StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Disadvantages of Laser Applications in Homeland Security - Essay Example

Cite this document
Summary
The essay "Disadvantages of Laser Applications in Homeland Security" focuses on the critical analysis of the main disadvantages of Laser applications in the field of Homeland security in the US. After the September 11 2001 bombing, Homeland security was created…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful

Extract of sample "Disadvantages of Laser Applications in Homeland Security"

Name: Course: Lecturer: Date: Disadvantages of Laser Application in homeland security After the September 11 2001 bombing, the Homeland security was created. This was entirely entrusted with utilizing technology and information gathering capabilities so as to keep the United States Homeland secure against terrorist attacks ( Bureau of Consular Affairs, 2013). They entirely used video surveillance; however, new laser systems are being used so as to secure the Homeland against ballistic attacks. They are commonly found on the ground, aboard mobile platforms, ships or even airplanes. Laser has been used by US military forces into combat when they were in Vietnam War. When considering the most complete and efficient security system, the Homeland security agencies are considering the threat level and the type of protection must offer. Many technological systems including the laser application are marred with diverse vulnerabilities and shortcoming which need to be addressed if at all the desired technology has to be realized. For example, laser based technology operate in very limited wavelength range. At around 800 nm which they operate, it is very hard to have effective security systems. This short wavelength can only be excellent performance in rain, humidity and dusty condition (Aglio et al, 2005). This therefore means that, in some conditions, it is not effective and therefore cannot be relied on for Homeland security especially when there is no rain or other conditions which are dictated by the system. In other words, other conditions rather than the ones dictated here block wave propagation and therefore result to compromised results (Hahn & Carranza, 2001 ).. When attackers intrude in such weather conditions, they can be detected and when they do when the conditions are otherwise, then the Homeland duties of securing the land will be compromised. Laser based technologies can only detect only one species without sacrificing the performance. This therefore means that detecting quite a host of components may sometimes become impossible when it comes to laser technologies. This may jeopardize the security which is the obligation of the Homeland security. This calls for manufactures of these systems upgrading them to for predetermined analytics of interest, obviating the possibility of using them to scan many components, known and even at times unknown. Additionally, the other limitation of laser based technologies is that they can only operate in the near-IR which in the long run limits their sensitivity and access to a wider spectrum of obstacles (Aglio et al, 2005). When it comes to online monitoring of weld quality is a problem which manufactures have not solved so far. This therefore means that, these systems do not effectively detect full range of defects that may be present in a certain location. The current laser systems have been implemented but they have not attained indisputable security. This is attributed to the fact that, the open loop controls have been proved to be ineffective. They can never be relied on. This in the long run depict that laser based systems have some limitations and constraints which need to be addressed and implemented if at all the best desired security is to be realized (Hahn & Hohreiter, 2006). There is a need to have sensors which will directly measure the nugget integrity and surface profile, while determining the strength of the wave. This will mean that, the deflection angles of a laser bean reflected for the nugget surface. However, poor surface qualities which are common cases in have prevented reliable measurement of such profile. Monitors which would effectively monitor the desired wave property need to be implemented. Laser based systems are prone to overlapping of overlapping signals. The features of interest produce a signal that has desired information. This information then produces signals which overlap the signal of interest and they may even contain signals which have no relevant information. The signal of interest maybe weak in a laser based system than the obscuring signals which makes the system not effective as it should be expected by the Homeland Security. While the markets have advocated for laser based security systems, there are substantial weaknesses in the entire system (Hahn & Carranza, 2001 ). In the signal processing, there are problems in separating the desired signals from the undesired signals while not destroying the desired information with the entire process. One of the vulnerabilities of laser based application system in detecting the explosive device is the technique that is used in propagating the THz wave through the environment since the THz is easily absorbed by the atmospheric vapor. The absorption of water is strong in most of its revolving form which makes it possible for the THz to be absorbed by water steam when is propagated in the atmosphere. For instance, a frequency of about 0.1 to 1 HTz holds 228 entity spectral lines for water steam. As humidity increases, a noticeable drop in the peak THz is observed, along with the emergence of water steam assimilation lines. Additionally, the other environmental water steam adds up to the experimental spectral background. These includes, species of gases such as O2,CO, CO2,O3N2O, and CH4 and also the small hanging particulates, mostly the ones that move towards the wavelength of THz emission (Aglio et al, 2005).. The THz-TDS spectroscopy imaging is mostly used in individuals screening, checking the parcels and baggage and also in ships and shipping containers. They are also used in detecting concealed private firearms and knives. It is also proposed in discovering hidden equipments of biological and chemical agents of war and of mass damage weaponry Laser induced breakdown spectroscopy has detection limits which are generally 1-1—times poorer than conventional techniques. Research depicts that that detection limits for LIBS do vary from element to element depending on the specimen type and the apparatus used. It has been found they the detection limit of 1-30 ppm by mass are common however this can range>100 ppm to < 1ppm. In the same case, poor precision is also inevitable in this application (Radziemski, 2002). 