Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The paper "Homeland Security & New Technology" discusses that home security mostly depends on technology. Advancement in technology means better and safer ways to handle home security. The new technology has created a platform for crimes like hacking and cyber crimes…
Download full paperFile format: .doc, available for editing
Extract of sample "Homeland Security & New Technology"
Homeland Security & New Technology The paper mostly focuses on how the advancement in technology has affected the implementation of security within the state borders. How the governments have been able to handle home safety and the negativities that come with implementing home security. The benefits of using modern technology in advancing security with our boarders and the ways of identifying as well rooting home grown terrorists through advanced communications and automatic vehicle tracking systems; human identity recognized technologies; computerized data and intelligence banks. How to involve all stakeholders and make sure inclusive cyber security protections is observed and how to regulate technological abuse for the benefit of national security
Introduction
Homeland security is an American team created by the government of the U.S whose primary concern was to put everything needed for the safety of the American citizen. To be able to thrive, the US government has to ensure that it protects its country against terrorists, man-made accidents, and disasters that are caused by nature like hurricane, landslide amongst others, reduce the chances of being attack and also lessen the damages caused by such attacks. In line with the September 2001 terrorist attack, the US government had to be cautious on how it handles the safety of its citizens (Oliver and Marion 2014).
By now technology is one of the identifiable element in our society that is advancing day in day out. The use of computers, tablets, cell phones amongst others have become virtually ubiquitous. One can say that in these times, the number of mobile phones supersedes the population of a county. It is with the accessibility and convenience that make our country vulnerable to internal and external attacks. At the same time, advancement in technology provides security. This will bring us to the question of how do new technology help us to keep safety?
On September 2001 in the US, nineteen hijackers took control of four US planes and murdered 3000 people. The attackers were passengers in the same planes meaning they also had passports though manipulated fraudulently. With this incident, the US government invested on a central database like the advanced biometrics that enabled them to identify information on every US citizens. This has made it hard for anyone harming them (.Lewis, Ted 2006)
In public health when an outbreak of a viral disease sensors has been installed in the main cities of the US to detect any outbreak of viral pathogens. This prevents more people becoming ill by providing early treatment to prevent and minimize the spread of the disease. In riots, public order vehicles are used to disperse and capture riot weapons. Advanced communications and automatic vehicle tracking systems; human identity recognized technologies; computerized data as well as intelligence banks with limited or restricted access terminals primarily (in police vehicles and border checkpoints, etc.); loaded fragmented exploding ammunition, image intensifiers; silenced assassination rifles together with precision infrared special for night sights; restraining and finally prison technologies, including leg shackles, thumb cuffs, blunt trauma inducing drugs, gallows, guillotines, execution chambers, interrogation and torture techniques.
Aum Shinrikyo cult which has its origin in Japan released sarin, which is a poisonous nerve agent, inside the Tokyo subway in 1995. in a span of few minutes, people were killed and thousands more injured. To be safe from a similar attack within the United States, a computerized, early caution system for the country’s subways has been developed and is now being tested in several cities. In the prevention of terrorist use of radioactive nuclear materials within its territories, the US has deployed nuclear detecting equipments to comber the problem (Welle, (2012). With all these examples, we can see how a nation go to an extend to invest in advanced technology in protection of its citizens.
There is a serious threat when the use of new technology is abused. The escalating use of social networking sites will likely give cause to new attacks. At these times, social networks are mostly targeted by cyber criminals. This begins with focusing on a tried-and-true black hat, sneaking one’s way past a company’s defenses with the gift of gab contrasting to a cleverly-worded email.
Facebook, being a good example, which has over 300 million subscribers, was the original target of the KOOBFACE botne. It will still be a battle since social networks will likely continue to be a host of cyber criminals. However, social networks are primarily used by valid businesses looking for new ways in which to be in touch and engage with customers. The business is challenged on how to utilize the benefits of social networks. Although still a good number dangerous attacks originate from the inside. Such kind of attacks stands out to be very devastating, when looking at the extent of damage advantaged User cause alongside the data they can be able to access. In a study by the U.S. Department of Homeland Security, the Carnegie Mellon University’s school of Software Engineering together with the U.S. Secret Service had a team of researchers who found out malicious insiders within the U.S. financial industry .They went without detection for 32 months. That means, too much trust can leave you vulnerable to technology attacks.
Also, there is increasing attacks when attackers use social engineering to call targeted employees and trick them into disclosing valuable information. It is significant to know the social construction, it can prevent sophisticated attacks meant to breach of any organization.
Technology can be regulated by the government. As much as it benefits us, the lack of trust on the Internet, has forced different governments need to solve the issue of regulation, ultimately,
Management of technology is not naturally good or wrong. Usually, technology is teamed to be a public resource categorized as under‐produced, this night causes a scenario related to a symbiosis between innovators and the state. Internet governance is an essential topic in its right.
A government has to involve all stakeholders and make sure inclusive cyber security protections; national governments are in most cases placed in a better position to realize new security policies. The procedures should outline particular areas including highlighting the significance of ICTs to the nation; point out and analyzing the risks from cyber crime and attacks identify objectives such as prevention, recognition and prosecution of cyber crimes; and set a plan to realize these goals (Falzone, 2013)
. Government can regulate its technology by; licensing, an individual produces necessary documents to acquire a license to operate a certain account or a certain device so that any crime that is done using the said equipment will be tracked. The other way to regulate technologies is by enacting laws. A good example is France, attempted to control the Internet using a mechanism established for policing the Minitel. This was proposed by Minitel to prowl the Minitel system inspecting content to guarantee that information providers submit themselves to the terms stipulated in their contract with France Telecom. The other is some countries have recommended voluntary code of conduct by using label and filtering platforms for internet content selection. In Vietnam, Interior Ministry has the mandate to check contents, including e-mails over the Internet. Internet users are held legally accountable for any information they give or receive (Foundation for Homeland Security, 2005).
To regulate technological abuse, it is sometimes appropriate to sacrifice a few individual rights for the sake of the whole country. terrorist like Osama Bin Laden acts, who was behind several worldwide nuclear attacks majorly the US attack of September 2001, The US government had to take away his right to life to save thousands who have could been his victims (Paul, 2015).
The same should be done to the domestic electronics surveillance, and foreign surveillance, the right to privacy has to be compromised when it comes to national security. There are cases where criminals caught carrying nuclear bombs meant for mass killings on surveillance cameras, telephone tapping. In a case like this, infringing one person right to privacy saved thousands whose right to life would have been violated. Authoritarian IT-based systems use a centralized architecture. It may be physically and discrete, but to be efficient in data transmission, and flexible against localized threats like natural disasters. A cypermethrin provides a broad outlook of systems flow of control loops, making him in a master controller. With the authoritarian regimes, observation of information privacy as well as data security play altogether plays crucial roles.
These new technology equipments are carefully redesigned to fulfill individual control mostly politically. Some good examples are modern riot techniques. In the domain of the public and media, they are designed to look less lethal but in real they are used to harass, maim or punish the crowd. These weapons are the rubber bullets they are said to be harmless yet they can kill, electrified AMAC riot tanks- they look like an ambulance but carry armory. JAI cameras- can take thousands of pictures in a second and frame demonstrators for later arrests and Arwen ace that can fire gas, smoke, plastic bullets. All such equipment is used to speed up processes of socio-political power and make them more efficient in targeting and removing rebels who question the status quo. All these equipments demonstrate how the ones in authority can violate human rights at will.
Conclusion
From this essay, I conclude that home security mostly depend on technology. Advancement in technology means better and safer ways to handle home security. The new technology has created a platform for crimes like hacking and cyber crimes. To protect its citizens against technology related abuses, the government has to create laws and mechanisms to arrest the criminals. To maintain a secure country, government is sometimes forced to violate the rights of a few individuals who endanger the rights of many. At times, the government has to apply lethal procedures just to keep peace and stability in their countries. In the future, modern technologies are likely to be used in the oppression rather than keeping its citizens safe.
References
Brown, I., & T, C. (n.d.). Regulating Code: Good Governance and Better Regulation in the Information Age.Home
Martin, G. (2008). Essentials of terrorism: Concepts and controversies. Los Angeles: SAGE Publications
News Service. Retrieved February 27, 2015, from http://www.highbeam.com/doc/1G1- 293204394.html?
