Friday, May 17, 2019

Crime in the 21st Century: Technology and Terrorism Essay

It is an accepted fact that globalization has been a dominant growing of the 21st century. Together with globalization, the major crimes in the 21st century became also global in cranial orbit and nature. The website policy-traccc. gmu. edu/ (2008) cited Louise I. Shelley, Director of George mason University School of Public Policy as saying that Terrorists and transnational crime groups allow proliferate because these crime groups are major beneficiaries of globalization. They take advantage of increased travel, trade, rapid money movements (1st para. ). ground from the statement, the major crimes in the 21st century in thelikes of Sept. 11, 2001 of World Trade Center and the subsequent activities of Al Queda were considered as terrorist-related crimes. Terrorism which is domestic in nature was defined by www. tfft. co. uk (2008) through Boaz Ganor, an expert in the same field as the intentional use of, or threat to use violence against civilians or against civilian targets, i n parliamentary law to attain political aims. (1st para. ). Based on the definition, the target victims of domestic terrorist act were the local population of a particular community or communities within a country.Kofi Annan, the UN Secretary prevalent define outside(a) terrorism as any action intended to kill or in earnest harm civilians or non-combatants, with the purpose of intimidating a population or compelling action by a government or international validation (Discussion of definitions and the possibility of amalgamation, 4th par. ). In both definitions, the use of violence, the target are individuals or a country or an international organization and the purpose is to attain political objectives were the salient points. Related to use of violence against individuals or an international organization, familiarity in 9/11bombing leave tell us that the impact of terrorist act is a great deal intense when it was done in a surprise manner. In this age of great technologica l advancement, it is urgent for a government to use engineering science to pre- empt terrorist acts which usually result to great destruction of lives and properties. In order to promote development of anti-terrorism engineering science, the US Congress after the 9/11 has acted decisively and passed the Support Anti-Terrorism by Fostering Effective Technologies (SAFETY) Act. This act provides protection to sellers, manufacturers, distri exclusivelyors and providers of hi-tech anti-terrorism gadgetsand instruments. As a result, about 200 varied companies were awarded the SAFETY Act certification. (Cafarano, 2008). This paper aims to document the availability of the latest high engine room instruments, what is the principle tin dissolve such instrument and elucidate how the government is utilize the gadgets to 2 pre-empt surprise terrorist attacks. It was mentioned by Louise I. Shelley, Director of George stonemason University School of Public Policy that terrorists usually us e the benefits of globalization related to increased travel, trade and rapid money movements.This was the reason why terrorists were always associated with urban centers, cumuluses, airplanes, airports and places where people usually congregate. The following are the frequent ant- terrorism gadgets so far invented The Anti Human-Bomb Bus In Israel and Iraq, the suicide bomber is one of the around deadly threats to innocent citizens. Numerous prevention techniques have been developed to address this problematic threat. According to Holmes, et al (2005), in Israel passel system, a new technology aimed at preventing suicide bombers from boarding a bus was invented and be used at present.This is achieved by detecting explosives from approaching passengers. Developed by Israeli force Industries, the system takes the form of turnstile fitted with shield sensors. The sensors great deal detect explosives at a distance of up to a meter from the bus. When the sensor detect a suspicious passenger, the turnstile remains blocked and a red warn light flashes near the bus driver. A green light flashes when a boarding passenger is not a threat. Another turnstile at the rear of the bus allows passenger to get off the rear but not board it in cases of emergencies. The bus windowswere bullet and shrapnel proof and a communication system chamberpot allow the driver to talk to waiting passengers outside and call for help in emergencies. A bus with these features costs $25,000. 00. Rapiscan Airport Scanner This technology was developed as an answer to the improvements needed with neutron and ion detector technology (Panel on Assessment of the Practicality of Pulsed Fast Neutron Transmission Spectroscopy for melodic phrase Security, 2008) According to the Panel, the drawback of the two technology instruments primitively developed is that it cannot detect explosives and other materials if hidden under lead cover and plastic materials.According to Holmes, et al , the instr ument was called Rapiscan Secure 1000 and function by scanning the passenger like a practical(prenominal) strip search. The machine uses a low-level reflective x-ray technology to scan a mortals body through their clothing thus showing clearly metal objects like guns and explosives cover in plastics. Civil liberties advocates were opposed in using it due to the virtual strip aftermath. The technology has been considered for irresponsible use in airports. The potential of people be embarrassed due to virtual strip effect of the scanner can be avoided by separating the male from female.The eXaminer This is an advanced(a) form of Explosive perception System (EDS) and is currency being used in the Middle East although the technology is still being perfected in the US according to Holmes,et al. The instrument is called the Examiner 3DX600 and being used to detect explosives in baggage and not from people. This instrument uses advanced Computer Tomography that result to complete 3D flick reconstruction of entire bags and analyzes any potential hazards from the baggage without the need for opening it. This reduces the likelihood of