Communications Security April M. Walker American Military University Communications Security Communications Security is critical to preventing adversaries from obtaining information traversing the internet. With today’s technology just about all information is being transmitted via the internet or phone lines or mobile radios. This can be anything from credit card payments for online purchases to classified secret level or above information for military operations. The technology involved in the area evolving crypto systems such as KG-175s, emissions security or TEMPEST requirements protecting emanations, physical security like ensuring material is accounted for, and transmissions security or protecting information from interception. To support the ever growing technology there is specific equipment and storage requirements for network traffic and voice traffic. There is even equipment devised just to manage and account for the encryption devices on the network. The companies and organizations overseeing communications security include the National Security Agency, General Dynamics, and the Committee on National Security Systems. Finally there are global implications for communications security. National Security Agency surveillance and cyber attacks are among the most relevant concerns in today’s communications security. First discussed will be the technology involved in the area. Technology in communications security is ever evolving. The need for improving
Since the onset of the first packet switching event that many believe to be beginning of the internet, no other technology besides the printing press has ever transformed the ability to deliver information. Although the internet is used by a large percentage of the civilized world, few Americans realize how vital cyberspace is to our national infrastructure. Today, we are faced with even more threats although it has been a recognized problem since 2009, when President Barrack Obama said “The cyber threat is one of the most serious economic and national security challenges we face as a nation. It’s also clear that we’re not as prepared as we should be, as a government or as a country (Obama, 2009).” Every industry that operates in the United States is dependent on the internet for some aspect of their business. Commerce, transportation, financial institutions, military, as well as industrial control systems are all interconnected. This interconnectedness has created vulnerabilities within their infrastructure that have increasingly become targets of terrorists, script kiddies, foreign governments and hackers of all types.
Technologies and processes not within the scope are; the coordination for Type III and above encryption and keying material and coordination for National Security Agency (NSA) communications security (COMSEC) requirements. New networking or information systems technology will not be introduced into the scope of this project unless it provides necessary network security features for the prescribed protection.
George Zimmerman committed murder, and was acquitted of charges by a jury, as there was not enough evidence to prove that Zimmerman had not acted in self-defense. Zimmerman walked away from the trial without any repercussion, and much of the country was outraged. But what if Zimmerman had been wearing Google Glasses, or what if Martin had been using his phone? Both devices have the capability to record events. Either of those could have been used as evidence against Zimmerman, and might have been enough for the jury to find him guilty of murder. Many Americans find flaws with the NSA's (National Security Agency) cell phone, satellite and camera monitoring. Though most people despise the program, the NSA's monitoring power needs to be raised. With the ability to more thoroughly investigate crime scenes though electronic methods, the NSA could help catch local criminals, and could also investigate terrorist attacks on the country more thoroughly. In the end, it comes down to a simple choice, privacy or safety. Which is more important, a small amount of privacy on electronic devices, or the safety of the entire country?
With the world becoming more advanced and more and more devices being conceived, ie. Smartphones, Smart car, and Smart house, along with a growing dependence on, them even on the level of the government, we need to protect our privacy and safety. It has been statistically shown that our safeguards against hackers and foreign threats is severely lacking. Still, this a worldwide problem, and with the technological revolution, people don’t know how to keep their information safe, so it is our job as part of the government to protect our citizens even from digital
Private organizations in the United States come under attack weekly if not daily and their cyber defenses must be kept up to par otherwise there will be an extreme loss of information and resources. FBI director James Comey can be quoted as saying “There are two kinds of big companies in the United States. There are those who 've been hacked by the Chinese and those who don 't know they 've been hacked by the Chinese” (Comey). Comey can also be quoted as having said that, “China was seeking to obtain "information that 's useful to them so they don 't have to invent" (Comey). This stolen information can be used against these companies when brokering a trade deal or even Chinese companies could begin manufacturing American goods illegally
In January of 2014, news agencies reported on the National Security Agency's (NSA) use of “leaky” mobile phone applications to obtain private user information. The United States government has admitted to spying on its citizens, but claims that doing so is the best way to protect the U.S. from foreign threats. Certain smartphone applications, such as the popular Angry Birds game, inadvertently transmit personal user information, such as age, gender, ethnicity, marital status and current location, collectively known as the user's metadata, across the internet[1]. As part of their world-wide telecommunications surveillance for terrorism or other criminal activity, the NSA exploits these security holes in smartphone applications, by collecting and storing user data. While many users are unaware of the information leaks in their mobile applications, most people would certainly prefer to keep such information private [2]. Smartphones know almost everything about who we are, what we do, and where we go, but how much of that information does the government have the right to know and possess? Is it ethical for the United States government to collect and track the cell phone data of its citizens in the name of national defense, or does that violate the citizens' right to personal privacy? NSA surveillance of private user data of U.S. citizens is the best method of protection against terrorism and is also legal under the Constitution. By examining these two components, it is plain to
The world is becoming more and more digital everyday, things as simple as the lights in our houses can be linked to a network. Nevertheless, these networks can be a window of opportunity for cyberterrorist groups, or hacktivists to exploit. Technology has also given the resources needed for these groups to become more efficient at what they do, like increasing bandwidth speeds or more efficient computers for example, but also the same technologies can be used to strengthen security measures against these attacks.
