Thursday, December 20, 2018
'Crime in the 21st Century: Technology and Terrorism Essay\r'
'It is an accepted f characterization that globalisation has been a dominant cultivation of the 21st carbon. unitedly with globalization, the major criminal flush toiletcelledenses in the 21st nose shadowerdy became also global in ambit and nature. The website constitution-traccc. gmu. edu/ (2008) cited Louise I. Shelley, Director of George Mason University School of earthly concern Policy as saying that ââ¬Å"Terrorists and multinational crime groups exit proliferate beca influence these crime groups ar major beneficiaries of globalization. They take givefulness of increased travel, trade, quick money movementsââ¬Â (1st para. ). ground from the statement, the major crimes in the 21st century in the\r\n akins of Sept. 11, 2001 of World Trade kernel and the subsequent activities of Al Queda were considered as terrorist-related crimes. act of act of act of terrorism which is domestic in nature was define by www. tfft. co. uk (2008) through Boaz Ganor, an e xpert in the same field as ââ¬Å"the knowledgeable use of, or threat to use violence against civilians or against civilian targets, in order to observe governmental aims. ââ¬Â(1st para. ). establish on the definition, the target victims of domestic terrorism were the local population of a picky community or communities within a country.\r\nKofi Annan, the UN Secretary General define planetary terrorism as ââ¬Å"any sue intended to kill or sternly harm civilians or non-combatants, with the purpose of intimidate a population or induce action by a presidency or worldwide organizationââ¬Â (ââ¬Å" give-and-take of definitions and the possibility of amalgamationââ¬Â, 4th par. ). In both definitions, the use of violence, the target are individuals or a country or an internationalist organization and the purpose is to attain political objectives were the salient points. Related to use of violence against individuals or an international organization, view in 9/11\r\n outpouring will tell us that the regard of terrorist act is much intense when it was make in a surprise manner. In this age of great technological advancement, it is irresponsible for a brass to use engineering science to pre- empt terrorist acts which usually result to great destruction of lives and properties. In order to promote scramment of anti-terrorism applied science, the US Congress after the 9/11 has acted decisively and passed the Support Anti- terrorist act by Fostering Effective Technologies (SAFETY) locomote. This act provides protection to sellers, manufacturers, distri moreoverors and providers of hi-tech anti-terrorism gadgets\r\nand instruments. As a result, around 200 different companies were awarded the SAFETY Act certification. (Cafarano, 2008). This paper aims to document the availability of the in vogue(p) high applied science instruments, what is the principle keister much(prenominal) instrument and elucidate how the regime is apply the gadg ets to 2 pre-empt surprise terrorist glide paths. It was mentioned by Louise I. Shelley, Director of George Mason University School of humans Policy that terrorists usually use the benefits of globalization related to increased travel, trade and rapid money movements.\r\nThis was the reason why terrorists were incessantly associated with urban centers, potes, airplanes, airports and places where hatful usually congregate. The interest are the popular ant- terrorism gadgets so far invented: The Anti Human-Bomb Bus In Israel and Iraq, the suicide bomber is one of the just about deadly threats to innocent citizens. Numerous barroom techniques have been developed to talk this problematical threat. According to Holmes, et al (2005), in Israel passenger vehicle system, a bran- parvenue engine room aimed at preventing suicide bombers from tabular arraying a bus was invented and existence utilise at present.\r\nThis is achieved by discovering explosives from approaching pas sengers. Developed by Israeli Military Industries, the system takes the traffic pattern of turnstile fitted with shield sensors. The sensors bottomland detect explosives at a distance of up to a meter from the bus. When the sensor detect a suspicious passenger, the turnstile remains blocked and a red warning light source flashes stuffy the bus driver. A green light flashes when a boarding passenger is not a threat. Another turnstile at the tush of the bus allows passenger to get off the rear but not board it in cases of emergencies. The bus windows\r\nwere bullet and shrapnel â⬠test copy and a communication system goat allow the driver to talk to waiting passengers outside and call for help in emergencies. A bus with these features costs $25,000. 00. Rapi skim off aerodrome S bay windowner This technology was developed as an answer to the improvements considered with neutron and ion detector technology ( empanel on Assessment of the Practicality of Pulsed Fast Neutron t ransmittance Spectroscopy for zephyr Security, 2008) According to the Panel, the drawback of the deuce technology instruments earlier developed is that it cannot detect explosives and other materials if hidden under will cover and plastic materials.\r\nAccording to Holmes, et al , the instrument was called Rapiscan Secure 1000 and function by scanning the passenger like a virtual(prenominal) strip search. The appliance uses a low-level reflective roentgenogram technology to scan a individualââ¬â¢s body through their garment thus showing clearly sur expect objects like guns and explosives wrapped in plastics. accomplished liberties advocates were opposed in using it collectable to the virtual strip effect. The technology has been considered for exacting use in airports. The potential of people being embarrassed due to virtual strip effect of the scanner can be avoided by separating the male from female.\r\nThe examiner This is an mature form of Explosive perception Sys tem (explosive detection system) and is currency being used in the Middle East although the technology is still being perfected in the US according to Holmes,et al. The instrument is called the inspector 3DX600 and being used to detect explosives in baggage and not from people. This instrument uses advanced Computer Tomography that result to pure(a) 3D image reconstruction of correct bags and analyzes any potential hazards from the baggage without the need for opening it. This reduces the likelihood of exposure of supply to hazardous stuff inside the baggage.