Technology and Homeland Security


A wide variety of technologies have been employed in recent years to help achieve the homeland security mission areas. Geographic Information System (GIS), biometrics, data mining, bomb detection robots, radiological monitors, and a host of other technologies are used for homeland security efforts. While these and other technologies provide the United States with significant advantages and capabilities, they also can have limitations. For example, a new technology created to monitor communication between and among terrorists may only work in certain conditions or geographic areas. Critical review of the strengths and limitations of homeland security technologies is essential for determining how they might be used in the future.

To prepare for this Discussion:

 

Review Chapter 12 of your course text, Introduction to Homeland Security. Reflect on the use of technology to achieve the homeland security mission areas.

 

Review the article, “Emerging Technologies for Homeland Security.” Focus on strengths and limitations of using emergency technologies for intelligence and warning, protecting cyber infrastructures, and emergency preparedness and response.

 

Review the online article, “Science and Technology for a Safer Nation.” Consider the strengths of using technologies to address critical needs, such as chemical and biological defense, border security, cyber security, and maritime security.

 

Review the online article, “Technology Strategies for Homeland Security: Adaptation and Coevolution of Offense and Defense.” Think about some of the limitations of defensive technology to prevent terrorist attacks.

 

Identify two strengths and two limitations of using technology to achieve the homeland security mission areas.

With these thoughts in mind:

Post by Day 5 two strengths and two limitations of using technology to achieve the homeland security mission areas. Then explain at least one insight you had or conclusion you drew about using technology to achieve homeland security mission areas as a result of completing this assignment. Be specific.

Be sure to support your postings and responses with specific references to the Learning Resources.

One and a half page with at least three references…. MULTIPLE USE OF INTEXT CITATION REQUIRED AND PAGE NUMBERS…… PLEASE USE SPLIT IN CITATIONS…PLEASE LOOK UP THE PROPER APA USE OF SPLIT CIATION

It is important that you cover all the topics identified in the assignment. Covering the topic does not mean mentioning the topic BUT presenting an explanation from the context of ethics and the readings for this class

To get maximum points you need to follow the requirements listed for this assignments 1) look at the page limits 2) review and follow APA rules 3) create subheadings to identify the key sections you are presenting and 4) Free from typographical and sentence construction errors.

find the cost of your paper

Case study Analysis( paper)- Prime Bank of Massachusetts

APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique….

“Letter from Birmingham Jail” was written by Martin Luther King Jr.

Overview “Letter from Birmingham Jail” was written by Martin Luther King Jr., as the title indicates, while he was confined in the Birmingham city jail in April, 1963. King is….

I need to write a medical report to academic advisor

Dear Sir or Madam, I need to write to my academic advisor a medical report ( Turki Alanazi came to our hospital after 14 days of his return from the….