Traffic Analysis/Homeland Security
One of the biggest challenges currently faced by the Department of Homeland Security is guaranteeing cybersecurity. Each and every day some type of cyber crime occurs. Such crimes have the potential to affect the country's national security. This paper investigates the significance of internet traffic and analysis to Homeland Security. It will look at the importance of internet traffic and analysis to Homeland Security as well as encrypted traffic and its implications to cyber-security. The manner in which the U.S. has handled cybersecurity over the past twenty years and the methods that the government has used in this time period will be discussed. Encrypted mobile messaging applications will also be discussed. At the end of the discussions, solutions are recommended and a conclusion given.
Introduction
In the recent past, the DHS (Department of Homeland Security) and the DoD (Department of Defense) signed an agreement to enhance the cooperation between the two, with regards to improving United States' cyber-security capabilities. The agreement is aimed at specifically enhancing cyber-security cooperation on capabilities development, mission activities and strategic planning. The agreement also outlined the specific individual and joint goals and responsibilities for both departments. The most crucial element in the agreement is personnel swap, which the Department of Defense expects to improve the different lines of communication between DHS and DoD. Under the cooperation agreement, the Department of Homeland Security will appoint an individual for the position of Director of Cyber-Security collaboration who will work in the NSA (National Security Agency) and serve as the Department's liaison to the United States Cyber Command. In addition, the agreement specifies that the DHS will supply more staffs from its office to the National Security Agency, including officers from its Office of the General Counsel, Office for Civil Rights and Civil Liberties and Privacy Office (Bobby, 2010). The DoD was to, in return, send a group of experts from its Cryptologic Services Group, to the Department of Homeland security's NCCIC (National Cyber-security and Communications Integration Center) with the aim of supporting Homeland Security's cyber-security efforts and coordinating those efforts with the operations of the DoD. In spite of the significant support that both departments will be offering each other, the agreement in no way interferes with the DHS and the DoD authorities, oversight mandates, command relationships or civil and privacy liberties. One of the most important strengths of the agreement is that Homeland Security will have more access to the Department of Defense, particularly its National Security Agency and its expertise and resources.
Background
The fact that cyberspace threats are borderless in nature calls for increased collaborations between countries so as to combat the threats. International collaboration is a key component of DHS's cyber mandate of safeguarding and securing the U.S.'s cyberspace. The Department, through the NPPD (National Protection and Programs Directorate), has created several functions to boost its international cooperation programs with other nations and organizations. The functions are carried out under the Office of Cyber-security and Communications in NPPD. Several parties have, however, insisted that for the NPPD to succeed in its international collaborations program, it should streamline its functions and operations so that it can consolidate its recourses and use them to better facilitate foreign relations (DHS Can Strengthen Its International Cybersecurity Programs, 2012). The United States Computer Emergency Readiness Team also needs to improve its information-sharing with related agencies so that it can better coordinate incident response.
Cyber-security entails all operations and activities aimed to protect and secure a cyberspace and computer infrastructure, in addition to the measures aimed at restoring ICT systems and the information contained in such systems. To best protect a cyberspace, there is the need to form security policies, best practices, collect tools, form guidelines, approaches, train staff, and have the technologies. Additionally, cyber-security also involves reduction of threat/vulnerabilities, incident response and deterrence of attacks, international cooperation and recovery measures. Due to the fact that cyber-attacks are borderless in nature, there is a need for governments and international organizations to act in concert so as to develop the cyber-security policies, procedures and plans, with the objective of enhancing cooperation, incident response and deterrence operations.
In the present day world, many aspects of our day-to-day lives have been moved to computers and online systems, for instance, education (we have online research, report cards, and virtual classrooms), healthcare (computer-based equipment and medical forms), finance (online bank transactions, bank accounts, electronic paychecks and loans), governments (online filing of birth records, death records, tax records and social security), transportation (aircraft navigation, car engine systems, and traffic control signals) and communications (texting, cell phones and email). Think of how much of your own personal data is stored on your own computer or...
Homeland Security and Preparedness, Response, Activities and Programs in Disaster Response or Disaster Recovery The focus of this study is the homeland security issue as it relates to the preparedness of the U.S.A. government and citizens in response to the emergencies that may emerge. The research question in this study is one that asks in light of the past disasters experienced by the United States such as the events of September 11,
Department of Homeland Security is clearly start-up: How quickly can DHS be up and running? The department formally began operating on January 24, 2003, and by March 1 had absorbed representatives from most of its component parts. The formal process of transferring agencies is expected to be completed by September 30, 2003, but analysts suggest full integration of agencies will take at least several years. Notwithstanding, as a practical matter,
Government The Trafficking Victims Protection Reauthorization Act Final Project / Dissertation Degree: Juris Doctorate Specialized Major: Specialization: Constitutional Law Full Address: The Trafficking Victims Protection Reauthorization Act This paper reviews the rights and protection that a state and federal government official provides to citizens that have been the subject of human trafficking crimes. Citizens need the protection of the police and other law enforcement officials to report human trafficking crimes and to protect and assist those that need
National Security Implications of Transnational Organized Crime The paper deals with three important aspects, one the National Security, second the crime -- organized in many ways, and the third rogue nations that pose a threat. National security is to be understood in multiple contexts. Firstly the physical security of the nation from alien threats, and intrusions, secondly damages to vital infrastructure and thirdly anti-national activities by organizations that may lead to
By federal law, all passenger airliners now feature cockpit doors that are locked by the pilots from inside the cockpit. Likewise, pilot training now includes the specific instructions not to open the door in response to any occurrence or emergency in the passenger cabin; instead, pilots are under instructions to land the aircraft immediately in response to any perceived emergency that would have previously been cause to investigate beyond
Human Trafficking The State Department of the U.S. Government has for the past ten years issued an annual report on the state of laws governing human trafficking. The latest report shows that most of the world's industrialized countries have enacted laws to protect against human trafficking. This includes recognizing that human trafficking is a problem and having taken steps to address the issue (Wu & Zifcak, 2010). Most countries in the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now