28 Jun 2022

327

Domestic Security and Cyber Terrorism: Protecting Your Home and Family

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 931

Pages: 3

Downloads: 0

The FBI and the Department of Homeland Security are among the government agencies that strive to safeguard the United States. Domestic terrorism is one of the greatest challenges that these agencies have focused their efforts on. The FBI has particularly revamped its efforts and systems to ensure that home-grown terrorists are not successful in their attempts to compromise the national security. The American military also plays a vital role in keeping the country safe. The military may be invited to support the other security agencies in tackling terrorism and other security threats.

Role of the military 

Timothy Thurston explores the role of the military in combating domestic terrorism. He argues that the military should never take center stage. Instead, it should play a supportive role. It should help civilian police agencies in their counter-terrorism efforts (Thurston, 2007). He argues further that the military should only be deployed when their participation is absolutely required. He encourages governments to empower civilian security agencies to tackle domestic terrorism. Thurston adds that the military lacks the training needed to effectively respond to domestic terrorism (Thurston, 2007). This hinders its effectiveness. The argument that Thurston raises is indeed sound. While the military is important, its involvement in security operations should be limited to defense operations. Civilian police should spearhead counter-terrorism operations because this boosts their capacity to contain domestic terrorism. Police officers are best placed to tackle domestic terrorism as they have received training and this function is squarely in their docket.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Counterterrorism responsibilities of FBI, CDC and US Border Patrol 

The FBI, Centers for Disease Control and Prevention (CDC) and US Border Patrol are among the agencies that are involved in counter-terrorism. Investigating attacks after they have occurred is one of the responsibilities of the FBI (Laub, 2017). The investigations enable the FBI to obtain insights that are used to prevent attacks. Pre-empting attacks is yet another role of the FBI (Laub, 2017). The agency routinely monitors terrorists and suspects to ensure that they do not carry out attacks. Intelligence gathering and training agents are the other roles that the FBI performs as it participates in counter-terrorism efforts (“The FBI’s Counterterrorism”, n.d). Unlike the FBI which plays an active role in counter-terrorism, the CDC’s mandate mainly involves providing medical assistance after an attack has occurred. The CDC seeks to safeguard the health of the American people through partnerships with local, state and federal agencies. Should the US suffer a terrorist attack involving a nuclear or radioactive agent, the CDC is prepared to minimize harm and deliver medical services (CDC, 2016). US Border Patrol is another agency whose role in keeping the US safe cannot be overstated. In relation to counterterrorism, this agency is primarily involved in screening people entering the United States through such entry points as airports and ports (DHS, 2015). As it does this, the agency guarantees that no individual who poses a threat to the US enters the country. The US Border Patrol also works with other security agencies to combat terrorism (DHS, 2015). Thanks to these partnerships, the agency is able to pass on intelligence to its partners.

Cyberterrorism 

The origins of cyberterrorism can be traced back to the 1990s when remarkable advances were made in the development of the Internet and computer technology (Littleton, 1995). Malicious software was developed and used to infect computers. This is what cyberterrorism means in its basic form. With time, the definition of cyberterrorism has been broadened to accommodate other acts. Today, cyberterrorism refers to acts committed in cyberspace that are intended to disrupt how the cyberspace functions. While cyberterrorism targets the cyberspace, its effects can be felt in the real world. For example, recently a ransomware attack was launched against computer systems across the globe. This attack interrupted operations and caused businesses to suffer losses. The world is united in its resolve to tackle cyberterrorism. Such countries as the United States have developed laws and operations aimed at tackling cyberterrorism. For example, the US Congress enacted the Cybersecurity Act in 2012 (Kain, 2012). This Act seeks to protect Americans and companies from the threat of cybercrime. The US has also developed operations whose primary purpose is to tackle cyber-terrorism. For example, the Department of Defense is engaged in capacity building and providing support to other agencies with the goal of securing the country against cyber threats (DOD, 2015). Since the US has enacted laws and set up operations, it is clear that the country considers cyber-terrorism to be a serious threat.

Internet and global Jihadist ideology 

The Internet is emerging as a tool that Jihadist groups are using to promote their ideology. One of the applications of the internet is in fundraising (McNeal, 2008). These groups are relying on the internet to raise the funds they need to finance their operations. The internet is also being used to distribute information and to issue directives to members who subscribe to the Jihadist ideology (McNeal, 2008). Furthermore, Jihadist terrorists are using the internet to conduct recruitment. Proselytizing is another purpose that the terrorists use the internet for (McNeal, 2008). Overall, the internet has provided the terrorist groups with a new and effective platform for advancing their agenda.

