Sunday, February 9, 2020

Digital Crime and Digital Terrorism Essay Example | Topics and Well Written Essays - 1750 words

Digital Crime and Digital Terrorism - Essay Example U.S., which have faced terrorists’ attacks and other security threats in the recent past have also initiated these steps. Although, these constructive initiatives were to protect the people of America, certain sections of the population have raised opposition mainly regarding the privacy related issues. Their view is, these measures sometimes infringes upon the privacy of citizens and compromises their lives, social standing, economic status, etc, leading to a lot of physical and mental problems for them. This paper will first discuss US’s government initiatives to protect its vital digital assets, then will discuss how it is crucial to protect both personal privacy as well as classified national security information, and finally will discuss how these classified assets could be breached and the safeguards that can be taken. The United States government’s classification and protection system for certain crucial information is established with the aid of number of legal regulations and executive orders. That is, all the important information and all the related documents, files, etc., pertaining to national security are classified and protected from getting into wrong hands in the form of USA-PATRIOT Act, Homeland Security Act, FISA, etc. USA-PATRIOT Act (manufactured acronym for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act) was passed in 2001 due to the initiatives of the former US President, George Bush, and it provides for a lot of security measures particularly for digital assets. In 2011, President Barack Obama strengthened this act by signing a four-year extension for three key provisions found in the Act, particularly related to digital terrorism. That is, the â€Å"roving wiretap† power allows the â€Å"federal au thorities to listen in on conversations of foreign suspects even when they change phones or locations†. (Mascaro, 2011). While

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.