The response must be 200 words and use at least 2 scholarly citation(s) in APA format. Any sources cited must have been published within the last five years. Acceptable sources include texts, articles, presentations, the Bible, blogs, videos, etc.
Textbook:
Johnson, T. A. (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare.Boca Raton, FL: CRC Press. ISBN: 9781482239225.
Pichtel, J. (2016). Terrorism and WMDs (2nd ed.). Boca Raton, FL: CRC Press. ISBN: 9781498738989.
***MELISSA***
There are many different aspects of cybersecurity, intelligence, counterintelligence, and information warfare. There are many things that affect them all to include legal aspects of each. One of the simplest ways to describe information warfare is the gathering of information through cyber attacks and to use that information against specific targets. Johnson, 2015, gave an example of this situation, he pointed out that coalition forces attacked Iraqi information systems through electronic and physical weapons.
One of the ways to combat information warfare is through cyber intelligence and counterintelligence. Counterintelligence is a combination of law enforcement and security protection mixed with foreign intelligence and the combatting of terrorism (Melendez, 2019). When it comes to information warfare in this day and age counterintelligence is going to be an important role in ensuring that the information sources in the United States are protected. In the previous week we learned about protecting critical infrastructure. This is accomplished through counterintelligence and intelligence sharing. September 11, 2001 was a defining moment in US history as it pertained to security. The tragedy of the attacks that day led to the development of new divisions of government to help protect intelligence. One of these organizations was the Office of the Director of National Intelligence.
For intelligence protection to work there needs to be a sharing of information among the different organizations in the US that are set up to ensure safety and security. If there is not a sharing of information, then there could openings for cyber threats and other security threats to occur. With the formation of new agencies to provide security against new threats there could be legal issues that arise. The US Patriot Act was designed to provide guidance under a new age of security threats. It was a quick acting piece of legislation that has not been without flaws, but still provides legal guidance for the protection of the United States (Welch, 2015).
One of the things that came out of the US Patriot Act was delaying of notice of search and seizure of property that was deemed criminal evidence of potential terrorist attacks (Welch, 2015). While this can be good in regard to protecting information that is being gathered to protect us it has also become a gray area with law enforcement agencies. Some people feel that law enforcement has used this to their advantage without regard to the privacy of others. One of the constitutional rights that Americans have is the right to have privacy and security in their homes against search and seizure. The Patriot Act has made that a gray area. Terrorism is not clearly defined and as it is not clearly defined one could interpret terrorism to mean any threat to the peace and safety of others (Rajah, 2019). If law enforcement entities feel that gathering information is necessary to protect the peace and safety of others it should not be held against them if they can prove that the information is necessary.
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreThe Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.
Read moreThe Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.
Read moreThe Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.
Read moreBy placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.
Read more