5-10% of poor precision is experience although this is dependent on the sample homogeneity, sample matrix and excitation properties of the laser. There are some effects which this technology experience coming from the environment and/or the chemical composition of the target sample. This affects the intensity of the emission line in an unpredictable manner. The matrix effect which is as a result of host element impact on the analyte result to inconsistent line spectra is inevitable in this technology (De Giacomo, Dell’Aglio & De Pascale, 2004). In the same case, the any laser shot targeting a certain material or even substance under study is changes due to reactions with the surrounding. This may in the end give results which cannot be relied on at all. Terrorists are well informed about the distance that an explosive material can be detected from the location of the laser application. This gives them a chance to avoid the location that they know the homeland security have installed the laser application system of detecting explosives and other dangerous materials. United States has witnessed many terror attacks, for instance on January 8, 2011; there was a shooting attack on political event at a supermarket. On October 29, 2010, a terror attack was thwarted attempting to bomb multiple US bond airliners with parcels of bombs that were sent from Yemen. In another terror attack, 2 police officers were killed and one was injured while examining another attack that had injured another police officer on August 14, 2012. The steps that have been made by the government and the security agents are recommendable but still something need to be done for the residents of the US to feel and be secured from terrorism. With the knowledge of the ways that attackers use, and also being aware of the delivery method used by attackers to deliver their devices, homeland security should come up with more powerful laser applications. The applications should be used in detecting the explosives even at a distance. Additionally, homeland security should make sure that the individuals who are getting entry to the state are well screened and scrutinized. This is to identify whether the visitor is a terrorist or an immigrant and also for the sake of preventing the entry of dangerous materials in the state. The use of biometric identifier can help in identifying the terrorists and others who poses a risk to the state who steals and uses counterfeit visas in getting entry to US ( Bureau of Consular Affairs, 2013). On the other hand, the homeland security service should safeguard its technology system from the hackers. This is because; the terrorist may hack the company’s system and get the information concerning the security of the nation. This information can be used in planning the attack and this can make the country be in a great security risk of terrorism. In addition, the company‘s system might be infected with viruses, worms or malwares that can make the system to corrupt. This would give an enemy a chance to invade the system and get the required information. This would result in terrorist interfering with the state security or even the government infrastructure. According to Patricia & Logan, a multinational company that is situated in California and deals with catalog was infected with malware virus. The company is highly networked with Wide Area Network (WAN). One day an email came showing that it is from the CEO of the company with a message containing an attachment on it with an extension .app, where they were required to change it on downloading to .exe. After the downloading, a number of computers shutdown and could not start and it spread to the whole system in the company. This took some days to contain the situation which brought great loss and also resulted to the loss of important information of the company which was stored in the system. Finally, people should learn to keep passwords to their machines secure and safe, so that hackers can never access the information they are not supposed to access like access the national intelligence systems. References Aglio M., Colao F., Fantoni R., Lazic V. "Double-pulse LIBS in bulk water and on submerged bronze samples." Applied Surface Science 247 (2005): 157–162. Affairs Bureau of Consular. (2013, March Sunday). Travel.State.Government. Retrieved from http://travel.state.gov/visa/immigrants/info/info_1336.html De Giacomo, A.; Dell’Aglio, M.; De Pascale, O. . "Single Pulse-Laser Induced Breakdown Spectroscopy in Aqueous Solution." Appl. Phys. A, 79, (2004): 1035-1038. . Hahn D. W., Hohreiter V. " Plasma-Particle Interactions in a Laser-Induced Plasma: Implications for Laser Induced Breakdown Spectroscopy. ." Anal.Chem. 78: ( 2006): 1509-1514. Hahn D.W. Carranza J.E. . " On-line analysis of ambient air aerosols using laser-induced breakdown spectroscopy. ." Spectrochimica Acta Part B 56: (2001): 851-864. Radziemski, L.J. "From LASER to LIBS, the Path of Technology Development." Spectrochim. Acta B 57, (2002): 1109-1113. Read More

