The story of Wikileaks demonstrates how the Department of Homeland Security should act against actors in cyberspace. By disclosure of 250,000 government secrets, Wikileaks initiated the cyber war between the administration and the anti-sovereignty group (Ashlee, 2010). The disdain of the Wikileaks leader Julian Assange and the government displeasure in these actions led other global organizations to withdraw their link and services from Wikileaks. Among the groups that withdrew their services and subsequently suffered continuous attacks include Amazon.com, Paypal, and MasterCards.
From the cyber-attacks by the Anonymous group in support of Wikileaks actions, the Homeland Security can learn some useful lessons and take appropriate measures in future. The Homeland Security can employ the use of non-state actors to mimic the activities of such cyber challenges in future to hide, individuals, corporations and the government from malicious attacks (Burns, 2010). These tactics are also utilized in other developed and developing countries such as Russia and China.
The Homeland Security should take the cyber challenges by the anonymous group in support of Wikileaks seriously as it such malicious activities are there and will continue to be there. Also, it is worth noting that, those attacks indicated that such hackers are improving and they could pose tougher challenges in future and may become uncontrollable if appropriate measures are not taken on time.
Also, the Homeland Security need to exploit the weaknesses of the United States enemies as the attackers can come from any country, various communication linkages or a multiple of internet providers.
ASHLEE VANCE and, M. H. (2010, Dec 09). Hackers give web companies a test of free speech.NewYorkTimesRetrievedfromhttp://search.proquest.com/docview/816608393?accountid=32521
BURNS, J. F. (2010, Dec 09). Hackers attack sites considered WikiLeaks foes. New York Times Retrieved from http://search.proquest.com/docview/816521970?accountid=32521
Discussion 2: Privacy and Civil Liberties
The movie Spying on the Home Front, reflect the reign of President Bush when his administration introduced the National Security Agencys domestic surveillance program in response to terrorism attacks (Marks, 2010). The movie revolves around the argument whether this action violates the Americans freedom.
The government program to check on peoples flow of information is useful because if people have nothing to wrong then they have nothing to fear and to conceal. After all the government efforts and the introduction of such programs as domestic surveillance are aimed at helping and protecting the citizens. The concept of data mining although it may appear as though it violate the human rights as stated by the United States constitutions fourth amendment (Ducat, 2012), it promotes governments efforts in the identification of anomalies that may give rise to questionable actions. In fact, the government cannot manage to peruse through every other persons emails, phone calls, and messages. From a technological point of view, the government can be able to identify some information that may require consideration but the officials cannot directly arrest the person. Nevertheless, it could be a good starting point to make a follow up of such a suspects activities so as to keep the public safe.
Secondly, the governments domestic surveillance program will not only enable the government to perpetuate the terrorists but also to identify and arrest them before they complete their attacking mission. Since it is very hard to survey on suspects only, it is, therefore, governments responsibility to treat everyone as a suspect and to conduct domestic surveillance so that they can get crucial information that might be helpful in protecting the citizens from terrorists attacks.
Ducat, Craig R. (2012). Constitutional Interpretation: Rights of the Individual. Wadsworth Pub Co.
Marks, R. A. (2010). Spying in America in the post 9/11 world: Domestic threat and the need for change. Santa Barbara, Calif: Praeger.
Need a paper on the same topic?
We will write it for you from scratch!
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- Computer Info Systems Essay Sample
- Cause and Effect Essay of Gun Control in the United States
- Will Technology Save Sears
- Fallacies Advertisement Essay
- Book report on Resilient Cultures by John Kicza
- Developing a sustainable city model for Port Louis
- Center for Disease Control
- Stress Relief
- Accounting Memo
- Bernie Sanders Standpoint on Social Security
- Women's Reproductive Rights in America
- Question Three