SlideShare a Scribd company logo
1 of 6
Running Head: EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION
TECHNOLOGY 1
Evaluating Surveillance, Detection, and Inspection Technology
Name:
Institution:
Date:
EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 2
Evaluating Surveillance, Detection, and Inspection Technology
The United States Customs and Border Protection (CBP) utilize a wide range of
strategies including latest technologies in accomplishing its objectives of prohibiting terrorist
weapons and terrorists from getting into the United States. Additionally, CBP enhances the flow
of legal commerce and travel. Both agents and officers CBP utilizes distinct technologies in
various combinations to reinforce their ability to identify terrorist weapons. Customs and Border
Protection, surveillance, inspection, and detection tools include X-ray and gamma-ray imaging
systems, advanced analytical computer databases, explosive detectors, radiation isotope
identifiers, cameras and sensors strategically placed along isolated boundaries (CBP, 2006).
Regardless, the presence of this surveillance, detection, and inspection technologies, CBP is
continuously searching for improved and new technologies including the Advanced Passenger
System and the America’s Shield Initiative. The aim of these technologies is to enhance security
and safety against terrorism.
Whether the United States has become a modern-day Roman Empire Falling into
Decline
The Roman Republic compared to American Republic survived for about five centuries
(500years). American Republic in contrast has existed for not more than 250years and is facing
various challenges. These challenges exhibit the ability to transform America as well as
negatively affect its population. For instance, the country’s economic inability to meet the needs
of its constituents in conjunction with societal discrepancies over priories and the ever-increasing
gap between the rich and the poor increases the likelihood of it losing its global supremacy,
unprecedented political transformations, and social unrest. According to economists, the global
EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 3
supremacy of America will shift to other countries including Brazil, India, and China by Mi-21st
century. Additionally, its decline will be attributed to military, economy, and technological
advancement of these nations.
Whether Technological dependence is a serious issue for the world
Overdependence on technology is a very serious issue for the world. The society is
rapidly embracing technology minus fully comprehending its long-term impacts. Equally, the
society is in pursuit of short-term improvements and gains without taking into account
technology impact on future generations. However, the computers are crucial because they
simplify people’s life; enhance access to information and helps in making an informed decision
(Starbird & Stamberger, 2010). However, what will happen in the case of a power outage? The
answer is simple; the collapse of the American economy. It is, therefore, important not to over
depend on technology.
How much national security is sufficient?
National security can never be adequate regardless technology advancement. In fact,
people will never feel secure enough to stop the implementation of advanced surveillance,
detection, and inspection technologies on U.S. soil because the globe is facing numerous threats
and challenges and the United States is not an exception. Thus, there is a need to enhance the
implementation of the United States inspection, detection, and surveillance technologies in order
to safeguard the public and the nation against terrorist threats and other attacks (CBP, 2006).
Is there an ideal balance between security and freedom?
EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 4
Yes. The Declaration of Independence resulted in enhancing natural rights and freedom
in the United States. Since this declaration, the United States has been the most secure and freest
country across the world. Its military capability can handle any threat. As a result, America has
shunned the fate of other countries trading their freedom for security promises or security for
restricted freedoms and realized none.
What I think is next with regard to further technological advancements and
implementation as they relate to Constitutional rights and regulatory legislation
The United States constitution was established to safeguard the American citizen’s right.
An example of such right is to safeguard individuals from unreasonable seizure and search.
However, with technological advancements, privacy protections are being infringed in favor of
enforcing the law.
EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 5
References
CBP.(2006). CBP Securing Our Borders Inspection and Surveillance Technologies. Retrieved
from,
http://www.cbp.gov/xp/cgov/newsroom/fact_sheets/trade/fact_sheet_cbp_securing.xml
Starbird, K., & Stamberger, J.(2010). Tweak the Tweet: Leveraging Microblogging Proliferation
with a Prescriptive Syntax to Support Citizen Reporting. Proceedings of the 7th
International ISCRAM Conference – Seattle, USA.
EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 5
References
CBP.(2006). CBP Securing Our Borders Inspection and Surveillance Technologies. Retrieved
from,
http://www.cbp.gov/xp/cgov/newsroom/fact_sheets/trade/fact_sheet_cbp_securing.xml
Starbird, K., & Stamberger, J.(2010). Tweak the Tweet: Leveraging Microblogging Proliferation
with a Prescriptive Syntax to Support Citizen Reporting. Proceedings of the 7th
International ISCRAM Conference – Seattle, USA.

More Related Content

Viewers also liked

Creative Writing Job Analysis, Job Description
Creative Writing Job Analysis, Job DescriptionCreative Writing Job Analysis, Job Description
Creative Writing Job Analysis, Job DescriptionPATRICK MAELO
 
U.S. Capacity for Combating Weapons of Mass Destruction
U.S. Capacity for Combating Weapons of Mass DestructionU.S. Capacity for Combating Weapons of Mass Destruction
U.S. Capacity for Combating Weapons of Mass DestructionPATRICK MAELO
 
ICT Access Library
ICT Access LibraryICT Access Library
ICT Access Libraryspattison76
 
Types of resistors
Types of resistorsTypes of resistors
Types of resistorskimreed444
 
обереги світлячок
обереги світлячокобереги світлячок
обереги світлячокdnz3
 
Child Psychology Research Paper
Child Psychology Research PaperChild Psychology Research Paper
Child Psychology Research PaperPATRICK MAELO
 
Ticket trends 2012 2017
Ticket trends 2012 2017Ticket trends 2012 2017
Ticket trends 2012 2017Susan Bohl
 
Základy marketingu na sociálních sítích
Základy marketingu na sociálních sítíchZáklady marketingu na sociálních sítích
Základy marketingu na sociálních sítíchJakub Ruzicka
 
Zajímavosti Chorvatska
Zajímavosti ChorvatskaZajímavosti Chorvatska
Zajímavosti ChorvatskaKamil Walder
 
Infinum Android Talks #9 - Making your app location-aware
Infinum Android Talks #9 - Making your app location-awareInfinum Android Talks #9 - Making your app location-aware
Infinum Android Talks #9 - Making your app location-awareInfinum
 
The present perfect tense
The present perfect tenseThe present perfect tense
The present perfect tenseravial17
 
[průzkum] Jak Češi používají Linkedin
[průzkum] Jak Češi používají Linkedin[průzkum] Jak Češi používají Linkedin
[průzkum] Jak Češi používají LinkedinJiří Kratochvíl
 
El origen de la vida
El origen de la vidaEl origen de la vida
El origen de la vidamarbanmun
 
What's Next? Retail Summit 2017
What's Next? Retail Summit 2017What's Next? Retail Summit 2017
What's Next? Retail Summit 2017Tomas Pflanzer
 

Viewers also liked (17)

Creative Writing Job Analysis, Job Description
Creative Writing Job Analysis, Job DescriptionCreative Writing Job Analysis, Job Description
Creative Writing Job Analysis, Job Description
 
USF
USFUSF
USF
 
U.S. Capacity for Combating Weapons of Mass Destruction
U.S. Capacity for Combating Weapons of Mass DestructionU.S. Capacity for Combating Weapons of Mass Destruction
U.S. Capacity for Combating Weapons of Mass Destruction
 
ICT Access Library
ICT Access LibraryICT Access Library
ICT Access Library
 
Types of resistors
Types of resistorsTypes of resistors
Types of resistors
 
обереги світлячок
обереги світлячокобереги світлячок
обереги світлячок
 
Glosario
GlosarioGlosario
Glosario
 
Child Psychology Research Paper
Child Psychology Research PaperChild Psychology Research Paper
Child Psychology Research Paper
 
