With the development of science and technology, the internet has become a part people’s lives. Hackers are not only threatening people’s own cyber security and privacy but also the United States’ economy, security and all citizens’ lives. On mid-November 2011, Russian hackers failed to attack a water plant in Illinois (Nakashima).Therefore, the Cybersecurity Act of 2012 was made. The Cybersecurity Act of 2012 is “a bill to enhance the security and resiliency of the cyber and communications infrastructure of the United States” (“S.2015”)The Cybersecurity Act of 2012 was the battle between the national security and personal privacy.In this paper I will lay out three different position people take on the issue about The Cybersecurity Act of 2012 .
People in general will be affected by The Cybersecurity Act of 2012 because it matters on personal privacy and national security Normal citizens like us will be really interested in this because that government could observe everything and there is no privacy for people.Government staffs like senators,representatives in the House, and even President Obama might be interested in this issue because they need to make a balance between supporters and opponents because it is a really controversial issue.People might want their privacy but things will get worse if hackers destroy all the defense of the nation security.Taxpayers will also be interested in this because they want to know how much they need to pay for this act to be actually carried out and how it is going to affect national economy and their benifits.My first position is in favor of passing the Cybersecurity Act which allow the government and company exchange information and prevent attacking prevent the hackers from destoorying...
... middle of paper ...
...out their own business might be affected.According to Stiennon, the Cybersecurity Act of 2012 will force “utility operators, banks, and earth resources companies to comply with frameworks based on outmoded asset and vulnerability methodologies will distract them from implementing threat based defenses” (Stiennon) which means this act might affect on the computer companies’ business, their own business privacy and the relationship with the users. The business people might pay more attention on the relationship with the users and the companies’ profit. If the users stop using anything relate to the internet filed, the computer companies’ business will have a hard time. People who have this view think this act is only taking both sides benefits away.It is wasting money and hurting both sides.
My last position is that a few people are holding the idea that the company
The Telecommunications Act of 1996 can be termed as a major overhaul of the communications law in the past sixty-two years. The main aim of this Act is to enable any communications firm to enter the market and compete against one another based on fair and just practices (“The Telecommunications Act 1996,” The Federal Communications Commission). This Act has the potential to radically change the lives of the people in a number of different ways. For instance it has affected the telephone services both local and long distance, cable programming and other video services, broadcast services and services provided to schools. The Federal Communications Commission has actively endorsed this Act and has worked towards the enforcement and implementation of the various clauses listed in the document. The Act was basically brought into existence in order to promote competition and reduce regulation so that lower prices and higher quality services for the Americans consumers may be secured.
After the horrendous terrorist attack on the New York Trade Center a new Bill was passed by congress shortly after September 11, 2004. This bill is known as The Domestic Security Enhancement Act also called Patriot Act 2. This bill was designed as a follow-up to the USA Patriot Act to work in increasing government surveillance, detention and other law enforcement powers while reducing basic checks and balances on such powers. By the beginning of the year 2003 a draft of the legislation was available. Amongst the most severe problems the bill diminishes personal privacy by removing checks on government power, diminishes public accountability by increasing government secrecy, and diminishes corporate accountability under the pretext of fighting terrorism. Also the bill undermines fundamental constitutional rights of Americans under overboard definitions of “terrorism” and “terrorist organization” or under a terrorism pretext. Furthermore, unfairly targets immigrants under the pretext of fighting terrorism. (http://www.aclu.org/Safeand Free/SafeandFree.cfm?ID=11835&c=206)
The Computer Fraud and Abuse Act (CFAA) of 1986 is a foundational piece of legislation that has shaped computer crime laws for the United States. It was spawned from Comprehensive Crime Control Act of 1984, Section 1030 that established three new federal crimes to address computer crimes. According to Sam Taterka, “Congress tailored the statute to three specific government interests: national security, financial records, and government property” (Taterka, 2016). The statue was criticized for the narrow range of issues it covered and vague language.
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
The Patriot Act has been under scrutiny and opposition since its creation following 9/11. When 9/11 struck it was clear that Americas intelligence was lacking in some specific way, but it was translated that America needed greater allowance for gathering information. The Patriot Act was signed on October 26, 2001, very close to 9/11. It can be concluded that the Patriot Act was signed with such extreme ability’s applied, because of how close it was signed after 9/11. The Act Greatly expands the liberty’s if law enforcement in their efforts to gather information, which in turn imposes on the privacy of the American people. The FBI has the ability to study any citizen suspected of terrorism, and has access to all their information. Wire Taps and other invasive action are allowed and granted by the Patriot Act. Was the Patriot Act signed to quickly? Are its measures to extreme? When is the line drawn on how much power the government can have? Is the Patriot Act effective enough that it is necessary? Should we as Americans willing to trade freedom for safety? Can the Patriot Act effectively stop or hinder terrorist attacks; has its stopped enough attacks to be validated? Another question is does America want a government that has that much power, how much are we as Americans willing to sacrifice, and how much more liberty’s is the government going take. If the government can pass the patriot act, what other legislation can they pass? In reality it all comes down to the American people, we are democracy but do we have the power in are hands? When finding all these questions one asks do we need an act that is in fact this controversial? Is the Patriot Act a necessary evil? To find this answer we have to answer all the questio...
