Protecting America's Internet Networks: Better Plan Is Needed Term Paper

PAGES
2
WORDS
713
Cite

¶ … Law Enforcement -- Computer Security Three agencies that are part of the U.S. Federal Government's effort to thwart computer crimes are the Department of Homeland Security, the FBI, and the Secret Service. Computer crime (also known as cyber crime) is a growing and dangerous menace, not just to the government -- and to all 50 state governments -- but to corporate networks, private computers and educational institution computer networks as well.

What challenges face the three departments mentioned above based on the independent nature of these agencies, and can they cooperate to provide steadfast collaboration against terrorists and other hackers who seek to steal important information and interrupt normal business cycles?

The Department of Homeland Security (DHS) is a massive, multi-agency department with many responsibilities, and cybersecurity is just one of its duties. It is also responsible for border security, customs (including enforcing immigration laws) and emergency management (FEMA) (www.dhs.gov). The Secret Service operates within the bureaucracy of DHS, and while it's main function is protection of the President of the United States (and others in the executive branch), it is also...

...

Also, the Secret Service is assigned to protect against those involved in criminal activity regarding "fund transfer frauds, access device frauds, false identification documents or devices," which would include cyber crime (www.law.cornell.edu). The FBI meanwhile has become deeply involved in cybercrimes and cyberterrorism since September 11, 2011. It fights organized crime, terrorism, and has 56 offices nationwide.
But are these three agencies aligned and are they collaborating to protect computer networks -- especially in the federal government's sensitive servers? There is evidence that the Secret Service's investigative mission "…does not fit clearly into any of the DHS stated missions," according to the Quadrennial Homeland Security Review (QHSR) (Harlow, 2011). In fact the Secret Service budget "…has not kept pace over the past budget cycles…" in part because the Secret Service's "inability to argue effectively for the need for this capability within DHS (Harlow, 2). The "lack of attention to this important area of criminal activity" -- computer crime in particular -- leaves America's financial stability "at risk," according…

Sources Used in Documents:

Works Cited

Harlow, R. (2011). Two Missions, One Secret Service: The Value of the Investigative Mission.

Naval Postgraduate School. Retrieved March 14, 2014, from http://www.hsdl.org.

Department of Homeland Security. (2012). Our Mission. Retrieved March 14, 2014, from http://www.dhs.gov.

Krieger, M. (2013). How the FBI Wants to Penalize Internet Companies for Providing "Too
Much" Security. Liberty Blitzkrieg. Retrieved March 14, 2014, from http://libertyblitzkrieg.com.
Wired. Retrieved March 14, 2014, from http://www.wired.com.


Cite this Document:

"Protecting America's Internet Networks Better Plan Is Needed" (2014, March 14) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/protecting-america-internet-networks-better-185041

"Protecting America's Internet Networks Better Plan Is Needed" 14 March 2014. Web.18 April. 2024. <
https://www.paperdue.com/essay/protecting-america-internet-networks-better-185041>

"Protecting America's Internet Networks Better Plan Is Needed", 14 March 2014, Accessed.18 April. 2024,
https://www.paperdue.com/essay/protecting-america-internet-networks-better-185041

Related Documents
Protect America Act of 2007
PAGES 15 WORDS 4307

S. mainland. The court can reject the procedures only if it finds the plan for complying with the law as "clearly erroneous." The program may also continue for a year although the law is scheduled for renewal in six months. Warrant-less eavesdropping may begin immediately and ahead of the security court approval of the procedures (Savage). Spur of the Moment and Secret Order Weeks after the 9/11 attacks, President Bush signed a

SRA International Study Focusing its professional experience and talents on departments of the federal government's national security agencies was smart for SRA because there are a multitude of aspects within each department that need security and impenetrable services. In other words, there is an enormous amount of work for a security agency that is tackling those crucial issues in thirteen of the fifteen departments linked to the executive branch of the

(Horticulture and the advantages of using the Internet Technology) What are the disadvantages of conducting business, large or small, on the Internet? They may be many. However, the most important disadvantages are: it can actually create a feeling of isolation; the businessman may feel that he has become isolated. This means that he may get the feeling that the World Wide Web is faceless and emotionless, and thus the business

Internet Privacy for High School Students The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients

Internet Security Measures- An Assessment The world of the Internet is truly an amazing and wonderful place where any information on any topic is available, right at your fingertips, with the mere click of a button. The Internet is very much like a huge city where high rises filled with honest people and slums filled with the lower classes coexist side by side; where there are both good people as well

Protecting Police & Engaging Citizens The nature of police work must ensure that is as adaptable, sophisticated, networked, and transnational as the criminals and terrorists it fights. A modern approach to policing must contain elements of traditional, mainstream efforts to fight crime along with a set of tools for carrying out an effective community policing approach. This paper provides a brief discussion about what such a hybrid model looks like in