cyber security body of knowledge and wireless communication
cyber security body of knowledge and wireless communication
ISSN-2347-4890
Volume 9 Issue 3 March 2021
1. INTRODUCTION
According to research, Internet-based sharing of computational facilities and data resources has created
opportunities for collaborative virtual working environments, and virtual control of sensing and control systems
of monitoring, operation, prediction, and control within the country’s Crime Investigation (CI) sector networks.
Unfortunately, these initiatives and systems created to facilitate and speed up communications, work, and
collaboration between nations and continents are largely insecure and susceptible to terrorist attacks. These
systems have been called ―the new and emerging threats and vulnerabilities‖ [1] with the potential for mass and
widespread destruction and disruption of communications.
Consequently, the National Cyberspace Security Response (NCSSR) was created to provide the
national framework for ensuring information security and protecting cyberspace. Specifically, this agency had
three strategic objectives:
(i) Prevent cyber-attacks against America’s critical infrastructures
(ii) Reduce national vulnerability to cyber-attacks
(iii) Minimize damage and recovery time for cyber-attacks that do occur.
The agency came up with a series of measures to reduce the threat and vulnerability programs, to
institute national cyberspace security awareness and training, and to go global by creating the International
Cyberspace Security Cooperation [1]. The creation of the National Cyber Security Division within the Office of
Cyber Security and Communication reflected the importance of the need to keep this domain intact and safe
from terrorism. The agency was created to build and maintain an effective national cyberspace response system
and to implement a cyber-risk management program for the protection of critical infrastructure. A terrorist
attack on any of our communication systems can infect and destroy the workings of most of our computer chips
in communication, flights, electricity, and every other element of our daily life that depends on computer
systems. So far, we have had threats and limited attacks that have been dealt with quickly and swiftly through
Odey John Adinya; Ele, B. I.;Obono,I. O., Volume 9 Issue 3, pp 53-65, March 2021
iJournals: International Journal of Software & Hardware Research in Engineering (IJSHRE)
ISSN-2347-4890
Volume 9 Issue 3 March 2021
computer viruses and infiltrations. But al Qaeda has continued to use tools like the World Wide Web, mobile
telephones, satellite telecommunications, electronic banking, and jetliners to coordinate its actions, to enable
movement through state borders without detection, and to disseminate its ideology‖ [2]. And al-Qaeda and the
ISIS have engaged in transnational terrorism which is ―borderless, present everywhere at once‖[3].
The paucity of communication network called on the US to consider this cyberwar an international
affair, one to be fought by all nations where cyber activities take place. Indeed, the 9/11 Commission found out
that about two dozen terrorist groups including al-Qaeda have attempted to acquire or develop chemical,
biological, radiological, and nuclear weapons to attack the USA and its allies. So the recommendation of the
Commission to the House was for the United States to work with the international community to prevent the
proliferation of such weapons or materials that are necessary for the development of these weapons. As a result,
the House enacted acts to prevent terrorist travel, terrorist access to critical infrastructures and key assets, and to
prevent the financial strength and flexibility of terrorist organizations. These measures led to the creation of the
National Strategy to Secure Cyberspace with the view of engaging in the following six initiatives to strengthen
U.S. national security and international cooperation:
(i) Strengthen cyber-related counterintelligence efforts
(ii) Improve capabilities for attack attribution and response
(iii) Improve coordination of responding to cyber-attacks within the US. national security and
community
(iv) Work with industry and through international organizations to facilitate dialogue and partnerships
among international public and private sectors focused on protecting information infrastructures
and promoting a global ―culture of security‖
(v) Foster the establishment of national and international watch-and-warning networks to detect and
prevent cyber-attacks as they emerge
(vi) Encourage other nations to accede to the Council of Europe Convention on Cyber Crime or to
ensure that their laws and procedures are at least as comprehensive
[1] and [4].
So this system which was initiated to facilitate communication, safety, and the global attack on
terrorism can equally be used by the terrorist against the Free states and nations. The above agenda and
objectives set a scenario for collaborative endeavors on the part of all global parties or would-be participants in
cybersecurity. Any attempts therefore to expand cyber networking or nuclear plants must take into consideration
the enormous cost both in human, material, financial aspects that go, not only into creating the network but
safeguarding it from misuse and terrorist attacks. Just as they are effective in building a network of collaborative
survival, they are equally susceptible to divulging information for massive destruction and confusion. It all
depends on who uses it and for what purpose.
