Presentation is loading. Please wait.

Presentation is loading. Please wait.

Border Security.

Similar presentations


Presentation on theme: "Border Security."— Presentation transcript:

1 Border Security

2 Border Extensions Embassies/Consulates Unincorporated Areas Treaties
Protectorates/Territories “Leased” Lands Cyberspace

3 Embassies/Consulates
Diplomatic Sovereignty 1961 Vienna Convention on Diplomatic Relations Immunity Right of Free Passage Inspection Reciprocity Special International Organizations WHO, ISO, UN, Red Cross, etc.

4 Unincorporated Areas Seas Polar Regions Admiralty Law Antarctic Treaty
Coastal Buffer, Fishing, Mining, Crime, Shipwreck, Protection, Lanes, Ports Polar Regions Antarctic Treaty Conservation

5 Unincorporated Areas Space
Begins at the lowest altitude at which an object can orbit. The 1967 Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space, including the Moon and Other Celestial Bodies (the "Outer Space Treaty"). The 1968 Agreement on the Rescue of Astronauts, the Return of Astronauts and the Return of Objects Launched into Outer Space (the "Rescue Agreement"). The 1972 Convention on International Liability for Damage Caused by Space Objects (the "Liability Convention"). The 1975 Convention on Registration of Objects Launched into Outer Space (the "Registration Convention"). The 1979 Agreement Governing the Activities of States on the Moon and Other Celestial Bodies (the "Moon Treaty").

6 Treaties Mutual Defense/Commerce NATO Hosted Military Bases

7 Protected Territories
US States Alaska, Hawaii Protectorates American Samoa, Guam, Puerto Rico, Virgin Islands, etc. Special Berlin UK Falkland Islands Virgin Islands Other Colonizing Countries History

8 “Leased” Lands Panama Canal Zone Hong Kong Guantanamo Bay

9 Border Issues Sovereignty Safety Commerce Ethnicity History

10 Border Incursion Rationales
Humanitarian Mutual Aid Police Action Declaration (UN)

11 Cyber Rules of Engagement
Specific Criminalization of Damaging Critical Infrastructure Computers Clarifying the Scope and Penalties for Offenses under the Computer Fraud and Abuse Act Data Breach Notification DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY ENHANCEMENT OF NATIONAL CYBERSECURITY AND CYBER INCIDENT RESPONSE

12 Cyber Rules of Engagement
NATIONAL CYBERSECURITY PROTECTION PROGRAM LIMITATION ON LIABILITY AND GOOD FAITH DEFENSE FOR CYBERSECURITY ACTIVITIES FEDERAL PREEMPTION, EXCLUSIVITY, AND LAW ENFORCEMENT ACTIVITIES PRIVACY AND CIVIL LIBERTIES; OVERSIGHT; PENALTIES FOR MISUSE REQUIRED SECURITY ACTION

13 Cyber Rules of Engagement
CYBERSECURITY REGULATORY FRAMEWORK FOR COVERED CRITICAL INFRASTRUCTURE ACT COORDINATION OF FEDERAL INFORMATION SECURITY POLICY MANAGEMENT OF INFORMATION TECHNOLOGY PERSONNEL AUTHORITIES RELATED TO CYBERSECUIRTY POSITIONS PREVENTING RESTRICTIONS ON DATA CENTER LOCATIONS


Download ppt "Border Security."

Similar presentations


Ads by Google