Homeland Security Threats

Superior Essays
The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012. However, as America and the rest of the …show more content…
Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65). He also adds, “Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb” (Pollit, 2007, 66). It is a haunting thought to know that terrorist attacks are taking place behind a computer screen. The fact that cyber terrorism can happen without anyone knowing gives these hackers and terrorist groups an advantage over authorities (Pollitt, 2007, …show more content…
The number one goal is to be prepared for any and every type of cyber attack. One of the first steps taken to thwart cyber terrorism was led by New York Governor George Pataki when he signed the Omnibus Governors’ Program Bill into law. This Bill created legal definitions for an array of terrorist crimes. A second measure taken was by New York senator and chairman of the Senate Committee on Veterans, Homeland Security and Military Affairs, Michael Balboni. Balboni was responsible for SB 1627, which legally defines cyber terrorism in New York and also making it a Class B felony to initiate a cyber attack on any local, state or federal government computer network (Boulard & Goodwin, 2003, 1). As well as creating the legislature, public officials are creating back-up systems for their databases and information in case of a cyber attack. This is one of the best ways to thwart any cyber activity: by always staying one step ahead of the hackers (Kemp, 2012,

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    President Obama recognizes this growing issue and made initiative to change it. “On February 12, 2013, President Obama signed Executive Order 13636, “Improving Critical Infrastructure Cybersecurity.” The Executive Order is designed to increase the level of core capabilities for our critical infrastructure to manage cyber risk” (Foreign Policy p.1). The main goal of Executive Order 13636 is to improve the United States posture on cyber security through information sharing, cybersecurity practices, and privacy.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    This would be crucial in elevating the knowledge level that citizens would possess on security matters and as a result, more jobs and improved cooperation. 2. How does the federal government address incidents of cybercrime and cyberterrorism within an overarching cybersecurity and critical infrastructure plan? Cyberterrorism refers to the malicious computer-based threats or attacks carried out against information systems by non-state actors with an aim to intimidate societies or governments in pursuit of social or political goals.…

    • 820 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    "In this day of age, we have dedicated large portions of our lives to the internet and staying connected. This allows a wide variety of knowledge and entertainment to be brought into every home. However, the vast amount of resources available online can possibly be a bad thing. Countless organizations of crime and terrorism roam the online world with a sense of anonymity and the resources to mass spread their ideologies across the world. This has led to the creation of governmental organizations such as the National Security Agency (NSA) that hold the main goal of trying to prevent terrorist and crime organizations from carrying out evil and violent attacks on the people of the United States and the world.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Since the 9/11 attacks, the city of Baltimore has taken substantial steps to prepare for the possibility of another terrorist incident. With the evolution of homeland security and Maryland’s close proximity to Washington DC, Baltimore officials were forced to re-evaluate the terrorist threat and vulnerabilities that plagued their city. Maryland was confronted with a variety of issues stemming from their mass transit system, expansive private and public people infrastructure, oceanic ports, and international airports (Kamien, 2012). Baltimore officials identified and established a set of 12 basic core capacities to improve homeland security within their city. The first was the need for an upgraded communication system.…

    • 385 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    DHS Missions

    • 648 Words
    • 3 Pages

    The office secures non military personnel and government PC frameworks, secure data frameworks for basic foundation, and dissect and lessen digital dangers. Encouraging reaction to digital episodes is basic to ensure our frameworks are protected. There are frameworks we use to encourage our destinations. The National Cybersecurity Protection System (NCPS), Continuous Diagnostics and Mitigation (CDM), National Cybersecurity and Communications Reconciliation Center (NCCIC), and the Federal Information Security Management Act (FISMA) Reporting guarantees that we ensure our the internet (Securing and Managing Our Borders…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    All of the United States Government agencies are now implementing some sort of risk management into there every day operations. A risk management can be done for a simple office party to the most dangerous raid. The Department of Homeland Security is no different with their 22 departments. In the case of ports, the Coast Guard and FEMA “cybersecurity efforts in the maritime port environment have been limited” (GAO, 2014, p.1). This includes the lack of a risk assessment that is heavily followed by DHS.…

    • 1502 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Millions of Americans depend on the Department of Homeland Security to protect their information including addresses, phone numbers, and other online information that is stored on the DHS’s network. Although cyber attacks can happen at any time, the Department of Homeland Security has many agencies to stop these attacks. The National Cybersecurity and Communications Integration Center (NCCIC) is one of the many agencies that works to stop and address cyber attacks. It is a 24/7 cyber awareness management center. It addresses threats and other incidents affecting our cyber infrastructure to the public to warn citizens about keeping their information…

    • 883 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Homeland Security Thesis

    • 670 Words
    • 3 Pages

    An introductory text for the 21st Century (11th ed.). Upper Saddle River, NY: Prentice Hall. Annotated Bibliography Bullock, J. A., Haddow, G. & Coppola, D. P. (2013). Introduction to Homeland Security (4th ed.). Waltham, MA: Butterworth-Heinemann.…

    • 670 Words
    • 3 Pages
    Great Essays
  • Superior Essays

    Cyber attackers have come from in the country and outside of the country, and these other countries need to know that we aren’t going to accept it. In the debate, Clinton said, “the United States has much greater capacity. And we are not going to sit idly by and permit state actors to go after our information, our private-sector information or our public-sector information.” (Washington Post)…

    • 1185 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    In spite of the fact that the Homeland Security’s main priority is to protect the civilians of the U.S, many worry that the funding is not necessarily used in the correct manner. It is understood that some believe that the expenditure is used to frequently obtain information on citizens and many feel this is a breach of privacy rights. Opposing parties believe that homeland security strategies can, and do, break regulations centred on human privacy rights. According to Kevin M. Keenan, eight states financially supported by the U.S. Department of Homeland Security began experimenting the total information Multistate Anti-terrorism Exchange, also known as MATRIX.…

    • 1090 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays