HOMELAND SECURITY Team #2. PRE 1973 Near non-existent security 1)NO ID required 2)Electronic Magnetometer Scan 3)Positive Scan = Search 8.

Slides:



Advertisements
Similar presentations
Stop. Think. Connect. National Cybersecurity Awareness Campaign October 2010.
Advertisements

The Secret of Grey Unveiled Grey Literature and the Freedom of Information Cees de Blaaij Library of Zeeland, Ac.Dep. Grey Literature Conference, Dec 14.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
National Security Changes. Dealing with 911 By: Brandon Eanes.
COMP 2903 A21 – The Evolution of Cyber Warfare Danny Silver JSOCS, Acadia University.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Some Policy Issues on the Internet An Incomplete Collection of Issues that Policy Makers, Interest Groups, and Activists Care About and that Might Lend.
PPA 503 – The Public Policy Making Process Lecture 7b – Policy Legitimation and Homeland Security.
Work Place Violence Guidelines for dealing with violent behavior involving employees and their work environment.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
BY: Noah E, Alexander G, Kirubell A, And Blake R.
CUSTOMER RELATIONS IN THE TRAVEL INDUSTRY 6.06 Recognize the importance of safety and security in the travel industry.
Contemporary Security Management Chapter 24 Critical Infrastructures and Key Resources CJFS 4848 Chapter 24 - Critical Infrastructures and Key Resources.
CITIZEN CORPS & CERT ORGANIZATIONS. What is Citizen Corps? Following the tragic events that occurred on September 11, 2001, state and local government.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
CJ 290 Terrorism Today UNIT 8 Homeland Security Instructor: Brigadier General Nick Halley (U.S. Army, Retired) Mike Ruth Special Guest Instructor.
George W. Bush -43 rd President of the United States. -Elected
LOGO AVIATION ADMINISTRATION Transportation Security Administration Chapter 2 part 2 19/8/2013.
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Lecture 11: Law and Ethics
Changes Provoked by the 9/11 Attack  Various changes in the U.S. legislation  Exceptional number of adopted policies  Change of Americans’ perceptions.
Jeopardy: Digital Citizenship Please use presentation mode!
Volunteerism in Public Safety Organizations Bob Jacobson New Brighton Department of Public Safety October 8, 2015.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Engaging Key Communities. Protecting Civil Rights U.S. Department of Justice Civil Rights Division Initiative to Combat Post-9/11 Discriminatory Backlash.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
HOW 9/11 CHANGED THE LAW MR. BOOK – 9/14/2015. HOW 9/11 CHANGED AMERICA AND OUR LAWS FOURTEEN YEARS AGO THE UNITED STATES WASN’T OFFICIALLY ENGAGED.
Are We Safer? PBS Frontline Video.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
NET2002 PSA Key Information Policy Issues in the Post-9/11 Environment Prue Adler, ARL.
1998: The House of Representatives votes to impeach President Clinton.
TEFMA 2008 Sudhish Nayyar. AGENDA CRISIS –What is the worst thing that could happen? –Where? –When? Steps in effective Crisis Management Aon’s capabilities.
Debate: How should we deal with global terrorism? Lesson 27.
THE PRESIDENTIAL CABINET THEN AND NOW. INSTRUCTIONS On the following slides, do the following: 1) Write a very brief definition describing the job of.
Tuesday, November 17, 2015 Objective: Students will be able to analyze and evaluate national security policies of the United States. Short video over.
ABUSE OF POWER BY OUR GOVERNMENT By Vinay Mathur.
Create a recent post on your page Facebook Profile Picture Cover Photo NAME About Lived in Educational background Married to Status Photo Place Life Event.
IS3220 Information Technology Infrastructure Security
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
STUDENT RIGHTS MINI-WRITE On a half sheet of paper write at least two paragraphs on the following questions: What rights do you have when you come to school?
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
6 Kiss privacy goodbye What is privacy? They know where we are
Bellwork Think about this…. Historical Event
Legislative Powers!.
Cybersecurity in the United States
Legal Implications.
U. S. Department of Homeland Security. Office for Civil Rights
AJS 552 Innovative Education-- snaptutorial.com
Building a Security Operations Center
Presidential Approaches to Cybersecurity
Computers and Homeland Security
Foundations of Homeland Security & Emergency Management Law & Policy Post NPHS 1510.
New Media: Issues and Ethics Mapping Human Genome
Bush to Obama.
APK Bellwork Think* Pair* Share
Presentation transcript:

HOMELAND SECURITY Team #2

PRE 1973 Near non-existent security 1)NO ID required 2)Electronic Magnetometer Scan 3)Positive Scan = Search 8.

Universal Passenger Screenings 1)Arrive < 30 min. prior 2)X-ray / Metal Detector PRE- 9/11

The PATRIOT Act [10/26/2001]George W. Bush signed into law. [05/26/2011]Barack Obama signs PATRIOT Extension Act. [06/01/2015]Parts of PATRIOT Act expire. [06/02/2015]USA Freedom Act restores expired parts. POST 9/

PATRIOT Act Key Points Civil Liberties/Common Defense Privacy Safeguards Constitutional Government Role POST 9/

Problems/Solutions of the PATRIOT Act Problems Secret Investigations Accountability Information Access POST 9/11 Solutions Public Reporting Checks and Balances Restrictive Access 11.

CURRENT EVENTS Social Media National Government International Security

SOCIAL MEDIA President Obama 2009 Cyberspace Policy Review Stop.Think.Connect Facebook is not your diary Check Privacy Settings Geo-tagging CURRENT EVENTS 1.

NATIONAL GOVERNMENT Critical Infrastructures are increasingly virtual 600,000 incidents in 2014 OPM Data Breach April & June 2015 Distributed Denial of Service (DDoS) attacks Block access to websites CURRENT EVENTS

INTERNATIONAL SECURITY Transportation Security Administration (TSA) Body Scanners Human Trafficking Blue Campaign CURRENT EVENTS

FUTURE Government Sponsored Attacks Growing mass surveillance Privacy as a selling point Communities fighting back

WORKS CITED [1] 1.Stop.Think.Connect 2.Office of Personnel Management 3.Digital Attack Map 4.TSA Body Scanners 5.Blue Campaign 6.Future of Government Surveillance 7.Library Tor Relay 8.Off With Your Shoes: A Brief History of Airport Security

WORKS CITED [2] 9. The PATRIOT Act The PATRIOT Act and the Constitution What’s wrong with the PATRIOT Act