The intelligence community itself has made a major shift of how it operates, what are its priorities and its ability to protect the nation in the entry of the 21st century. The attacks on 9/11 greatly changed the way we see the world now and has shown major flaws within the intelligence community. Those events led the creation of the Department of Homeland Security and with it pooled federal agencies into in umbrella for it to be centralized in order to be effective. There are three categories in which the Homeland Security Intelligence face in the 21st century. Those categories are technological, political, and cyber security. In this day in age everything from critical infrastructure, government information to money is being digitalized to the internet. Furthermore, it gave a showed a new front in which our nation can be attacked via cyber space. The Cyber security role for Homeland Security intelligence has become increasingly worrisome. Due to the fact that the cyber security of the nation has become increasingly targeted by foreign organizations, countries, and terrorists. One of the most potentially damaging targets is the nation’s critical infrastructure, especially the water and energy. In an article Hacking Gets Physical, it states that the “FBI confirmed that operatives in Russia, Iran, and China conducted mapping operations in order to discover weakness in the nations cyber security.” The critical infrastructure is becoming more digitalized because of its
The most recents detections of how cyber warfare is inevitably coming was the accusations of Russia hacking the the Democratic National Committee and former Secretary of State Hillary Clinton’s email’s releasing damaging evidence against them which ultimately lead to Donald Trump being named the President of The United States (Diamond, 2016). The effects of cyber warfare have leaked over in to televise series, forming shows such as CSI cyber, and the gaming world, Call Of Duty Infinite Warfare. Neglect regarding cyber security can: undermine the reputation of both the government and elected officials; force unacceptable expenditures associated with the cost of cleaning up after security breaches; cripple governments' abilities to respond to a wide variety of homeland security emergency situations or recover from natural or man-made threats; and disable elected officials' ability to govern (Lohrmann, 2010). Classified information such as overseas operators and attacks, missile locations, response plans and weaknesses, and much more cripples America’s ability to defend itself from enemies both foreign and domestic. To combat cyber terrorism is the Cybersecurity Information Sharing Act, or CISA. In an article titled “Why Cybersecurity Information Sharing Is A Positive Step for Online Security” it is discussed that under CISA, the Department of Homeland security will have more responsibility for domestic cybersecurity. CISA’s fundamental purpose is to better enable cybersecurity information to be shared between the private and public sectors (2016). The sharing of threat information between public and private sectors can give the the United States a head start by allowing them to share information rapidly and more often to combat enemy threats while still providing safety for privacy and civil
While the Department of Homeland Security (DHS) is one, centralized agency, securing the homeland involves the cooperation and collaboration of many, different agencies and organizations ranging from local law enforcement to national agencies such as the NSA, CIA, and FBI. Each of these agencies contributes to the development of homeland security intelligence. By carefully analyzing and commenting on the objectives, tasks, strengths, weaknesses, and roles of each agency, a larger picture emerges regarding the capabilities and limitation of intelligence in supporting homeland security efforts.
Since the onset of the first packet switching event that many believe to be beginning of the internet, no other technology besides the printing press has ever transformed the ability to deliver information. Although the internet is used by a large percentage of the civilized world, few Americans realize how vital cyberspace is to our national infrastructure. Today, we are faced with even more threats although it has been a recognized problem since 2009, when President Barrack Obama said “The cyber threat is one of the most serious economic and national security challenges we face as a nation. It’s also clear that we’re not as prepared as we should be, as a government or as a country (Obama, 2009).” Every industry that operates in the United States is dependent on the internet for some aspect of their business. Commerce, transportation, financial institutions, military, as well as industrial control systems are all interconnected. This interconnectedness has created vulnerabilities within their infrastructure that have increasingly become targets of terrorists, script kiddies, foreign governments and hackers of all types.
Perhaps the most important change in how the federal government was reorganized after September 11th is the creation of both the Director of National Intelligence (DNI) position and the Office of the Director of National Intelligence (ODNI) in 2004 with the passage of the same IRTPA that created TSA. This concept had been first suggested in 1955 after a study by Congress then and was recommended time and again but only became a reality after the September 11th attacks drove the need for major intelligence reform home and the 9/11 Commission continued the push for the creation of such a position (ODNI, n.d., paras. 1-5). As one can see from the mission and vision of the ODNI, the importance cannot be overstated. The mission includes leading intelligence integration while having the IC produce the most insightful intelligence products possible and the vision is fully integrating the IC thus making the nation more secure (ODNI, n.d., paras. 1-2).
