Unit 5 – Individual Project
View Assignment Details for Unit 5 – Individual Project
Type: Individual Project
Unit: Technology Alternatives
Deliverable Length: 2-3 pages
Key Assignment: (2-3 pages in APA 6th edition guidelines)
Taking all of your findings into consideration, including the provided initial draft draft a report summarizing the role of technology in society and assessing the efforts of the United States to harness it to reduce the threat of terrorism.
The paper will focus on the following:
Create a user guide of terrorist threats, U.S. counterterrorism (CT) strategy and documents, and the technological solutions in this strategy. Provide an executive summary that explains the following:
What is the U.S. CT strategy?
What role does technology play in this strategy?
Do you think the U.S. can eventually eliminate terrorism? Why or why not?
Support your arguments with authoritative sources and apply appropriate APA formatting guidelines.
Initial draft for reference:
From: Security Manager
To: The management
Subject: Major Challenges Facing the Field of Homeland security (HLS).
The following are some of the challenges facing the department of homeland security. These challenges fall into three major categories – Essential problems of protecting the border and transportation, Essential problems of protecting critical infrastructure and the fundamental problems for first responders.
The Essential problems of protecting the border and transportation include mitigating the threats posed by high risk-cargo passing through the airports, countering unmanned aircrafts and using canines effectively at border points and at transport terminals to enhance screening. Challenges in protecting the border include porousness of the borders away from the manned and designated border points (Department of Homeland Security, 2009). The US/Mexico border is one of the most porous given its huge expanse and the inability by the US forces to cover all parts of the border. Borders also present the challenge of illicit trade and trafficking of drugs, minerals, firearms and other weapons. The borders become more challenging to provide security when there are communities that live across a border making it difficult to interfere with their way of life.
The problems facing the protection of critical infrastructure include protection of water, gas, internet and other related infrastructure from destruction. The vastness of the infrastructure and the potential areas of attack a logistically challenging plan for security. The DHS also faces challenges in defending food, agriculture and veterinary systems that can pose challenges in food security for the country. The execution of successful covert was also a major challenge facing the department of homeland security. The 16 critical infrastructure areas such as civil nuclear, defense, finance, health, space and emergency services all need well-coordinated protection. They require a high number of well-trained security officers capable of handling all security threats.
The fundamental problems for first responders include lack of sufficient training, skills and knowledge on how to respond to varied emergencies amidst time and logistical constraints. The nature of disasters and the places where they happen varies greatly thereby demanding well trained responders and capacity building in communities to be well equipped to respond effectively. First responders also face the challenge of local regulations on how to respond to disasters. There are issues with decision-making and the organization of emergency services which must work closely with other stakeholders to respond to emergencies. The increased risk of burnout and psychological problems such as Post Traumatic Stress Disorder and Major Depressive Disorder (MDD) affecting the first responders to horrific disasters involving loss of human lives and terrible destruction.
Issue or problem
One of the critical problems in homeland security is border security. Many countries around the world in Europe and the Americas are struggling to contain immigration crisis where civil and economic strife forces millions of people to want to illegally cross into neighboring countries. Although most of the immigrants are not dangerous and are simply in search of better social-economic opportunities there are those that traffic drugs, weapons, and simply want to get into other countries for malicious reasons. In order to avoid endangering citizens countries have been deploying technologies such as imagers, radar, and motion sensors across certain points along land borders. However, these technologies cannot be deployed across massive boundaries and the vast parts of the borders are largely unsecured technologically or by security forces.
Identify and describe the solution
Air-based technologies of border surveillance would present a great solution to border security. The sensors would be fixed on rotary and fixed wing of aircraft as well as unmanned aircraft systems just like drones. The sensors should be high-tech to detect human motion at border points and track illicit activities. The workability of this solution is its unpredictability. Drones and unmanned small aircraft systems are highly mobile. A few such devices can be used to cover vast borders. They can work best through deterrence where people intending to cross borders illegally are uncertain whether they are under surveillance. Besides providing information on illicit activities at borders the air-based technologies can also help in relaying information on disasters such as wildfires and floods affecting areas along the border.
Financial, legal, and ethical implications of such a solution.
Air-based technologies for border security enhancement would be very expensive to implement. They need high-tech drones and affiliated technologies to receive and analyze information. These technologies are expensive to install and maintain. The legality of the tech systems can also come into question because drones are bound to carry surveillance over private property near and along borders hence raising the legal question of intrusion and violation of privacy. The legality of the systems is also likely to be checked against some international laws because the other country may lodge complaints of their side being suspiciously under surveillance as an act of espionage. Ethically, the technologies need to gain all the relevant consent from all involved persons and the process of rolling out such tech should be considerate of the rights to privacy.
National Southwest Border Counternarcotic Strategy. (2011). Retrieved from White House Online Web site: http://www.whitehouse.gov/sites/default/files/ondcp/policy-and-research/swb_counternarcotics_strategy11.pdf
National Infrastructure Protection Plan: Partnering to enhance protection and resiliency. (2009). Retrieved from the U.S. Department of Homeland Security Web site: http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf
Brooks, F. (1986). No silver bullet—Essence and accident in software engineering. Proceeding of the IFIP tenth world computing conference, 1069–76.
White, R. (2012, October 19). E-mail interview.
Bureau of Alcohol, Tobacco, Firearms, and Explosives. (n.d.). Retrieved from http://www.atf.gov/
Central Intelligence Agency. (n.d.). Retrieved from https://www.cia.gov/
Federal Bureau of Investigation. (n.d.). Retrieved from http://www.fbi.gov/
Federal Emergency Management Agency. (n.d.). Retrieved from http://www.fema.gov/
North American Aerospace Defense Command. (n.d.). Retrieved from http://www.norad.mil/
Official New York City Police Department. (n.d.). Retrieved from http://www.nyc.gov/html/nypd/html/home/home.shtml
United States Northern Command. (n.d.). Retrieved from http://www.northcom.mil/