Sunday, February 9, 2020
Digital Crime and Digital Terrorism Essay Example | Topics and Well Written Essays - 1750 words
Digital Crime and Digital Terrorism - Essay Example U.S., which have faced terroristsââ¬â¢ attacks and other security threats in the recent past have also initiated these steps. Although, these constructive initiatives were to protect the people of America, certain sections of the population have raised opposition mainly regarding the privacy related issues. Their view is, these measures sometimes infringes upon the privacy of citizens and compromises their lives, social standing, economic status, etc, leading to a lot of physical and mental problems for them. This paper will first discuss USââ¬â¢s government initiatives to protect its vital digital assets, then will discuss how it is crucial to protect both personal privacy as well as classified national security information, and finally will discuss how these classified assets could be breached and the safeguards that can be taken. The United States governmentââ¬â¢s classification and protection system for certain crucial information is established with the aid of number of legal regulations and executive orders. That is, all the important information and all the related documents, files, etc., pertaining to national security are classified and protected from getting into wrong hands in the form of USA-PATRIOT Act, Homeland Security Act, FISA, etc. USA-PATRIOT Act (manufactured acronym for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act) was passed in 2001 due to the initiatives of the former US President, George Bush, and it provides for a lot of security measures particularly for digital assets. In 2011, President Barack Obama strengthened this act by signing a four-year extension for three key provisions found in the Act, particularly related to digital terrorism. That is, the ââ¬Å"roving wiretapâ⬠power allows the ââ¬Å"federal au thorities to listen in on conversations of foreign suspects even when they change phones or locationsâ⬠. (Mascaro, 2011). While
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.