The response must be 200 words and use at least 2 scholarly citation(s) in APA format. Any sources cited must have been published within the last five years. Acceptable sources include texts, articles, presentations, the Bible, blogs, videos, etc.
Johnson, T. A. (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare.Boca Raton, FL: CRC Press. ISBN: 9781482239225.
Pichtel, J. (2016). Terrorism and WMDs (2nd ed.). Boca Raton, FL: CRC Press. ISBN: 9781498738989.
There are many different aspects of cybersecurity, intelligence, counterintelligence, and information warfare. There are many things that affect them all to include legal aspects of each. One of the simplest ways to describe information warfare is the gathering of information through cyber attacks and to use that information against specific targets. Johnson, 2015, gave an example of this situation, he pointed out that coalition forces attacked Iraqi information systems through electronic and physical weapons.
One of the ways to combat information warfare is through cyber intelligence and counterintelligence. Counterintelligence is a combination of law enforcement and security protection mixed with foreign intelligence and the combatting of terrorism (Melendez, 2019). When it comes to information warfare in this day and age counterintelligence is going to be an important role in ensuring that the information sources in the United States are protected. In the previous week we learned about protecting critical infrastructure. This is accomplished through counterintelligence and intelligence sharing. September 11, 2001 was a defining moment in US history as it pertained to security. The tragedy of the attacks that day led to the development of new divisions of government to help protect intelligence. One of these organizations was the Office of the Director of National Intelligence.
For intelligence protection to work there needs to be a sharing of information among the different organizations in the US that are set up to ensure safety and security. If there is not a sharing of information, then there could openings for cyber threats and other security threats to occur. With the formation of new agencies to provide security against new threats there could be legal issues that arise. The US Patriot Act was designed to provide guidance under a new age of security threats. It was a quick acting piece of legislation that has not been without flaws, but still provides legal guidance for the protection of the United States (Welch, 2015).
One of the things that came out of the US Patriot Act was delaying of notice of search and seizure of property that was deemed criminal evidence of potential terrorist attacks (Welch, 2015). While this can be good in regard to protecting information that is being gathered to protect us it has also become a gray area with law enforcement agencies. Some people feel that law enforcement has used this to their advantage without regard to the privacy of others. One of the constitutional rights that Americans have is the right to have privacy and security in their homes against search and seizure. The Patriot Act has made that a gray area. Terrorism is not clearly defined and as it is not clearly defined one could interpret terrorism to mean any threat to the peace and safety of others (Rajah, 2019). If law enforcement entities feel that gathering information is necessary to protect the peace and safety of others it should not be held against them if they can prove that the information is necessary.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more