In conclusion, cyberterrorism will continue to pose a challenge to security agencies in the US and across the world. The fresh nature of this threat makes it even more difficult to contain. Such agencies as FBI are committed to ensuring that this threat does not compromise American security. To guarantee national safety, the US needs to do more to tackle cyberterrorism. Agencies like the CDC should become more involved and proactive.

References

Centers for Disease Control and Prevention (CDC). (2016). Emergency Preparedness and 

Response. Retrieved 23 rd July 2017 from https://emergency.cdc.gov/radiation/cdcrole.asp 

Department of Homeland Security (DHS). (2015). CBP Border Security Report . Retrieved 23 rd 

July 2017 from https://www.dhs.gov/sites/default/files/publications/CBP%20FY15%20Border%20Security%20Report_12-21_0.pdf 

Kain, E. (2012). Does the Cybersecurity Act of 2012 Mark the Beginning of the War on

Cyber-terrorism? Retrieved 23 rd July 2017 from https://www.forbes.com/sites/erikkain/2012/02/22/does-the-cybersecurity-act-of-2012-mark-the-beginning-of-the-war-on-cyber-terrorism/#1b527cce7ddd 

Laub, Z. (2017). The FBI’s Role in National Security. Retrieved 23 rd July 2017 from

https://www.cfr.org/backgrounder/fbis-role-national-security 

Littleton, M. J. (1995). Information Age Terrorism: Toward Cyberterror. Retrieved 23 rd July

2017 from https://fas.org/irp/threat/cyber/docs/npgs/terror.htm 

McNeal, G. S. (2008). Cyber Embargo: Countering the Internet Jihad. Case Western Review 

Journal of International Law, 39 (3), 789-826.

The FBI’s Counterterrorism Program. Since September 2001. (n.d). Retrieved 23 rd July

2017 from http://govinfo.library.unt.edu/911/hearings/hearing10/mueller_fbi_report.pdf 

Thurston, T. W. (2007). The Military’s Role in Domestic Terrorism . Retrieved 23 rd July 2017

From http://calhoun.nps.edu/bitstream/handle/10945/3019/07Dec_Thurston.pdf?sequence=1&isAllowed=y 

US Department of Defense (DOD). (2015). The DOD Cyber Strategy. Retrieved 23 rd July 2017

From https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Domestic Security and Cyber Terrorism: Protecting Your Home and Family.
https://studybounty.com/domestic-security-and-cyber-terrorism-protecting-your-home-and-family-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Climate Change Pattern around the World

Running head: CLIMATE CHANGE PATTERN AROUND THE WORLD 1 Climate Change Pattern around the World Name Institutional Affiliation Climate Change Pattern around the World It is now an accepted fact that the world’s...

Words: 690

Pages: 2

Views: 93

Autism Myths: Debunking the Misconceptions

The patient portal is a 24-hour internet application that the patients use to access their personal health information. The first patient’s website was established in 1998 but the patient portal was rolled out in...

Words: 1480

Pages: 5

Views: 154

Pros and Cons of Cancer Treatment

The project is about the pros and cons associated with the treatment of cancer patients. Patients who have cancer may benefit from the advantages of cancer treatment and suffer the consequences of the treatment...

Words: 359

Pages: 1

Views: 453

Human Mitochondrial DNA: Functions, Mutation, and Inheritance

2 Summary of Three Papers Human mitochondria DNA is characterized by circular double-stranded molecules that are separable through the process of configuration density. The comprehension of the various roles and...

Words: 1377

Pages: 5

Views: 134

What is Team Learning?

Teamwork is becoming paramount in organizations to achieve their objectives, but there are concerns that collaboration may limit individuals from reaching their career goals. Most teams are based on ensuring that a...

Words: 408

Pages: 1

Views: 199

What is Gentrification? Causes, Effects & Solutions

Gentrification refers to the conversation of farm buildings to dwelling places. The wealthy people mostly do gentrification by moving in from the outside community leading to the rise of the socio- economic status of...

Words: 293

Pages: 1

Views: 125

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration