Intelligence in Homeland Security Introduction After the attack of 9/11 on the United States the Nation learned there were many areas that needed improvement in regards to the security of the homeland. The Department of Homeland Security (DHS) had to take into account the lessons learned from 9/11, especially the shortfalls that were seen in intelligence gathering and make some major changes. The DHS is not the only agency that is responsible for gathering information for the Nation’s safety,…
the infringement of the rights guaranteed by the US Constitution is too high a price to pay. September 11, 2001 should not be just remembered as the beginning of America’s “War on Terrorism,” it should also be remembered as being the first “cybersecurity war.” The terrorists who had used the internet for their recruitment, and communications, on many occasions, were subsequently identified, were hacked by counter-terrorist computer specialists of the CIA and the National Security Agency. Upon…
The Dangers of Cyberspace: Identifying the threats on the web in Charles Koppelman’s Zero Days The documentary Zero Days, directed by Charles Koppelman, studies computer exploits and cyber-espionage that are conducted over cyberspace. This 2015 documentary interviews multiple professional computer hackers to explain what hacking skills they rely on in order to conduct either legal or illegal activities across the web. Whereas the scholars in this discipline focus on studying the psychology of…
When I first heard from my summer boss, Tom Dunlap it was over the phone while I was at Marist College. He told me how he is stationed in St. Paul, Minnesota I was worried I had accidentally applied to the wrong internship location and put St. Paul instead of Hartford. It turned out that he would be working remotely from St. Paul and have me working in Hartford. Something unimaginable 50 years ago, someone managing a summer intern in Harford from St. Paul. However, the unimaginable became a…
A- Recommended Safeguards It is crucial to recognize the importance of the Industrial Control Systems (ISC) in our daily life whether it is related to power, transport, water, gas, and other critical infrastructures. Each of these infrastructures is needed at all time and any downtime could be disastrous for the persons and businesses. The following safeguards will help the Western Interconnection power grid as well as any other entity that uses ICS from running a safe system while keeping…
Cybercriminals and the Criminal Justice System. Criminals have always been part of society. As far back as the code of Hammurabi, written approximately 1680 B.C.E. civilization has made laws to govern men (Code, 2013). Why? Because, according to written records, crime has been with society as long as man has been civilized. There is no way to know for sure, but crime was probably around during the caveman era. Laws ensure that men can live together and prosper. Criminals have always used…
In the year 2013, one of the biggest retail data breaches in history occurred, where Target lost the credit and debit cards of over 40 million customers, along with the personal information of 70 million customers. It all started right before Thanksgiving on November 27, when someone installed malware in Target’s security and payments system that was designed to steal every credit card used at the company’s many stores throughout the United States. When a shopping item was scanned and the…
With all of the madness going on in this day and age, the only way to stay current on the happenings of the world is to watch the news and hope for the best. Television has helped citizens remain informed on the world around them. Viewers can visit other countries, explore different cultures, and learn things they never would have been able to from the comfort of their La-Z-Boy recliner. The troubling mystery is if the media is trustworthy or not. Most would assume yes. Of course the news media…
the whole U.S. government. Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…
her grandmother grew up in Germany at a time when they would spy on your mail to see what you were up to and it frightened her. Nowadays, no-one seems to be frightened that everything they put online is not private. Our society has decided that cybersecurity is really not that big of a deal. I think that the idea that we know and accept that our lives are no longer private leads into Turkle’s next point. We are creating digital copies of ourselves. Since we understand that what we post is not…