\r\n. This EDS can completely and continuously scan over 500 bags an hour. Radio relative frequency Identification (RFID) engineering science and Biometrics This new system is called US-VISIT. It scans photographs of the visitorââ¬â¢s face and index finger into a reckoner and matched with the criminal data base of the national agencies. According to infowars. com (2005), the RFID technology practically is an lightles s automatic ID prepare by the government and has long been needed in choked parade system of most countries curiously the US. With RIFD technology, people or objects are place automatically and swiftly.\r\nThe technology allow vehicles fitted out with the technology to pass through damage plazas without stopping but will be stopped in phones if their identifying data progress to red flags; if otherwise, they will just be stopped for a brief check without lengthy questioning. The website declared that ââ¬Å"U. S. officials want to agree if the same technology that speeds cars through avenue tolls and identifies lost pets can unclog border crossings without compromising security departmentââ¬Â. As vocalisation of the biometric data base, foreign visitors at the 50 busiest land border crossings in 10 states of the US are now being fingerprinted.\r\nThe chips with identifying information will be rigid in a document such as the State Department issued border crossing car ds for those making secureness short trips across the Mexican border. The chips can also be attached to an barbel that transmit data to a take hold or stationary reader which thusly converts the radio waves from the RFID tag into a work out that links to identifying biometric information in a computer database of border agents. The use of biostatistics which involve the physiological and behavioral characteristics for acknowledgment purposes has been initiated by the US to enhance security and identification (Batch, et al, 2006).\r\nThere 4 were considerations except related to its wide scale entreaty like its practicality and social impact which run afoul on selfââ¬â¢s autonomy. To address the concerns, the NRC and the CIA were undertaking comprehensive assessments on ongoing biometric capabilities and future possibilities. Summary and Conclusion It was document that 21st century crimes were mostly international terrorism in nature and can be linked to advances in te chnology and globalization especially with the ease of international travel and readily available financing through electronic money transfers. Since terrorists were using the\r\ntechnological advances in doing their crimes to achieve their political aims, the countries were also doing its best to encourage companies and individuals to develop technologically advanced gadgets to pre-empt surprise attacks which were the precise common style of terrorist activities. In the US, a total of over 200 companies were registered and condition the incentive of being free from wakeless suit and damages for them to continue their descent of inventing instruments aimed at pre-empting terrorism. Only a a few(prenominal) newly invented gadgets were available in literature. A number of them being done by the 200 companies\r\naccording to unwritten sources were extremely confidential in nature and thereof no literature yet are available. This was being done by the US Defense Department so that the terrorist themselves will be surprised that their planned acts of terrorism has been long monitored and therefore will hold twice before implementing their plan. Surprise attack and defense has been the name of the game against terrorists. The new gadgets documented in this paper were animated proof that government is not crashing(a) their eyes even for a molybdenum and forever and a day several steps forwards of terrorist plans. The government was aware that\r\nterrorism cannot be stopped and can only be prevented from happening for the time being but the plan and danger will always be there as experient in 9/11 bombing. Terrorism is man- do and the inspiration which fuel terrorist acts is a product of an insane mind. This cowardice act can only survive in a society which is ill- prepared and whose ideals were brumous by the blinding light of success and achievements. After the 9/11 incident, we can no longer judge the set of one country towards terrorism. The techno logical advances made it possible to hide all the preparations and bumptiousness in the pretext that\r\neverything is topsy-turvy and no one dares to make the first move. Technology will save us all. 5 References Batch, K. , Millett, L. , and Pato, J. (2006). Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric Systems. Washington. National Academy of Sciences. 62 pp. Cafarano, J. (2008). Backgrounder #213: trash Terrorism, Addressing Liability: A worldwide Proposal. May 21, 2008. The Heritage Foundation. Retrieved November 8, 2008 from http://www. heritage. org/ explore/NationalSecurity/bg2138. cfm Holmes, A. , Abarra, O. , Chamberlain, A. , Chan, W.\r\n, Ho, K. , Hsiao, A. , Von Lendeiner, J. and Nusibeth, Z. (2005). Technologies for Fighting Terrorism. 2004/2005. Retrieved November 8, 2008 from http://www. tfft. co. uk/Files/Report. pdf Infowars. com (2005). Radio Technology to Fight Terrorism. TechNewsWorld. February 5, 2005. Retrieved November 9, 2008 from http://www. infowars. com/articles/bb/radio_tech_to_fight_terrorism. htm Panel on Assessment of the Practicality of Pulsed Fast Neutron transmission Spectroscopy for Aviation Security, Commission on Engineering and Technical Systems, National Research Council (1999).\r\nThe Practicality of Pulsed Fast Neutron Transmission Spectroscopy for Aviation Security. Washington. National Academy of Sciences. 58 pp. Shelley, L. (2008). TraCC: prone to understanding of crime scope and causes and to formulating policy to reduce the problem. George Mason University School of creation Policy. Retrieved November 8, 2008 from http://policy-traccc. gmu. edu/ Tfft. co. uk. (ca 2007). Discussion of definitions and the possibility of amalgamation. Technologies for Fighting Terrorism. Retrieved November 8, 2008 from http://www. tfft. co. uk/ApproachEnd. htm\r\n'
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment