With the development of science and technology, the internet has become a part people’s lives. Hackers are not only threatening people’s own cyber security and privacy but also the United States’ economy, security and all citizens’ lives. On mid-November 2011, Russian hackers failed to attack a water plant in Illinois (Nakashima).Therefore, the Cybersecurity Act of 2012 was made. The Cybersecurity Act of 2012 is “a bill to enhance the security and resiliency of the cyber and communications infrastructure of the United States” (“S.2015”)The Cybersecurity Act of 2012 was the battle between the national security and personal privacy.In this paper I will lay out three different position people take on the issue about The Cybersecurity Act of 2012 .
People in general will be affected by The Cybersecurity Act of 2012 because it matters on personal privacy and national security Normal citizens like us will be really interested in this because that government could observe everything and there is no privacy for people.Government staffs like senators,representatives in the House, and even President Obama might be interested in this issue because they need to make a balance between supporters and opponents because it is a really controversial issue.People might want their privacy but things will get worse if hackers destroy all the defense of the nation security.Taxpayers will also be interested in this because they want to know how much they need to pay for this act to be actually carried out and how it is going to affect national economy and their benifits.My first position is in favor of passing the Cybersecurity Act which allow the government and company exchange information and prevent attacking prevent the hackers from destoorying...
... middle of paper ...
...out their own business might be affected.According to Stiennon, the Cybersecurity Act of 2012 will force “utility operators, banks, and earth resources companies to comply with frameworks based on outmoded asset and vulnerability methodologies will distract them from implementing threat based defenses” (Stiennon) which means this act might affect on the computer companies’ business, their own business privacy and the relationship with the users. The business people might pay more attention on the relationship with the users and the companies’ profit. If the users stop using anything relate to the internet filed, the computer companies’ business will have a hard time. People who have this view think this act is only taking both sides benefits away.It is wasting money and hurting both sides.
My last position is that a few people are holding the idea that the company
The Telecommunications Act of 1996 can be termed as a major overhaul of the communications law in the past sixty-two years. The main aim of this Act is to enable any communications firm to enter the market and compete against one another based on fair and just practices (“The Telecommunications Act 1996,” The Federal Communications Commission). This Act has the potential to radically change the lives of the people in a number of different ways. For instance it has affected the telephone services both local and long distance, cable programming and other video services, broadcast services and services provided to schools. The Federal Communications Commission has actively endorsed this Act and has worked towards the enforcement and implementation of the various clauses listed in the document. The Act was basically brought into existence in order to promote competition and reduce regulation so that lower prices and higher quality services for the Americans consumers may be secured.
After the horrendous terrorist attack on the New York Trade Center a new Bill was passed by congress shortly after September 11, 2004. This bill is known as The Domestic Security Enhancement Act also called Patriot Act 2. This bill was designed as a follow-up to the USA Patriot Act to work in increasing government surveillance, detention and other law enforcement powers while reducing basic checks and balances on such powers. By the beginning of the year 2003 a draft of the legislation was available. Amongst the most severe problems the bill diminishes personal privacy by removing checks on government power, diminishes public accountability by increasing government secrecy, and diminishes corporate accountability under the pretext of fighting terrorism. Also the bill undermines fundamental constitutional rights of Americans under overboard definitions of “terrorism” and “terrorist organization” or under a terrorism pretext. Furthermore, unfairly targets immigrants under the pretext of fighting terrorism. (http://www.aclu.org/Safeand Free/SafeandFree.cfm?ID=11835&c=206)
The Computer Fraud and Abuse Act (CFAA) of 1986 is a foundational piece of legislation that has shaped computer crime laws for the United States. It was spawned from Comprehensive Crime Control Act of 1984, Section 1030 that established three new federal crimes to address computer crimes. According to Sam Taterka, “Congress tailored the statute to three specific government interests: national security, financial records, and government property” (Taterka, 2016). The statue was criticized for the narrow range of issues it covered and vague language.
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
The Patriot Act has been under scrutiny and opposition since its creation following 9/11. When 9/11 struck it was clear that Americas intelligence was lacking in some specific way, but it was translated that America needed greater allowance for gathering information. The Patriot Act was signed on October 26, 2001, very close to 9/11. It can be concluded that the Patriot Act was signed with such extreme ability’s applied, because of how close it was signed after 9/11. The Act Greatly expands the liberty’s if law enforcement in their efforts to gather information, which in turn imposes on the privacy of the American people. The FBI has the ability to study any citizen suspected of terrorism, and has access to all their information. Wire Taps and other invasive action are allowed and granted by the Patriot Act. Was the Patriot Act signed to quickly? Are its measures to extreme? When is the line drawn on how much power the government can have? Is the Patriot Act effective enough that it is necessary? Should we as Americans willing to trade freedom for safety? Can the Patriot Act effectively stop or hinder terrorist attacks; has its stopped enough attacks to be validated? Another question is does America want a government that has that much power, how much are we as Americans willing to sacrifice, and how much more liberty’s is the government going take. If the government can pass the patriot act, what other legislation can they pass? In reality it all comes down to the American people, we are democracy but do we have the power in are hands? When finding all these questions one asks do we need an act that is in fact this controversial? Is the Patriot Act a necessary evil? To find this answer we have to answer all the questio...
