The events of September 11 the U.S. national aviation system became an effective weapons delivery system. Since the tragic event, however, the nation has acted to improve the security of its critical infrastructure. Still, much more needs to be done in this regard. According to Bullock, Haddow, and Coppola (2013), technology is a vital ingredient in the efforts to ensure homeland security (p. 164). Today, numerous technologies are in place to secure the country from terror attacks. However, while technologies may have advantages, they also possess certain limitations that must be addressed. In this regard, there is a need to carefully evaluate the strengths and weaknesses of using technology in homeland security.
There is doubt that technologies used in homeland security operations possess invaluable advantages and strengths. First, these technologies are versatile. Versatile technologies are those that are appropriate for a broad range of tactical contexts and operations. For example, bombs and guns can be a handful in many areas of operations. Versatility, states Yen (2004) enables users to transfer the technology to other areas they are needed (p. 34). Second, technologies offer specialization. Specialization enables personnel to focus on increased levels of capability in particular areas of operation. For example, Unmanned Aerial Vehicles, or drones, can be very helpful in locating and bombing targets that are too remote for versatile technologies.
There are many limitations of security technologies. For one, technologies are affected by coevolution, according to Jackson (2009), coevolution means the “the reciprocal change” that happens to players that interact within similar environments and which compete (p. 3). In this sense, technology brings about coevolution in that as much as the U.S. government is producing and using advanced technologies to fight terrorists, terrorists are also developing equally cutting-edge technologies. Both sides could coevolve regarding the technologies they use. Another limitation of technologies is that they can never eliminate collateral damage. While it true that weapons such as drones limit the number of casualties by locking on specific targets, it is almost impractical to develop technologies that could eliminate unintended causalities. A conclusion I have made in the course of doing this assignment is that perhaps the reason why terror activities are still increasing is the thinking that terrorists are not tech-savvy. The reality is that terrorists have at their disposal ambitious technologies.
In summary, technologies are an essential part of the war against terror. Since 9/11 the U.S. government has developed and used cutting-edge machines in the fight against Al Qaeda and other terror groups. Security technologies have numerous strengths and advantages, such as versatility and specialization. However, the limitations cannot be ignored. Technologies can also have limitations such as coevolution as well as the inability to get rid of collateral damage effectively.
Bullock, J. A., Haddow, G. D., & Coppola, D. P. (2013). Introduction to homeland security (5th ed.). Waltham, MA: Elsevier Inc.
Jackson, B. A. (2009). Technology strategies for homeland security: Adaptation and
coevolution of offense and defense. Homeland Security Affairs, V(1).
Yen, J. (2004). Emerging technologies for homeland security. Communications of the ACM, 47(3), pp. 34.
“ One of the greatest barriers to utilizing technology within the federal government is acquisition. It often takes over a month to procure supplies and over a year to procure services. The federal government needs to focus on eliminating pre-solicitation and pre-award steps that are redundant and creating a method to negotiate changes to the contract type and structure after award which would give acquisition professionals much needed flexibility when planning (Meier, 2010). They should also focus on researching and implementing best practices learned from “The Lean Start-Up” and business models of innovation leaders such as SpaceX. I recently created a three part workshop titled, “How to Fight Inertia in Federal Acquisition.” Part I focuses on facilitating understanding by asking mission clients the “right questions” about their requirements and teaching mission clients the Federal Acquisition Regulation procedures (Meier, 2010). Part II focuses on taking calculated risks to increase speed which involves focusing efforts during pre-solicitation and pre-award on only the most crucial steps and learning how to make changes after award. Part III addresses the need for a cultural change. Federal agencies often lack vision. It is impossible to innovate in an environment that embraces reality. Part III encourages employees to raise expectations and demand resolutions.
Meier, S. R. (2010). Causal inferences on the cost overruns and schedule delays of large‐scale US federal defense and intelligence acquisition programs. Project Management Journal, 41(1), 28-39.”
Respond to the bold paragraph ABOVE base on the section above it… in APA format with At least two reference…..