Friday, June 14, 2019
Digital Crime and Digital Terrorism Essay Example | Topics and Well Written Essays - 1750 words
Digital Crime and Digital Terrorism - Essay ExampleU.S., which have approach terrorists attacks and other security threats in the recent past have also initiated these steps. Although, these constructive initiatives were to protect the people of America, certain sections of the population have raised opposite mainly regarding the privacy related issues. Their view is, these measures sometimes infringes upon the privacy of citizens and compromises their lives, social standing, economic status, etc, leading to a lot of physical and mental problems for them. This paper forget first discuss USs government initiatives to protect its vital digital assets, then will discuss how it is crucial to protect both face-to-face privacy as well as classified national security information, and finally will discuss how these classified assets could be breached and the safeguards that can be taken.The join States governments classification and protection system for certain crucial information is e stablished with the aid of number of legal regulations and executive orders. That is, all the heavy information and all the related documents, files, etc., pertaining to national security are classified and protected from getting into wrong hands in the form of USA-PATRIOT Act, Homeland bail Act, FISA, etc. USA-PATRIOT Act (manufactured acronym for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act) was passed in 2001 due to the initiatives of the former US President, George Bush, and it provides for a lot of security measures particularly for digital assets. In 2011, President Barack Obama strengthened this act by signing a four-year extension for three constitute provisions found in the Act, particularly related to digital terrorism. That is, the roving wiretap power allows the federal authorities to listen in on conversations of inappropriate suspects even when they change phones or locations. (Mascaro, 2011). Whi le
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.