Thursday, December 19, 2019

Essay on Cyber Intelligence Sharing and Protection Act

The Stop Online Piracy Act was proposed in January of 2012. SOPA was a legislative act that attempted to prevent piracy through DNS blocking and censorship. The legislation caused the protest and blackout of multiple online internet services including Reddit, 4Chan, Google, Wikipedia, Mozilla, and Tumblr. Now, internet users are faced with another possible challenge called the Cyber Intelligence Sharing and Protection Act, or CISPA. CISPA was quickly passed by the House of Representatives on April 26th, 2012, and is now being processed through the Senate (Beadon). CISPAs purpose is to promote national cybersecurity through allowing private companies and the federal government to exchange users private information, including emails and†¦show more content†¦The Wiretap Act prohibits the government from intentional interception, use, or disclosure of wire and electronic communications without a warrant. Similarly, the Electronic Communications Privacy Act protects wire, oral, a nd electronic communications while in transit (Franklin). Some may wonder how the government is able to override such laws that come to make America what it is today, a nation noted for its religious and intellectual freedom, and the answer is national security. Anything is possible in order to increase national security and eliminate any threats. Not to mention that as long as participants of CISPA exchange information with good intentions, they will not be held to any criminal or civil liabilities and become one hundred percent anonymous in the process (PopVox). This may incentivize private companies to release users information without a thought regarding the authenticity of the threat due to convenience. After information is shared with the federal government, the data is stored and is able to be used for any purpose beyond preserving the national security. Some usages include immigration and crime. At the same time, users are also not required to be notified by either the private company or the government when their information is exchanged. Due to such concerns, many activist websites that opposed SOPA, including DemandProgress.org and Avaaz.org, are also attempting toShow MoreRelatedInternet Wars: SOPA, PIPA and CISPA Essay1660 Words   |  7 PagesThe Internet has found a new enemy, in form of cyber-security legislati on that has wide-ranging privacy implications. A bill introduced to the House of Representatives late last year could become the centerpiece of the next SOPA-style struggle between the tech community and Washington, D.C. SOPA, or Stop Online Piracy Act, was introduced in a sub-committee at the House of Representatives last fall. SOPA was a United States bill introduced to expand the ability of the U.S. Law enforcement to fightRead MoreThe Homeland Security And Homeland Defense Missions923 Words   |  4 Pagesthe September 11, 2001 terror attacks. Designed to fill gaps in intelligence sharing to defend against or response to terror attacks. This paper will discuss the future success of the current homeland security and homeland defense missions. It will also look into the role civil liberties plays in that success. Discussion The missions held by homeland security and homeland defense are vital to the protection of the country against acts of terror. While relatively young programs, much has been achievedRead MoreThe Department Of Homeland Security912 Words   |  4 Pagesthat feed intelligence, support, equipment, and personnel to this large department. To have coordination of over twenty-two agencies and ensure they are all working together is a task that may seem impossible but it is one that DHS has hit upon head-on. All the agencies must be aware of the intelligence and actions and risks that are prevalent so as to prepare themselves. Then the next hurdle is to gather intelligence and information from the citizens without violating the Patriot Act which protectsRead MoreThe Fbi Agents And The Criminal Law Of The United States1615 Words   |  7 Pagesfrom dangers that we cannot deal with. The FBI agents have an impact on our nation because they defend us against counterfeiting, terrorist attacks a nd cyber-based attacks. The FBI is a treat-based and intelligence driven national security organization. There mission is to protect and defend the United States against terrorists and foreign intelligence threats, to help enforce the criminal law of the United States. FBI Agents also have the opportunity to investigate specific crimes assigned to themRead MoreDifferent Elements That Compromise The Intelligence Communities ( Ic ) From Local Law Enforcement Essay1556 Words   |  7 PagesThis paper will analyze the different elements that compromise the intelligence communities (IC) from local law enforcement to national agencies and how each of those entities contributes to security intelligence. Secondly, this paper will evaluate the lessons learned from the attacks of 9/11. Lastly, the issues of domestic intelligence vs. foreign intelligence will be examined. Intelligence-led policing along with other various initiatives is a newly developed style of investigation strategy. ThisRead MoreCyber Security Operations Centre ( Csoc ) Investigates And Analysis Cyber Attacks On Uk Networks1212 Words   |  5 PagesCyber Security Operations Centre (CSOC) investigates and analysis cyber-attacks on UK Networks and provide solutions and means to mitigate future attack. Its job is in cyber forensics and incident response while the Government Computer Emergency Response Team (GovCERT) deals with the public sector organisations on issues relating to computer security incidents, warnings, alerts, assistance and advice to prevent, reduce expose and mitigate attacks. The National Crime Agency formed in Oct 2013 toRead MoreProtecting Us Citizens And Important Infrastructure876 Words   |  4 PagesIntroduction: Protecting US citizens and important infrastructure which have impact on national security, economic security or public health and safety from cyber-attacks is one of the recent congressional interests and the internet protection is also needed. Initial there was an approach to ensure the operations of critical infrastructure and larger economy regulatory framework is needed. There came an argument that these regulatory schemes may not improve cybersecurity and it increases the costsRead MoreRegulatory Issues Of The Private Sector2863 Words   |  12 Pageswhat agencies will get involved. The fear is not only about their own customers, clients and shareholders but from agencies like the SEC, FTC, FCC, CFPB and others alike. All have different agendas, regulations and standards on how they approach a cyber-breach situation. The major fear for the private sector is regulatory laws. What if they are not following federal regulatory requirements? This is a risk that some companies are not willing to take to share information about a threat they may haveRead MoreThe Armys Current Network Defense System1218 Words   |  5 Pagesbecame evident that something else was needed. One of the command’s subordinate commands was the Army Research Labs and is on one the foremost research labs in the world. One of the labs mission was Cyber Defense and came under my preview as it program manager. The lab had developed several cyber security tools and had been testing them very successfully on a several platforms. The power of this tool compared to the Army’s current tool suite was 10 to 1. The only issue was that it was expensiveRead MoreChina Saper Threat777 Words   |  4 PagesWeak USA Cyber Policy vs China’s Security Threat to the USA? Abstract A cyber spy network based mainly in China hacked into classified documents from government and private organizations. One of the biggest questions still remains unanswered. Should the U.S. Congress conduct an in depth assessment of Chinese cyber spying and consider imposing tougher penalties on companies that benefit from industrial espionage. In this paper I will review china’s cyber threat and possible USA solutions

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.