Monday, April 22, 2019

Technological issue in homeland security Case Study

Technological issue in homeland security - Case Study showcase consort to Vacca (2007), the mesh has led to vast transformations in the Homeland pledge. For many years, the mesh has been utilized to stir communication between terrorists. The terrorists are also utilizing the internet as a recruiting tool, and support of terrorist organizations it is through the internet that various terrorist organizations communicate and advise each other on the t cultivateics to theatrical role in fight their enemies. The internet has also enabled Homeland Security to get information in a cheap and at large(p) manner obtaining of information through the internet is easy since, at a single click, Homeland Security can have a lot of information. This has helped the Homeland Security to detect any threats to security and act promptly, thus eliminating issues of terrorism.Sharing of information from one individual to another over the globe has been necessitated through the physical exercise of the internet. Hence, the Homeland Security can access terrorism information over the globe through the use of the internet. This terrorist information is usually crucial in eliminating terrorist activities and improving security. On the side of Homeland security, the internet has been an subtle tool since it has assisted the department in identifying individuals who may be terrorists through the use of biometric technology (Alperen, 2011). According to biometric technology, every person possesses certain traits behavioral and physical, which identify people in a unique manner.The internet has made the revelation of operations done by the Homeland Security officials feasible. Through internet hacking or cyber crimes, the terrorists can access crucial information from the Homeland security website. Because of this problem, the Homeland Security has increased cyber lore through seeking Information Technology professionals to assist in tracking of the terrorist activities on the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.