Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
The impact of cyber warfare in the united states
Cyber terrorism in the united states
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: The impact of cyber warfare in the united states
The greatest threat America faces is the threat of terrorism on our national institutions. The paper
utilizes two contributive articles and one supportive article, each having varying angles of discussion
regarding vulnerabilities with respect to cyber issues. In 2013, the President of the United States
(POTUS) and multiple Secretaries of Defense public acknowledged our nation’s vulnerabilities to
attacks from our adversaries (Alexander, Goldman, & Warner, 2013). These vulnerabilities include
potential cyber-attacks against municipal and federal infrastructure, such as industrial control systems
which impact water and sewage systems as well as the military (Brenner, 2013, p.16). The United
States (U.S.) has to ensure that
…show more content…
There are threats that pose
great risk to our institutions from a federal, state and local level. Potential at-risk systems are those that
can be connected to the internet such as: energy sources, electric grids, water and sewer systems,
manufacturing, banks, transportation and communication networks (Brenner, 2013, p.15). The fall-out
from a cyber-attack in any of these areas would be harmful at every level of our nation’s institutions. By
attacking the United States’ infrastructure there would be significant economic damage levied as a result
of these criminal actions. Finding the origination of attacks (terrorist source) by utilizing our system of
layered protection is critical in keeping America safe before the terrorist action can be perpetrated.
In order to maintain order and to protect the public from the impact of such dangerous attacks,
the government has had to organize a layered system of structure and responsibilities to maintain a
watchful eye on adversarial behavior. On the domestic front, the Department of Homeland
…show more content…
al., 2013, p.21).
Prosecution efforts are led by the Department of Justice (DOJ). The nation is defended against
cyber-attacks by the Department of Defense (DOD). The NSA is the driving force behind the nation’s
oversight of cyber activity through the USCYBERCOM, based in Fort Meade, Maryland. The NSA is
responsible for the oversight of the nation’s cyber-defense activity, but the NSA is not the sole entity for
strategic responsibility. Coordination across all entities (DHS, DOJ, DOD, and NSA) is required in
order to meet the nation’s strategic initiatives (Alexander, et. al., 2013, p.22). On the world stage, the
U.S. government must work with other governments to enforce criminal cyber activity by disrupting
criminal business models and creating international deterrence (Filshtinskiy, 2013, p.28). The U.S. must
lead the effort with our vast resources to ensure our allies are adequate protected against cyber threats.
THE GREAT THREAT OF CYBER-ATTACKS IN AMERICA 4
Based on the information provided in the articles, the U.S. faces a collective threat is
Jeffrey David Simon, The Terrorist Trap: America's Experience with Terrorism, 2nd ed. (Bloomington, IN: Indiana University Press, 2001), 188-89.
At this juncture, it may be somewhat difficult to accept the proposition that a threat to the telecommunications grid, both wired and wireless, in the United States could potentially be subject to a catastrophic cyber attack. After careful research on the subject, it appears the potentiality of an event of such magnitude, which either disrupts one or the other grids for a long period or destroys either, is both theoretically and realistically impossible. It may be that proponents—those who advance such theories—equate such “doomsday” scenarios as if a cyber attack would or could be of the same magnitude as a conventional or nuclear military strike. Terms such as “cyber Pearl Harbor,” “cyber 9/11” and “cyber Vietnam” have been used to describes potential catastrophic cyber attacks and yet, “Though many have posited notions on what a ‘real’ cyber war would be like, we lack the understanding of how such conflicts will be conducted and evolve.” (Rattray & Healey, 2010, p. 77). Yet, the U.S. government continues to focus on such events, as if the plausibility of small-scale cyber attacks were not as pressing.
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
The NSA helps to supply the military with weapons and supplies. The NSA also helps protect citizens by providing high tech security. Some of which are approving standards, techniques, systems, and equipment related to the security of National Security Systems (NSA.gov). In addition, the NSA also provides “end-to-end insights into malicious cyber activity, the activities of hostile foreign powers, and cyber best practices” (NSA.gov). Another thing the NSA does is partner with other departments, countries, and companies to help reach goals and provide a good outcome in any circumstance (NSA.gov). Terrorism and cyber threats are big problems towards the United States as well. When the NSA hears or reports any terrorism threats they communicate with national leaders, military, law enforcement and policymakers to discuss solutions. There always is a group of National Security Act workers monitoring surveillance twenty- four seven(NSA.gov).This always ensures extra protection and is always
Terrorism represents a continuing threat to the United States. It is the most significant threat to our national security. Terrorist attacks have definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism.
