1 of 11

Slide Notes

DownloadGo Live

USA on Indigenous Peoples & Cyber Warfare

Published on Feb 21, 2016

This presentation outlines USA's stance on:

1) Indigenous Peoples 2) Cyber Warfare

Information provided is valid and true as of 12/03/2015

PRESENTATION OUTLINE

The United States of America

on Indigenous Peoples & Cyber Warfare
Photo by arbyreed

The Displacement and Rights

of the Indigenous Population
Photo by Puzzler4879

A Culture

Photo by Or Hiltch

The Native Americans

  • Nearly 6.5 million or 2% of Population
  • Consist largely of 'American Indians', Native Alaskans and Native Hawaiians
  • Expected to exceed 11 million by 2060
  • 566 Federally recognised tribes
  • 630 legal protected areas (apart from Hawaiian homelands)

Current Policy

  • The Constitution (Article 1, Section 8)
  • The Supreme Court's Verdict
  • The "Duty of Protection"
  • Indian Reorganization Act
  • Hawaiian Homelands
  • Alaskan Native Claims Settlement Act
Photo by Dietmar Temps

Stance

  • Governments take charge of organising and designating land
  • The Tribes have partial sovereignty and rights to self-governence
  • Governments have responsibility to protect and full authority to interfere
  • Tribes have more participation in Legislative Matters
Photo by wbeem

Course of Action

  • Designated legally protected land for Indigenous population
  • Make it a National Issue
  • Improved Consultation Procedures
  • Planned land transfer management
  • Education
Photo by VinothChandar

Cyber Warfare

Photo by ssoosay

Cyber Space of Today

  • The Budapest Convention
  • Cyber Terrorism
  • International Cyber Warfare
  • Cyber Warfare against other countries
Photo by photosteve101

Cyber Warfare

  • "As Cyber-crimes go International, so must Enforcement Agencies"
  • Proactive Defences
  • Critical Infrastructure Protection
  • Collective Defence
  • Artificial Intelligence
Photo by Lacrymosa

Stance

  • National Security comes first
  • Cyber Warfare can be used to defend and retaliate to Cyber attacks
  • Cyber Espionage can be used
  • Regional Alliances
Photo by IsaacMao