• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Countering Terrorism with the Help of Information Technology

Extracts from this document...

Introduction

Countering Terrorism with the Help of Information Technology Shane Schulze Review Topic #1, Article #1 What steps are needed for a nation to prevent terrorist threats being carried out? In a recent article by a few of DARPA's (Defense Advanced Research Projects Agency) managers, that answer is using IT (Information Technology). Robert Popp, Thomas Armour, Ted Senator, and Kristen Numrych state that the DARPA's goal is to "empower users within the foreign intelligence and counterterrorism communities with IT" so that the decision makers can make informed choices. The need for this information to be 100% accurate is vital not only for the United States national security but for the integrity of our government. DARPA is a United States Military program that pursues high payoff research that can be applied to government policies. They continuously research advanced technologies with a high enthusiasm from each of their department managers. They encourage these radical innovations by steadily rotating their managers in and out of the company every 4 years thereby injecting a great amount of energy into their programs. New people come in with fresh ideas and are able to quickly start them with an extremely large budget (2004 annual budget of $2.9 billion). They are also able to sponsor far reaching technology explorations through other organizations. They just recently sponsored the DARPA Challenge in April, 2004; in which contestants were challenged to manufacture a fully automated vehicles that could travel from Los Angeles to Las Vegas with no help from their human creators for a $1,000,000 prize. ...read more.

Middle

One perspective and one policy must be chosen and proven in order for this tool to operate correctly. Once these principles have been established, communications will flow faster and more smoothly as too much time is currently wasted on researching when immediate information is demanded. However, the requirement of using a synchronized set of tools the methods must be consistently challenged to ensure that the tools are always valid. Always questioning the set methods will allow the users to find out if any fixes are needed due to outlining problems or outdated practices. The use of tools in pattern analysis is important to assist in the flagging of potentially illegal activities. The theory behind this is that terrorists must participate in certain activities to carry out their plans, i.e. destructive methods, financing. These activities leave sparse pieces of embedded information that can be detectable and when assembled with already recognized suspected movements it will send a warning to an analyst. A great assistant to a pattern analyst is the use of graphical illustrations. These help analyst's discover and visualize the networks created by the flagged information. This is more practical in larger information pools as data can easily be lost in the text and the connecting lines can make things be more noticeable. Foreign languages are the third area that DARPA has focused it's IT on. ...read more.

Conclusion

was bombing a small town in Iraq that supposedly was hiding one of the former military leaders. The bombs were sent, buildings destroyed, and people were killed; but not the right ones. The leader was later shown on TV alive. So the U.S. had made a decision with the information that was given to them and they made a mistake. Not only does this waste our time and resources and it makes the U.S. look extremely poor in the eyes of our allied nations. The failed search for WMD's (weapons of mass destruction) in Iraq also didn't help as our country is perceived now as a "evil power" to more people. The government is trying to make the analyst's work totally computerized, thereby trying to regulate everything from a small lab in a secure area. A part of the reason terrorists such as Osama bin Laden and Saddam Hussein have so successful in eluding capture is that there is no element in the guidelines to verify the information is correct. In the past these elements were spies that penetrated the groups to validate the information. Granted that having a analyst doing this work eliminates the risk involved but there needs to be human factors contributing to the research continuously. Overall, the article from DARPA's group was very interesting as I am a great admirer of their agency. The ideas and technologies generated by there group are truly incredible, beneficial to the U.S. and I'm sure that these IT tools are no different. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. UNIT4: PRESENTING BUSINESS INFORMATION

    Strategic level Managers are largely concerned with long term organisational planning. Decisions tend to be unstructured and they are made infrequently. However, the decisions made at this level are likely to have a larger impact on the organisation as a whole are not easily reversed.

  2. Artificial Intelligence

    and insurances, who can use AI to predict customer behavior and detect trends. As you may expect, the business of Artificial Intelligence is becoming one of the major driving forces for research.

  1. The purpose of this document is to define the Context of Cain Motors Information ...

    their documentation, and that there system is successfully managing all aspects of their business. On satisfactory conclusion of this process a company is certificated, accredited with operating to a system which is compliant to the essence of the ISO 9001:2000 Standard.

  2. Apple Incorporation - Case Analysis

    Services and other sales were also positive to a tune of $69 million from nets sales associated with AppleCare Protection Plan (APP) extended maintenance and support services plus its Internet related services. All of the positives were offset slightly with the decreased desktop system movement.

  1. The Use of Geographical Information Systems (GIS) And International Technology Transfer by Non-Governmental ...

    * A critical approach will be taken in order to evaluate the limitations as well as the benefits of any of the systems considered. It is hoped that, there would be discovery on whether the GIS product use matters in the development process and what alternative GIS's are possible, who

  2. Free essay

    Managing information

    Things like for example that the business and its staff do which they are effective at or well known for. A strength which a business could have is its reputation. Weaknesses These are the things that a business does badly, that it is ineffective at or that it has a poor reputation for.

  1. Human resources

    of having only one source of family income * Support and friendship between family members Conflict is most likely to arise in making decisions. Thus, clear role definition and a separation between work and home are important. Nelton (1986) suggested that successful teams shared the following characteristics: * Marriage and

  2. Recent Developments in Information Technology

    The audio signals and the video signals and data from application are also transmitted in this way. For example, if a user is demonstrating using graphs from data in a spreadsheet, then this could also be transmitted. IKEA would use video-conferencing for meetings between distant places.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work