.

Saturday, May 11, 2019

Home land security and terrorism Essay Example | Topics and Well Written Essays - 500 words

Home disgrace warranter and terrorism - Essay ExampleEither they belong to Muslim communities or non Muslim they stimulate the target of violent spreading factors (Eric Croddy, James J. Wirtz, 2005, p 458). In such a worse limit there are few countries which are severely affected i.e. Pakistan Afghanistan and Srilanka. But the super power of this manhood is not yet largely affected by the roots of terrorism.Securing the smothers is one of the biggest challenges that US government is face up these days. To avoid the risk of terrorism the government utilizes a number of technologies such as virtual repugn of sensors cameras, motion detectors, and other equipments (United States, Dept. of Defense, Newton N. Minow). Undocumented immigrants are also forbidden by the government so that the invasion of terrorists is controlled within a state. But this does not make the whole system a waste ones time proof system but it still leaves doubts because of which the government tries to en hance its system.Bush administration bequeathed a border security program to Obama team in which undocumented immigrants were cited as a cause of terrorism. Therefore inexpugnable Border Initiative (SBI) plan was made by Obama administrations new team. It is a all-around(prenominal) plan to control the illegal flow of immigrations. It includes increased staffing to strengthen interior enforcement. A great investing was also made in detecting technology and infrastructure. A vital module of the SBI strategy is SBI- straighten out program. In March 2010 DHS designed another surveillance policy in which a new security technology would be installed. It includes mobile surveillance, thermal imaging devices, ultra-light detection, backscatter units, mobile radios, cameras and laptop computers for pursuit vehicles, and far video surveillance system enhancements. By applying all these parameters it is expected that US can be happy in maintaining security

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.