| by admin | No comments

Homeland Security Activities and Programs in Cyber Security and Privacy


Homeland Security Activities and Programs in Cyber Security andPrivacy Protection

Homeland Security Activities and Programs in Cyber Security andPrivacy Protection

Research question: what are the solutions to cyber security threatsfaced by the U.S today?

This research question is important in studying homeland securityand disaster management because experts have identified cybersecurity as one of the top five threats to national security that theU.S is likely to face in future (Snow, 2011).Moreover, president Obama has considered cyber security as a serioussecurity and economic challenge the U.S is facing as a nation. Thepresident has also acknowledged that the U.S as a country is notadequately prepared to deal with cyber security threats(Snow, 2011). Finding solutions to the cyber security threatsfaced by the U.S is important because it enable avert cyber securitydisasters in future.


  • Partnership with different stakeholders is one of the solutions that is more likely to address the cyber threats faced by the U.S

  • Sharing information between the government and the private sector is more likely to be effective in combating cyber security threats

  • Coming up with improved cyber security components is likely to avert cyber security threats faced by the U.S

Forming partnerships between different security agencies in the U.Slike the FBI, Central Intelligence agency (CIA), Department ofHomeland Security, Department of Defense, and intelligencecommunities is crucial in fighting cyber threats. Partnerships enableeffective monitoring and joint action in case of an attack. Incombating cyber terrorism, forming partnerships with other countriesis also important because cyber crime and terrorism is a globalproblem (Snow, 2011).

Ensuring collaboration between the government and the private sectoris important in fighting cyber security. Collaboration between thegovernment and the private sector will ensure that the private sectorreport cyber attacks on critical infrastructure more often. Somecompanies are normally reluctant to report cyber attacks for fear ofscaring away investors. Collaboration between the government and theprivate sector will also enable the exchange of knowledge, experienceand other invaluable contributions (Snow, 2011).

Constantly improving cyber security infrastructure is also effectivein preventing cyber attacks. Advanced cyber security infrastructuremeans that cyber criminal will take more time before they master howto go around such infrastructure. This means that constantimprovement will avert cyber attacks (Snow, 2011).

According to an article published in the New York Time on February11 2014, the director of national intelligence admitted that there isno adequate technology that would prevent insiders from accessingtop-secrete data on a large scale. This statement came after Edward JSnowden managed to hack into highly classified information from theNational Security Agency (Sanger &amp Schmitt,2014). It is believed that the information at Snowden’sdisposal could reveal the identities of American under cover agentsand foreigners who have been recruited by the U.S. Snowden hasalready leaked some of the top secrete information to Russian newspapers, but the identities of secrete agents has not been revealedyet (Sanger &amp Schmitt, 2014).

Scholars predicted that in future, cyber security would be one ofthe major challenges and it seem their prediction has come to true.Scholars have also observed that the current cyber attacks betweenthe U.S and China are likely to continue and even get worse infuture. In the recent past China and the U.S have been involved cyberattacks and espionages with aim of accessing or stealing crucialinformation.


Sanger, D. E., &amp Schmitt, E. ( 2014, Febraury11). Spy Chief Says Snowden TookAdvantage of ‘Perfect Storm’ of Security Lapses.Retrieved February 14, 2014, from New York Times:http://www.nytimes.com/2014/02/12/us/politics/spy-chief-says-snowden-took-advantage-of-perfect-storm-of-security-lapses.html

Snow, G. M. (2011, April 12). StatementBefore the Senate Judiciary Committee, Subcommittee on Crime andTerrorism. Retrieved February 14, 2014,from FBI:http://www.fbi.gov/news/testimony/cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism