Ed, The New York Times, June 3, 2012 at http://www.nytimes.com/2012/06/04/opinion/preventing-a-cybercrime-wave.html?_r=1& (AccessedDecember 2, 2014).8. The Cyber Domain Security and Operations, Special Report, US Department of Defense.9. Michael Corkery, Jessica Silver-Greenberg and David E. Sanger, ‘Obama Had Security Fearson JPMorgan Data Breach’, The New York Times, October 8, 2014, at http://dealbook.nytimes.com/2014/10/08/cyberattack-on-jpmorgan-raises-alarms-at-white-house-and-on-wall-street/?_php=true&_type=blogs&emc=edit_na_20141008&nlid=55349507&_r=0 (AccessedDecember 2, 2014).10. Guy Taylor, ‘Obama’s cybersecurity adviser: Biometrics will replace passwords for safety’ssake’, The Washington Times, October 9, 2014, at http://www.washingtontimes.com/news/2014/oct/9/obamas-cybersecurity-adviser-biometrics-will-repla/ (Accessed December 2, 2014).11. Craig Timberg and Greg Miller, ‘FBI blasts Apple, Google for locking police out of phones’,The Washington Post, September 25, 2014, at http://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e-4344-11e4-9a15-137aa0153527_story.html (Accessed December 2,2014).12. Joe Barnes, ‘Israel utilises its cyber security expertise’, The Financial Times, February 24,2014, at http://www.ft.com/intl/cms/s/0/8b6e572c-97e7-11e3-8dc3-00144feab7de.html#axzz3KXXT0Je6 (Accessed December 2, 2014).13. Ari Yashar, ‘Israel’s New “Cyber Gym” Trains Cyber-Warfare’, December 2, 2013, at http://www.israelnationalnews.com/News/News.aspx/174712#.VHre6jSUd3E (Accessed December2, 2014).14. Ibid.15. https://twitter.com/milinddeora/status/351946198816526336 (Accessed December 2, 2014).16. EC- Council Foundation, ‘The Talent Crisis in InfoSec An Outlook of the Future of theIndian Information Security Scenario.’17. Ibid.18. PTI, ‘India not prepared to handle cyber terrorism threat: EC Council’, Economic Times, February19, 2014, at http://articles.economictimes.indiatimes.com/2014-02-19/news/47489884_1_cyber-ddos-participants (Accessed December 2, 2014).19. Jim Eckenrode, ‘Transforming cybersecurity: New approaches for an evolving threat land-scape’, Deloitte Center for Financial Services, 2014.20. Adrian Croft and Peter Apps, ‘NATO websites hit in cyber attack linked to Crimea tension’,Reuters, Mar 16, 2014, at http://www.reuters.com/article/2014/03/16/us-ukraine-nato-idUSBREA2E0T320140316 (Accessed December 2, 2014).21. David Shamah, ‘Latest viruses could mean “end of world as we know it,” says manwho discovered Flame’, The Times of Israel, June 6, 2012, at http://www.timesofisrael.com/experts-we-lost-the-cyber-war-now-were-in-the-era-of-cyber-terror/#ixzz3KQV7Alyw (AccessedDecember 2, 2014).8 Suryakanthi Tripathi
The American responseChina awakensIsrael’s innovationIndia alert
Notes

Order Your Custom Paper
Best Custom Essay Writing Services

QUALITY: 100% ORIGINAL PAPER NO PLAGIARISM – CUSTOM PAPER

Why Choose Us?

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee
SATISTACTION

How It Works

  • Click on the “Place Your Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the “PAPER DETAILS” section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.

About AcademicWritersBay.com

AcademicWritersBay.com is an easy-to-use and reliable service that is ready to assist you with your papers 24/7/ 365days a year. 99% of our customers are happy with their papers. Our team is efficient and will always tackle your essay needs comprehensively assuring you of excellent results. Feel free to ask them anything concerning your essay demands or Order.

AcademicWritersBay.com is a private company that offers academic support and assistance to students at all levels. Our mission is to provide proficient and high quality academic services to our highly esteemed clients. AcademicWritersBay.com is equipped with competent and proficient writers to tackle all types of your academic needs, and provide you with excellent results. Most of our writers are holders of master’s degrees or PhDs, which is an surety of excellent results to our clients. We provide assistance to students all over the world.
We provide high quality term papers, research papers, essays, proposals, theses and many others. At AcademicWritersBay.com, you can be sure of excellent grades in your assignments and final exams.

NO PLAGIARISM
error: Content is protected !!