Verified Document

Protecting America's Internet Networks: Better Plan Is Needed Term Paper

¶ … Law Enforcement -- Computer Security Three agencies that are part of the U.S. Federal Government's effort to thwart computer crimes are the Department of Homeland Security, the FBI, and the Secret Service. Computer crime (also known as cyber crime) is a growing and dangerous menace, not just to the government -- and to all 50 state governments -- but to corporate networks, private computers and educational institution computer networks as well.

What challenges face the three departments mentioned above based on the independent nature of these agencies, and can they cooperate to provide steadfast collaboration against terrorists and other hackers who seek to steal important information and interrupt normal business cycles?

The Department of Homeland Security (DHS) is a massive, multi-agency department with many responsibilities, and cybersecurity is just one of its duties. It is also responsible for border security, customs (including enforcing immigration laws) and emergency management (FEMA) (www.dhs.gov). The Secret Service operates within the bureaucracy of DHS, and while it's main function is protection of the President of the United States (and others in the executive branch), it is also...

Also, the Secret Service is assigned to protect against those involved in criminal activity regarding "fund transfer frauds, access device frauds, false identification documents or devices," which would include cyber crime (www.law.cornell.edu). The FBI meanwhile has become deeply involved in cybercrimes and cyberterrorism since September 11, 2011. It fights organized crime, terrorism, and has 56 offices nationwide.
But are these three agencies aligned and are they collaborating to protect computer networks -- especially in the federal government's sensitive servers? There is evidence that the Secret Service's investigative mission "…does not fit clearly into any of the DHS stated missions," according to the Quadrennial Homeland Security Review (QHSR) (Harlow, 2011). In fact the Secret Service budget "…has not kept pace over the past budget cycles…" in part because the Secret Service's "inability to argue effectively for the need for this capability within DHS (Harlow, 2). The "lack of attention to this important area of criminal activity" -- computer crime in particular -- leaves America's financial stability "at risk," according…

Sources used in this document:
Works Cited

Harlow, R. (2011). Two Missions, One Secret Service: The Value of the Investigative Mission.

Naval Postgraduate School. Retrieved March 14, 2014, from http://www.hsdl.org.

Department of Homeland Security. (2012). Our Mission. Retrieved March 14, 2014, from http://www.dhs.gov.

Krieger, M. (2013). How the FBI Wants to Penalize Internet Companies for Providing "Too
Much" Security. Liberty Blitzkrieg. Retrieved March 14, 2014, from http://libertyblitzkrieg.com.
Wired. Retrieved March 14, 2014, from http://www.wired.com.
Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Security Measures an Assessment
Words: 3999 Length: 10 Document Type: Term Paper

Internet Security Measures- An Assessment The world of the Internet is truly an amazing and wonderful place where any information on any topic is available, right at your fingertips, with the mere click of a button. The Internet is very much like a huge city where high rises filled with honest people and slums filled with the lower classes coexist side by side; where there are both good people as well

Protecting Against Cyberthreats During a Global Covid 19 Pandemic
Words: 4298 Length: 14 Document Type: Research Paper

New Solutions to New Threat: Optimizing the Remote Work Environment during a Global COVID- PandemicGiven the continuous political turmoil emanating from the nation’s capital for the past three and a half years, few observers would likely have regarded 2019 as “the good old days,” but the multiple crises of an ongoing global COVID-19 pandemic combined with a devastated economy, massive unemployment and growing unrest over racial disparities underscore just how

Protect America Act of 2007
Words: 4307 Length: 15 Document Type: Term Paper

S. mainland. The court can reject the procedures only if it finds the plan for complying with the law as "clearly erroneous." The program may also continue for a year although the law is scheduled for renewal in six months. Warrant-less eavesdropping may begin immediately and ahead of the security court approval of the procedures (Savage). Spur of the Moment and Secret Order Weeks after the 9/11 attacks, President Bush signed a

Business Intelligence Bi Plan Business
Words: 4104 Length: 14 Document Type: Business Plan

Although intranet pages may provide links to the Internet, an intranet is not a site accessed by the general public" (Housel and Hom, 1999). Aside from the intranet, the company also uses a wide array of anti-virus programs, firewalls and virtual private networks. The scope of these software applications is that of screening the information which flows between all the organizational computers (Answers, 2011). At the level of the organization,

Use of Content Filters on Internet in High School
Words: 14424 Length: 42 Document Type: Term Paper

Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Foundation (NSF) were the primary creators of the ARPANET. Subsequently however, efforts from private entities and universities have helped develop the network infrastructure, as it exists today. "The goals of ARPA's

Looking at the Federal Plan for Cyber Security and Information Assurance...
Words: 2942 Length: 9 Document Type: Research Paper

Federal Plans NICE Plan Development and Research Challenge Future Plan This paper discusses what is referred to as the Federal Plan is for Cyber Security and Information Assurance (CSIA- R&D) Research and Development. Details of the federal government's plan will be discussed as well as what is expected and can be done about cyber security in the long-term. In this federal plan, the terms 'information assurance' and 'cyber security' refer to measures put in place to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now