Download presentation
Presentation is loading. Please wait.
1
Border Security
2
Border Extensions Embassies/Consulates Unincorporated Areas Treaties
Protectorates/Territories “Leased” Lands Cyberspace
3
Embassies/Consulates
Diplomatic Sovereignty 1961 Vienna Convention on Diplomatic Relations Immunity Right of Free Passage Inspection Reciprocity Special International Organizations WHO, ISO, UN, Red Cross, etc.
4
Unincorporated Areas Seas Polar Regions Admiralty Law Antarctic Treaty
Coastal Buffer, Fishing, Mining, Crime, Shipwreck, Protection, Lanes, Ports Polar Regions Antarctic Treaty Conservation
5
Unincorporated Areas Space
Begins at the lowest altitude at which an object can orbit. The 1967 Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space, including the Moon and Other Celestial Bodies (the "Outer Space Treaty"). The 1968 Agreement on the Rescue of Astronauts, the Return of Astronauts and the Return of Objects Launched into Outer Space (the "Rescue Agreement"). The 1972 Convention on International Liability for Damage Caused by Space Objects (the "Liability Convention"). The 1975 Convention on Registration of Objects Launched into Outer Space (the "Registration Convention"). The 1979 Agreement Governing the Activities of States on the Moon and Other Celestial Bodies (the "Moon Treaty").
6
Treaties Mutual Defense/Commerce NATO Hosted Military Bases
7
Protected Territories
US States Alaska, Hawaii Protectorates American Samoa, Guam, Puerto Rico, Virgin Islands, etc. Special Berlin UK Falkland Islands Virgin Islands Other Colonizing Countries History
8
“Leased” Lands Panama Canal Zone Hong Kong Guantanamo Bay
9
Border Issues Sovereignty Safety Commerce Ethnicity History
10
Border Incursion Rationales
Humanitarian Mutual Aid Police Action Declaration (UN)
11
Cyber Rules of Engagement
Specific Criminalization of Damaging Critical Infrastructure Computers Clarifying the Scope and Penalties for Offenses under the Computer Fraud and Abuse Act Data Breach Notification DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY ENHANCEMENT OF NATIONAL CYBERSECURITY AND CYBER INCIDENT RESPONSE
12
Cyber Rules of Engagement
NATIONAL CYBERSECURITY PROTECTION PROGRAM LIMITATION ON LIABILITY AND GOOD FAITH DEFENSE FOR CYBERSECURITY ACTIVITIES FEDERAL PREEMPTION, EXCLUSIVITY, AND LAW ENFORCEMENT ACTIVITIES PRIVACY AND CIVIL LIBERTIES; OVERSIGHT; PENALTIES FOR MISUSE REQUIRED SECURITY ACTION
13
Cyber Rules of Engagement
CYBERSECURITY REGULATORY FRAMEWORK FOR COVERED CRITICAL INFRASTRUCTURE ACT COORDINATION OF FEDERAL INFORMATION SECURITY POLICY MANAGEMENT OF INFORMATION TECHNOLOGY PERSONNEL AUTHORITIES RELATED TO CYBERSECUIRTY POSITIONS PREVENTING RESTRICTIONS ON DATA CENTER LOCATIONS
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.