As a patriot of this great nation, what has been presented is of extreme if not grave concern. The challenges of cyberculture to our nation’s security have been revealed . To what extent our security has been breached is a matter of speculation but be informed that these breaches must be met with complete counter active success - failure to do so is not an option.
Domestic Surveillance Citizens feeling protected in their own nation is a crucial factor for the development and advancement of that nation. The United States’ government has been able to provide this service for a small tax and for the most part it is money well spent. Due to events leading up to the terrifying attacks on September 11, 2001 and following these attacks, the Unites States’ government has begun enacting certain laws and regulations that ensure the safety of its citizens. From the Foreign Intelligence Surveillance Act (FISA) of 1978 to the most recent National Security Agency scandal, the government has attempted and for the most part succeeded in keeping domestic safety under control. Making sure that the balance between obtaining enough intelligence to protect the safety of the nation and the preservation of basic human rights is not extremely skewed, Congress has set forth requisites in FISA which aim to balance the conflicting goals of privacy and security; but the timeline preceding this act has been anything but honorable for the United States government.
Everything is stored on the internet including highly classified government information, and your bank information. How do we make sure no one steals, views, or sells your passwords, and private information? Congress passed a law in 1986 called the Computer Fraud and Abuse Act (CFAA) to protect the government’s information. Many laws have been passed that revises the CFAA. The CFAA has imprisoned many people, and many people want changes to the CFAA today.
The Stop Online Piracy Act was proposed in January of 2012. SOPA was a legislative act that attempted to prevent piracy through DNS blocking and censorship. The legislation caused the protest and blackout of multiple online internet services including Reddit, 4Chan, Google, Wikipedia, Mozilla, and Tumblr. Now, internet users are faced with another possible challenge called the Cyber Intelligence Sharing and Protection Act, or CISPA. CISPA was quickly passed by the House of Representatives on April 26th, 2012, and is now being processed through the Senate (Beadon). CISPA's purpose is to promote national cybersecurity through allowing private companies and the federal government to exchange users' private information, including emails and text messages, with complete legal immunity and one hundred percent anonymity. To some, CISPA appears as SOPA 2.0, another attempt to further limit American rights and privacy. Meanwhile, to others, CISPA appears as a milestone that needs to be reached in order to advance technologically and improve the nation's security. CISPA's purpose appears noble, but the current version of the legislation at least requires a revision due to its privacy invading policies, vague terminology, possible restrictions of internet freedom, and violation of the Fourth Amendment.
Millions of people all around the world are using Smartphones, like iPhones, which turns out to be crucial part of our lives. We are using them not only for calling but we also store unbelievably huge amount of personal information. We have there all our contacts, calls and messages and all our pictures that we save and keep in the phones. A
Cyber security is like trying to box while being blindfolded.. Cyber instability may cause massive panic in citizens of the United States. Government surveillance is one of the platforms of cyber security and it started to erupt after the 9/11 incident. The main ways the government watches people today is with cell phone, social media, and email surveillance. Should they be able to invade our privacy? Maybe. Many crimes are committed on computers everyday whether it be credit card hacks, stolen identities, or even social media accounts taken. Cyber attacks may lead people to distrust the cyber community and the people behind cyber protection.
And cybersecurity also have ability protect any anticipated treats or hazards to security system, to protect unauthorized access or use of such records or information (Shackelford 319-320). We’ve known that all these abilities are very helpful to prevent from cyber-attack and US government has a powerful security system to prevent terrorism attack. Roesener, Bottolfson and Femandez purpose that the government and private sectors (Non-government companies) have to improve the cybersecurity for technology to prevent from espionage, identity theft, and economic terrorisms and so forth. The government is pushing the private sectors to do more research, academic and organizations to improve the cybersecurity (40). It seems like the government is not pushing the private sectors hard enough to improve the cybersecurity and that is why the cybercrimes or hackers can still hack into the computer system to steal everyone information. The government should get more involve with cybersecurity system because it is the government duty to keep it saves for the citizens. According to Roesener, Bottolofson and Femandez said “With some dramatic changes within the authorities and responsibilities, the US government could drastically improve its ability to protect the US citizens from the cyber threats”
Computer hackers in today's world are becoming more intelligent. They are realizing that people are constantly developing more hack-proof systems. This presents the hackers with a bigger challenge and a bigger thrill. The government is realizing this and is working on making harsher laws to, hopefully, scare the potential hackers. With the increase in hacking and hacker intelligence, governmental regulation of cyberspace hasn't abolished the fact that it's nearly impossible to bring a hacker to justice.
...t is not possible to eliminate cybercrime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime. Undoubtedly the Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime. I would conclude with a word of caution for the pro-legislation school that it should be kept in mind that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counter-productive.
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.