Paper Example on Security and Cyberterrorism

Paper Type:  Essay
Pages:  4
Wordcount:  1043 Words
Date:  2022-09-21

Introduction

Merutka concludes that the Armed Forces have always engaged in domestic law enforcement. Before 1878, there was no law in the constitution barring the military's involvement in domestic activities. The military plays a role in domestic law enforcement activities, but it's involvement strictly governed by the Posse Comitatus Act of 1878 (Merutka, 2013). The Act effectively curbed the army's involvement in domestic law enforcement. The law has been amended severally, but the basic premise still stands. It states that military shall only engage domestically under circumstances where they are authorized by an Act of Congress or the Constitution. Recent cases of the military's involvement include the aftermath of the September 11 bombings. Immediately after the terror attacks, fighter jets were deployed to patrol the airspace above Washington DC and New York with explicit instructions to shoot down airliners. The military, in 2002, was also used to secure the Winter Olympic games in Salt Lake City, Utah. Black Hawk helicopters and fighter jets were on standby as thousands of troops patrolled the streets ("Defining the Domestic Role of the Military," 2015).

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Roles and Responsibilities of FBI, CDC, and US Border Patrol.

FBI

The FBI's primary responsibility is to protect the US, its citizens, and interests from the threat of terrorist attacks. It does this in some ways:

It is the leading federal agency in the investigation and prevention of domestic and international terror attacks involving a WMD. It oversees the crisis management in the event of a terror attack.

The FBI locates and apprehends fugitives who have committed an act of terror domestically (The United States Department of Justice, 2014).

The FBI works in close partnership with the Director of National Intelligence, among other agencies, to gather and analyze critical information on potential terrorist threats.

The FBI also has far-reaching investigative and surveillance powers granted by the Patriot Act. The bureau conducts intelligence collection and professional investigations to identify and thwart the imminent threat posed by international and domestic terrorists.

The FBI also runs counterintelligence and coordinates the activities of other intelligence activities to protect information from possible terrorists.

Coordinating the protection of the country's critical infrastructure by isolating and investigating terrorist groups via cyber and physical attacks.

CDC

The Centers for Disease Control is a part of the Department of Health and Human Services (HHS). The CDC is the primary public health liaison in the event of a chemical, radiological, or biological weapon of mass destruction. Some of its roles and responsibilities include:

Assessing the health status of the affected population in the local health departments ("CDC's Roles and Responsibilities," 2016).

Evaluating the medical effects of the exposure to the radiological or chemical materials on emergency responders, the local community, and high-risk populations such as pregnant women and children.

Offering advice to local and state health departments on the best ways of protecting food and water supplies, people, and animals from contamination.

Providing consultation services and technical assistance to local and state health departments on treatment methods, and decontamination of the scene and people exposed to the harmful material.

The CDC also keeps an updated record of all the people exposed to the contaminants in the WMD ("CDC's Roles and Responsibilities," 2016).

United States Border Patrol

The USBP has, for many years, been America's first line of defense against any unauthorized migration activities (Haddal, 2010). The primary mission of the USBP is the detection and prevention of the illegal entry of terrorists, illegal aliens, and weapons of mass destruction. The USBP's strategy reflects the realities of the post-September 11, 2001 security landscape. It plays the following roles:

  • USBP assesses the probability of capturing the terrorists alongside their weapons of mass destruction as they attempt to cross border points into America (Haddal, 2010).
  • It deters any unauthorized entry activities via improved enforcement tactics.
  • USBP detects, apprehends, and arrests human and contraband smugglers.

The USBP must also stay ahead by knowing each type of contraband. Changing patterns in global terror see an increase in the use of improvised explosives. The border patrol must know the latest materials used in making explosives to be able to stop them at the border.

How Is Cyberterrorism Being Addressed Operationally and Legislatively?

Cyberterrorism refers to the use of information technology and computers to cause widespread panic and disruption. Hackers target sensitive information that can help in striking at vital infrastructure. A recent case of cyberterrorism involves a computer hacker who furnished ISIL with the names and personal details of over 1000 US military and civilian personnel as potential targets. Ardit Ferizi, a Kosovo native, was arrested in Malaysia and sentenced to a 20-year jail term by a court in Alexandria, Virginia. ("Hacker charged with cyber terrorism," 2016)

Addressing cyberterrorism is a crucial part of the FBI's mandate, but other agencies such as the DHS are also actively involved in thwarting the vice.

The FBI is prioritizing high-level intrusions to help in predicting and preventing attacks instead of reacting after the fact.

FBI analysts, computer scientists, and agents use a combination of traditional investigative tactics, such as wiretaps, and technical capabilities to combat cybercrime.

The bureau also works with local and state partners at each of the 56 field offices to come up with effective ways of thwarting cyberterrorists.

States are also addressing the threat of cyberterrorism by using legislation. Some examples include:

  • Increasing the federal funding towards improved security measures
  • Requiring businesses or government agencies to implement particular types of security measures.
  • Increasing the penalties for computer-related crimes.
  • Addressing threats to vital infrastructure. For example, Alabama adopted legislation that shields the national electricity grid against dynamic cyber threats.

References

CDC's Roles and Responsibilities in the Event of a Nuclear or Radiological Terrorist Attack. (2016). Retrieved from https://emergency.cdc.gov/radiation/cdcrole.asp

Defining the Domestic Role of the Military. (2015). Retrieved from https://www.foxnews.com/story/defining-the-domestic-role-of-the-military

Hacker charged with cyber terrorism gets 20 years. (2016). Retrieved from https://www.federaltimes.com/2016/09/23/hacker-charged-with-cyber-terrorism-gets-20-years/

Haddal, C. (2010). Border Security: The Role of the U.S. Border Patrol [pdf]. Washington DC. Retrieved from https://fas.org/sgp/crs/homesec/RL32562.pdf

Merutka, C. (2013). Use of the Armed Forces for Domestic Law Enforcement [pdf]. Pennsylvania: United States Army War College. Retrieved from http://www.dtic.mil/dtic/tr/fulltext/u2/a589451.pdf

The United States Department of Justice. (2014). Organization, Mission and Functions Manual: Federal Bureau of Investigation. Washington DC.

Cite this page

Paper Example on Security and Cyberterrorism. (2022, Sep 21). Retrieved from https://midtermguru.com/essays/paper-example-on-security-and-cyberterrorism

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience!

24/7 online support

NO plagiarism