Application:Technology and Terrorism
Technology… is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other.
—C. P. Snow
This quote by noted British scientist and author C. P. Snow brings to light the fact that technology can have both favorable and adverse effects. On the one hand, it can be used to prevent, protect against, respond to, or recover from a wide variety of hazards or disasters, including terrorist attacks. On the other hand, technology also constitutes a major threat, risk, or vulnerability because it can be used by terrorists to plan or execute attacks. In some cases, it takes technology to fight or beat technology, just as firefighters set backfires to prevent the further spread of wildfires in forested areas. It is important to grasp the applications, consequences, or impacts of technology on actual events in order to assess the potential future applications of technology in homeland security.
To prepare for this assignment:
Review the online article, “Tech-Savvy Terror.” Reflect on how terrorists have used technology to plan and execute attacks in the past and how they might use technology for future attacks.
Review the online article, “Terrorists and the Internet.” Focus on how terrorists use the Internet to spread their message and commit acts of terrorism. Also, think about the challenges the government might encounter when trying to combat terrorists’ online activities and consider how such challenges might be addressed.
Review the assigned pages of the online article, “Technology Strategies for Homeland Security: Adaptation and Coevolution of Offense and Defense.” Focus on the author’s analysis of “coevolution”—how terrorists not only use technology to attack their targets, but also engage in a reciprocal back-and-forth battle to disrupt or damage the defense technologies employed by their intended targets. Also, consider long-term challenges for security planning and how specific homeland security strategies might be used to address those challenges.
Review the assigned pages in Chapter 3 of your course text, Introduction to Homeland Security. Pay particular attention to the challenges related to protecting against, preparing for, and responding to acts of cyberterrorism. Think about how homeland security officials might address such challenges.
Reflect on how terrorists and terrorist organizations use technology to plan and execute acts of terrorism.
Identify two homeland security challenges related to terrorists’ use of technology to plan and execute acts of terrorism.
Think about how homeland security officials might use specific strategies to address those challenges.
The assignment: (1–2 pages)
Explain how terrorists and terrorist organizations use technology to plan and execute acts of terrorism. Be specific, and use examples to illustrate your explanation.
Describe at least two homeland security challenges related to terrorists’ use of technology to plan and execute acts of terrorism.
Explain how homeland security officials might address the challenges, using specific strategies.
Support your Application Assignment with specific references to all resources used in its preparation. You are asked to provide a reference list only for those resources not included in the Learning Resources for this course.
One to two pages with at least four references…. MULTIPLE USE OF INTEXT CITATION REQUIRED AND PAGE NUMBERS…… TRY TO USE THE ASSIGNMENT READINGS IF POSSIBLE and PLEASE USE SPLIT IN CITATIONS…PLEASE LOOK UP THE PROPER APA USE OF SPLIT CIATION
It is important that you cover all the topics identified in the assignment. Covering the topic does not mean mentioning the topic BUT presenting an explanation from the context of ethics and the readings for this class
To get maximum points you need to follow the requirements listed for this assignments 1) look at the page limits 2) review and follow APA rules 3) create subheadings to identify the key sections you are presenting and 4) Free from typographical and sentence construction errors.
REMEMBER IN APA FORMAT JOURNAL TITLES AND VOLUME NUMBERS ARE ITALICIZED.
Course Text: Bullock, J. A. , Haddow, G. D. & Coppola, D. P. (2013).Introduction to homeland security(5th ed.). Waltham, MA: Elsevier Inc
Chapter 8, “Cybersecurity and Critical Infrastructure Protection”
Chapter 12, “Science and Technology”
Article: Yen, J. (2004). Emerging technologies for homeland security. Communications of the ACM, 47(3), 32–35.
Use the Academic Search Premier database, and search using the article’s title.
Online Article: Homeland Security: Science and Technology. (2008). Science and technology for a safer nation. Retrieved from http://www.hsdl.org/?view&did=28869
Online Article: Jackson, B. A. (2009). Technology strategies for homeland security: Adaptation and coevolution of offense and defense. Homeland Security Affairs, V(1). Retrieved from http://www.hsaj.org/?fullarticle=5.1.4
Note: You are only required to read pages 1–13 of this article.
Online Article: Bruno, G. (2009). Tech-savvy terror. Retrieved from http://www.cfr.org/india/tech-savvy-terror/p18160?…
Online Article: Kaplan, E. (2009). Terrorists and the Internet. Retrieved from http://www.cfr.org/terrorism-and-technology/terror…
Online Article: Homeland Security: Science and Technology. (2008). Five-year research and development plan: Fiscal years 2008-2013. Retrieved from http://www.dhs.gov/xlibrary/assets/cfo_afrfy2008.p…
Online Article: Homeland Security: Science and Technology. (2009). High-priority technology needs. Retrieved from http://www.dhs.gov/xlibrary/assets/High_Priority_T…
Online Article: Office of Science and Technology Policy. (2005). Science and technology: A foundation for homeland security. Retrieved from http://www.whitehouse.gov/files/documents/ostp/Iss…
Website: Safety Act
Website: U.S. Department of Homeland Security