• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Countering Terrorism with the Help of Information Technology

Extracts from this document...


Countering Terrorism with the Help of Information Technology Shane Schulze Review Topic #1, Article #1 What steps are needed for a nation to prevent terrorist threats being carried out? In a recent article by a few of DARPA's (Defense Advanced Research Projects Agency) managers, that answer is using IT (Information Technology). Robert Popp, Thomas Armour, Ted Senator, and Kristen Numrych state that the DARPA's goal is to "empower users within the foreign intelligence and counterterrorism communities with IT" so that the decision makers can make informed choices. The need for this information to be 100% accurate is vital not only for the United States national security but for the integrity of our government. DARPA is a United States Military program that pursues high payoff research that can be applied to government policies. They continuously research advanced technologies with a high enthusiasm from each of their department managers. They encourage these radical innovations by steadily rotating their managers in and out of the company every 4 years thereby injecting a great amount of energy into their programs. New people come in with fresh ideas and are able to quickly start them with an extremely large budget (2004 annual budget of $2.9 billion). They are also able to sponsor far reaching technology explorations through other organizations. They just recently sponsored the DARPA Challenge in April, 2004; in which contestants were challenged to manufacture a fully automated vehicles that could travel from Los Angeles to Las Vegas with no help from their human creators for a $1,000,000 prize. ...read more.


One perspective and one policy must be chosen and proven in order for this tool to operate correctly. Once these principles have been established, communications will flow faster and more smoothly as too much time is currently wasted on researching when immediate information is demanded. However, the requirement of using a synchronized set of tools the methods must be consistently challenged to ensure that the tools are always valid. Always questioning the set methods will allow the users to find out if any fixes are needed due to outlining problems or outdated practices. The use of tools in pattern analysis is important to assist in the flagging of potentially illegal activities. The theory behind this is that terrorists must participate in certain activities to carry out their plans, i.e. destructive methods, financing. These activities leave sparse pieces of embedded information that can be detectable and when assembled with already recognized suspected movements it will send a warning to an analyst. A great assistant to a pattern analyst is the use of graphical illustrations. These help analyst's discover and visualize the networks created by the flagged information. This is more practical in larger information pools as data can easily be lost in the text and the connecting lines can make things be more noticeable. Foreign languages are the third area that DARPA has focused it's IT on. ...read more.


was bombing a small town in Iraq that supposedly was hiding one of the former military leaders. The bombs were sent, buildings destroyed, and people were killed; but not the right ones. The leader was later shown on TV alive. So the U.S. had made a decision with the information that was given to them and they made a mistake. Not only does this waste our time and resources and it makes the U.S. look extremely poor in the eyes of our allied nations. The failed search for WMD's (weapons of mass destruction) in Iraq also didn't help as our country is perceived now as a "evil power" to more people. The government is trying to make the analyst's work totally computerized, thereby trying to regulate everything from a small lab in a secure area. A part of the reason terrorists such as Osama bin Laden and Saddam Hussein have so successful in eluding capture is that there is no element in the guidelines to verify the information is correct. In the past these elements were spies that penetrated the groups to validate the information. Granted that having a analyst doing this work eliminates the risk involved but there needs to be human factors contributing to the research continuously. Overall, the article from DARPA's group was very interesting as I am a great admirer of their agency. The ideas and technologies generated by there group are truly incredible, beneficial to the U.S. and I'm sure that these IT tools are no different. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays


    Strategic level Managers are largely concerned with long term organisational planning. Decisions tend to be unstructured and they are made infrequently. However, the decisions made at this level are likely to have a larger impact on the organisation as a whole are not easily reversed.

  2. Artificial Intelligence

    and insurances, who can use AI to predict customer behavior and detect trends. As you may expect, the business of Artificial Intelligence is becoming one of the major driving forces for research.

  1. The Information Society and Information Technology: A New Mode of Production?

    which arises a legal and political superstructure and to which correspond definite forms of social consciousness...At a certain stage of development, the material productive forces of society come into conflict with the existing relations of production or-this merely expresses the same thing in legal terms-with the property relations within the framework of which they have operated hitherto.

  2. Free essay

    Managing information

    It is usually divided into six external influences on a business- political, economic, social, technological, legal, and environmental. Political The factors which affect the activity of business. This is concerned with how political developments might affect a business's strategy which is out of control of the business but need to anticipate changes and be able to react accordingly.

  1. Human resources

    The leadership/ management matrix Considerable leadership but not much management required (start up businesses) Considerable leadership and management required (most big businesses) Little management or leadership required (most very small businesses) Considerable management but little leadership required High Amount of change needed Low High Low The complexity of the operation

  2. Recent Developments in Information Technology

    computer networks, and these in turn connects a number of individual computers. IKEA uses the Internet to extracting relevant information and to encourage customers to visit their website, to look at the wide range of products that the business has to offer.

  1. china town revision notes

    Absence of competitor analysis may account for one of the contributing factors to the restaurant's low profits after the move. At the restaurant in Chinatown, the massive increase in capacity and the inability to forecast potential demand leads to under utilisation of the restaurant's capacity.

  2. Full Assignment

    This will slow down the income of the business com pared to a PLC. This will restrict the amount of capital they can raise to invest in PEP. Task 2B There are two sectors within the economy. A PLC falls into the private sector.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work