Another area that has been impacted by these re-organizations has been the shipping ports where
security has been beefed up. The SAFE Port Act of October 2006 was passed to enhance port authorities and as
an extension of the USA Patriot Act that empowered the Department of Homeland Security to use any of its law
enforcement agencies to detect and intercept terrorists and terrorist acts. More money and manpower were
deplored to the various ports of entry and exit which are susceptible to terrorists who may use them to export
Weapons of Mass Destruction or guns. Terrorist attacks of any ports will not only lead to the loss of life but also
to the loss of national and international business in a society where the economy is a life wire of each country.
These anti-terrorist moves were made in conjunction with the international communities because commerce
involves local citizens and governments and foreign citizens and their governments as well. So, the DHS has
successfully planted intervention steps at key ports and areas in the shipment process using the Container
Security Initiative Plans to prevent the shipment of terrorist materials. Operation Safe Commerce has been
implemented in collaboration with international agencies and foreign governments that have allowed US
workers to inspect and handle the materials exported to America and from those foreign ports and countries.
These collaborations have yielded success since the US Coast Guards, the Immigration and Customs
Enforcement Agency (ICE), and other agencies have not reported incidents resulting from the penetration of US
ports [1]. The immigration service was immediately co-opted into the Department of Homeland Security to
ensure that those who entered and left the US were legal and had no criminal intent. The Office of Detention
and Removal Operations was empowered to detain and deport those who were illegal in the US, and the US
2. FUSION CENTERS
The creation of Fusion Centers was an excellent move by the Bush Administration to bring together
professionals within the law enforcement community with diverse backgrounds in intelligence gathering to work
together to detect, deter, and prevent terrorist elements from engaging in homeland attacks. Indeed, a ―fusion
center is an effective and efficient mechanism to exchange information and intelligence, maximize resources,
streamline operations, and improve the ability to fight crime and terrorism by analyzing data from a variety of
sources‖ [6]. Fusion Centers emerged out of necessity: the need to fight crime and terror with all the information
available across the globe. According to the Authors in [6], "the ultimate goal of Fusion Centers is to provide a
mechanism through which government, law enforcement, public safety, and the public sector get together with a
common purpose and improve the ability to safeguard our homeland and prevent criminal activity" (p. 4). They
were created out of a crisis and given the freedom to penetrate the core of the society to dig out the roots of
terrorist and criminal activities by engaging every level of society. They have sprung up across the nation since
the last decade.
Fusion Centers have become a much more manageable way of solving terrorism and crime in a
collaborative and all-inclusive way. They involve law enforcement Offices, the office of public safety such as
the Fire Department and Medical Emergencies, and the public sectors, all united in a single effort to fight crime
and to prevent a 9-11-like attack from taking place in the USA again. The Center also has the advantage of
sampling the best from all walks of life and technical fields that bring to the table a diverse assortment of skills
needed to fight crime. In this way, the Fusion Center becomes a microcosm of the community because it is
composed of representatives from all the sectors of that community. The Center engages in training on
intelligence gathering, analysis, calibration, and dissemination with the goal of keep-enabling the members to
make informed decisions about activities and actions deemed un-American to keep the society safe.
Indeed, the Fusion Center concept is a new or innovative way of eliminating crimes in society. The
idea is that if these homegrown terrorists do exist and engage in activities within the society, somebody
somewhere should be able to discern these changes in attitudes and report back to the authorities. The
innovation here is that everybody is deemed capable of acting in the role of an informant and therefore a
contributor to the safety of society. Formerly, security and public safety were considered the prevue of the
police and law enforcement agents. The police, CIA, and FBI had almost total control of these situations but
Fusion Centers have debunked this idea and demystified intelligence activities making it a privilege also for
those who have the character traits of honesty and who are determined to assist in protecting the nation.
Fusion Centers have also shifted the center of allegiance from the Unit of Origin to the Center of
Activities. This calls for a shift in organizational behavior and protocol as the shift is now towards the Center
and away from the local precincts or former areas of employment. This shift brings in a true test of loyalty as
conflicts will always arise in the dissemination of information across jurisdictions where each officer or person
will feel called to pay particular attention to the home precinct or jurisdiction. The underlying concept behind
these centers is that a united effort yields better results. It will be more useful to empower the member to be
independent of their various feeder groups through the provision of salaries concomitant with the training and
level of each member being initiated to give them each a reason to be fully committed to the Centers. This
change in management paradigm does not undercut the loyalties to the intelligence offices, but rather ensures
The evolution of wireless services has led to an unrestricted accelerated pace of adoption and
widespread acceptance of wireless technology. This evolution in communication is recognized as a promising
breakthrough for the next decade and beyond. The wireless technology invention is strengthening and
integrating wireless communication, network protocols, and next-generation internet protocols into a more
unified wireless technology architecture. Unlike analog, wireless technology has added considerable value to
wireless communications by extending wide range coverage and connections to a multiplicity of devices and
application programs[10]. Wireless technology has created productivity enhancement and an effective medium
of communication on a just-in-time service to the global community. The advancement of wireless technology
and its unhindered utilization for communications has stretched the conversion and contributed to the
changeover from dial-up, cable-wired analog connections to digital connections. The wireless service code-
named ―direct connections‖ transmission is easier, faster, and less expensive than its predecessor[11].
However, the vulnerability of wireless networks still presents enormous challenges and risks that
continue to threaten wireless security. The author in [12] argued that wireless communication takes place
through the air using radio frequency signals that minimize the threats of interception. Conventional wisdom
maintains that encrypted information and data with a weak algorithm will continue to be vulnerable to hackers
and cyber terrorists. The authors in [13] and [14] asserted that the majority of converted data and information is
powerless and at the risk of being intercepted, read, and compromised by unauthorized officials. Consequently,
there is an urgent call to decrease the vulnerability of wireless network systems to uphold confidentiality, ensure
integrity, and to provide constant protection of wireless network operations. The evolution of wireless
technology is entrenched with the potential for dramatic improvement of individual, organization, and social
communication services. We are amid a historic proliferation of wireless transmission and communication
services across the globe. The growth and universal approach to wireless technology has increased demands for
data and information transmission and communications. It has collectively improved the efficiency of wireless
technology.
Wireless technology is deployed in almost every corner of the world community for on-going operative
transmission and communication. The authors in [15] noted that organizations and individuals residing in
remote regions of the world now have access to wireless services for data and information transmission,
communication including instant and emergency contacts. Certainly, the wireless services industry is currently
entrenched with widespread support from private and general public agencies. Wireless communication is
beginning to receive important regulatory supervision from the government by restricting the use of wireless
devices in school zones and texting while driving for safety reasons. Amid existing challenges, wireless services
remain sustainable, inevitable, and convenient solutions to innovative daily life. Statistics revealed that large
segments of the world community and approximately one million people in the United State have wireless
service accounts with various carriers [16]. The evolution of wireless services and associated technology is
working intelligently by empowering the lives of individuals, organizations, local, states, and federal
government agencies, nations by transforming analog (wired-cable) to digital (wireless) services.
The advantages of wireless services involve allowing important information to be accessible to a large
segment of the global community. Today’s universal society consists of the first time beneficiary of wireless
service and efficient communication around the world in ways that were never thought possible. The authors in
[12]noted that the global community collaboration and active participation in both progressions of wireless
services and associated technology is a credible avenue to reinforce a universal alliance around the world.
Wireless services have been instrumental in organizing, transmitting, and preserving important documentation
and learning endeavours around the world.
Universal wireless has benefits, shortcomings, and challenges. Wireless service users in various
countries, precisely in Africa and Asia are subjected to unlawful tracking, monitoring, and data interception that
tend to undermine and overturn the fundamental rights of privacy and freedom of expression. Despite these
potential vulnerabilities, the reward of wireless services in the education institutions, government agencies, and
corporate enterprises cannot afford to shy away from wireless service challenges. Stakeholders must continue to
establish a well-conceived alliance with regulatory agencies such as the Global Network Initiative (GNI) and the
Electronic Industry Code of Conduct (EICC) to minimize emerging wireless services challenges [12].
Generally speaking, bad actors seek to achieve their goals through the placement and execution of malicious
software (malware) that exploits a vulnerability in an information system. Vulnerabilities are flaws in
software/code that provide a means for malware to be installed and executed, typically without any overt sign of
its presence to system users.
