100% (1)
page:
5 pages/≈1375 words
Sources:
-1
Style:
APA
Subject:
Law
Type:
Speech Presentation
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.6
Topic:

Ransomware. Law Speech Presentation Assignment.

Speech Presentation Instructions:

Describe the responsibilities of the National Security Administration (NSA).

Identify the four critical needs at the state or local level of law enforcement in order to fight computer crime more effectively.

Explain how the U.S. Postal Service assists in the investigation and prosecution of cases involving child pornography

Discuss how and why the Department of Homeland Security (DHS) consolidated so many federal offices.

Use at least three quality references for this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Speech Presentation Sample Content Preview:

Ransomware
Your Name
Subject and Section
Professor’s Name
May 2, 2020
* The National Security Agency and its responsibilities
The National Security Agency generally deals with information and data. Data is monitored, collected, and ultimately processed to be used for intelligence and counter-intelligence, both domestic and outside the country. As part of counter-intelligence, NSA moves to protect the American interest through information and communication systems. It has the task to prevent outside intelligence to get a hold of classified information which is a matter of national security. NSA uses a variety of measures, and one of its primary disciplines, so to speak, is signal intelligence (SIGINT).
In John C. Sims’ (2006) article, What NSA is doing… And why it’s illegal, NSA’s primary job of intercepting information was given emphasis, albeit a problematic one. NSA (and other intelligence agencies for this matter) can indeed have the power to block electronic channels and data. However, being able to analyze and process these data and information is a different story. Due to the onslaught of information technology, a sudden surge in electronic transmission was to be expected. Theoretically, NSA (and other intelligence agencies) would not have a problem intercepting a large volume of information. However, this (sudden) large amount of information proved to be problematic as the resources (i.e., personnel and equipment) did not meet the demand or was lacking.
What NSA needed to do was to focus or set its sight and resources on what needs to be intercepted, processed, and stored (for future use). Deciding on this, through and through, for every interception (or daily), is a task formulated from having too much information to gather. By virtue of this:
“It can focus on particular modes or channels of communication, particular locations, particular phone numbers or email addresses, characteristics of the communication (e.g., length, language, use of encryption), and content, such as particular names, words, phone numbers, or combinations of these” (Sims, 2006).
About the quotation above, we can see how the aforementioned responsibility of providing needed help to the military and other intelligence agencies takes place. One way NSA was able to curb the problem of too much electronic communication and information to intercept was through based on the needs of the intelligence agencies and the military. However, we see some possible caveats here. Outside (“adversary”) intelligence can possibly determine which channels of electronic transmission are given emphasis or which channels are not. Because of this, as an example, there is the possibility of avoiding the possible avenues of interest, therefore, preventing interception of information, which can be detrimental to national security. Otherwise, it can also be advantageous for a group whose goal is to manipulate the information by transmitting false ones once, these channels of interest are known (Sims, 2006).
It is, therefore, an essential responsibility for the National Security Agency to be secretive, even from the target itself. NSA can act by keeping the priorities secret, work on them until a final report is done. Only then NSA can release a report to those who are concerned. In this sense, the collection, analysis, processing of information is an essential area in NSA (and other agencies, for that matter). The “official” title for this is the intelligence cycle. This cycle consists of complex processes starting with planning and determining the target, moving to the collection of intelligence. The collected intelligence then undergoes analysis until it reaches finality, to be given to the concerned bodies, then start at the planning stage again (Sims, 2006).
* State Laws’ needs in combating electronic crimes
The pervasiveness of Information Technology is no secret. Almost our daily activities rely on technology, which includes accessing the information area. However, this came with a price; it became a venue for some people whose acts are tantamount to being criminals. To curb this problem, laws were needed to be implemented. A good law is one that is grounded. Hence, possible studies existed to determine ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!