Have you ever pondered on the fact that the government could be observing that text message you just sent to your best friend or what you just looked up on your computer? American citizens were puzzled when they first heard Edward Snowden address the media on the astonishing truths of the NSA and their surveillance. Today, I will undertake both sides of this troubling wrangle, the debate between the supporters and the critics of the NSA. My position on this riveting topic is that I support the NSA and its involvement in our everyday lives. This agency is for the better good, and its main goal is not to eavesdrop on citizens, but to protect America from any harmful acts of terrorism.
Over the past decade, the Department of Defense (DoD) has transitioned from its older public-switched telephone network (PSTN) network to an almost total Voice over Internet Protocol (VoIP) network. They are being adopted by DoD because they offer higher flexibility, more features, and lower costs than the traditional PSTN infrastructure. However, VoIP systems also represent a higher complexity in terms of architecture, protocols, and implementation, with a corresponding increase in the potential for misuse. This case study examines the current state of affairs on DoD VoIP security through research of known/disclosed/potential eavesdropping and interception threats to DoD systems. This paper should serve as a starting point for understanding
In an effort to improve security, the Public Safety Wireless Networks (PSWN) program in coordination with the Department of Justice took action to create the Public Safety Communications Security Awareness Guide and focus on solutions to security issues. Therefore, this paper will provide a summary of wireless communications issues and address issues as various agencies cooperate, coordinate, and use interoperable digital technologies to meet public safety requirements. I aim first to discuss communications system security, identify vulnerabilities and address how critical physical, network, communications, and administrative security components operate to protect against intrusions. The final section will include PSWN program, federal, state, and local agencies proposed solutions to improve security
Secretary Johnson, this memo is being addressed to you on the basis that the foreign policy issue that is threats to cyber security is of interest to the Department of Homeland Security. In brief explanation of the issue at hand, it can be concluded that the major foreign policy problem of cyber security threats has created and will continue to create imitate danger to the United States of America. The act of breaching the security sustained around private networks has become renowned as a type of terrorism, one that has rapidly evolved since the beginning of the 21st century and has gained even more strength with the increased use of computers. This threat has the potential to risk the exposure of the nation’s most valuable information including government documents, military plans that are considered top secret, and even the United States power grid. The convenience and the ease of use has made this threat greater as individuals conducting what has become known as cyber attacks can be thousands of miles away from the network they hack into. In order for this threat to be combated efficiently, a brief history based around the issue must be conducted as well as an examination of possible alternatives before concluding with the best proposed solution that will bring this threat under control and ultimately aim to eliminate it.
Constant surveillance is something that we, as Americans, see and face every day of our lives. This surveillance that we encounter everyday is for our personal protection, but what happens when this protection is used for the wrong reasons or is abused? That is a concern that almost everyone has, and that is if they have some sort of privacy in their daily lives. “Surveillance Abuse is the use of police investigation methods or technology to supervise the activity of an individual or group of individuals in a way which violates the social norms or laws of a society” (US Legal, Inc.). Citizens of the U.S. worry whether their privacy is at risk or is being protected by our government. The topic of Surveillance Abuse and Culture will be
In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.
Cyber espionage is an area that has recently attracted the attentions of Indian government and corporate houses alike. Both Indian government and corporate houses are the biggest loosers from cyber espionage. Sensitive information on national security and trade secrets and commercial information has been occasionally stolen through cyber espionage in India.
Nonetheless, in an age where everything is connected as well as networked, the need for robust security measures have never been more important. Furthermore, the interdependence of the telecommunication infrastructure yields rising concerns to the vulnerability of this infrastructure in addition to its cascading impact on all other critical infrastructures. However, the telecommunications sector can and has been impacted by other sectors. Therefore, moving forward the security measures besides recovery procedures must encompass cross infrastructure dependence trepidations.