In many regards, the battle in cyber security is between bad actors seeking to exploit vulnerabilities that have yet
to be repaired (or patched in a security update) or to discover and exploit a new one. The first exploitation of a
newly-discovered vulnerability for which no patch is available (or even under consideration) is called a zero-
day attack, and it is a very dangerous condition in cyber security for its potential to conduct undetected
mayhem. The Open SSL vulnerability known as ―Heartbleed‖ (CVE-2014-0160) was undetected for
approximately two years, so only a bad actor is certain of the zero-day attack on it.
Cyberspace and its underlying infrastructure are vulnerable to a wide range of risks stemming from both
physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to
steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of
essential services. A range of traditional crimes is now being perpetrated through cyberspace. This includes the
production and distribution of child pornography and child exploitation conspiracies, banking and financial
fraud, intellectual property violations, and other crimes, all of which have substantial human and economic
consequences.
Cyberspace is particularly difficult to secure due to several factors: the ability of malicious actors to operate
from anywhere in the world, the linkages between cyberspace and physical systems, and the difficulty of
reducing vulnerabilities and consequences in complex cyber networks. Of growing concern is the cyber threat to
critical infrastructure, which is increasingly subject to sophisticated cyber intrusions that pose new risks (Singer
and Friedman, 2014). As information technology becomes increasingly integrated with physical infrastructure
operations, there is an increased risk for wide-scale or high-consequence events that could cause harm or disrupt
services upon which our economy and the daily lives of millions of Americans depend. In light of the risk and
potential consequences of cyber events, strengthening the security and resilience of cyberspace has become an
important homeland security mission.
5. CONCLUSION
The above narrative indicates the complexities, costs, and inconveniences entailed in an unrestricted
application of the Bill of Rights, globalization of the Internet and Cyber activities, and the proliferation of
REFERENCES
[1] Bullock, J, Haddow, G, Coppola, D. & Yeletaysi, S. (2009). Introduction to homeland security: Principles of
all-hazards response. 3rd Edition. Burlington, MA: Elsevier Inc.
[2]Watts, M. (2007). Revolutionary Islam-Violent geographies, New York: Routledge. 175-204.
[3] Popescu, G. (2016). Borders in the era of globalization. Border Crossings: A Bedford Spotlight Reader.
New York: Bedford/St. Martins, 273- 293.
[4] Department of Homeland Security. (2003). A national strategy to secure cyberspace. Retrieved on
9/25/2015 from www.dhs.gov.
[5] Sauter, M. A. & Carafano, J. J. (2005). Homeland Security: A complete guide to understanding,
preventing, and surviving terrorism. New York: McGraw-Hill CompaniesInc.
[6]Office of Justice Programs. (2013). Fusion center guidelines. Retrieved on 5/28/2013 from
http://www.it.ojp.gov/fusioncenterguidelines/intro.html.
[7] Department of Homeland Security. (2013). Fusion Centers Guidelines: Developing and sharing information
and intelligence in a new era... Retrieved on 5/29/2016 from
http://www.it.ojp.gov/fusioncenterguidelines/intro.html
[8] Office of Justice Program. (2003). The National Criminal Intelligence Sharing Plan: Solutions and
approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence.
Retrieved 24/04/2016 from http://www.fas.org/irp/agency.
[9] Petersen, C. R. P. (2003). Community collaboration. Retrieved 12/12/2015 from
http://www.communitycollaboration.net.
[10] Tse, D., and Viswanath, P. (2005). Fundamentals of Wireless Communication. New York, Cambridge
University Press.
[11] Theodore S. R. (2002). Wireless Communications - Principles and Practice. Prentice-Hall
PTR, 2nd edition.
[12]Raychaudhuri, Dipankar, and Mandayam, Narayan (2011). ―Frontiers of Wireless and
Mobile Communications.‖ Proceedings of IEE, Vol 100, No 4 (824-840).
[13] Fagin, J.A. (2006). When Terrorism strikes at home: Defending the United States. Boston: Pearson
Education, Inc.
[14] Lun, D. S., Koetter, M., Koetter,R. and Effros, M. (2008) ―On coding for reliablecommunication over
packet networks‖. Phys. Commun., vol. 1, no. 1, (3–20).
[15] Frenkiel, R. Badrinath, B., Borres, J and R. Yates, R. (2000) ―The infestations Challenge: Balancing cost
and ubiquity in delivering wireless data‖. IEEE Pers. Commun., vol. 7, no. 2, (66–71)
[16] Meguerdichian, S, Koushanfar, F., M. Potkonjak, and M. Srivastava, M. (2001). ―Coverage problems in
wireless ad-hoc sensor networks.‖ 20th Annual Joint Conference. IEEE Computer Commun. Soc. vol. 3,
(1380–1387).
[17] Oz, E. (2009). Management Information Systems. Boston: Course Technology,
Massachusetts.
[18] Stair, R. M.& Reynolds, G. W. (2014). Fundamentals of Information Systems. Boston: MA, Cengage
Learning Course Technology.
[19] Pierre, T. (2001). Building Secure Wireless Local Area Networks. White Papers
atColubris.comhttp://download.colubris.com/library/whitepapers/WP-010712-EN-01-00.pdf,
Retrieved 13/11/2015.
[20] Paul, S., Yates, R., Raychaudhuri, D. and Kurose, J. (2008) ―The cache-and-forward network architecture
for efficient mobile content delivery services in the future internet.‖
[21] Mansfield, Kenneth C, and Antonakos, James L. (2010). Computer Networking from LANs to WANs:
Hardware, Software, and Security. Boston: MA, Cengage Learning Course Technology.
[22] Esin, J. O. (2011). The Evolution of Instructional Technology.Journal of Educational Media & Library
Sciences (JEMLS), Bloomington, Vol. 29 No. 1: 15-21.
[23] Shelly, G. B., Gunter, G. A., and Gunter, R. E. (2012).TeachersDiscovering Computers Integrating
Technology in a Connected World. Boston: MA, Cengage Learning Course Technology.
[24] Gupta, S., Islam, S., Nurronnabi, K., Hossain, M. S., and Hasan,Z. (2012). Design & Implementation of
Cost Effective Wireless Power Transmission Model: Good-Bye Wires. International Journal of Scientific
and Research Publications, Vol. 2, Issues 12.
[25] Bolton, M.K. (2008). US National Security and foreign policy after 9/11: Present at the re-Creation. New
York: Rowman & Littlefield Publishers, Inc.
[26] Stair, Ralph M & Reynolds, George W. (2016). Principles of Information Systems. Boston: MA, Cengage
Learning Course Technology.
[27] Ivan M., Glen Z., Joe S., and Hao G. (2008). Design, Implementation, and Performance Analysis of
DiscoSec – Service Pack for Securing WLANs. The University of Kaiserslautern, Germany.
[28] LAN MAN Standards Committee of the IEEE Computer Society (2004). Wireless LAN Medium Access
Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Medium Access Control (MAC)
Security Enhancements. Technical Report 2004 Edition, IEEE Std 802.11i.
[29] Kessler, G. C. (2013) 35 ―Paradigms for Cybersecurity Education in a Homeland Security Program.‖
Journal of Homeland Security Education, Washington, D.C, Vol. 2 no 35.
[30] Kamien, D. (2005). The McGraw-Hill homeland security handbook: The definitive guide for law
enforcement, EMT, and other security professionals. New York: McGraw Hill Publishers, Inc.
[31] David, C., and Cliff, P. (2002). A Path Loss Comparison Between the 5 GHz UNII Band (802.11a) and the
2.4 GHz ISM Band (802.11b). Technical report, Intel Corporation England.
[32] Jorgen, B., Clement D., and Joshua H.(1995). Propagation Measurements and Models For Wireless
Communications Channels. IEEE Communication Magazine, 33(1):42-49.
[33] Wu, C. J., and Irwin, J. D. (2013). Introduction to Computer Networks and Cybersecurity. Boca Raton:
CRC Press.
[34] Singer, P. W., and Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know.
Oxford University Press.
[35] Moore, R. (2005) "Cybercrime: Investigating High-Technology Computer Crime," Cleveland, Mississippi:
Anderson Publishing.
[36] Warren G. Kruse, Jay G. Heiser (2002). Computer forensics: incident response essentials. Addison-Wesley.
p. 392.
[37] Halder, D., & Jaishankar, K. (2011) Cybercrime and the Victimization of Women: Laws, Rights, and
Regulations. Hershey, PA, USA: IGI Global.
[38] Cucinella, C. (2016). Border Crossings: A Bedford spotlight reader. Boston: Bedford/St. Martins.