Need back in 12 hours MPA6001

RUNNING HEAD: SECURITY CHALLENGES IN THE US GOVERNMENT 0

Security challenges in the US Government management of security challenges

Vibert Jacob

Research and Data Analysis in Public Administration | MPA6001 S01

South University

Abstract

Security had been the major issue in the United States currently, posing a significant threat to the nation and citizens. The objective of this project is to investigate the strategies and measures the US Government is taking to deal with these security challenges. I will also focus on how these challenges affect the US and reasons why these security issues are a primary concern to the country. From the gathered information, it was observed that there are diverse ways that the US government is dealing with security challenges. On issues of cyber-crime, the government investigates a wide range of cybercrimes from fraud and theft to child exploitation and apprehending and prosecuting those responsible. Regarding climate change, designed a strategy around executive action and using powers already granted under laws such as the Clean Air Act. The government is also dealing with terrorism by designating countries like Syria, Somalia, and Sudan as that people could not visit if the planned to participate in the US Visa Waiver program. President Trump also signed a controversial executive order that suspended entry to refugees to the country, barred Syrian refugees indefinitely (U.S. Department of Defense, 2010). It has also been involved in preventing the North Korean president Kim Jong Un from testing military weapons by sending a fleet of navy seals to warn the country.

Keywords: Security, cyber-crime, terrorism, nuclear weapons, climate change.

Introduction

Security had been the major issue in the United States currently, posing a significant threat to the nation and citizens. With the increase in information technology development, cybercrime challenge is a challenge that has been substantially faced, making it essential for the government to outlook the security problem. The greatest challenge to the government is to design various strategies that will facilitate anti-cybercrime unit that will ensure individuals who rely on computers are kept secure on their operations (Schell, B. H., & Martin, C. 2004). United State is the country with the highest number of individuals who uses computers with broadband, a factor that makes computer security the most crucial factor to fight against cyber-crime. Although there is a verity of challenges that faced by the United States government management of security problems, it is essential to focus on this challenge since there are millions of dollars lost every year due to the cyber-crime problem.

The greatest question that should be on the board regarding cyber-crime problems is that; what should be done by the government management security department to reduce the rate of cyber-crime in U.S? Through appropriate research on this question, there is a high possibility of achieving various strategies that can facilitate reduction of cybercrime challenges in the country. Cybercrimes search as social media fraud, security breaches, and spear phishing is essential; to be abolished through appropriate regulations by the U.S government management of security challenges department.

Securing computer systems in the country are the most factors that should be considered by the government through building up various laws that will boost computer systems security. In America today, most of the operations are carried out through utilization of computers by the internet, making it essential for the security systems to be boosted by the government. The main importance of this research is to understand many ways that hackers conducts their operations while planning to get involved in a cybercrime activity and the most appropriate forms to stop search activities in the country that is affecting millions of individuals. Considering that individuals entities, individuals, government departments and US military are both using technology and they are at significant risk of being attacked through cyber-crime actions, the department of security is required to be vigilant in laws that will boost the security systems to avoid any form of cyber-crime action. Crime repercussions of cybercrime actions should be enacted, whereby this research will keenly look over the outcomes of individuals involved in cyber-crime.

To achieve the most appropriate data based on the cybercrime as a challenge in the United States government of security problems, it is essential to utilize research method that will facilitate the collection of reliable information for appropriate analysis. Considering the various forms of research method, a mixed model of research is the most suitable methodology since it will involve quantitative and qualitative methods of research that will help in gathering reliable data for a research topic and contribute to answering the solutions to the big question of the subject (Wall, D. 2007). Through mixed research model, it is possible to gather various statistical data that will help in understanding on how many cyber-crimes activities occurs in the country and the number that is being affected by the offense. Moreover, information on various strategies that can be used to curve these cybercrime challenges information will also be achieved through the mixed model, leading to precise data for the research analysis. The research is of immense importance since it will facilitate understanding of various challenges faced by organization or individuals who are cybercrime victims, and on what they think the government security department is required to do to end the misery in the country. Throughout the research, various ethical challenges will be faced, and it is essential to solving the problems appropriately. The moral dilemma is one of the factors that are required to be considered significantly. Throughout the research, various ethical issues will be faced that include invasion of privacy, unfair and copyright infringement. It is usually against the tort law for an individual’s intrusion to confidential information (Brenner, S. W. 2010). Through conducting the research, this ethical issue of gathering individual’s confidential information will be faced whereby various individuals who have been confronted with the crime will decline to give their report. Considering the ethical dilemma against intrusion to individual’s information, search interviews will be offered an opportunity to answer the only question that will have no prove.

Online defamation is one of the ethical challenges that will be faced through online research, whereby incorrect information might be gathered. To solve this problem, we will make sure that all information that is collected through the internet is reliable and has a credited source to avoid any incorrect information. Fraud involvement in the process of data collection is an ethical challenge that will be avoided to make sure that the data collected is from a safe and secure source. In conclusion, cybercrime resolution research is of great importance to facilitate achievement of the recommendations for security challenges in the department of US government management of security problems.

Statement of problem

The US faces security challenges both within the country and outside the country. From within the country, a problem such as changing climate is a natural security issue because it poses a threat to the US infrastructure, agriculture, population, and economy. There is also a worsening cyber security front where individuals and criminal groups hack both private and public entities which result in loss of billions of dollars in damages. Persistent terrorist attacks from small groups that are done domestically also pose a security challenge. Most of these threats have been facing the US for years, and there is need to focus on them because they affect us daily.

Literature review

From the gathered information, it has been found out that the US government is using diverse ways to deal with the security challenges. On the issue of cyber-crimes, with the increase in the number of Americans becoming more reliant on modern technology, we also become susceptible to cyber-crimes which include social media fraud, security breaches, and spear phishing. The law enforcement performs an essential role in achieving the country’s cyber security objectives. It does this by investigating a wide range of cybercrimes from fraud and theft to child exploitation and apprehending and prosecuting those responsible. Network security experts and criminal investigators work to respond to and investigate cyber-crimes effectively. The Internet Crime Complaint Center which is a partnership between the FBI and the National White Collar Crime Center also provides a platform for people report online internet crime (Jacob, 2009).

The changing climate also poses a challenge to the US. Climate change multiplies threat making already existing threats worse. The threat of global warming for insecurity will manifest itself through food shortages in the country, water insecurity, rise in sea level and resource scarcity. Climate change also poses a creeping national security threat in that when neighboring countries face extreme global warming, it will result to refugees flow into the US, and this will cause conflict over food and water (Daniel, 2010). To manage this security challenge, the government designed a strategy around executive action and using powers granted by the Clean Air Act.

The former President Obama came up with the clean energy plan which would limit the carbon pollution from dirty power plants. The number one source for global warming in America is the country’s more than 500 power plants, and hence the clean energy plan will help to cut pollution by 30% by the end of the next decade. The government can also implement a greenhouse gas fee that puts a price on all climate change-causing emissions from all energy sources.

Terrorist threats and attacks from internal groups and external groups outside the country also pose a security challenge to the country. The ISIS group controls territories in Syria, Libya, and Iraq while Al Qaida occupies regions of Yemen. Other terrorist groups like Al-Shabab invade countries like Somalia. These groups pose a threat to the US security. The US state department alleges that governments of Syria, Sudan, and Iran do support international terrorism. These countries have been designated by the government as areas that people could not visit if the planned to participate in the US Visa Waiver program. President Trump also signed a controversial executive order that suspended entry to refugees to the country, barred Syrian refugees indefinitely (U.S. Department of Defense, 2010).

Other security challenges to the US include the nuclear weapon test planned by President Kim Jong Un of North Korea the new ICBM missile technology. The government responded to this by sending a fleet of navy seals to North Korea to warn the nation against testing any more weapons. (Daniel, 2010) There is an increase in the number of failed states and persistent civil wars that have caused refugee crises in the United States.

