Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask English Expert

Question: Assignment Objectives

Describe and discuss information sharing and knowledge management technologies used to facilitate information sharing and intelligence gathering among Homeland Security agencies.

Use the below response to answer the below questions:

I chose Human Intelligence Collection (HUMANINT), CCTV surveillance and Biometric scanning as my three subjects to address. Human Intelligence gathering is used both in the civilian and military realms to obtain or extract information from individuals. The two basic types of information gathering are interview or interrogation. One or the other will be used depending on the circumstances of the situation. CCTV is close circuit television. This method is used almost everywhere; from buses to buildings to elevators and subways to monitor events and to obtain evidence of a happening. Biometrics is the use of physical characteristics such as fingerprints, retina scans and voice features to identify a person for security reasons. I was interested to read there are microchips that can be swallowed and stomach acid allows the chip to send off a radio signal for identification.

It is my opinion HUMANINT is effective in its approach. Many methods have been developed to be used in order to extract information from individuals. I was privileged enough to take a class on Interview and Interrogation a few years ago, given by the man who was one of the people who interviewed O.J. Simpson and was taught his method in 40 hour class. There is a distinct difference between interview and interrogation and usually this is based on the how the subject is approached, how comfortable he/she is made; how and what questions are asked. This particular approach was based on general personality types but is by no means the only approach to the subject, but from the information in the class it was highly effective without engaging in the use of physical force. I believe the use of psychology has come a long way in developing methods to pressure a person without inflicting any pain, while still obtaining the necessary information.

I think HUMANINT can improve but is very effective at this point. I believe it has to do with the person conducting the interview/interrogation and his or her skill and ability to read the other person and apply the correct principle. HUMANINT collection can indeed be misused, just read about the allegations and incarceration of military members who have gone far beyond the basic application and used physical torture and humiliation to conduct the interrogation. I believe it is very easy for this to be illegally used.

CCTV is in wide use today. It can be found just about anywhere: businesses, home, military bases, vehicles, bicycles, patrol cars, etc. In most cases a video can make or break curt case by its admission into the proceedings. Such video has been used not only to exonerate but to convict people on both sides of the law. It's use is extremely important for law enforcement for two reasons: liability and training. For instance, I have regular reviews with my supervisor over traffic stops I have made. This allows me to see myself in action and to discuss what I did well and what could be improved. This type of training allows for accountability and improved public relations. On the other hand, such video can be misused as well. The current media can 'spin' a particular story by showing a portion of an incident and can often lead to unrest, protest and violence. The Ferguson incident is one such event. By showing only a portion of the facts and presents a particular slant to the event the city of Ferguson, Missouri suffered terribly from the riots and violence that took place. In addition, police officers who turn off their cameras or in court state that somehow their body camera wasn't working at the moment can find themselves being investigated for misconduct or worse. It is easy to misuse the camera and its contents.

Biometrics is the ability to identify a person based on physical characteristics. Fingerprint scanners, retina scans and facial recognition are all part of a high tech security movement. My Samsung tablet goes to sleep mode if it can't 'read my eyes', quite frustrating when I'm in the middle of reading an email or browsing the Net. I believe its uses is limited and the technology can be improved and be more effective but in its present state it is very effective and it takes a person with high tech skills to break past such safeguards. The problems arise from its misuse in the area of invasion of privacy. A disgruntled employee in a government installation with such technology and who understands it use could create a method in which a person could be monitored constantly. Take the subways of New York with their myriad of cameras; using facial recognition one could be tracked daily and constantly and every moved tracked. There is potential for information such as fingerprints, as vital as a Social Security number to be leaked and misused.

To conclude, I think all the methods above are in their full use. I believe they are effective and whie there could be improvements, I believe they are being used to their full pontential.

What have you learned from others'' responses?

What were the most compelling points from the interaction with your fellow students?

How did participating in this discussion help in your understanding of the Discussion Board task?

What approaches could have yielded additional valuable information in the students'' networking?

What is still unclear after the discussion with your classmates that needs to be clarified?

English, Academics

  • Category:- English
  • Reference No.:- M91563927
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in English

Question apa style establishes ground rules for how you

Question: APA style establishes ground rules for how you document the sources of quotations, paraphrased information, statistics, and illustrations (graphs, tables, pictures, if any) you use in your paper. APA style empl ...

Section 66 of the text discusses how we can pick up tips

Section 6.6 of the text discusses how we can pick up tips and techniques from children's media to aid our teaching with this new media-literare generations (Coars, 2013). Create a classroom newsletter that shares how you ...

Question what you think is significance of the title of

Question : What you think is significance of the title of this play: This Random World? In your answer, please give an example from the script itself; and then imagine, postulate, and suggest how another specific "random ...

Assignment deep ecologythis is the most radical

Assignment : Deep Ecology This is the most "radical" environmental ethic. Remember, I would like you to try to determine where you stand with regard to the different environmental ethics. Also, when you do these assignme ...

Use the outline you created for the previous assignment

Use the outline you created for the previous assignment and: 1. Develop your topic into an essay of 1000 words. Keep in mind, that you are required to present and analyze the main topic by conducting a literature review ...

Chapter 7 study guide 1regarding the salts in the

Chapter #7 Study Guide 1. Regarding the salts in the ocean: a) Where do the salts from the ocean come from and where do they go? b) What are excess volatiles? c) What is meant by our oceans being in chemical equilibrium? ...

Assignment - argumentative essaymany businesses and

ASSIGNMENT - Argumentative Essay Many businesses and organisations are shifting away from traditional, autocratic and hierarchical modes of leadership towards models which focus on teamwork and community. Servant Leaders ...

Question choose one of the professional scenarios provided

Question: Choose one of the professional scenarios provided in Blackboard under the Student Center tab, or click here to view them in a new window. Write a Professional Email Message (in the form of Figure 5.1 on page 84 ...

Should insurance companies be given access to database for

Should Insurance companies be given access to database for the purpose of identifying individuals with potential medical problems, even though the individuals have not shown any shown any symptoms? Some issues to conside ...

In this task you will write an analysis suggested length of

In this task, you will write an analysis (suggested length of 3-5 pages) of one work of literature. Choose one work from the list below: Classical Period • Sappho, "The Anactoria Poem" ca. 7th century B.C.E. (poetry) • A ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As