Evaluating Surveillance, Detection, and Inspection Technology
1. Running Head: EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION
TECHNOLOGY 1
Evaluating Surveillance, Detection, and Inspection Technology
Name:
Institution:
Date:
2. EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 2
Evaluating Surveillance, Detection, and Inspection Technology
The United States Customs and Border Protection (CBP) utilize a wide range of
strategies including latest technologies in accomplishing its objectives of prohibiting terrorist
weapons and terrorists from getting into the United States. Additionally, CBP enhances the flow
of legal commerce and travel. Both agents and officers CBP utilizes distinct technologies in
various combinations to reinforce their ability to identify terrorist weapons. Customs and Border
Protection, surveillance, inspection, and detection tools include X-ray and gamma-ray imaging
systems, advanced analytical computer databases, explosive detectors, radiation isotope
identifiers, cameras and sensors strategically placed along isolated boundaries (CBP, 2006).
Regardless, the presence of this surveillance, detection, and inspection technologies, CBP is
continuously searching for improved and new technologies including the Advanced Passenger
System and the America’s Shield Initiative. The aim of these technologies is to enhance security
and safety against terrorism.
Whether the United States has become a modern-day Roman Empire Falling into
Decline
The Roman Republic compared to American Republic survived for about five centuries
(500years). American Republic in contrast has existed for not more than 250years and is facing
various challenges. These challenges exhibit the ability to transform America as well as
negatively affect its population. For instance, the country’s economic inability to meet the needs
of its constituents in conjunction with societal discrepancies over priories and the ever-increasing
gap between the rich and the poor increases the likelihood of it losing its global supremacy,
unprecedented political transformations, and social unrest. According to economists, the global
3. EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 3
supremacy of America will shift to other countries including Brazil, India, and China by Mi-21st
century. Additionally, its decline will be attributed to military, economy, and technological
advancement of these nations.
Whether Technological dependence is a serious issue for the world
Overdependence on technology is a very serious issue for the world. The society is
rapidly embracing technology minus fully comprehending its long-term impacts. Equally, the
society is in pursuit of short-term improvements and gains without taking into account
technology impact on future generations. However, the computers are crucial because they
simplify people’s life; enhance access to information and helps in making an informed decision
(Starbird & Stamberger, 2010). However, what will happen in the case of a power outage? The
answer is simple; the collapse of the American economy. It is, therefore, important not to over
depend on technology.
How much national security is sufficient?
National security can never be adequate regardless technology advancement. In fact,
people will never feel secure enough to stop the implementation of advanced surveillance,
detection, and inspection technologies on U.S. soil because the globe is facing numerous threats
and challenges and the United States is not an exception. Thus, there is a need to enhance the
implementation of the United States inspection, detection, and surveillance technologies in order
to safeguard the public and the nation against terrorist threats and other attacks (CBP, 2006).
Is there an ideal balance between security and freedom?
4. EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 4
Yes. The Declaration of Independence resulted in enhancing natural rights and freedom
in the United States. Since this declaration, the United States has been the most secure and freest
country across the world. Its military capability can handle any threat. As a result, America has
shunned the fate of other countries trading their freedom for security promises or security for
restricted freedoms and realized none.
What I think is next with regard to further technological advancements and
implementation as they relate to Constitutional rights and regulatory legislation
The United States constitution was established to safeguard the American citizen’s right.
An example of such right is to safeguard individuals from unreasonable seizure and search.
However, with technological advancements, privacy protections are being infringed in favor of
enforcing the law.
5. EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 5
References
CBP.(2006). CBP Securing Our Borders Inspection and Surveillance Technologies. Retrieved
from,
http://www.cbp.gov/xp/cgov/newsroom/fact_sheets/trade/fact_sheet_cbp_securing.xml
Starbird, K., & Stamberger, J.(2010). Tweak the Tweet: Leveraging Microblogging Proliferation
with a Prescriptive Syntax to Support Citizen Reporting. Proceedings of the 7th
International ISCRAM Conference – Seattle, USA.
6. EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 5
References
CBP.(2006). CBP Securing Our Borders Inspection and Surveillance Technologies. Retrieved
from,
http://www.cbp.gov/xp/cgov/newsroom/fact_sheets/trade/fact_sheet_cbp_securing.xml
Starbird, K., & Stamberger, J.(2010). Tweak the Tweet: Leveraging Microblogging Proliferation
with a Prescriptive Syntax to Support Citizen Reporting. Proceedings of the 7th
International ISCRAM Conference – Seattle, USA.