Abstract
Issues resulting from the Convergence of order and cybersecurity threats have been reported in many incidences on several occasions as foreign actors and criminals tend to incorporate technology whereby they use cyber techniques and utilize computers for the essence of circumventing your physical borders for the United States of America. Currently, the US border protection unit, i.e. the homeland security requires a physical nexus while dealing with Cyber-crimes that are committed in the traditional models of the country. The paper examines the juncture existing between the conventional borders of the state and cybersecurity. It also entails the property policies which will be applied for the essence of evolving the concept of border security in the cyber domain (Bishop, 2016). In the defining and enforcers of the national cyber border according to the National cyber-crime program management for the United States Customs services, the benefits and power backs of this adaptive methodology which is incorporated alongside cyber issues have to be addressed with new legislation. This will enable United States of America to protect its citizen and protect itself from any further prospective cyber-attacks especially from terrorists and criminals in the country and across the country’s borders (Devlin & Chiu, 2017). With this trend, they never reflect on some of the privacy issues that tend to emerge from the Cyber border ideology. Using the same adaptive methodology of current projections future outcomes of privacy. Clear and vivid expectations and illustrations for the desire and legal authority in the definition of a national cyber border is represented. This juncture of cyber-adoptive program outline privacy issues with emerging from the Cyber border perspective through the current projections and expectations of privacy issues associated with cyber threats and border security. The essence of the paper is to develop a clear discussion which will lead into and an academic laboratory research on the Convergence of cyber and border security concerns which depend on each other and are highlighted in the Homeland and National Security of the United States of America.
Introduction
Increased incidences of a terrorist attack due to instances of cybercrime has resulted in emerging issues of border security in the country. The design of crimes committed across borders varies from incidences where terrorists tend to launch an attack due to low-degree crimes such as contaminating agricultural products that will lead to a weakened nation (Trump, 2017). The United States of America government has always been vital in ensuring that it develops compelling movements in providing that the border security issues are well-maintained and enforces the agents of traditional border security and the patrol agents who are the derivatives that are incorporated by the government for the essence of controlling anybody or commodities entering and leaving the country.
These regulations set by the government at the boundaries of the United States of America have the essence of identifying and moderating anybody or object that crosses the border. The emergence of cyber issues, however, has implicated the border security landscape for a long time now.The reason behind this discussion is to outline the concept which tends to bring our identification of the homeland security research in border and cyber issues (Robinson, Jones & Janicke, 2015). This further concentrates on the definition of legal enforcement of the National cyber border through the adaptation and interpretation of previous and current United States border enforcement authorities.
The United States of America border search authority is responsible for searching individuals to determine the type of merchandise present. The survey methods used will enhance the quality of border security for circumventing traditional border security measures in order to facilitate crimes to a particular degree whereby the circumventing of the outcomes can only be done through large-scale military actions (White, 2016). Criminals and other people will in motives tend to take advantage of the traits of cyber issues for the essence of harming the nation and its occupants. The submitted information on National infrastructure that entails illegal occurrence of sensitive information regarding the government and its importation of harmful materials and theft entail some of the threats that required to the compromise of traditional border security state for penetration. These criminal activities are even met easily through the use of internet and cyber methods. Nowadays, cyber methods have collaborated with traditional border security threats and tend to complement each other with the essence of providing new potentials of nation humming and threats. Methods applied have made the traditional border security to appear as useless since the Cyber techniques tends to circumvent the physical border security regulations laid out by the United States of America in controlling its borders (Cook, 2018).
The government does not only concentrate on preventing the entry of cyber threats but focuses on examining the facts and the response role of threats after it happens. The nation’s cyber program defense is majorly left to private institutions who have to protect their own cyber codes. Thus, in regard to border security views, it is unacceptable owing to the fact that the dependency concerns arising from the individual network become compromised. This results into a supplementary attack vector being located in the borders of United States of America while the actual device being controlled in a remote locality.
This, therefore, makes every individual in the United States to be responsible for the physical border security and the entire national security across the borders. However, cross-border issues can be solved by developing the concept of the Cyber border whereby once it is defined, the government can incorporate traditional measures and authorities to safeguarding the nation from the threats recognized and expected cyber issues.
