Thesis on "Terrorism Technological Innovation as a Weapon"

Thesis 15 pages (4295 words) Sources: 10

[EXCERPT] . . . .

Terrorism Tech

Technological Innovation as a Weapon Against Terrorism

The United States is regarded as among the world's most vaunted leaders in technology development. Simultaneously, its military denotes one of the most formidable fighting forces in the world, both with respect to its capability to wage war and its capacity to provide defense to the homeland. These claims are inextricably linked, with the United States channeling its technological prowess into the development of greater weaponry, greater defense resources, more effective protective gear for military and defense personnel and a host of computer, communication and media devices that can have a significant impact on preserving the lives of Americans both at home and abroad. And yet, in the face of the threat of terror, many of the technological resolutions applied to military stratagem in the recent past, and indeed many of those which have been regarded as passages to future combat tactics, are now being reexamined in the face of a different type of treat. The guerilla nature of terrorism, the unpredictable mode of this type of warfare, the frequently loosely coordinated networks and the non-incremental approach of random, small-scale attacks intermingled with an occasionally large and catastrophic terrorist event has made the application previously used military strategies either vulnerable or impotent. The diversion from traditional warfare in the face of the terrorism has therefore forced a reevaluation and reapplication of military and defense technologies as a means to strengthening defenses, eliminating threats and staving off potential future attacks.

While this has not necessari
Continue scrolling to

download full paper
ly invoked a change in the overall thrust of technology, which has focused on the refinement of such now prominent instruments as unmanned aerial drone devices for surveillance and offensive striking; communication and surveillance technologies for the gathering of crucial preventative intelligence; and computer technologies both for protection against hacking networks and for the analysis of data or the gathering of information. The result has been the initiation of a specific avenue of innovation through which is developed a set of priorities relating technological development to the prevention of terrorism. This is informed by a history which has demonstrated both the failures and successes of prevention in this precarious area of defense and also by an industry of creativity, innovation and the imagination to apply technological ingenuity to the real and pressing dangers of the global terrorism crisis. The discussion hereafter will address both the defense culture surrounding the application of technology to terrorism defense and the practical realities of this field with respect to past incidences, present conditions and future expectations.

As the current scenario denotes, the establishment of specific groups and agencies dedicated to the application of technology to terrorism defense would emerge with the rising awareness of the danger's presented to the western world by terrorism. Accordingly, such symposiums as the Force Protection Demonstrations would come into play in the 1990s, inclined by the domestic (World Trade Center Bombing-1993) and global events (Facility housing U.S. soldiers attacked in Saudi Arabia-1996) to create a context for the meeting of "military and civilian personnel from the U.S. Armed Forces, as well as federal, state and local homeland security, law enforcement and other first-responder personnel from throughout the United States, and defense media."

The purpose of the annual event is to provide demonstration, information and access to the technologies now being refined for the purposes of combating terrorism. Such symposiums are an official and government sanctioned means to proliferating this technology so as to allow decision-makers in agencies and localities throughout the United States to contribute to and participate in the defense of the nation. Accordingly, "the Force Protection Demonstrations were initiated by the Chairman of the Joint Chiefs of Staff in 1997 as a result of the terrorist bombing of Khobar Towers in Saudi Arabia the previous year. They have become a means of assuring that leaders responsible for physical security and force protection can stay abreast of evolving and advancing technology to counter increasing terrorist activity against personnel, equipment, and infrastructure -- in military settings as well as other government activities at home and in foreign locations."

This is the underlying mission for the military as it grapples with a threat that is quite often unseen and most characteristically unpredictable. This would, of course, only be the initiation in America's awareness of the threat truly represented by terrorism. Within a year of the inception of the FPED, terrorist efforts directed against the United States and its friends and allies would reach new heights of visibility, sophistication and coordination. Accordingly, "on Aug. 7, 1998, the U.S. embassies in Nairobi, Kenya, and Dar es Salaam, Tanzania, were bombed by terrorists, leaving 258 people dead and more than 5,000 injured."

This would be closely followed by the 1999 bombing of the U.S.S. Cole, which was docked in a Yemen port. The collective of these events would demonstrate America's relative lack of readiness for and its relative military disconnect from the danger reflected in the threat of terrorism. With the events of September 11th, 2001, which felled the World Trade Center in New York, knocked a hole into the side of the Pentagon and sent a fourth commercial airliner aground in a Pennsylvania field.

One of the deadliest days in America history also left no doubt that considerable changes are needed in America's defense policy to contend with the nature of such warfare. The research encountered here demonstrates that quite in fact, it was a failure to avail itself the various technologies potentially at its disposal that prevented the government in its various agencies to tie together the various clues pointing to the approach of 9/11. Indeed, "one of the most painful things about examining the events leading up to the September 11 hijackings is realizing just how close the terrorists were to having their plot disrupted. Fifteen years ago, stopping terrorism relied on old-fashioned tools: strict physical security at vulnerable facilities, intelligence gathering by government agents, vigilance on the part of all citizens, and a sense of community in which we all do what we can to protect each other."

This denotation of 'old-fashioned tools' is especially useful to the discussion here. As the text by Ham & Atkinson (2002) goes on to argue, there have been significant developments especially in America's capabilities with respect to information technology. Its role as the leading force in the infrastructural proliferation of high speed fiber-optics networks allowing for advanced surveillance techniques and its primacy in enhancing web and computer technologies to meet highly sophisticated demands have made the United States a nation distinctly capable of finding innovative and intelligent ways to provide itself with defense against terrorist threats. As the 2002 text would contend, "the IT revolution has given us many tools -- wireless data networks, encryption, powerful miniature computer chips, the global Internet, data mining software, and many more -- that weren't available for domestic security just a few years ago.

To this way of thinking, the argument frequently posited by public officials and by the 9/11 Commission Report released thereafter would be reinforced, that the defense failures of 9/11 were intelligence failings relating to a misuse or neglect of available technologies. It is thus that the focus of such symposiums as the FPED becomes important for helping always to train a focus on the advancements which have been made in the areas of defense, intelligence and military technology. During this year's conference, the degree of innovation in place is demonstrated by the sheer variety and creativity exhibited by that which is on display. Boasting over 3,300 'commercially available' resources for the improvement of counterterrorism, "This year, FPED VII will cover 20 equipment categories, including: automated entry control systems and equipment; armored and utility vehicles; biometrics; blast protection/mitigation systems; cargo inspection devices; chemical and biological detection, mitigation and protection equipment; communications equipment; delay and denial technology; explosives detection systems; explosive ordnance disposal equipment; fence sensor systems; individual protective equipment; night vision and optics devices; non-lethal weapons and technology; physical security equipment sensor and surveillance systems; robotic vehicles and systems; unattended ground sensors; unmanned aerial vehicles; vulnerability assessment/analysis software tools; and waterside security equipment."

This emphasis is supported by recent past instances in which a degree of success has been demonstrated in foiling terrorist plots through the proper and sensible use of available technologies. To this point, past instances reveal that the application of technology is quite frequently less an issue of capability or feasibility but instead implicates more directly issues of budgeting and political priority. Evidence suggests that with the intensifying evidence of the threats represented by terrorism in the late 1990s, the tandem of President Bill Clinton and Director of the CIA George Tenet would work toward an increase in the budgeting which allowed for technological enhancement of intelligence and surveillance efforts. Though Tenet would still be the CIA head for the period of the Bush Administration which occupied 9/11, this would be a marked transition in priorities, with the new regime significantly scaling back advancements made in the funding… READ MORE

Quoted Instructions for "Terrorism Technological Innovation as a Weapon" Assignment:

A brief historical analysis to include examples where technology thwarted attacks in the past. Also, successful technologies currently in place and promising proposed/possible future technologies.