It has also created a haven for extremist groups who are hostile to the United States. The increase in refugees in the United States causes strain on resources which include food and water, and hence this makes the issue a security threat to the United States. To manage this problem, the United States government is trying to discuss a suitable deal with neighboring countries for their mutual benefit

According to the order, a waiver may be granted on a case-to-case basis by both the department of state and department of homeland security and may be awarded for those who are a religious minority in their country of nationality facing religious persecution if they don’t pose a security threat to the US. In my opinion, this order generalizes that everyone from those Islamic countries is a terrorist and it is quite unfair. It’s also quite unfortunate that the law also barred innocent Syrian refugees from the country because statistically, it’s only a few refugees who have malicious intentions towards the US and the majority are genuinely in need for asylum. President Trump is understandably focused on the threats from ISIS, but statistics show that since 2014, most people charged in the US with ISIS-related offenses have been US citizens. Moreover, a lot of ISIS fighters in Syria and Iraq seem to come from countries such as Tunisia, Russia, Turkey, China, Egypt and Saudi Arabia.

In the climate change issue about the Clean Power Plan, though it has significant benefits implementing it might not be successful for some reasons. One reason that stands out for me is stating plans. Under the model of cooperative federalism under the Clean Air Act, the federal government is responsible for setting targets, and the rules determine how to comply. The Clean Power Plan gives States more flexibility than usual setting statewide targets rather than individual power plants objectives and allowing States to determine the best way to allocate reductions.

Research methodology

The research methodology in collecting information will involve published articles related to security threats in the US, TV programs, interviews with the relevant authorities in the government who handle security threats in the country, interviews with individuals who have been affected by the security threats in the country, surveys. To get my information, I plan to visit the Homeland Security offices and conduct interviews with the employees and hopefully the administrator. I will also conduct surveys to see the progress that the government has made in dealing with security challenges internally and the external threats. I will also search through published articles in the newspapers and magazines and from libraries to look at the government’s progress. I will also search through academic journals and books as sources of information.

Results

The topic of discussion was on the security challenges in the US and the government’s management of these security problems. The research on this overall issue involved the collection of information which included visiting the Homeland Security office and having an interview with an employee about the daily operations of the department in handling security issues.

Conclusion and recommendations

During the Study, several challenges were encountered. The first challenge was in the choice of topic.it was at first quite difficult to find a subject which I can do justice to; an argument that would hold my interest from beginning to end. The topic of choice (security challenges and the government’s management of these issues) was a bit complex especially with the limited resources regarding information sources. In the data collection methods, I got to meet uncooperative interviewees, and I felt a lot of information was being withheld. Getting different institutions to participate in my study was also a bit challenging. Lastly, staying motivated till the end was challenging with all the obstacles in my research.

In conclusion, the security agenda in the US has evolved over time whereby the Bush administration placed terrorism as the number one priority on the security agenda. The security plan is not stagnant but rather changes over time. Obama administration de-scrutinized the war on terrorism and war on drugs. Each president that assumes office has a different vision and social construction of the world. Issues such as organized crime, drug trafficking, immigration, border security have also been addressed, and the president and government have managed to maintain security threats and protect the United States by coming up with effective strategies.

References

Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif:

Praeger.

Jacob, John, (2009). The Rise of Integrated Security Appliances. Channel Business.

Rattner, Daniel. (2010.)"Internal & External Threats." Security Management. Northeastern

University, Boston. 8 April.

Rattner, Daniel. "Loss Prevention & Risk Management Strategy." Security Management.

Northeastern University, Boston. 5 Mar. 2010

Schell, B. H., & Martin, C. (2004). Cybercrime: A reference handbook. Santa Barbara, Calif:

ABC-CLIO.

U.S. Department of Defense, (2010) Joint Chiefs of Staff, New Revised Edition, Joint Pub. 1-02,

Wall, D. (2007). Cybercrime: The transformation of crime in the information age. Cambridge:

Polity.