The United States of America borders also relates to the ideology that Cyberspace has no borders in the United States. This, however, is not true as the Cyberspace has data transmission lines and in which the data arrives concurrently from any other foreign destinations. This concept that has to be examined father the ideology of borders in Cyberspace leads to computer network such as border routers which are used to illustrate the boundaries of borders existing between various networks (Flynn, 2018)
Several existing legal judgments concerning the Cyberspace are focused on the interpretation of current new guides to the typical situations that do not pertain to Cyber issues. In many instances, the United States border methodology has been influential in locating a useful application of the current laws while in other applications, it proves to be difficult as there are duties the regulation of Cyberspace and internet radical improvements from broad perspectives align with law more specifically that are distinct in United States of America. These measures enacted to illustrate cyber border father have to be presented in a manner that allow adjustments to the current laws governing cyber border issues (Coats, 2017).
The simplest way of defining the country’s border is by incorporating their land border ideology. Data transmission cables from a juncture with the physical national borders will differentiate the connectivity of the borders effectively. This entails the fixed point where data arrives for any action through computer service, public computers or routers connected to the network. Then, there is this website which demonstrates the concept in a clear way as it is applied to the Cyber border. This site clearly defines the World Wide Web that entails the sale of illegal commodities across the borders of United States of America. These commodities in question tend to be illegal products at the border especially counterfeit commodities and child pornography. In this instance, the website is usually maintained in United States service but substantially regulated and monitored by criminals located in foreign places.
Key border protection element is the border search authority which is managed by customs officers and other relevant officials. This authority has been in existence since the nation was founded and tends to obtain its legitimate powers from the Congress (Finklea & Theohary, 2015). On the basis of the Congress wider objectivity to control foreign trade and implement immigration measures, the border search authority developed an exemption to the fourth amendment that will likely result into search requirements. The border search authority is tasked with the role of the search individuals conducting conveyancers in the Borders and also any form of merchandise.
The difference between traditional and the border search authority is that traditional border searches only concentrate on the inspection of people and conducting conveyances while the Cyber border search authority concentrate on digital searches on merchandise being exported and imported. The fundamental role of customs border search is to ensure that individuals luggage’s and merchandise undergo appropriate searches to control whatever is entering or leaving the country thus ensuring that they comply with the United States law. In case there should be further debates to whether the data processed over the internet is making copyright owners and software investors who deliver the data to various customers on a daily basis through the internet that they purportedly imported or exported through the internet operate while contradicting the law requirement (Baggett & Simpkins, 2018).
The Cyber environment will not be satisfied over the accordance of security and protection due to the expected outcomes in the traditional physical border security. Hence, the issues and entailing cyber border have to be reflected in a critical manner than the traditional border conditions.
Conclusion
The significance of ensuring that the United States of America is safeguarded from cyber threats is effective toward the national and homeland security. The rationale behind this is due to the extent of the existing and expected cyber threats being equal and may even go beyond traditional threats. Terrorists and criminals will always have the motive of exploiting cyber techniques for their benefits that thus rendering the traditional crime prevention programs being useless. Hence, the practice of ensuring security and mitigating for security at the border is always a priority in safeguarding the citizens of the United States and the country itself. The adaptation and implementation of the current definition and illustration of border security toward national cyber border issues will aid this pathway concerning foreign threats into the United States of America.
References
Baggett, R. K., & Simpkins, B. K. (2018). Homeland security and critical infrastructure protection. ABC-CLIO.
Bishop, J. (2016). International security: Cybersecurity. Australian Year Book of International Law, 34, 377.
Coats, D. R. (2017). Worldwide Threat Assessment.
Cook, C. (2018). Cross-Border Data Access and Active Cyber Defense: Assessing Legislative Options for a New International Cybersecurity Rulebook. Stan. L. & Pol’y Rev., 29, 205.
Devlin, T. A., & Chiu, S. (2017). Six cyber issues for the Trump administration. Risk Management, 64(2), 4.
Finklea, K. M., & Theohary, C. A. (2015, January). Cybercrime: conceptual issues for Congress and US law enforcement. Congressional Research Service, Library of Congress.
Flynn, M. J. (2018). CYBER REBELLIONS: THE ONLINE STRUGGLE FOR OPENNESS. Journal of International Affairs, 71(1.5), 107-114.
Robinson, M., Jones, K., & Janicke, H. (2015). Cyberwarfare: Issues and challenges. Computers & security, 49, 70-94.
Trump, D. J. (2017). National security strategy of the United States of America. Executive Office of The President Washington DC Washington United States.
White, J. (2016). Cyber Threats and Cyber Security: National Security Issues, Policy and Strategies. Global Security Studies, 7(4).