Based on the Learn items, what role does or should cyber intelligence and counter intelligence play today? Discuss information warfare theory and application. Provide an overview of high-level legal aspects both within the U.S. and internationally as they pertain to cybersecurity. Finally, discuss and defend your stance on the use of electronic data collection for law enforcement and or intelligence purposes.
The response must be 450 words and use at least 2 scholarly citation(s) in APA format. Any sources cited must have been published within the last five years. Acceptable sources include texts, articles, presentations, the Bible, blogs, videos, etc.
Johnson, T. A. (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare.Boca Raton, FL: CRC Press. ISBN: 9781482239225.
Pichtel, J. (2016). Terrorism and WMDs (2nd ed.). Boca Raton, FL: CRC Press. ISBN: 9781498738989.