the U.S. national aviation system , science homework help
the U.S. national aviation system , science homework help
Introduction
The events of September 11 the U.S. national aviation system became an effective weapons delivery system. Since the tragic event, however, the nation has acted to improve the security of its critical infrastructure. Still, much more needs to be done in this regard. According to Bullock, Haddow, and Coppola (2013), technology is a vital ingredient in the efforts to ensure homeland security (p. 164). Today, numerous technologies are in place to secure the country from terror attacks. However, while technologies may have advantages, they also possess certain limitations that must be addressed. In this regard, there is a need to carefully evaluate the strengths and weaknesses of using technology in homeland security.
Technology Strengths
There is doubt that technologies used in homeland security operations possess invaluable advantages and strengths. First, these technologies are versatile. Versatile technologies are those that are appropriate for a broad range of tactical contexts and operations. For example, bombs and guns can be a handful in many areas of operations. Versatility, states Yen (2004) enables users to transfer the technology to other areas they are needed (p. 34). Second, technologies offer specialization. Specialization enables personnel to focus on increased levels of capability in particular areas of operation. For example, Unmanned Aerial Vehicles, or drones, can be very helpful in locating and bombing targets that are too remote for versatile technologies.
Technology Limitations
There are many limitations of security technologies. For one, technologies are affected by coevolution, according to Jackson (2009), coevolution means the “the reciprocal change” that happens to players that interact within similar environments and which compete (p. 3). In this sense, technology brings about coevolution in that as much as the U.S. government is producing and using advanced technologies to fight terrorists, terrorists are also developing equally cutting-edge technologies. Both sides could coevolve regarding the technologies they use. Another limitation of technologies is that they can never eliminate collateral damage. While it true that weapons such as drones limit the number of casualties by locking on specific targets, it is almost impractical to develop technologies that could eliminate unintended causalities. A conclusion I have made in the course of doing this assignment is that perhaps the reason why terror activities are still increasing is the thinking that terrorists are not tech-savvy. The reality is that terrorists have at their disposal ambitious technologies.
Conclusion
In summary, technologies are an essential part of the war against terror. Since 9/11 the U.S. government has developed and used cutting-edge machines in the fight against Al Qaeda and other terror groups. Security technologies have numerous strengths and advantages, such as versatility and specialization. However, the limitations cannot be ignored. Technologies can also have limitations such as coevolution as well as the inability to get rid of collateral damage effectively.
References
Bullock, J. A., Haddow, G. D., & Coppola, D. P. (2013). Introduction to homeland security (5th ed.). Waltham, MA: Elsevier Inc.
Jackson, B. A. (2009). Technology strategies for homeland security: Adaptation and
coevolution of offense and defense. Homeland Security Affairs, V(1).
Retrieved fromhttp://www.hsaj.org/?fullarticle=5.1.4.
Yen, J. (2004). Emerging technologies for homeland security. Communications of the ACM, 47(3), pp. 34.
” Good job addressing the pros and cons of technology with regard to achieving the homeland security missions! Drones are an interesting tool that can be used in foreign missions, as well as in domestic programs. U.S. Customs and Border Protection uses drones to patrol the Southern Border and many police departments are moving towards smaller drones as a surveillance technique.
Take a look at these two sources regarding U.S. Customs and Border Protection’s drone program:
1. http://www.oig.dhs.gov/assets/pr/2015/oigpr_010615…
2. http://www.kpbs.org/news/2015/jan/27/border-drones…
The investigative office had some solid critiques of the program as it is administered.
“
Give your thoughts on the links in the bold paragraph ABOVE base on the section above it… in APA format with At least two reference…..
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..