I don't want just a chronological recitation of facts - I am looking for analysis. Select your key points and use historical examples to prove your points

Use of Technology: demonstrated excellent proficiency in technology tools (mapping, charts, graphs, figures, etc.)

Every body paragraph must start with a topic sentence in the author*****s own words. The topic sentence is like a mini-thesis, relating back to the main thesis, and will be the focus of that paragraph. The first sentence of a paragraph may NOT be a quote or paraphrase.

*****¢ Papers without significant analysis will receive no higher than a grade of *****C*****.

*****¢ First/second person is NOT permitted.

Any paper using first/second person will receive no higher than a grade of *****C*****.

*****¢ Avoid use of indefinite words like *****it***** or *****they***** unless it is absolutely clear what subject each pertains

How to Reference "Terrorism Technological Innovation as a Weapon" Thesis in a Bibliography

Terrorism Technological Innovation as a Weapon.” A1-TermPaper.com, 2009, https://www.a1-termpaper.com/topics/essay/terrorism-tech-technological-innovation/460682. Accessed 27 Sep 2024.

Terrorism Technological Innovation as a Weapon (2009). Retrieved from https://www.a1-termpaper.com/topics/essay/terrorism-tech-technological-innovation/460682
A1-TermPaper.com. (2009). Terrorism Technological Innovation as a Weapon. [online] Available at: https://www.a1-termpaper.com/topics/essay/terrorism-tech-technological-innovation/460682 [Accessed 27 Sep, 2024].
”Terrorism Technological Innovation as a Weapon” 2009. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/terrorism-tech-technological-innovation/460682.
”Terrorism Technological Innovation as a Weapon” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/terrorism-tech-technological-innovation/460682.
[1] ”Terrorism Technological Innovation as a Weapon”, A1-TermPaper.com, 2009. [Online]. Available: https://www.a1-termpaper.com/topics/essay/terrorism-tech-technological-innovation/460682. [Accessed: 27-Sep-2024].
1. Terrorism Technological Innovation as a Weapon [Internet]. A1-TermPaper.com. 2009 [cited 27 September 2024]. Available from: https://www.a1-termpaper.com/topics/essay/terrorism-tech-technological-innovation/460682
1. Terrorism Technological Innovation as a Weapon. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/terrorism-tech-technological-innovation/460682. Published 2009. Accessed September 27, 2024.

Related Thesis Papers:

Security Aviation Security Pre and Post 911 Term Paper

Paper Icon

Security

Aviation Security Pre and Post 911

The security in most airports did not used to be much of a problem for anyone. For many years before the events of… read more

Term Paper 30 pages (10540 words) Sources: 20 Topic: Terrorism / Extremism / Radicalization


Mara Salvatrucha and 18th Street Gangs: Threat to National Security? Thesis

Paper Icon

predominantly Latino Gangs, Mara Salvatrucha (aka MS-13), and the 18th Street Gang operating on the streets of communities across America. This study is significant because it will provide a snapshot… read more

Thesis 40 pages (17380 words) Sources: 40 Style: APA Topic: Crime / Police / Criminal Justice


Marshall Plan and the Post 911 Global Research Paper

Paper Icon

Marshall Plan and the Post 911 Global War on Terror

Many times in the history of the world, war or its aftermath has threatened catastrophe. Following the end of the… read more

Research Paper 20 pages (6775 words) Sources: 10 Style: MLA Topic: World History


South Korean & German Trade Show Industry Dissertation

Paper Icon

Trade Show Industry in Germany and South Korea



Trade as Marketing and Communication



Area of Study



Study Components


read more

Dissertation 113 pages (31155 words) Sources: 105 Topic: Economics / Finance / Banking


Private Security Functions as it Relates to the Various Components of the Criminal Justice System Term Paper

Paper Icon

Private Security Functions as it Relates to the Various Components of the Criminal Justice System

The objective of this work is to analyze major components of the criminal justice system… read more

Term Paper 5 pages (1424 words) Sources: 5 Style: APA Topic: Crime / Police / Criminal Justice


Fri, Sep 27, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!