When it comes to online monitoring of weld quality is a problem which manufactures have not solved so far. This therefore means that, these systems do not effectively detect full range of defects that may be present in a certain location. The current laser systems have been implemented but they have not attained indisputable security. This is attributed to the fact that, the open loop controls have been proved to be ineffective. They can never be relied on. This in the long run depict that laser based systems have some limitations and constraints which need to be addressed and implemented if at all the best desired security is to be realized (Hahn & Hohreiter, 2006).

There is a need to have sensors which will directly measure the nugget integrity and surface profile, while determining the strength of the wave. This will mean that, the deflection angles of a laser bean reflected for the nugget surface. However, poor surface qualities which are common cases in have prevented reliable measurement of such profile. Monitors which would effectively monitor the desired wave property need to be implemented. Laser based systems are prone to overlapping of overlapping signals.

The features of interest produce a signal that has desired information. This information then produces signals which overlap the signal of interest and they may even contain signals which have no relevant information. The signal of interest maybe weak in a laser based system than the obscuring signals which makes the system not effective as it should be expected by the Homeland Security. While the markets have advocated for laser based security systems, there are substantial weaknesses in the entire system (Hahn & Carranza, 2001 ).

In the signal processing, there are problems in separating the desired signals from the undesired signals while not destroying the desired information with the entire process. One of the vulnerabilities of laser based application system in detecting the explosive device is the technique that is used in propagating the THz wave through the environment since the THz is easily absorbed by the atmospheric vapor. The absorption of water is strong in most of its revolving form which makes it possible for the THz to be absorbed by water steam when is propagated in the atmosphere.

For instance, a frequency of about 0.1 to 1 HTz holds 228 entity spectral lines for water steam. As humidity increases, a noticeable drop in the peak THz is observed, along with the emergence of water steam assimilation lines. Additionally, the other environmental water steam adds up to the experimental spectral background. These includes, species of gases such as O2,CO, CO2,O3N2O, and CH4 and also the small hanging particulates, mostly the ones that move towards the wavelength of THz emission (Aglio et al, 2005).. The THz-TDS spectroscopy imaging is mostly used in individuals screening, checking the parcels and baggage and also in ships and shipping containers.

They are also used in detecting concealed private firearms and knives. It is also proposed in discovering hidden equipments of biological and chemical agents of war and of mass damage weaponry Laser induced breakdown spectroscopy has detection limits which are generally 1-1—times poorer than conventional techniques. Research depicts that that detection limits for LIBS do vary from element to element depending on the specimen type and the apparatus used. It has been found they the detection limit of 1-30 ppm by mass are common however this can range>100 ppm to < 1ppm.

In the same case, poor precision is also inevitable in this application (Radziemski, 2002). 5-10% of poor precision is experience although this is dependent on the sample homogeneity, sample matrix and excitation properties of the laser. There are some effects which this technology experience coming from the environment and/or the chemical composition of the target sample. This affects the intensity of the emission line in an unpredictable manner.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Disadvantages of Laser Applications in Homeland Security Essay Example | Topics and Well Written Essays - 1500 words, n.d.)
Disadvantages of Laser Applications in Homeland Security Essay Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/military/2049750-disadvantages-of-laser-applications-in-the-field-of-homeland-security
(Disadvantages of Laser Applications in Homeland Security Essay Example | Topics and Well Written Essays - 1500 Words)
Disadvantages of Laser Applications in Homeland Security Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/military/2049750-disadvantages-of-laser-applications-in-the-field-of-homeland-security.
“Disadvantages of Laser Applications in Homeland Security Essay Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/military/2049750-disadvantages-of-laser-applications-in-the-field-of-homeland-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Disadvantages of Laser Applications in Homeland Security

Employment of Forensic Science Examinations within the U.S. Military

The study discussed the different recommendations of a Senate Report on assessment of forensic science needs of state, and local authorities; on the maximal use of the resources for forensic sciences; identification of potential forensic advancements; on the recommendations of programs to increase qualified forensic sciences; and on the assessment of the role of the forensic community in homeland security.... Recommendations in relation to homeland security are also established by the committee, and this is based on the specifications of the Senate report....
10 Pages (2500 words) Dissertation

Border Security Measure

The events of 9/11 compelled some American politicians and citizens to address homeland security more intensively and extensively.... This essay "Border security Measure" discusses the issue and arguments surrounding border security.... Several sources indicated the need for greater border security through a wide range of technological, legislative, and military interventions (Antal, 2010; Meyers, 2003), as well as global agreements (Taylor, 2005)....
9 Pages (2250 words) Essay

Business Software: Accounting Dynamics V.3

This is from its level of competency in regard to task execution and security.... However, the disadvantage results from the fact that all previous infrastructures have undesirable levels of security, in reference to the minimum requirements outlined in users' guide (Morris, 2010, p....
3 Pages (750 words) Research Paper

Houston as a Sanctuary City

The report "Houston as a Sanctuary City" discusses the dilemma of immigration in the USA focusing on Houston being a sanctuary city.... The current cross-border violence instigated by Mexican drug cartels has revived the eternal debate of illegal immigrants permeating the United States borders.... ...
7 Pages (1750 words) Report

Hurricane Katrina as a Learning Lesson for the US Government

Department of homeland security is a body, deployed to take care of security measures required to be taken within the territory of the country.... The research objective is focused on drawing a balance between homeland security measures before and after Hurricane Katrina.... hreat IdentificationHurricane Katrina turned out to be a catastrophe for the US, allegedly due to the inefficiency and delayed reaction of the homeland security, which was designed by the government to meet the national crisis within the boundaries of the country....
5 Pages (1250 words) Research Paper

FEMAs Failure during the Hurricane Katrina Disaster

This study 'FEMA's Failure during the Hurricane Katrina Disaster' gives an idea about all the aspects of FEMA besides its failures and flaws, its history and how it came to be under the Department of homeland security.... As 2003 came FEMA was integrated into the new Department of homeland security and became a part of it....
25 Pages (6250 words) Research Paper

Sociological Perspectives of Crime

John Alderson's contribution to sociological perspectives of crime is also highlighted based on the community-policing framework, which has been adopted as an essential component of homeland security due to the events surrounding the September 11 2001 terrorism attack in the United States.... The attack, which increased attention on terrorism as posing greater challenge to internal security of many countries, has led to increased focus on surveillance rather than social control of the masses....
11 Pages (2750 words) Essay

Organization Assets Physical Security

The paper "Organization Assets Physical security" highlights that physical security control can be provided by both natural barriers or artificially engineered barriers.... Artificially engineered barriers must be developed in a way that they will correspond to the security system in place.... Organizations recognize the aspect of security as important in assuring their best interests.... security professionals have established that risks arise from the existing threat as well as the vulnerability of an asset which can result in the destruction or loss of the assets....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us