Domestic Surveillance Citizens feeling protected in their own nation is a crucial factor for the development and advancement of that nation. The United States’ government has been able to provide this service for a small tax and for the most part it is money well spent. Due to events leading up to the terrifying attacks on September 11, 2001 and following these attacks, the Unites States’ government has begun enacting certain laws and regulations that ensure the safety of its citizens. From the Foreign Intelligence Surveillance Act (FISA) of 1978 to the most recent National Security Agency scandal, the government has attempted and for the most part succeeded in keeping domestic safety under control. Making sure that the balance between obtaining enough intelligence to protect the safety of the nation and the preservation of basic human rights is not extremely skewed, Congress has set forth requisites in FISA which aim to balance the conflicting goals of privacy and security; but the timeline preceding this act has been anything but honorable for the United States government.
Millions of people all around the world are using Smartphones, like iPhones, which turns out to be crucial part of our lives. We are using them not only for calling but we also store unbelievably huge amount of personal information. We have there all our contacts, calls and messages and all our pictures that we save and keep in the phones. A
Everything is stored on the internet including highly classified government information, and your bank information. How do we make sure no one steals, views, or sells your passwords, and private information? Congress passed a law in 1986 called the Computer Fraud and Abuse Act (CFAA) to protect the government’s information. Many laws have been passed that revises the CFAA. The CFAA has imprisoned many people, and many people want changes to the CFAA today.
Cyber security is like trying to box while being blindfolded.. Cyber instability may cause massive panic in citizens of the United States. Government surveillance is one of the platforms of cyber security and it started to erupt after the 9/11 incident. The main ways the government watches people today is with cell phone, social media, and email surveillance. Should they be able to invade our privacy? Maybe. Many crimes are committed on computers everyday whether it be credit card hacks, stolen identities, or even social media accounts taken. Cyber attacks may lead people to distrust the cyber community and the people behind cyber protection.
In recent years, many possible plans to enact government regulation to improve cybersecurity have been suggested. Most recently, in 2017, then U.S. president Barack Obama implemented the Cybersecurity National Action Plan (CNAP). The plan would have invested $19 billion in cybersecurity by gathering experts to make recommendations in regards to cyber security, help secure the government IT group, and encourage more advanced security measures (Daniel 1). However, while CNAP does present a way to solve the problem, it just adds another program that attempts to enhance cybersecurity: “It is the multiplicity of programs and division of responsibility that diminishes their effectiveness. At least eleven federal agencies bear significant responsibility for cybersecurity” (Cohen 1). Every so often, another cybersecurity program will be established, but former plans are seldom removed. This leads to a large amount of departments to share responsibility, which creates general confusion and limits each department’s power. Furthermore, widespread government regulation may weaken cybersecurity. Many fear that any regulation would not be flexible enough and would instead allow easier hacking (Ridge 3). If every system in the entire nation had the same security measures, it would be much easier to break into as by breaking into one system, a hacker a could break into everything.
Computer hackers in today's world are becoming more intelligent. They are realizing that people are constantly developing more hack-proof systems. This presents the hackers with a bigger challenge and a bigger thrill. The government is realizing this and is working on making harsher laws to, hopefully, scare the potential hackers. With the increase in hacking and hacker intelligence, governmental regulation of cyberspace hasn't abolished the fact that it's nearly impossible to bring a hacker to justice.
Cybersecurity is a government institution implemented by Homeland Security. According to the website for Homeland Security, cybersecurity is operated by a team of skilled professionals who will recognize cyber vulnerability and respond as quickly as possible. The security was mainly built for United States defense reasons, but lately has also dealt with issues within the country. Of course its main purpose is to protect the United States and it will continue to do that. It just recently has taken steps to advance to national security as well as personal security. In 2010 the cybersecurity act that was passed was intended to integrate the private and public sector of cybersecurity for optimal use. Hacking int...
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
As a patriot of this great nation, what has been presented is of extreme if not grave concern. The challenges of cyberculture to our nation’s security have been revealed . To what extent our security has been breached is a matter of speculation but be informed that these breaches must be met with complete counter active success - failure to do so is not an option.
...t is not possible to eliminate cybercrime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime. Undoubtedly the Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime. I would conclude with a word of caution for the pro-legislation school that it should be kept in mind that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counter-productive.