The 9/11 attacks opened the avenue for a scrutiny of the performance and ability of the intelligence community to detect any threats to the safety of the United States. The media, politicians, reformists and other interested parties would not comprehend how such an attack would happen without the knowledge of the intelligence community. However, it is important to consider the fact that the attack was one of its kind and could not be approached with the resources and expertise used in other initiative such as the cold war. Therefore, the need to restructure the intelligence community arose from the view that it was still operating in the mindset and spirit of the cold war even in the modern era that had seen a revolutionary change of warfare
It is essential to understand America’s critical infrastructure and key resources (CIKR) and National Infrastructure Protection Program (NIPP) to ensure survivability of its critical assets, while maintaining security for America. “The plans are carried out in practice by an integrated network of Federal departments and agencies, State and local government agencies, private sector entities, and a growing number of regional consortia (DHS, 2009, p. I).” Several agencies work together to mitigate attacks on CIKR to protect public safety and security of the nation. A terrorist may stop at nothing to carry out an attack on CIKR. If an attack or natural disaster does transpire, each agency working together to restore the damage must be timely. Additionally, NIPP helps to identify hazards associated with the various sectors, and provides necessary security measures to harden resources (DHS,
To improve our readiness to combat and battle these threats. In Seattle,there are secure fiber networks being put together to interlink the government and emergency operations. Not only Seattle but many other cities and countries have invested local funds in creating new 911 centers and emergency operation ceters. Worried about these attacks and threats the United States have “hardened” the control networks that manage electricity and water grids. The entire field of cyber security and information technology has a new way of confronting not only terrorist threats but all of the ongoing issues created by hackers and identity thieves. Knowing if America is safer now than in 2001, especially since Bin Laden's death ,the United States will not know. But in not knowing, where, how, or when a threat could be more than just that the United States has become more vigilant and more prepared (Proud To
The intelligence community has undergone some major changes in the past thirty years. During the cold war this section of defense had massive funding. There needed to be an ability to predict what the Soviet Union was planning to do and what they were actually doing in order to prevent a nuclear war. After this period in time ended there was again large changes. The budget to the intelligence community was cut astronomically because there was perceived to be less of a threat to the United States (“9/11 Intelligence Failures Report”, 2002). This misperception was actually due to a lack of ability to shift to a new changing threat. This mind set allowed many unwelcomed risks to enter into the United States.
The United States is under attack. To be exact, the nation’s power grid is under attack in the form of cyber warfare. On May 21st, 2013 Congressmen Edward J. Markey and Henry A Waxman published a report that provided the findings from information that they had requested from over 150 utility companies (of which 60% responded). More than a dozen utilities reported “daily, constant, or frequent attempted cyber-attacks” (Markey & Waxman) with one utility reporting that they have about 10,000 attempted attacks per month!
United States’ national infrastructure are resources that are vital to keep commerce operating. Technology have allowed the governments and the private sector to share vital information with them. The nation well-being depend on each of the critical infrastructures, the big question is on how to maintain all of our infrastructure sectors operative without any problem. There a big wave of threats to our nation and if one of this threads go through, it can created a multidimensional problem to the infrastructure system of the country. The main concerns that exist in protecting the U.S. against any attacks to any U.S. infrastructure and in the same time on how to have a system that work well with other agencies. For example; is important to
Intelligence is a dependable instrument of its own to generate information that establishes the base of National Security in the United States. Intelligence has been used since the beginning of history to provide information on enemy threats and how to prevent a mass disasters. It has been used for wars, national security, military tactics, etc. Intelligence has been available since the revolutionary war and our first president George Washington and other leaders of the world have used intelligence to protect their countries. Intelligence is the dominant and the backbone of homeland Security and it is ceaseless learning about it. National Intelligence agents train tirelessly to fight and create
Secretary Johnson, this memo is being addressed to you on the basis that the foreign policy issue that is threats to cyber security is of interest to the Department of Homeland Security. In brief explanation of the issue at hand, it can be concluded that the major foreign policy problem of cyber security threats has created and will continue to create imitate danger to the United States of America. The act of breaching the security sustained around private networks has become renowned as a type of terrorism, one that has rapidly evolved since the beginning of the 21st century and has gained even more strength with the increased use of computers. This threat has the potential to risk the exposure of the nation’s most valuable information including government documents, military plans that are considered top secret, and even the United States power grid. The convenience and the ease of use has made this threat greater as individuals conducting what has become known as cyber attacks can be thousands of miles away from the network they hack into. In order for this threat to be combated efficiently, a brief history based around the issue must be conducted as well as an examination of possible alternatives before concluding with the best proposed solution that will bring this threat under control and ultimately aim to eliminate it.
Cyber security is a major concern for every department, business, and citizen of the United States because technology impacts every aspect of our daily lives. The more we use technology the more complacent, we get with the information that is stored within our cyber networks. The more complacent, we get, the more vulnerable we become to cyber-attacks because we fail to update the mechanisms that safeguard our information. Breaches to security networks are detrimental to personal, economic, and national security information. Many countries, like Russia, China, Israel, France, and the United Kingdom, now have the abilities and technology to launch cyber-attacks on the United States. In the last five years there have been several attacks on cyber systems to gain access to information maintained by major businesses and the United States Government. Cyber-attacks cause serious harm to the United States’ economy, community, and the safety, so we need to build stronger cyber security mechanisms. Based on my theoretical analysis, I recommend the following:
Homeland security works around the clock to provide safety for not just our country, but for the entire world. Over the years there have been constant improvements to homeland security. The capabilities of intelligence gathering have been bolstered by the numerous agencies at different levels of our government, coordination between agencies, and even the very strategy used to analyze the data.
The damage of a full-fledged cyber attack would be devastating, the destruction would be unparalleled to any other tragedy that has occurred America. Since technology is responsible for providing America with vital entities and resources, an unadulterated cyber attack would nearly fail the American economy; this is what is known as critical systems failure. Weapons of mass destruction and cyber attacks present imminent threats of critical systems failure. Although currently Americas’ critical infrastructures are coordinated by controlled systems, majority of these systems are indeed connected to the American cyberspace. This exposes one of America’s most vulnerable spot amidst cyber security. Another major vulnerable spot within the nations IT security would be the geographical physical location for each of Americas primary infrastructures, as well as their productivity. Due to the proximal locations, the major infrastructures could very well be infiltrated by one efficient CNA.