Vecihi Hürkuş
Vecihi HürkuşVecihi Hürkuş
Vecihi Hürkuş
 
Ticket trends 2012 2017
Ticket trends 2012 2017Ticket trends 2012 2017
Ticket trends 2012 2017
 
Základy marketingu na sociálních sítích
Základy marketingu na sociálních sítíchZáklady marketingu na sociálních sítích
Základy marketingu na sociálních sítích
 
Zajímavosti Chorvatska
Zajímavosti ChorvatskaZajímavosti Chorvatska
Zajímavosti Chorvatska
 
Infinum Android Talks #9 - Making your app location-aware
Infinum Android Talks #9 - Making your app location-awareInfinum Android Talks #9 - Making your app location-aware
Infinum Android Talks #9 - Making your app location-aware
 
The present perfect tense
The present perfect tenseThe present perfect tense
The present perfect tense
 
[průzkum] Jak Češi používají Linkedin
[průzkum] Jak Češi používají Linkedin[průzkum] Jak Češi používají Linkedin
[průzkum] Jak Češi používají Linkedin
 
El origen de la vida
El origen de la vidaEl origen de la vida
El origen de la vida
 
What's Next? Retail Summit 2017
What's Next? Retail Summit 2017What's Next? Retail Summit 2017
What's Next? Retail Summit 2017
 

Similar to Evaluating Surveillance, Detection, and Inspection Technology

Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillanceskimkiper
 
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxREPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxchris293
 
A Theoretical Examination Of The Objections To Body-Worn Cameras With The Add...
A Theoretical Examination Of The Objections To Body-Worn Cameras With The Add...A Theoretical Examination Of The Objections To Body-Worn Cameras With The Add...
A Theoretical Examination Of The Objections To Body-Worn Cameras With The Add...Arlene Smith
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
 
Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Felicia Barker
 
The big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceThe big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceHop Trieu Sung
 
Big Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceBig Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceDotmappers1
 
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxRESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxwilfredoa1
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxdebishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ronnasleightholm
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
Executive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia FarinaExecutive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia Farinanslscornell
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 

Similar to Evaluating Surveillance, Detection, and Inspection Technology (20)

Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxREPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
 
A Theoretical Examination Of The Objections To Body-Worn Cameras With The Add...
A Theoretical Examination Of The Objections To Body-Worn Cameras With The Add...A Theoretical Examination Of The Objections To Body-Worn Cameras With The Add...
A Theoretical Examination Of The Objections To Body-Worn Cameras With The Add...
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...
 
The big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceThe big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-race
 
Big Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceBig Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms Race
 
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxRESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Executive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia FarinaExecutive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia Farina
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
Ip commission report_052213
Ip commission report_052213Ip commission report_052213
Ip commission report_052213
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Foreig~1 (1)
Foreig~1 (1)Foreig~1 (1)
Foreig~1 (1)
 

More from PATRICK MAELO

Using the Neuman's System Model to Decrease the Risk of Falls on a Medical-Su...
Using the Neuman's System Model to Decrease the Risk of Falls on a Medical-Su...Using the Neuman's System Model to Decrease the Risk of Falls on a Medical-Su...
Using the Neuman's System Model to Decrease the Risk of Falls on a Medical-Su...PATRICK MAELO
 
Racial Profiling in the Black Community
Racial Profiling in the Black CommunityRacial Profiling in the Black Community
Racial Profiling in the Black CommunityPATRICK MAELO
 
From the Civil Rights to Incarceration Nation by Doctor Brown
From the Civil Rights to Incarceration Nation by Doctor BrownFrom the Civil Rights to Incarceration Nation by Doctor Brown
From the Civil Rights to Incarceration Nation by Doctor BrownPATRICK MAELO
 
current trends in criminal justice system
current trends in criminal justice systemcurrent trends in criminal justice system
current trends in criminal justice systemPATRICK MAELO
 
The 1993 World Trade Centre Bombing
The 1993 World Trade Centre BombingThe 1993 World Trade Centre Bombing
The 1993 World Trade Centre BombingPATRICK MAELO
 