Science and Technology: A Foundation for Homeland Security. (2005). Science and Technology106 Falzone, A. (2013). Regulation and Technology. Harv. JL & Pub. Poly, 36, 105
Oliver, W. M., Marion, N. E., & Hill, J. B. (2014). Introduction to Homeland Security. Jones & Bartlett Publishers.
Lewis, Ted G. Critical infrastructure protection in homeland security: defending a networked nation. John Wiley & Sons, 2006., Division on Engineering and Physical Sciences, National Research Council
Paul, R. (2015, February 19). US used Osama bin Laden to invade Middle East.PRESS TV
Welle, D. (2012, June 15). Japan Captures Fugitive Linked to Tokyo Sarin Gas Attack.States
Read
More
Share:
CHECK THESE SAMPLES OF Homeland Security & New Technology
The paper "Department of homeland security" discusses that scientists insist on being allowed to inform policy through balanced and expert views of relevant technical facts and best judgments are perhaps the most essential structural element in the bridge between science and politics.... The establishment of the Department of homeland security has created several issues about its yet another political dogma that might eventually become another burden of the federal government that will threaten the US community....
In its quest to achieve its goals of assuring the safety of the nation and its people against the threat of terrorism, the Bush administration legislated the Department of homeland security that continuously explores the different areas and strategies to maximize government services to the US society.
... n its establishment though, the department's mission were added with four more significant missions that are deemed necessary for further strengthening homeland security....
If one were to define homeland security, it would be something like this : homeland security is the action taken by a domestic government to prevent, detect, respond to, and recover from terrorist attacks and also natural disasters.... homeland security is defined by the National.... rategy for homeland security (2002) as "a concerted national effort to prevent terrorist attacks within the United States, reduce Americas vulnerability to terrorism, and minimize the damage and recover from attacks that do occur"....
he second course, The Unconventional Threat to homeland security, how terrorism operate and how there organized in terms of the extremists behind them and the groups.... Research writing and homeland security and Research Colloquium are the two courses offered dealing with it.... HSR policy framework needs implementation by use of appropriate technology in a manner as to attain proper preventive mechanism and storing relevant data that can be used to help in the training process....
The author of the paper titled "homeland security: The Unmanned Aerial Vehicles" paper highlight the key controversies of the debate that circles within safety and privacy of the wider American population regarding Unmanned Aerial Vehicles technology.... homeland security News Wire (2012) counters the use of drones as posing a threat to safety by stating that the FAA 2013 established testing sites for UAVs set furthest from domestic populations.... Key amongst these is the homeland security Department which just like all other security bodies is preparing to initiate the use of drones in their intelligence and law enforcement mandates following the signing of the controversial Federal Aviation Administration bill by President Barrack Obama that allows their use....
"Quadrennial homeland security" paper argues that the private sector can have either a positive or a negative impact on the way the homeland security department can achieve its missions.... It can use its research either in favor of homeland security or against it.... This has two fundamental impacts on the way the homeland security department can deal with the issue of illegal immigrants.... he private sector through firms in various sectors has a fundamental impact on the way the homeland security department can accomplish this mission....
The author learns how Israel has modified to its homeland security.... homeland security in the US entails a wide range of stakeholders in both the public and the private sector and has been a major area of collaboration between the US and Israel.... homeland security in the US is majorly borrowed from Israel security system that it uses to protect its country.... The US homeland security as well as the Israeli homeland security system has been working together for quite some time and share intelligence and commercials aspects in different unprecedented ways (US Chamber of Commerce, 2012)....
In its quest to achieve its goals of assuring the safety of the nation and its people against the threat of terrorism, the Bush administration legislated the Department of homeland security that continuously explores the different areas and strategies to maximize government services to the US society.... epartment of homeland security (DHS)homeland security is defined by the three strategic objectives by the Office of homeland security's National Strategy for homeland security....
5 Pages(1250 words)Term Paper
sponsored ads
Save Your Time for More Important Things
Let us write or edit the research paper on your topic
"Homeland Security & New Technology"
with a personal 20% discount.