CLIENT #567464
CLIENT #567464
order 454646
Read More
Finished paper far before deadline, and promptly worked on areas I had concern. I had a 93%. Thank you once again
CLIENT #12432
CLIENT #12432
order 567433
Read More
This was the first time ever using this service and it’s safe to say they did an amazing job on my essay and got an A! Will use her again for sure!
CLIENT #32145
CLIENT #32145
order 908765
Read More
The paper was 100% authentic and well written.
CLIENT #546327
CLIENT #546327
order 230127
Read More
Good work, professional and was beat the deadline. Great work! Followed directions and completed a great paper
CLIENT #67543
CLIENT #67543
order 342156
Read More
My paper was finished early and there is never any revisions needed. Nice, friendly, understandable, and always go above and beyond to get the job done. Thank you so much.
CLIENT #454678
CLIENT #454678
order 21324
Read More
I received 99 out of 100 and the work was not plagiarized so overall id rate their work a 10/10 would highly recommend
CLIENT #4543216
CLIENT #4543216
order 329031
Read More
The paper they wrote for me was not plagiarized, and they took my notes and did a good job of making adjustments to the paper at my request. I got an A.
CLIENT #443665
CLIENT #443665
order 230987
Read More
Very great service! My paper was sent to me a significant amount of time before the deadline.
Previous
Next

The response must be 200 words and use at least 2 scholarly citation(s) in APA format. Any sources cited must have been published within the last five years. Acceptable sources include texts, articles, presentations, the Bible, blogs, videos, etc. Textbook: Johnson, T. A. (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare.Boca Raton, FL: CRC Press. ISBN: 9781482239225. Pichtel, J. (2016). Terrorism and WMDs (2nd ed.). Boca Raton, FL: CRC Press. ISBN: 9781498738989. ***MELISSA*** There are many different aspects of cybersecurity, intelligence, counterintelligence, and information warfare. There are many things that affect them all to include legal aspects of each. One of the simplest ways to describe information warfare is the gathering of information through cyber attacks and to use that information against specific targets. Johnson, 2015, gave an example of this situation, he pointed out that coalition forces attacked Iraqi information systems through electronic and physical weapons. One of the ways to combat information warfare is through cyber intelligence and counterintelligence. Counterintelligence is a combination of law enforcement and security protection mixed with foreign intelligence and the combatting of terrorism (Melendez, 2019). When it comes to information warfare in this day and age counterintelligence is going to be an important role in ensuring that the information sources in the United States are protected. In the previous week we learned about protecting critical infrastructure. This is accomplished through counterintelligence and intelligence sharing. September 11, 2001 was a defining moment in US history as it pertained to security. The tragedy of the attacks that day led to the development of new divisions of government to help protect intelligence. One of these organizations was the Office of the Director of National Intelligence. For intelligence protection to work there needs to be a sharing of information among the different organizations in the US that are set up to ensure safety and security. If there is not a sharing of information, then there could openings for cyber threats and other security threats to occur. With the formation of new agencies to provide security against new threats there could be legal issues that arise. The US Patriot Act was designed to provide guidance under a new age of security threats. It was a quick acting piece of legislation that has not been without flaws, but still provides legal guidance for the protection of the United States (Welch, 2015). One of the things that came out of the US Patriot Act was delaying of notice of search and seizure of property that was deemed criminal evidence of potential terrorist attacks (Welch, 2015). While this can be good in regard to protecting information that is being gathered to protect us it has also become a gray area with law enforcement agencies. Some people feel that law enforcement has used this to their advantage without regard to the privacy of others. One of the constitutional rights that Americans have is the right to have privacy and security in their homes against search and seizure. The Patriot Act has made that a gray area. Terrorism is not clearly defined and as it is not clearly defined one could interpret terrorism to mean any threat to the peace and safety of others (Rajah, 2019). If law enforcement entities feel that gathering information is necessary to protect the peace and safety of others it should not be held against them if they can prove that the information is necessary.

 
CLICK 'ORDER NOW' BUTTON BELOW TO GET HELP WITH ANY ASSIGNMENT/ESSAY/DISCUSSION BOARD/HOMEWORK. 15% OFF FOR YOUR FIRST ORDER

Do you have an upcoming assignment,essay or discussion?

Now you don’t need to worry about the deadlines, grades, or absence of ideas. Place an order on our platform to get original papers for a low price.
× WhatsApp us here