Coca-Cola Company Background Information, Suppliers, Stakeholders and Busines...
Coca-Cola Company Background Information, Suppliers, Stakeholders and Busines...Coca-Cola Company Background Information, Suppliers, Stakeholders and Busines...
Coca-Cola Company Background Information, Suppliers, Stakeholders and Busines...PATRICK MAELO
 
Illegal Migrants and the US Economy
Illegal Migrants and the US EconomyIllegal Migrants and the US Economy
Illegal Migrants and the US EconomyPATRICK MAELO
 
Civil Engineering-Revision
Civil Engineering-RevisionCivil Engineering-Revision
Civil Engineering-RevisionPATRICK MAELO
 
Audi Company Marketing Strategy
Audi Company Marketing StrategyAudi Company Marketing Strategy
Audi Company Marketing StrategyPATRICK MAELO
 
Apple Inc. Cost Drivers
Apple Inc. Cost DriversApple Inc. Cost Drivers
Apple Inc. Cost DriversPATRICK MAELO
 

More from PATRICK MAELO (13)

Using the Neuman's System Model to Decrease the Risk of Falls on a Medical-Su...
Using the Neuman's System Model to Decrease the Risk of Falls on a Medical-Su...Using the Neuman's System Model to Decrease the Risk of Falls on a Medical-Su...
Using the Neuman's System Model to Decrease the Risk of Falls on a Medical-Su...
 
Racial Profiling in the Black Community
Racial Profiling in the Black CommunityRacial Profiling in the Black Community
Racial Profiling in the Black Community
 
From the Civil Rights to Incarceration Nation by Doctor Brown
From the Civil Rights to Incarceration Nation by Doctor BrownFrom the Civil Rights to Incarceration Nation by Doctor Brown
From the Civil Rights to Incarceration Nation by Doctor Brown
 
current trends in criminal justice system
current trends in criminal justice systemcurrent trends in criminal justice system
current trends in criminal justice system
 
The 1993 World Trade Centre Bombing
The 1993 World Trade Centre BombingThe 1993 World Trade Centre Bombing
The 1993 World Trade Centre Bombing
 
Coca-Cola Company Background Information, Suppliers, Stakeholders and Busines...
Coca-Cola Company Background Information, Suppliers, Stakeholders and Busines...Coca-Cola Company Background Information, Suppliers, Stakeholders and Busines...
Coca-Cola Company Background Information, Suppliers, Stakeholders and Busines...
 
Illegal Migrants and the US Economy
Illegal Migrants and the US EconomyIllegal Migrants and the US Economy
Illegal Migrants and the US Economy
 
Child Psychology
Child PsychologyChild Psychology
Child Psychology
 
Civil Engineering-Revision
Civil Engineering-RevisionCivil Engineering-Revision
Civil Engineering-Revision
 
Audi Company Marketing Strategy
Audi Company Marketing StrategyAudi Company Marketing Strategy
Audi Company Marketing Strategy
 
Astronomy
AstronomyAstronomy
Astronomy
 
Apple Inc. Cost Drivers
Apple Inc. Cost DriversApple Inc. Cost Drivers
Apple Inc. Cost Drivers
 
