In the contemporary world computers and networks play an important role in everyday life. Retail stores use them to process non-cash transactions, government entities use them to store data about citizens, and financial institutions use them to record and process transactions, but these are only a few examples of the many organizations that rely on networked computers. For these systems to be effective, they must be reasonably secure from breaches and attacks, such as cyberterrorism. According to William L. Tafoya, cyberterrorism is defined as “the intimidation of civilian enterprise through the use of high technology to bring about political, religious, or ideological aims, actions that result in disabling or deleting critical infrastructure data or information” (2011). The importance of such networked systems and their value as cyberterrorism targets, means that organizations must have adequate policies in place to decrease the likelihood of such attacks.
"National Security Letters." Defending Your Rights in the Digital World. Electronic Frontier Foundation, n.d. Web. 24 Feb. 2014.
The terrorist attacks on September 11, 2001, have greatly changed United States security policies. September 11, 2001, is an infamous day that has changed the United States in numerous aspects. After this infamous day, many people live with the fear of experiencing another major attack. After the attacks the national Commission on Terrorist Attacks Upon the United States, also known as the 9/11 Commission, was created. One task given to the 9/11 Commission was to provide recommendations designed to prevent future attacks. In order to prevent another attack the power of security in the United States was increased. The effects of this increase in security can be seen when going through airport, going to a ball game, or even just walking on the street.
Australia is dependent on technology, everything from state security, economics and information collaboration is more accessible resulting in an increased reliance on digital networks. The rapid increase in cyber activity has a symbiotic relationship with cyber crime. The evolving nature of cyber crimes are constantly leaving counter measures obsolete in the face of these new technologies. Australia takes insufficient action against cyber crime, inaction is based on Australia’s previous focus on counter-terrorism. This study will use the Australia’s National Security Strategy 2013 to show the increasing trend towards cyber security. Unfortunately the Australia Government is lacking in the presence of this growing phenomenon. Recently cyber crimes including attacks from Anonymous and Wiki-leaks prove that no network is completely secure. This study will conclude that the exponential growth of the Internet has resulted in an inability to properly manage regardless of the governmental strategies being implemented.
It is now 64 years since George Orwell released the famous futuristic novel “1984”. In the book he describes a frightening society with omnipresent government surveillance. Big Brother is watching you. His novel has never been more relevant than after the war against terror gave the government reason to increase the surveillance. The war against terror is bringing us closer to Orwells dystopian society. Do we have to pay this high price to win the war against terror?
Pillars of smoke reached up into the blue sky. Eyes were glued to television screens waiting for the latest update. Families scrambled to get in contact with their loved ones. Children were removed from school and phones stopped working due to excessive network use. On September 11th, 2001, the United States of America was shocked by massive destruction caused by terrorist. Approximately 3,000 people died on the airplanes, in the World Trade Center, and at the Pentagon during the attacks. An immense fear unified the country in the most unpredictable way: Congress passed a bill with little to no debate. The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA Patriot) Act of 2001 rushed through Congress and was immediately signed into law by President Bush with the statement, “It will help law enforcement to identify, to dismantle, to disrupt, and to punish terrorists before they strike” (Department of Justice). However, many suggest that the USA Patriot act endangers fundamental rights of American citizens. In 2015, when the this act is being considered for renewal or dismissal, national leaders should keep elements that enhance transparency between government agencies and eliminate elements that allow investigative action without probable cause and searches without the owner’s knowledge.
The National Security Agency/Central Security Service main purpose is to protect the U.S. and gather foreign information. The Central Security Service, CSS, official established a partnership with the NSA in 1972. For more then half a century, the code breakers and code hackers of the NSA have been providing information to war leaders and high ranked decision makers (“About NSA” 1). The Network World refers to this as the “NSA's weird alphabet soup code names of secret spy programs” (Messmer 1). These two agencies do not only help the government officials they also give information to the Department of Defense, the Intelligence Community, industry partners, and other allies. To give the war generals a head start in battle, the NSA and CSS convey strategic and tactical instruction to war planners and soldiers (“About NSA” 1). Certainly, their good deeds do not stop there.
12. "What is the USA Patriot Web." Welcome to the United States Department of Justice. N.p., n.d. Web. 17 Oct.
“The War on Terror: The Rising of the US PATRIOT Act”
America, once considered the land of the free and the home of the brave. That was until, September 11, 2001 when terrorist succeeded with a planned attack on the World Trade Center and the Pentagon. That day “the United States government announced its intentions to begin a War on Terrorism (or War on Terror), a protracted struggle against terrorists and states that aid terrorists” (WAR ON TERROR). I think the terrorist attack that took place that day demanded for a response like the one given. America knows the face of war and that face is usually seen on the battlefield, not in the streets of a highly populated city.
Joel Brenner’s book America the Vulnerable is written to make the reader aware of the history, present day, and future of digital security. Brenner, a former top-level National Security Agency insider, writes the book in a “behind the scenes” way to help explore America’s next great battleground. Everything from a simple password hack to taking one of the U.S. military’s fighter jets off course is discussed. All things like this can be done according to Brenner with the click of a mouse. Brenner goes on to talk about the three distinct categories of cyber worries that make America a vulnerable digital nation. One category discussed is the danger to the U.S. as a nation in terms of digital espionage and crime both inside and outside of the country itself. The other main points made by Brenner were more government based. Brenner discusses how America’s competition in terms of cyber security has become a risk to our own countries safety because of other countries growing knowledge in the digital spectrum. Also Brenner goes into detail on what our intelligence agencies are doing to try and slow down or possibly resolve the cyber issues.