SlideShare a Scribd company logo
1 of 4
Reply to post 1 & 2 with 150 words each
Post 1
Of the six strategic challenges our country faces, the threat of
Transnational Criminal Organizations (TCOs) is at the forefront
of one of the greatest challenges we face as a nation. TCOs
facilitate the illegal production and trafficking of narcotics,
human trafficking and the sex trade. Mexican TCOs remain the
single greatest drug threat to the United States; with no other
criminal organizations postured to challenge them. Their
sophisticated infrastructure allows them to have all but total
control over the illegal trafficking of narcotics from farming,
processing, producing and exporting (dea.gov, 2017, p.iv). The
second and third order effects of the drug trade have a direct
impact our nation’s critical infrastructure and come from the
TCOs themselves who have, in the last decade, resorted to
extremely brutal violence, trafficking in persons, extortion,
kidnapping, oil theft, and utilizing profits from illegal activities
to finance corruption (DHS.gov, 2014, p.26).
At this point in our nation’s history, we are seeing the
consequences of the drug epidemic not being adequately
addressed. The 2017 National Drug Threat Assessment (NDTA)
has a trove of data reinforcing the notion that the U.S. is losing
the war on drugs. Law enforcement agencies across the U.S.
have seen an increase in incidents of violent crime, drug
availability and overdoses. Illicit narcotics such as cocaine,
methamphetamine and most recently, controlled prescription
drugs are surging in large portions of the country as thier
availability has increased (dea.gov, 2017, p.145).
The data supports the idea that this risk is not being adequately
addressed. Rather, the U.S. has transitioned from a mission of
stopping narcotics trafficking to one of mitigating trafficking
and the effects of narcotics on the population. The U.S. has
placed greater emphasis on rehabilitation and treatment
programs to be at the forefront of the domestic and international
effort to disrupt the impact of illicit drug abuse and
distribution. Strategy has been developed outlining specific
measures to reduce illicit drug use to include: early
intervention, breaking cycles of crime, incarceration, and drug
abuse, disrupting domestic drug trafficking and production and
strengthening international partnerships (Obamawhitehouse.gov,
2018, p.1). Additionally, the United States has made funds
available to the international community towards drug treatment
and recovery to improve health and welfare of individuals but
also curb the demand for narcotics.
Post 2
The specific challenge I reviewed for this week are the growing
cyber threats as it relates to the US and critical infrastructure.
Cyber threats or cyber warfare is a variety of techniques and
activities using information systems as a weapon to gain an
advantage by an adversary or opposing force (Chapple, 2015).
Cyber Warfare has quickly become the forefront of threats
facing the DoD, critical infrastructure, private sector, and
overall national security. Based off the Director of National
Intelligence strategy on cyber warfare, cyberattacks and
cyberespionage are the two specific activities which cyber
warfare either participates in or counters based off the mission
and/or requirements. Not only can cyber warfare shape and
prepare the battlefield for commanders, it can shape the overall
US strategy at both the defense and national-level. This
translates specifically to homeland security priorities regarding
critical infrastructure as the communications and information
technology sectors manage most aspects of cyber threats to US
critical infrastructure.
Critical infrastructure remains a high priority for our
adversaries to target from all aspects but specifically via cyber
methods. High-level critical infrastructure targets in the US
include power grids or financial targets as a steadfast priority
and target for bad cyber actors (Ranger, 2018). The
transportation sector being targeted for a cyber-attack would
cause a chain reaction that impacts the majority of critical
infrastructure and day-to-day activity in the US. Furthermore,
cyber-attacks occur on a daily basis targeting the DoD via
attempts to penetrate our government networks and illicitly
obtain sensitive and controlled information. These attacks can
be conducted via denial-of-service attacks, phishing attacks,
eavesdropping, SQL injection, viruses, ransomware and a
variety of other methods (Melnick, 2018). Future cyber warfare
includes cyber being used to target advanced communication
technology and equipment, encrypted communication, and
additional technology that enables specific technologies and
advances (Kim, et al, 2019). With this type of technology
impacting the strategic through tactical levels, it is only a
matter of time before the same applications are implemented to
target critical infrastructure in the US.
Unfortunately, I feel there has been minor progress made
against cyber threats targeting critical infrastructure and other
areas within the US. This is primarily due to the adversary
having more resources to dedicate against cyber activity along
with the bureaucratic US legal process preventing certain cyber
warfare to be conducted in a timely manner. Overall, the US
government is leaning in the right direction to prevent and
protect against the future of cyber threats facing the homeland.
Thank you for the time and have a good week.
Reply to post 1 & 2 with 150 words eachPost 1Of the six

More Related Content

Similar to Reply to post 1 & 2 with 150 words eachPost 1Of the six

Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
hartrobert670
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
SusanaFurman449
 
In the United States, a number of law enforcement agencies, includin.docx
In the United States, a number of law enforcement agencies, includin.docxIn the United States, a number of law enforcement agencies, includin.docx
In the United States, a number of law enforcement agencies, includin.docx
coubroughcosta
 
TestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docxTestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docx
mattinsonjanel
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
randyburney60861
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
astonrenna
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
briancrawford30935
 
Mapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docxMapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docx
gertrudebellgrove
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
amrit47
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Ben Griffith
 
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...
NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...
John Cederstrom
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 
How does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between CountriesHow does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between Countries
ijtsrd
 
William Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docxWilliam Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docx
ambersalomon88660
 

Similar to Reply to post 1 & 2 with 150 words eachPost 1Of the six (20)

Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
 
In the United States, a number of law enforcement agencies, includin.docx
In the United States, a number of law enforcement agencies, includin.docxIn the United States, a number of law enforcement agencies, includin.docx
In the United States, a number of law enforcement agencies, includin.docx
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
 
TestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docxTestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docx
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
Mapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docxMapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docx
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
Approach to preparing for a biological attack (2017)
Approach to preparing for a biological attack (2017)Approach to preparing for a biological attack (2017)
Approach to preparing for a biological attack (2017)
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...
NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...
 