American-SpanishWAR
American-SpanishWARAmerican-SpanishWAR
American-SpanishWAR
 

Evaluating Surveillance, Detection, and Inspection Technology

  • 1. Running Head: EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 1 Evaluating Surveillance, Detection, and Inspection Technology Name: Institution: Date:
  • 2. EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 2 Evaluating Surveillance, Detection, and Inspection Technology The United States Customs and Border Protection (CBP) utilize a wide range of strategies including latest technologies in accomplishing its objectives of prohibiting terrorist weapons and terrorists from getting into the United States. Additionally, CBP enhances the flow of legal commerce and travel. Both agents and officers CBP utilizes distinct technologies in various combinations to reinforce their ability to identify terrorist weapons. Customs and Border Protection, surveillance, inspection, and detection tools include X-ray and gamma-ray imaging systems, advanced analytical computer databases, explosive detectors, radiation isotope identifiers, cameras and sensors strategically placed along isolated boundaries (CBP, 2006). Regardless, the presence of this surveillance, detection, and inspection technologies, CBP is continuously searching for improved and new technologies including the Advanced Passenger System and the America’s Shield Initiative. The aim of these technologies is to enhance security and safety against terrorism. Whether the United States has become a modern-day Roman Empire Falling into Decline The Roman Republic compared to American Republic survived for about five centuries (500years). American Republic in contrast has existed for not more than 250years and is facing various challenges. These challenges exhibit the ability to transform America as well as negatively affect its population. For instance, the country’s economic inability to meet the needs of its constituents in conjunction with societal discrepancies over priories and the ever-increasing gap between the rich and the poor increases the likelihood of it losing its global supremacy, unprecedented political transformations, and social unrest. According to economists, the global
  • 3. EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 3 supremacy of America will shift to other countries including Brazil, India, and China by Mi-21st century. Additionally, its decline will be attributed to military, economy, and technological advancement of these nations. Whether Technological dependence is a serious issue for the world Overdependence on technology is a very serious issue for the world. The society is rapidly embracing technology minus fully comprehending its long-term impacts. Equally, the society is in pursuit of short-term improvements and gains without taking into account technology impact on future generations. However, the computers are crucial because they simplify people’s life; enhance access to information and helps in making an informed decision (Starbird & Stamberger, 2010). However, what will happen in the case of a power outage? The answer is simple; the collapse of the American economy. It is, therefore, important not to over depend on technology. How much national security is sufficient? National security can never be adequate regardless technology advancement. In fact, people will never feel secure enough to stop the implementation of advanced surveillance, detection, and inspection technologies on U.S. soil because the globe is facing numerous threats and challenges and the United States is not an exception. Thus, there is a need to enhance the implementation of the United States inspection, detection, and surveillance technologies in order to safeguard the public and the nation against terrorist threats and other attacks (CBP, 2006). Is there an ideal balance between security and freedom?
  • 4. EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 4 Yes. The Declaration of Independence resulted in enhancing natural rights and freedom in the United States. Since this declaration, the United States has been the most secure and freest country across the world. Its military capability can handle any threat. As a result, America has shunned the fate of other countries trading their freedom for security promises or security for restricted freedoms and realized none. What I think is next with regard to further technological advancements and implementation as they relate to Constitutional rights and regulatory legislation The United States constitution was established to safeguard the American citizen’s right. An example of such right is to safeguard individuals from unreasonable seizure and search. However, with technological advancements, privacy protections are being infringed in favor of enforcing the law.
  • 5. EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 5 References CBP.(2006). CBP Securing Our Borders Inspection and Surveillance Technologies. Retrieved from, http://www.cbp.gov/xp/cgov/newsroom/fact_sheets/trade/fact_sheet_cbp_securing.xml Starbird, K., & Stamberger, J.(2010). Tweak the Tweet: Leveraging Microblogging Proliferation with a Prescriptive Syntax to Support Citizen Reporting. Proceedings of the 7th International ISCRAM Conference – Seattle, USA.
  • 6. EVALUATING SURVEILLANCE, DETECTION, AND INSPECTION TECHNOLOGY 5 References CBP.(2006). CBP Securing Our Borders Inspection and Surveillance Technologies. Retrieved from, http://www.cbp.gov/xp/cgov/newsroom/fact_sheets/trade/fact_sheet_cbp_securing.xml Starbird, K., & Stamberger, J.(2010). Tweak the Tweet: Leveraging Microblogging Proliferation with a Prescriptive Syntax to Support Citizen Reporting. Proceedings of the 7th International ISCRAM Conference – Seattle, USA.