Assignment Overview

Type: Discussion Board (Part 1/2)

Unit: Technology Alternatives

Deliverable Length: 400-600 words

View objectives for this assignment

Assignment Objectives

Evaluate information sharing and knowledge management technologies, such as database technology, data mining, link and content analysis, and Web 2.0 technologies used to facilitate information sharing and intelligence gathering agencies.

Evaluate inspection, detection, and surveillance technologies, such as RFID, SensorNetworks, Biometrics, Radiation Detection, Bio Detection, UAVs, CCTV, Satellite Imagery and GIS.

Leverage knowledge of information assurance and enterprise technology implementation to better manage the risks associated with designing, building, implementing, and using technology enablers.

Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Note: There are 2 parts to this assignment.

Part 1

U.S. counterterrorism (CT) strategy is not predicated on technology solutions. The ultimate goal of U.S. CT strategy is to eliminate the root motivations for terrorism. Post your answers to the following questions:

Identify what you think are at least 3 root causes of terrorism.

Can these root causes be eliminated? Why or why not?

Do you think technology should play a lesser or greater role in U.S. CT strategy? Explain your reasoning.

Part 2

Review and reflect on the knowledge that you gained during the course, and provide a summary. Post your answers to the following questions:

How does understanding Department of Homeland Security Technology Solutions affect your views on technology?

Do you feel more or less optimistic about your personal security?

will the knowledge gained pertaining to (DHS) Technology affect your personal behavior?

For assistance with your assignment, please use the following resources.

Brooks, F. (1986). No silver bullet—Essence and accident in software engineering. Proceeding of the IFIP tenth world computing conference, 1069–76.

White, R. (2012, October 19). E-mail interview.

Bureau of Alcohol, Tobacco, Firearms, and Explosives. (n.d.). Retrieved from http://www.atf.gov/

Central Intelligence Agency. (n.d.). Retrieved from https://www.cia.gov/

Federal Bureau of Investigation. (n.d.). Retrieved from http://www.fbi.gov/

Federal Emergency Management Agency. (n.d.). Retrieved from http://www.fema.gov/

North American Aerospace Defense Command. (n.d.). Retrieved from http://www.norad.mil/

Official New York City Police Department. (n.d.). Retrieved from http://www.nyc.gov/html/nypd/html/home/home.shtml

United States Northern Command. (n.d.). Retrieved from http://www.northcom.mil/

Order your essay today and save 30% with the discount code ESSAYSHELP