Homeland Security{Comments Off on Homeland Security}

by Ivan C
After the terrorist attack on September 11, 2001 the United States declared war against terror.  This declaration created new costs to set new security measures that included the cost of human resources, deployment of defensive weaponry and technology purchases, and time. An effective method to reduce the cost of such security methods is to have precise and accurate intelligence. In order for that to happen mass amount of data needs to be gathered in databases. It is not easy to gather information about terrorists because they are discreet and blend in with the general public. But for terrorists to commit attacks they must travel, communicate, transfer money, and have weapons smuggled in (Kim, 2005). Their actions leave records behind when they travel from country to country having entry and departure records stored in databases. When they communicate via chat rooms, cell phones, and emails Homeland Security can intercept most of those types of communications using FBI’s Carnivore system and other systems (Kim, 2005). Also records of underground weapons dealers are available. This data can either be stored in government databases, or in customer and transaction databases of corporations. The use of databases also includes multimedia data which consists of text documents, images, audio, video, and speech.  In such cases of multimedia data specialized multimedia recognition software is used to match data samples against stored data. The cooperation of different nations and corporations has increased the data stored in databases making it easier to find patterns among terrorist actions.

Overall the use of databases for national security has increased and new technologies are being researched to expand the capabilities of a database. This article provided information on how Homeland Security goes about finding terrorist using databases. I liked how this article explained its topics and described its content.

Works Cited

Kim, W. (2005). On U.S. Homeland Security and Database Technology. ABI/INFORM Complete , 1-5.

1. How much time did you spend on writing the blog post, including reading the article, thinking, writing and formatting? This blog post took me 1 hour and 30 minutes.
2. How many others’ blog posts did you read  this week? I read 6 blog posts by my classmates this week.