National Security Council: Lack Of Attribution

Improved Essays
Our recommendation to the National Security Council is to pursue Policy #4, using a honeynet to trap attackers and provide attribution. This technical solution is far more covert than our other alternative policies. It allows us to obtain knowledge about hackers’ methods and means of attack during their attempts to infiltrating sensitive data. Most importantly, it could potentially provide irrefutable evidence for attribution. This evidence enables the US to impose harsher sanctions without fear of a backlash. Within the other policies presented, the lack of attribution plays a very limiting role in terms of what actions the government can take to deter additional attacks.

The crucial part of this policy is to find or create uniquely identifiable

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    9/11 Research Paper

    • 1403 Words
    • 6 Pages

    That inability to share made it more difficult for us to arrest the person and charge him criminally, because the two sets of agents could not share information back and forth. That has changed. There is now ample sharing of information, and we can now readily use criminal charges to incapacitate people from doing harm and to improve our human intelligence cadre” (Caproni). While increased government surveillance may make some people uncomfortable, there is now a better chance an event like 9/11 will be…

    • 1403 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The National Security Council The National Security Act of 1947 created the National Security Council. The next few paragraphs will further examine the functions and responsibilities of the National Security Council, the current domestic political environment pertaining to the border wall in Mexico, as well as the current threat of the Islamic State of Iraq and Syria (ISIS) and what role the National Security Council represents. National Security Council Background The National Security Act of 1947 created the National Security Council to advise the President of all foreign policy and military situations. The legislation also established the Secretary of Defense which helps direct the work and goals of the National Security Council alongside…

    • 881 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Resolved: The United States federal government should substantially curtail its domestic surveillance. Plan: The government will curtail its surveillance by only viewing collected data by means of a warrant. Intro-After the NSA reported their first transparency avowal, the publisher Omicron Technology Limited stated, “The report said 19,212 "national security letters"—administrative subpoenas that allow the FBI to collect information without a warrant—were issued last year, containing 38,832 requests for information.” These unwarranted leaks are why this problem needs to be solved. That is why we stand resolved that “The United States federal government should substantially curtain its domestic surveillance.…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    The Oklahoma City Bombing in 1995 was so horrible because the truck with the bomb was able to be placed right in front of the building. Similar events took place at embassies and other United States controlled buildings over the years. New and existing buildings are now provided with barriers and standoff distance from roads to prevent the reoccurrence of such an event. Additional security and access control are additional measures used to prevent terrorist attacks on public and private buildings (Kemp 2012, p. 32). Protection of information systems is the newest field within the homeland security spectrum.…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    The Importance Of The National Security Agency

    • 1199 Words
    • 5 Pages
    • 1 Works Cited

    There are street cameras everywhere, watching the sidewalks, the cars on the road, and appear at every entrance and exit on public property. We are constantly being observed no matter where go, which isn’t necessarily a bad thing. With the recent terrorists’ attacks and threats, our society should feel protected by the cameras, knowing that if someone attempts to create chaos, it’ll be easier to capture them if they are caught on video. Even though this is form of protection, the government has been over zealous with what exactly they are looking for and taking advantage of the fact that they can watch citizens. The only difference between our government and BB is that people tend to get away with a lot more without causing alarm because our government isn’t as stringent.…

    • 1199 Words
    • 5 Pages
    • 1 Works Cited
    Superior Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays