Sealing Up the Cracks
Security in a Post-9/11 World
On September 11, 2001, America was changed forever. From out of the ruins of the World Trade Center, and over the unmarked graves of nearly three thousand innocent people, a new world took shape. It was a world in which the citizens of the United Sates found themselves suddenly vulnerable to the murderous plots of a handful of fanatics. A trip to the mall, a drive over a bridge, a meeting at the office: an everyday event could spell disaster. Americans were discovering for the first time what so many around the globe had known for years, that the scenes of daily life could become the settings of terror. But what was to be done? Were the people of the United States to spend their lives looking over their shoulders? Was the free and open society so cherished by each and every American to disappear as completely as the lofty towers themselves? Freedom of speech, freedom of movement, and freedom of association: how might these essential tenets of American democracy be changed by a single day of horror? Clearly, security would have to be improved. For the sake of safety Americans would have to relinquish some of their accustomed liberties. Immediately, President and Congress took action. New laws were crafted, and new regulations put in place. Yet the nagging question remained - was it all enough?
The USA PATRIOT Act, signed by President Bush on October 26, 2001,was the first major comprehensive measure to address the new security concerns. As its full title implies, the enactment is a blueprint for "Uniting and Strengthening America by Providing [the] Appropriate Tools Required to Intercept and Obstruct Terrorism." In an attempt to achieve the object of preventing future terrorist attacks, the PATRIOT Act included the following mandates:
Updated Federal laws to reflect the rapid and dramatic changes that have taken place in recent years in communications technology;
Required the Department of the Treasury to require financial institutions to verify the identities of persons opening accounts, granted immunity to financial institutions that voluntarily disclosed suspicious transactions, and increased the penalties for money-laundering;
Broadened the terrorism-related definitions in the Immigration and Nationality Act, expanded the grounds of inadmissibility to include aliens who publicly endorse terrorist activity, and required the Attorney General to detain aliens whom he certifies as threats to national security;
Authorized grants that will enhance state and local governments' ability to respond to and prevent terrorism, and expanded information-sharing among law enforcement authorities at different levels of government. (Office of the Press Secretary, 2002)
Such provisions attack the inherent shortcomings that caused the catastrophic failing of 9/11. Properly applied the PATRIOT Act would prevent the use by would-be terrorists of computers and the Internet. Secret fund transfers and money-laundering would become things of the past. Suspect aliens would no longer be able to cross our frontiers with impunity. And most importantly of all, there would be an unimpeded flow of information between government agencies in all matters concerning national security.
However well-intentioned, many of these measures have all ready met with staunch criticism from civil rights groups and members of the Left. Linguistic, cultural, and religious barriers prevent intelligence agents from successfully infiltrating many terrorist organizations. Many terrorist organizations operate under cover of seemingly peaceful ethnic or religious societies. The Internet and the computer, both so pervasive in the modern world, allow wrongdoers of all kinds to communicate swiftly, easily, and secretly. Data encryption systems exist that make it impossible for even federal investigators to extract information from a computer's hard drive. Organizations such as the FBI and the CIA must be able to attend and report on the kinds of public gatherings where important information might be gleaned. They must be able to intercept Internet transmissions and telephone calls without being tied down by excessive red tape.
With the reformed guidelines, our FBI will finally be able to perform their obligation to protect us while not infringing upon our civil rights, unless of course your civil rights include publicly discussing and plotting terrorist activity. Of course this won't stop terrorism, but it will definitely make planning attacks on our home soil more difficult. Otherwise, we could end up with a FBI that treats terrorism like the INS treats immigration. (Pause to cringe.)" (Green, 2002)
In other words, public meetings and public postings on the Internet are just that - public. Anyone attending such meetings or making such postings should...
Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,
Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of
Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework
Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination
Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is
Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now