Introduction The events of September 11 the U.S. national a

You Are Eligible For 15% Discount This Month!

Introduction The events of September 11 the U.S. national aviation system became an effective weapons delivery system. Since the tragic event, however, the nation has acted to improve the security of its critical infrastructure. Still, much more needs to be done in this regard. According to Bullock, Haddow, and Coppola (2013), technology is a vital ingredient in the efforts to ensure homeland security (p. 164). Today, numerous technologies are in place to secure the country from terror attacks. However, while technologies may have advantages, they also possess certain limitations that must be addressed. In this regard, there is a need to carefully evaluate the strengths and weaknesses of using technology in homeland security. Technology Strengths There is doubt that technologies used in homeland security operations possess invaluable advantages and strengths. First, these technologies are versatile. Versatile technologies are those that are appropriate for a broad range of tactical contexts and operations. For example, bombs and guns can be a handful in many areas of operations. Versatility, states Yen (2004) enables users to transfer the technology to other areas they are needed (p. 34). Second, technologies offer specialization. Specialization enables personnel to focus on increased levels of capability in particular areas of operation. For example, Unmanned Aerial Vehicles, or drones, can be very helpful in locating and bombing targets that are too remote for versatile technologies. Technology Limitations There are many limitations of security technologies. For one, technologies are affected by coevolution, according to Jackson (2009), coevolution means the “the reciprocal change” that happens to players that interact within similar environments and which compete (p. 3). In this sense, technology brings about coevolution in that as much as the U.S. government is producing and using advanced technologies to fight terrorists, terrorists are also developing equally cutting-edge technologies. Both sides could coevolve regarding the technologies they use. Another limitation of technologies is that they can never eliminate collateral damage. While it true that weapons such as drones limit the number of casualties by locking on specific targets, it is almost impractical to develop technologies that could eliminate unintended causalities. A conclusion I have made in the course of doing this assignment is that perhaps the reason why terror activities are still increasing is the thinking that terrorists are not tech-savvy. The reality is that terrorists have at their disposal ambitious technologies. Conclusion In summary, technologies are an essential part of the war against terror. Since 9/11 the U.S. government has developed and used cutting-edge machines in the fight against Al Qaeda and other terror groups. Security technologies have numerous strengths and advantages, such as versatility and specialization. However, the limitations cannot be ignored. Technologies can also have limitations such as coevolution as well as the inability to get rid of collateral damage effectively.ReferencesBullock, J. A., Haddow, G. D., & Coppola, D. P. (2013). Introduction to homeland security (5th ed.). Waltham, MA: Elsevier Inc.Jackson, B. A. (2009). Technology strategies for homeland security: Adaptation and coevolution of offense and defense. Homeland Security Affairs, V(1).Retrieved from, J. (2004). Emerging technologies for homeland security. Communications of the ACM, 47(3), pp. 34.’ I agree also about technology being versatile. By technology being versatile it opens up many opportunities for agencies. Do you think that because technology is versatile it could eventually be a danger to the United States?’ Respond to the question in the bold paragraph ABOVE base on the section above it… in APA format with At least two reference…..

Our Prices Start at $11.99. As A First Time Client, You Are Eligible For 15% Discount This Month!

Get The Answer Here
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published.