The threats to security from the United States Department of Defense, the national power grid and the Chamber of Commerce are very real and omnipresent. The Defense Department made an admission of the first major cyber attack upon its systems in August 2010. It was revealed that the attack actually took place in 2008 and was accomplished by placing a malicious code into the flash drive of a U.S. military laptop. “The code spread undetected on both classified and unclassified systems, establishing what amounted to a digital breachhead.” (2) This quote, attributed to then Deputy Defense Secretary William J. Lynn III, is just part of the shocking revelations that were disclosed in his speech made on July 14, 2011.
Americans have considered terrorism as a horror that occurs in other countries and not as a real threat to America itself. As the recent terrorist attacks on our nation shows, this opinion was gravely incorrect. There are several policies in both the private sector and our government, which contributed to our vulnerability to terrorism.
The advent of the interagency process coincided with the passage of the National Security Act of 1947. This landmark legislation dramatically altered the landscape of the federal government at the dawn of the Cold War. Although various presidential administrations adjusted their foreign policy methods to meet their own requirements, this act established the basic framework of coordination necessary for America’s position as a global superpower.
...the nation’s critical infrastructure. With the creation of the DHS the government has shown that they are investing money and resources into protecting our nation’s infrastructure.
Cybersecurity is a government institution implemented by Homeland Security. According to the website for Homeland Security, cybersecurity is operated by a team of skilled professionals who will recognize cyber vulnerability and respond as quickly as possible. The security was mainly built for United States defense reasons, but lately has also dealt with issues within the country. Of course its main purpose is to protect the United States and it will continue to do that. It just recently has taken steps to advance to national security as well as personal security. In 2010 the cybersecurity act that was passed was intended to integrate the private and public sector of cybersecurity for optimal use. Hacking int...
Paisley. "The Impact of a Cyber War." Defense Tech RSS. N.p., 16 Jan. 2008. Web. 21 Nov. 2013. (Source H)
In recent years, many possible plans to enact government regulation to improve cybersecurity have been suggested. Most recently, in 2017, then U.S. president Barack Obama implemented the Cybersecurity National Action Plan (CNAP). The plan would have invested $19 billion in cybersecurity by gathering experts to make recommendations in regards to cyber security, help secure the government IT group, and encourage more advanced security measures (Daniel 1). However, while CNAP does present a way to solve the problem, it just adds another program that attempts to enhance cybersecurity: “It is the multiplicity of programs and division of responsibility that diminishes their effectiveness. At least eleven federal agencies bear significant responsibility for cybersecurity” (Cohen 1). Every so often, another cybersecurity program will be established, but former plans are seldom removed. This leads to a large amount of departments to share responsibility, which creates general confusion and limits each department’s power. Furthermore, widespread government regulation may weaken cybersecurity. Many fear that any regulation would not be flexible enough and would instead allow easier hacking (Ridge 3). If every system in the entire nation had the same security measures, it would be much easier to break into as by breaking into one system, a hacker a could break into everything.
Consider what it would be like if computers that regulate subway systems, trains, planes, ships did not work properly. There could be multiple accidents with vehicles not following their course or not working because the computer systems that regulate them are not working. It could be disastrous.A cyber attack on our communication and transportation infrastructures could freeze our nation’s ability to do these things safely at the biggest levels. If these systems are attacked, the ability to use technology to talk and travel safely may not be possible. “...Because the nation’s grid has about 600 separate owners, and their computers are heavily interconnected with links that can carry both good data and malicious code, 100 percent protection against cyber attack is unlikely” (Wald). It is easy to take for granted the ability to get ahold of family and friends that live far away, or travel safely to work every day, but cyber attacks on computer systems that regulate telephone lines, computer data bases, subways, trains, and airplanes could be devastating to a huge number of people.
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
Thomas, Teka. "Cyber defense: Who 's in charge?" National Defense July 2015: 21+. War and Terrorism Collection. Web. 28 Oct.