exposure of supply to hazardous stuff inside the baggage.. This EDS can completely and continuously scan over calciferol bags an hour. Radio Frequency Identification (RFID) engine room and Biometrics This new system is called US-VISIT. It scans photographs of the visitors facet and index finger into a computer and matched with the criminal data base of the federal agencies. According to infowars. com (2005), the RFID technology practically is an invisible automatic ID check by the government and has long been needed in close up border system of most countries particularly the US. With RIFD technology, people or objects are identified automatically and swiftly.The technology allow vehicles outfitted with the technology to pass through toll plazas without stopping but will be stopped in borders if their identifying data produce red flags if otherwise, they will just be stopped for a brief check without lengthy questioning. The website declared that U. S. officials want to see if the same technology that speeds cars through channel tolls and identifies lost pets can unclog border crossings without compromising security. As part of the biometric data base, foreign visitors at the 50 busiest land border crossings in 10 states of the US are now being fingerprinted.The chips with identifying information will be placed in a document such as the conjure up Department issued border crossing cards for those making regular short trips across the Mexican border. The chips can also be attached to an antenna that transmit data to a handheld or stationary reader which then converts the radio waves from the RFID tag into a code that links to identifying biometric information in a computer database of border agents. The use of biometrics which involve the physiological and behavioral characteristics for identification purposes has been initiated by the US to enhance security and identification (Batch, et al, 2006).There 4 were considerations however related to its wide scale assembling like its practicality and social impact which infringe on selfs autonomy. To address the concerns, the NRC and the CIA were undertaking panoptic assessments on current biometric capabilities and future possibilities. Summary and Conclusion It was documented that 21st century crimes were mostly international terrorism in nature and can be linked to advances in technology and globalization peculiarly with the ease of international travel and readily available financing through electronic money transfers. Since terrorists were using thetechnological advances in doing their crimes to achieve their political aims, the countries were also doing its best to encourage companies and individuals to develop technologically advanced gadgets to pre-empt surprise attacks which were the very common style of terrorist activitie s. In the US, a total of over 200 companies were registered and given(p) the incentive of being free from legal suit and damages for them to continue their business of inventing instruments aimed at pre-empting terrorism. exclusively a few newly invented gadgets were available in lit. A number of them being done by the 200 companiesaccording to unwritten sources were highly confidential in nature and at that placefore no literature yet are available. This was being done by the US Defense Department so that the terrorist themselves will be surprised that their planned acts of terrorism has been long monitored and therefore will think twice forward implementing their plan. Surprise attack and defense has been the name of the game against terrorists. The new gadgets documented in this paper were surviving proof that government is not winking their eyes even for a moment and always several(prenominal) steps ahead of terrorist plans. The government was aware thatterrorism cannot be stopped and can only be prevented from happening for the time being but the plan and danger will always be there as experienced in 9/11 bombing. Terrorism is man- made and the inspiration which fuel terrorist acts is a product of an insane mind. This cowardice act can only survive in a party which is ill- prepared and whose ideals were blurred by the blinding light of success and achievements. After the 9/11 incident, we can no longer judge the readiness of one country towards terrorism. The technological advances made it possible to encompass all the preparations and readiness in the pretext thateverything is topsy-turvy and no one dares to make the first move. Technology will save us all. 5 References Batch, K. , Millett, L. , and Pato, J. (2006). Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric Systems. Washington. bailiwick Academy of Sciences. 62 pp. Cafarano, J. (2008). Backgrounder 213 fighting Terrorism, Addressing Liability A Global P roposal. May 21, 2008. The Heritage Foundation. Retrieved November 8, 2008 from http//www. heritage. org/Research/NationalSecurity/bg2138. cfm Holmes, A. , Abarra, O. , Chamberlain, A. , Chan, W., Ho, K. , Hsiao, A. , Von Lendeiner, J. and Nusibeth, Z. (2005). Technologies for Fighting Terrorism. 2004/2005. Retrieved November 8, 2008 from http//www. tfft. co. uk/Files/Report. pdf Infowars. com (2005). Radio Technology to Fight Terrorism. TechNewsWorld. February 5, 2005. Retrieved November 9, 2008 from http//www. infowars. com/articles/bb/radio_tech_to_fight_terrorism. htm Panel on Assessment of the Practicality of Pulsed Fast Neutron Transmission Spectroscopy for melody Security, Commission on Engineering and Technical Systems, National Research Council (1999).The Practicality of Pulsed Fast Neutron Transmission Spectroscopy for Aviation Security. Washington. National Academy of Sciences. 58 pp. Shelley, L. (2008). TraCC Devoted to understanding of crime scope and causes and to for mulating policy to reduce the problem. George Mason University School of Public Policy. Retrieved November 8, 2008 from http//policy-traccc. gmu. edu/ Tfft. co. uk. (ca 2007). Discussion of definitions and the possibility of amalgamation. Technologies for Fighting Terrorism. Retrieved November 8, 2008 from http//www. tfft. co. uk/ApproachEnd. htm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.