The United States of America has made enormous strides towards securing its boarders since the 9/11 attack. Following the attack the federal government has developed frameworks to include technologies in preventing large scale attacks. One of the key frameworks was developing the Department of Homeland Security. The types of homeland security technologies are varied as the threats the government face. According to the department of Homeland Security there are certain technologies have emerged over the years.
Security Technology since 9/11
The United States of America has made enormous strides towards securing its boarders since the 9/11 attack. Following the attack the federal government has developed frameworks to include technologies in preventing large scale attacks. One of the key frameworks was developing the Department of Homeland Security. The types of homeland security technologies are varied as the threats the government face. According to the department of Homeland Security there are certain technologies have emerged over the years.
Some of the technologies developed to avoid terrorist attacks include the creation of remote- controlled airlines. The theory used in the development of this technology is to ensure that airlines could be controlled from the ground. In case of a hijack, the plane could be controlled to land at specific location where security forces could storm and rescue passengers. The other new technology that has gain prominence is the use of Bio-Monitors. It is better to stop terrorist from boarding planes and bombing them.
Most airports prevent this from happening by equipping airports with Explosive Trace Detection Devices. The technology has the ability of scrutinizing passenger luggage for explosive. It also allows security officers to look under the clothing of individuals for weapons concealed (Homeland Security, 2015). The approach has moved to developing technologies that have the ability of scrutinizing facial expression for identifying suspicious behavior. The various detection devices that are in use in airports include millimeter wave machine, chemicals, and radiation as well as biological detectors.
The other technology that has been in use by the American security is the use of biometric identification. This technology uses physical characteristics of a person as a base for identification. Fingerprints are the most used biometric identifier (Mena, 2007). This form of identification is used to identify visitors entering the country. Since the attack other biometric identification methods have come into use that include voice analysis, retina scans and hand geometry.
One of the sectors that have improved its technology is domestic and foreign intelligence. There has been an improvement in data mining software as well devices for intercepting signals. The sector relies on information from overseas operatives. Local police have also improved their tools to analyze information (Homeland Security, 2015). Counterterrorism as well as law enforcement sectors, have received most of the improvements in terms of technology. It has become necessary for improvement of communication between local security agencies.
The improvement in technology covers the federal as well as local authorities. Boarder and physical security infrastructure has received focus lately with Trump willing to develop the wall between US and Mexico border. The Aviation sector has received most of the focus in terms of security technology. Most of the technologies have been on the aviation sector to prevent future attacks through use of planes.
The primary focus for Homeland Security Technology is to develop measures to counter nuclear and biological threats. The biological countermeasures are important for the department since most of current attacks might come through biological agents (Yen, 2004). Terrorists have improved their ability to create biological weapons as it was used during the Syrian war. Biological counter measures account to a huge chunk of the Directorate of Science and Technology. The reason for a huge amount of the budget being allocated for the sector is for preparation and response in case of a chemical attack.
The objectives of the sector are to develop detection equipment, restoration techniques and simulation of attacks. The other area of importance that technology assists is the microbial pathogens. The National Bio-Weapons Defense Analysis Center has been transferred to the Homeland Security department (Homeland Security, 2015). This therefore means that the department has to set up counter-measures technologies towards weapons of mass destruction. The other reasons for improvement in technology are to capture the effects that can result from nuclear proliferation. It includes development of technologies that are able to detect and reduce nuclear smuggling.
Most of the security apparatus in cities operate on the right of boom. This includes the operations of EMS and Fire services. The department once conducted its mandate in a similar. But current operations of the Department of Homeland Security are on the left of boom. The department now operates under the strategy of identifying potential threats, disrupting and preventing attacks (Yen, 2004). Since the 9/11 attack, first responders and intelligence services have to stay ahead and avert terrorist attacks. Some of the main aspects of the left of boom is addressing terrorists financing and planning strategies. Terrorism activities can be controlled by controlling its source of finance. The department has to be proactive, have monitoring strategies as well as vigilance awareness.
The Syria war led to the emergence of the ISIS this terrorist group had taken over huge parts of Iraq and Syria. It has been able to attract fighters from as far as the United States of America. After the fall of the group many of the fighters are returning to their original countries. This is a security threat that has made homeland Security Department develop measures for technological research.
Surveillance strategies through the use of camera on streets have been effective in identifying terrorism suspects. The surveillance technology has been effective at identifying attackers. The successes of the strategy have been its ability to arrest suspects. However the surveillance cameras were not able to prevent the Boston Marathon attack. It was vital for arresting suspects.
Though the technologies have been able to improve the levels of security for ordinary citizens, they infringe on privacy of persons. Some of the security measures have been mining data from social media sites (Mena, 2007). This has had an impact on the society with many complains placed against social media sites like Facebook for divulging private information to security agencies. Airport security technologies have been effective at minimizing the challenges of checking bags.
Modern X-ray technologies are able to search through luggage without the challenges of physical searches. These technologies save on time of passengers as well as assure them of their safety while travelling. The technologies have been able to intercept over 90% of prohibited items into planes and other mode of transport (Mena, 2007). Ordinary citizens have been able to receive training on how to deal with a terror situation. This has the ability of minimizing deaths.
The advancement of security technologies of the Homeland Security Department has improved on my assurance of personal security. Through its framework, it has become easier for one to report any suspicious security threat. The assurance that planes will always have trained marshals increases the level of security assurance. The deployment of screening machines has also reduced the amount of time one takes during screening. This has reduced the wait time up to 10 minutes.
[...]
- Citar trabajo
- Moses Kibiwott (Autor), 2015, Homeland Security Focused Technologies, Múnich, GRIN Verlag, https://www.grin.com/document/513983