10 May 2022

127

The Future of Anti-Terrorism

Format: APA

Academic level: High School

Paper type: Essay (Any Type)

Words: 535

Pages: 1

Downloads: 0

The technology industry has taken a paradigm shift and is fast evolving. In the next five years, technology usage will have had a profoundly more considerable impact on how industries operate. Pervasive technological effects have resulted in the radical restructuring of entire industries (Bharadwaj et al., 2013). It has become evident that adopting real-time digital technologies results in a high rate of productivity.

One of the areas where technological interventions should be applied is security, and in particular terror combat sector. The future of anti-terrorism is dependent on advanced breakthrough technological features since terrorist groups, with their limited resources, are quick in refining their existing methods and improvising time-tested techniques that might overcome the military troops out there in the field (Pavlou and El Sawy, 2010). Terrorist groups are in a battle that they believe they are yet to win and they are always at the forefront in seeking new ways in striking the new targets. Therefore, the next five years in the Anti-Terrorism sector need advanced methods, which are inclusive of system technologies, Biometrics, non-lethal weapons, data mining and link analysis technologies, nanotechnology and directed-energy weapons. All these can be achieved by adopting new computer systems that can support an array of such applications. Network-centric operations are part of the system-integrated technologies and eases effectiveness through networking sensors, which in turn ensures active coordination between emergency responders, law enforcement officials and decision makers thus enhancing shared awareness, increase the speed of command and higher tempo of operations in curbing vulnerability to potential hostility. On the other hand, the idea on biometrics ensures details of every individual who enters or leaves any nation are captured and stored in the computer database for future identification or verification. Such biometrics make it easy for the Anti-Terrorism Agencies to narrow down to individuals who are suspected of possible or have been involved in mass killings since biometric details are unique to every individual. Individual features captured in the computer systems include hand geometry, face recognition, voice recognition and Iris recognition.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

A wide range of computing in this industry in the next half-decade should be on a platform of supporting the application referred to as Non-lethal Weapons. There is a more significant challenge at the battlefields as forces try combating the enemy. In a bid to safeguard lives, possible destruction of property, apprehend, and incapacitate the enemy, the Anti-Terrorism sector ought to do things the smart way. In the next five years, computer applications will have been improvised to accommodate the idea of non-lethal weapons that are controlled by expertise in the server rooms without necessarily engaging forces on a man-on encounter with the terrorist. Such discriminate weapons are designed to incapacitate the enemy or bombs and missiles thus minimizing fatalities and undesired damage to property and environment. The broad spectrum covered by non-lethal weapon ranges from development of acoustic systems, non-penetrating projectiles, and munitions, communication system, electromagnetic systems, and chemicals. There is also the idea of data mining, which tracks the historical and current online data to support informed decision-making. Vast datasets are subjected to scrutiny to aid in identifying patterns and anomalies from previous searches ("Future of Anti-Terrorism Technologies | The Heritage Foundation," n.d.). Data mining and link analysis in computing can harbor and exploit the vast amount of information about individuals undergoing probing and thus stands out to be the most efficient, unlike the initial processes where trailing terrorists were often indistinguishable from a mass of bills, census records, license applications and visa forms.

References

Bharadwaj A., O.A. El Sawy, P.A. Pavlou, N. Venkatraman. Digital business strategy: Toward a next generation of insights.

P.A. Pavlou, O.A. El Sawy. The ‘third hand': IT-enabled competitive advantage in turbulence through improvisational capabilities

The Future of Anti-Terrorism Technologies | The Heritage Foundation. (n.d.). Retrieved from http://www.heritage.org/homeland-security/report/the-future-anti-terrorism-technologies

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). The Future of Anti-Terrorism.
https://studybounty.com/the-future-of-anti-terrorism-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

The 1931 Central China Flood

The country of China was a vibrant agricultural hub in the early 18th century. The agriculturists cultivated on every available fertile piece of land. Their activities disrupted wetlands and Nanyang trees were felled...

Words: 625

Pages: 2

Views: 143

2009 Washington DC Metro Train Collision

The 22 nd of June 2009 saw the collision of two southbound Red Line Washington Metro trains. The total number of casualties was nine with tens of others being injured. According to DC Metro, the cause of the accident...

Words: 554

Pages: 2

Views: 80

Comparing and Contrasting the Rural, Urban, and Insurgent Models of Terrorism

In the purest sense, the term terrorism refers to the application of intentional brutality and violence, in general against unarmed civilians, mainly for political reasons. The term was coined during the French...

Words: 325

Pages: 1

Views: 518

Understanding Response and Recovery

The emergency management system will have to change the response and recovery protocols for better response to an emergency. The changes in the system will entail new official organizations and primed plans for...

Words: 374

Pages: 1

Views: 209

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

Radicalization is a concept that refers to the gradual social processes used to explain changes in behaviours or ideas. There is a clear distinction between behavioural and cognitive dimensions of...

Words: 1951

Pages: 7

Views: 134

Information Sharing and Collaboration: Department of Homeland Security

The Department of Homeland Security (DHS) has many intelligence agencies used for protecting American citizens. The various agencies should collaborate by sharing information to combat threats to Americans....

Words: 307

Pages: 1

Views: 63

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration