SlideShare a Scribd company logo
Reply to post 1 & 2 with 150 words each
Post 1
Of the six strategic challenges our country faces, the threat of
Transnational Criminal Organizations (TCOs) is at the forefront
of one of the greatest challenges we face as a nation. TCOs
facilitate the illegal production and trafficking of narcotics,
human trafficking and the sex trade. Mexican TCOs remain the
single greatest drug threat to the United States; with no other
criminal organizations postured to challenge them. Their
sophisticated infrastructure allows them to have all but total
control over the illegal trafficking of narcotics from farming,
processing, producing and exporting (dea.gov, 2017, p.iv). The
second and third order effects of the drug trade have a direct
impact our nation’s critical infrastructure and come from the
TCOs themselves who have, in the last decade, resorted to
extremely brutal violence, trafficking in persons, extortion,
kidnapping, oil theft, and utilizing profits from illegal activities
to finance corruption (DHS.gov, 2014, p.26).
At this point in our nation’s history, we are seeing the
consequences of the drug epidemic not being adequately
addressed. The 2017 National Drug Threat Assessment (NDTA)
has a trove of data reinforcing the notion that the U.S. is losing
the war on drugs. Law enforcement agencies across the U.S.
have seen an increase in incidents of violent crime, drug
availability and overdoses. Illicit narcotics such as cocaine,
methamphetamine and most recently, controlled prescription
drugs are surging in large portions of the country as thier
availability has increased (dea.gov, 2017, p.145).
The data supports the idea that this risk is not being adequately
addressed. Rather, the U.S. has transitioned from a mission of
stopping narcotics trafficking to one of mitigating trafficking
and the effects of narcotics on the population. The U.S. has
placed greater emphasis on rehabilitation and treatment
programs to be at the forefront of the domestic and international
effort to disrupt the impact of illicit drug abuse and
distribution. Strategy has been developed outlining specific
measures to reduce illicit drug use to include: early
intervention, breaking cycles of crime, incarceration, and drug
abuse, disrupting domestic drug trafficking and production and
strengthening international partnerships (Obamawhitehouse.gov,
2018, p.1). Additionally, the United States has made funds
available to the international community towards drug treatment
and recovery to improve health and welfare of individuals but
also curb the demand for narcotics.
Post 2
The specific challenge I reviewed for this week are the growing
cyber threats as it relates to the US and critical infrastructure.
Cyber threats or cyber warfare is a variety of techniques and
activities using information systems as a weapon to gain an
advantage by an adversary or opposing force (Chapple, 2015).
Cyber Warfare has quickly become the forefront of threats
facing the DoD, critical infrastructure, private sector, and
overall national security. Based off the Director of National
Intelligence strategy on cyber warfare, cyberattacks and
cyberespionage are the two specific activities which cyber
warfare either participates in or counters based off the mission
and/or requirements. Not only can cyber warfare shape and
prepare the battlefield for commanders, it can shape the overall
US strategy at both the defense and national-level. This
translates specifically to homeland security priorities regarding
critical infrastructure as the communications and information
technology sectors manage most aspects of cyber threats to US
critical infrastructure.
Critical infrastructure remains a high priority for our
adversaries to target from all aspects but specifically via cyber
methods. High-level critical infrastructure targets in the US
include power grids or financial targets as a steadfast priority
and target for bad cyber actors (Ranger, 2018). The
transportation sector being targeted for a cyber-attack would
cause a chain reaction that impacts the majority of critical
infrastructure and day-to-day activity in the US. Furthermore,
cyber-attacks occur on a daily basis targeting the DoD via
attempts to penetrate our government networks and illicitly
obtain sensitive and controlled information. These attacks can
be conducted via denial-of-service attacks, phishing attacks,
eavesdropping, SQL injection, viruses, ransomware and a
variety of other methods (Melnick, 2018). Future cyber warfare
includes cyber being used to target advanced communication
technology and equipment, encrypted communication, and
additional technology that enables specific technologies and
advances (Kim, et al, 2019). With this type of technology
impacting the strategic through tactical levels, it is only a
matter of time before the same applications are implemented to
target critical infrastructure in the US.
Unfortunately, I feel there has been minor progress made
against cyber threats targeting critical infrastructure and other
areas within the US. This is primarily due to the adversary
having more resources to dedicate against cyber activity along
with the bureaucratic US legal process preventing certain cyber
warfare to be conducted in a timely manner. Overall, the US
government is leaning in the right direction to prevent and
protect against the future of cyber threats facing the homeland.
Thank you for the time and have a good week.
Reply to post 1 & 2 with 150 words eachPost 1Of the six

More Related Content

Similar to Reply to post 1 & 2 with 150 words eachPost 1Of the six

Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
hartrobert670
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
SusanaFurman449
 
In the United States, a number of law enforcement agencies, includin.docx
In the United States, a number of law enforcement agencies, includin.docxIn the United States, a number of law enforcement agencies, includin.docx
In the United States, a number of law enforcement agencies, includin.docx
coubroughcosta
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
adnis1
 
TestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docxTestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docx
mattinsonjanel
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
randyburney60861
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
astonrenna
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
briancrawford30935
 
Mapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docxMapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docx
gertrudebellgrove
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
Julie Davis
 
Approach to preparing for a biological attack (2017)
Approach to preparing for a biological attack (2017)Approach to preparing for a biological attack (2017)
Approach to preparing for a biological attack (2017)
Arete-Zoe, LLC
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
amrit47
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
ijcisjournal
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Ben Griffith
 
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...
NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...
John Cederstrom
 
Confrance presntstation
Confrance presntstationConfrance presntstation
Confrance presntstation
Technical Advisor at Iraqi Government
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 
How does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between CountriesHow does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between Countries
ijtsrd
 
Homeland Security Bill
Homeland Security BillHomeland Security Bill
Homeland Security Bill
Lissette Hartman
 
William Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docxWilliam Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docx
ambersalomon88660
 

Similar to Reply to post 1 & 2 with 150 words eachPost 1Of the six (20)

Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
 
In the United States, a number of law enforcement agencies, includin.docx
In the United States, a number of law enforcement agencies, includin.docxIn the United States, a number of law enforcement agencies, includin.docx
In the United States, a number of law enforcement agencies, includin.docx
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
 
TestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docxTestimonyBefore the Subcommittee on National Security,Ve.docx
TestimonyBefore the Subcommittee on National Security,Ve.docx
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
Mapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docxMapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docx
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
Approach to preparing for a biological attack (2017)
Approach to preparing for a biological attack (2017)Approach to preparing for a biological attack (2017)
Approach to preparing for a biological attack (2017)
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...
NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...NSWBCN Strategy  All Hazards Interagency Challenges  P5 IP   HLS650 VC 1501B ...
NSWBCN Strategy All Hazards Interagency Challenges P5 IP HLS650 VC 1501B ...
 
Confrance presntstation
Confrance presntstationConfrance presntstation
Confrance presntstation
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
How does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between CountriesHow does Terrorism Effect on Business and Relation Between Countries
How does Terrorism Effect on Business and Relation Between Countries
 
Homeland Security Bill
Homeland Security BillHomeland Security Bill
Homeland Security Bill
 
William Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docxWilliam Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docx
 

More from felipaser7p

Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docxDiscussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
felipaser7p
 
Discussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docxDiscussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docx
felipaser7p
 
Discussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docxDiscussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docx
felipaser7p
 
Discussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docxDiscussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docx
felipaser7p
 
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docxDiscussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
felipaser7p
 
Discussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docxDiscussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docx
felipaser7p
 
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docxDiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
felipaser7p
 
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docxDiscussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
felipaser7p
 
Discussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docxDiscussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docx
felipaser7p
 
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docxDiscussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
felipaser7p
 
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docxDiscussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
felipaser7p
 
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docxDiscussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
felipaser7p
 
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docxDiscussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
felipaser7p
 
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docxDiscussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
felipaser7p
 
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docxDiscussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
felipaser7p
 
Discussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docxDiscussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docx
felipaser7p
 
discussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docxdiscussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docx
felipaser7p
 
Discussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docxDiscussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docx
felipaser7p
 
Discussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docxDiscussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docx
felipaser7p
 
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docxDiscussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
felipaser7p
 

More from felipaser7p (20)

Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docxDiscussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
Discussion topic 2Cyber AttacksDefine the term hacking.How migh.docx
 
Discussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docxDiscussion topicFor this weeks discussion, review the normal prof.docx
Discussion topicFor this weeks discussion, review the normal prof.docx
 
Discussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docxDiscussion-Based AssessmentOnce you have completed all of the le.docx
Discussion-Based AssessmentOnce you have completed all of the le.docx
 
Discussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docxDiscussion  Answer the following discussion questions  with below.docx
Discussion  Answer the following discussion questions  with below.docx
 
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docxDiscussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
Discussion topic 1 Computer Crime Versus Computer FraudYour frien.docx
 
Discussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docxDiscussion TopicExplain how you would integrate the current extern.docx
Discussion TopicExplain how you would integrate the current extern.docx
 
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docxDiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
DiscussionDiscussion topic #1 Popular culture (music, books, visu.docx
 
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docxDiscussion topic Complex FraudsAuditors often fail to detect fina.docx
Discussion topic Complex FraudsAuditors often fail to detect fina.docx
 
Discussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docxDiscussion Topic The Importance of Strategic ControlsRetail com.docx
Discussion Topic The Importance of Strategic ControlsRetail com.docx
 
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docxDiscussion Topic Porter’s Five Force AnalysisChoose an industry.docx
Discussion Topic Porter’s Five Force AnalysisChoose an industry.docx
 
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docxDiscussion Topic 1 – Ethical CommunicationCommunication that is et.docx
Discussion Topic 1 – Ethical CommunicationCommunication that is et.docx
 
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docxDiscussion Thread 2—Integration of TechnologyTechnology has chan.docx
Discussion Thread 2—Integration of TechnologyTechnology has chan.docx
 
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docxDiscussion Statistical Hypothesis Testing and ErrorProvide .docx
Discussion Statistical Hypothesis Testing and ErrorProvide .docx
 
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docxDiscussion Questions for Theories of Personality.Discussion 1 – Di.docx
Discussion Questions for Theories of Personality.Discussion 1 – Di.docx
 
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docxDiscussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
Discussion Question w5 Short 150 wordsAcknowledging BiasIn a.docx
 
Discussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docxDiscussion Question Short 150 wordsFinding Terrorists within th.docx
Discussion Question Short 150 wordsFinding Terrorists within th.docx
 
discussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docxdiscussion questions 70 words min on the three question below no pla.docx
discussion questions 70 words min on the three question below no pla.docx
 
Discussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docxDiscussion Question 5ObjectiveCharacterize the Moon..docx
Discussion Question 5ObjectiveCharacterize the Moon..docx
 
Discussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docxDiscussion Question 1Engaging in a political process enabl.docx
Discussion Question 1Engaging in a political process enabl.docx
 
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docxDiscussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
Discussion Question Civil Versus Criminal CourtsDiscuss the diffe.docx
 

Recently uploaded

PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 

Recently uploaded (20)

PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 

Reply to post 1 & 2 with 150 words eachPost 1Of the six

  • 1. Reply to post 1 & 2 with 150 words each Post 1 Of the six strategic challenges our country faces, the threat of Transnational Criminal Organizations (TCOs) is at the forefront of one of the greatest challenges we face as a nation. TCOs facilitate the illegal production and trafficking of narcotics, human trafficking and the sex trade. Mexican TCOs remain the single greatest drug threat to the United States; with no other criminal organizations postured to challenge them. Their sophisticated infrastructure allows them to have all but total control over the illegal trafficking of narcotics from farming, processing, producing and exporting (dea.gov, 2017, p.iv). The second and third order effects of the drug trade have a direct impact our nation’s critical infrastructure and come from the TCOs themselves who have, in the last decade, resorted to extremely brutal violence, trafficking in persons, extortion, kidnapping, oil theft, and utilizing profits from illegal activities to finance corruption (DHS.gov, 2014, p.26). At this point in our nation’s history, we are seeing the consequences of the drug epidemic not being adequately addressed. The 2017 National Drug Threat Assessment (NDTA) has a trove of data reinforcing the notion that the U.S. is losing the war on drugs. Law enforcement agencies across the U.S. have seen an increase in incidents of violent crime, drug availability and overdoses. Illicit narcotics such as cocaine, methamphetamine and most recently, controlled prescription drugs are surging in large portions of the country as thier availability has increased (dea.gov, 2017, p.145). The data supports the idea that this risk is not being adequately
  • 2. addressed. Rather, the U.S. has transitioned from a mission of stopping narcotics trafficking to one of mitigating trafficking and the effects of narcotics on the population. The U.S. has placed greater emphasis on rehabilitation and treatment programs to be at the forefront of the domestic and international effort to disrupt the impact of illicit drug abuse and distribution. Strategy has been developed outlining specific measures to reduce illicit drug use to include: early intervention, breaking cycles of crime, incarceration, and drug abuse, disrupting domestic drug trafficking and production and strengthening international partnerships (Obamawhitehouse.gov, 2018, p.1). Additionally, the United States has made funds available to the international community towards drug treatment and recovery to improve health and welfare of individuals but also curb the demand for narcotics. Post 2 The specific challenge I reviewed for this week are the growing cyber threats as it relates to the US and critical infrastructure. Cyber threats or cyber warfare is a variety of techniques and activities using information systems as a weapon to gain an advantage by an adversary or opposing force (Chapple, 2015). Cyber Warfare has quickly become the forefront of threats facing the DoD, critical infrastructure, private sector, and overall national security. Based off the Director of National Intelligence strategy on cyber warfare, cyberattacks and cyberespionage are the two specific activities which cyber warfare either participates in or counters based off the mission and/or requirements. Not only can cyber warfare shape and prepare the battlefield for commanders, it can shape the overall US strategy at both the defense and national-level. This translates specifically to homeland security priorities regarding critical infrastructure as the communications and information technology sectors manage most aspects of cyber threats to US critical infrastructure.
  • 3. Critical infrastructure remains a high priority for our adversaries to target from all aspects but specifically via cyber methods. High-level critical infrastructure targets in the US include power grids or financial targets as a steadfast priority and target for bad cyber actors (Ranger, 2018). The transportation sector being targeted for a cyber-attack would cause a chain reaction that impacts the majority of critical infrastructure and day-to-day activity in the US. Furthermore, cyber-attacks occur on a daily basis targeting the DoD via attempts to penetrate our government networks and illicitly obtain sensitive and controlled information. These attacks can be conducted via denial-of-service attacks, phishing attacks, eavesdropping, SQL injection, viruses, ransomware and a variety of other methods (Melnick, 2018). Future cyber warfare includes cyber being used to target advanced communication technology and equipment, encrypted communication, and additional technology that enables specific technologies and advances (Kim, et al, 2019). With this type of technology impacting the strategic through tactical levels, it is only a matter of time before the same applications are implemented to target critical infrastructure in the US. Unfortunately, I feel there has been minor progress made against cyber threats targeting critical infrastructure and other areas within the US. This is primarily due to the adversary having more resources to dedicate against cyber activity along with the bureaucratic US legal process preventing certain cyber warfare to be conducted in a timely manner. Overall, the US government is leaning in the right direction to prevent and protect against the future of cyber threats facing the homeland. Thank you for the time and have a good week.