Technology and Homeland Security
A wide variety of technologies have been employed in recent years to help achieve the homeland security mission areas. Geographic Information System (GIS), biometrics, data mining, bomb detection robots, radiological monitors, and a host of other technologies are used for homeland security efforts. While these and other technologies provide the United States with significant advantages and capabilities, they also can have limitations. For example, a new technology created to monitor communication between and among terrorists may only work in certain conditions or geographic areas. Critical review of the strengths and limitations of homeland security technologies is essential for determining how they might be used in the future.
To prepare for this Discussion:
Review Chapter 12 of your course text, Introduction to Homeland Security. Reflect on the use of technology to achieve the homeland security mission areas.
Review the article, “Emerging Technologies for Homeland Security.” Focus on strengths and limitations of using emergency technologies for intelligence and warning, protecting cyber infrastructures, and emergency preparedness and response.
Review the online article, “Science and Technology for a Safer Nation.” Consider the strengths of using technologies to address critical needs, such as chemical and biological defense, border security, cyber security, and maritime security.
Review the online article, “Technology Strategies for Homeland Security: Adaptation and Coevolution of Offense and Defense.” Think about some of the limitations of defensive technology to prevent terrorist attacks.
Identify two strengths and two limitations of using technology to achieve the homeland security mission areas.
With these thoughts in mind:
Post by Day 5 two strengths and two limitations of using technology to achieve the homeland security mission areas. Then explain at least one insight you had or conclusion you drew about using technology to achieve homeland security mission areas as a result of completing this assignment. Be specific.
Be sure to support your postings and responses with specific references to the Learning Resources.
One and a half page with at least three references…. MULTIPLE USE OF INTEXT CITATION REQUIRED AND PAGE NUMBERS…… PLEASE USE SPLIT IN CITATIONS…PLEASE LOOK UP THE PROPER APA USE OF SPLIT CIATION
It is important that you cover all the topics identified in the assignment. Covering the topic does not mean mentioning the topic BUT presenting an explanation from the context of ethics and the readings for this class
To get maximum points you need to follow the requirements listed for this assignments 1) look at the page limits 2) review and follow APA rules 3) create subheadings to identify the key sections you are presenting and 4) Free from typographical and sentence construction errors.
REMEMBER IN APA FORMAT JOURNAL TITLES AND VOLUME NUMBERS ARE ITALICIZED.
Course Text: Bullock, J. A. , Haddow, G. D. & Coppola, D. P. (2013).Introduction to homeland security(5th ed.). Waltham, MA: Elsevier Inc
Chapter 8, “Cybersecurity and Critical Infrastructure Protection”
Chapter 12, “Science and Technology”
Article: Yen, J. (2004). Emerging technologies for homeland security. Communications of the ACM, 47(3), 32–35.
Use the Academic Search Premier database, and search using the article’s title.
Online Article: Homeland Security: Science and Technology. (2008). Science and technology for a safer nation. Retrieved from http://www.hsdl.org/?view&did=28869
Online Article: Jackson, B. A. (2009). Technology strategies for homeland security: Adaptation and coevolution of offense and defense. Homeland Security Affairs, V(1). Retrieved from http://www.hsaj.org/?fullarticle=5.1.4
Note: You are only required to read pages 1–13 of this article.
Online Article: Bruno, G. (2009). Tech-savvy terror. Retrieved from http://www.cfr.org/india/tech-savvy-terror/p18160?…
Online Article: Kaplan, E. (2009). Terrorists and the Internet. Retrieved from http://www.cfr.org/terrorism-and-technology/terror…
Online Article: Homeland Security: Science and Technology. (2008). Five-year research and development plan: Fiscal years 2008-2013. Retrieved from http://www.dhs.gov/xlibrary/assets/cfo_afrfy2008.p…
Online Article: Homeland Security: Science and Technology. (2009). High-priority technology needs. Retrieved from http://www.dhs.gov/xlibrary/assets/High_Priority_T…
Online Article: Office of Science and Technology Policy. (2005). Science and technology: A foundation for homeland security. Retrieved from http://www.whitehouse.gov/files/documents/ostp/Iss…
Website: Safety Act
Website: U.S. Department of Homeland Security