Describe at least two homeland security challenges


Homework: Technology and Terrorism

Technology... is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other.
-C. P. Snow

This quote by noted British scientist and author C. P. Snow brings to light the fact that technology can have both favorable and adverse effects. On the one hand, it can be used to prevent, protect against, respond to, or recover from a wide variety of hazards or disasters, including terrorist attacks. On the other hand, technology also constitutes a major threat, risk, or vulnerability because it can be used by terrorists to plan or execute attacks. In some cases, it takes technology to fight or beat technology, just as firefighters set backfires to prevent the further spread of wildfires in forested areas. It is important to grasp the applications, consequences, or impacts of technology on actual events in order to assess the potential future applications of technology in homeland security.

To prepare for this homework:

i. Review the online article, "Terrorists and the Internet." Focus on how terrorists use the Internet to spread their message and commit acts of terrorism. Also, think about the challenges the government might encounter when trying to combat terrorists' online activities and consider how such challenges might be addressed.

ii. Review the assigned pages of the online article, "Technology Strategies for Homeland Security: Adaptation and Coevolution of Offense and Defense. Pages 1-13" Focus on the author's analysis of "coevolution"-how terrorists not only use technology to attack their targets, but also engage in a reciprocal back-and-forth battle to disrupt or damage the defense technologies employed by their intended targets. Also, consider long-term challenges for security planning and how specific homeland security strategies might be used to address those challenges.

iii. Review the assigned pages in Chapter 3 of your course text, Introduction to Homeland Security. Pay particular attention to the challenges related to protecting against, preparing for, and responding to acts of cyberterrorism. Think about how homeland security officials might address such challenges.

iv. Reflect on how terrorists and terrorist organizations use technology to plan and execute acts of terrorism.

v. Identify two homeland security challenges related to terrorists' use of technology to plan and execute acts of terrorism.

vi. Think about how homeland security officials might use specific strategies to address those challenges.

Task: (1 page)

i. Explain how terrorists and terrorist organizations use technology to plan and execute acts of terrorism. Be specific, and use examples to illustrate your explanation.

ii. Describe at least two homeland security challenges related to terrorists' use of technology to plan and execute acts of terrorism.

iii. Explain how homeland security officials might address the challenges, using specific strategies.

Format your homework according to the following formatting requirements:

i) The answer should be typed, using Times New Roman font (size 12), double spaced, with one-inch margins on all sides.

ii) The response also includes a cover page containing the title of the homework, the student's name, the course title, and the date. The cover page is not included in the required page length.

iii) Also include a reference page. The Citations and references must follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Other Subject: Describe at least two homeland security challenges
Reference No:- TGS03114529

Now Priced at $40 (50% Discount)

Recommended (97%)

Rated (4.9/5)