Confrance presntstation
Confrance presntstationConfrance presntstation
Confrance presntstation
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
How does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between CountriesHow does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between Countries
 
Homeland Security Bill
Homeland Security BillHomeland Security Bill
Homeland Security Bill
 
William Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docxWilliam Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docx
 

More from felipaser7p

Discussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docxDiscussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docx
felipaser7p
 
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docxDiscussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
felipaser7p
 
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docxDiscussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
felipaser7p
 

More from felipaser7p (20)

Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docxDiscussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
 
Discussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docxDiscussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docx
 
Discussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docxDiscussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docx
 
Discussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docxDiscussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docx
 
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docxDiscussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
 
Discussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docxDiscussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docx
 
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docxDiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
 
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docxDiscussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
 
Discussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docxDiscussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docx
 
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docxDiscussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
 
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docxDiscussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
 
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docxDiscussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
 
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docxDiscussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
 
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docxDiscussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
 
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docxDiscussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
 
Discussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docxDiscussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docx
 
discussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docxdiscussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docx
 
Discussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docxDiscussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docx
 
Discussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docxDiscussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docx
 
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docxDiscussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Reply to post 1 & 2 with 150 words eachPost 1Of the six

  • 1. Reply to post 1 & 2 with 150 words each Post 1 Of the six strategic challenges our country faces, the threat of Transnational Criminal Organizations (TCOs) is at the forefront of one of the greatest challenges we face as a nation. TCOs facilitate the illegal production and trafficking of narcotics, human trafficking and the sex trade. Mexican TCOs remain the single greatest drug threat to the United States; with no other criminal organizations postured to challenge them. Their sophisticated infrastructure allows them to have all but total control over the illegal trafficking of narcotics from farming, processing, producing and exporting (dea.gov, 2017, p.iv). The second and third order effects of the drug trade have a direct impact our nation’s critical infrastructure and come from the TCOs themselves who have, in the last decade, resorted to extremely brutal violence, trafficking in persons, extortion, kidnapping, oil theft, and utilizing profits from illegal activities to finance corruption (DHS.gov, 2014, p.26). At this point in our nation’s history, we are seeing the consequences of the drug epidemic not being adequately addressed. The 2017 National Drug Threat Assessment (NDTA) has a trove of data reinforcing the notion that the U.S. is losing the war on drugs. Law enforcement agencies across the U.S. have seen an increase in incidents of violent crime, drug availability and overdoses. Illicit narcotics such as cocaine, methamphetamine and most recently, controlled prescription drugs are surging in large portions of the country as thier availability has increased (dea.gov, 2017, p.145). The data supports the idea that this risk is not being adequately
  • 2. addressed. Rather, the U.S. has transitioned from a mission of stopping narcotics trafficking to one of mitigating trafficking and the effects of narcotics on the population. The U.S. has placed greater emphasis on rehabilitation and treatment programs to be at the forefront of the domestic and international effort to disrupt the impact of illicit drug abuse and distribution. Strategy has been developed outlining specific measures to reduce illicit drug use to include: early intervention, breaking cycles of crime, incarceration, and drug abuse, disrupting domestic drug trafficking and production and strengthening international partnerships (Obamawhitehouse.gov, 2018, p.1). Additionally, the United States has made funds available to the international community towards drug treatment and recovery to improve health and welfare of individuals but also curb the demand for narcotics. Post 2 The specific challenge I reviewed for this week are the growing cyber threats as it relates to the US and critical infrastructure. Cyber threats or cyber warfare is a variety of techniques and activities using information systems as a weapon to gain an advantage by an adversary or opposing force (Chapple, 2015). Cyber Warfare has quickly become the forefront of threats facing the DoD, critical infrastructure, private sector, and overall national security. Based off the Director of National Intelligence strategy on cyber warfare, cyberattacks and cyberespionage are the two specific activities which cyber warfare either participates in or counters based off the mission and/or requirements. Not only can cyber warfare shape and prepare the battlefield for commanders, it can shape the overall US strategy at both the defense and national-level. This translates specifically to homeland security priorities regarding critical infrastructure as the communications and information technology sectors manage most aspects of cyber threats to US critical infrastructure.
  • 3. Critical infrastructure remains a high priority for our adversaries to target from all aspects but specifically via cyber methods. High-level critical infrastructure targets in the US include power grids or financial targets as a steadfast priority and target for bad cyber actors (Ranger, 2018). The transportation sector being targeted for a cyber-attack would cause a chain reaction that impacts the majority of critical infrastructure and day-to-day activity in the US. Furthermore, cyber-attacks occur on a daily basis targeting the DoD via attempts to penetrate our government networks and illicitly obtain sensitive and controlled information. These attacks can be conducted via denial-of-service attacks, phishing attacks, eavesdropping, SQL injection, viruses, ransomware and a variety of other methods (Melnick, 2018). Future cyber warfare includes cyber being used to target advanced communication technology and equipment, encrypted communication, and additional technology that enables specific technologies and advances (Kim, et al, 2019). With this type of technology impacting the strategic through tactical levels, it is only a matter of time before the same applications are implemented to target critical infrastructure in the US. Unfortunately, I feel there has been minor progress made against cyber threats targeting critical infrastructure and other areas within the US. This is primarily due to the adversary having more resources to dedicate against cyber activity along with the bureaucratic US legal process preventing certain cyber warfare to be conducted in a timely manner. Overall, the US government is leaning in the right direction to prevent and protect against the future of cyber threats facing the homeland. Thank you for the time and have a good week.