Identify a person based on physical characteristics

Assignment Help Other Subject
Reference no: EM13889841

Question: Assignment Objectives

Describe and discuss information sharing and knowledge management technologies used to facilitate information sharing and intelligence gathering among Homeland Security agencies.

Use the below response to answer the below questions:

I chose Human Intelligence Collection (HUMANINT), CCTV surveillance and Biometric scanning as my three subjects to address. Human Intelligence gathering is used both in the civilian and military realms to obtain or extract information from individuals. The two basic types of information gathering are interview or interrogation. One or the other will be used depending on the circumstances of the situation. CCTV is close circuit television. This method is used almost everywhere; from buses to buildings to elevators and subways to monitor events and to obtain evidence of a happening. Biometrics is the use of physical characteristics such as fingerprints, retina scans and voice features to identify a person for security reasons. I was interested to read there are microchips that can be swallowed and stomach acid allows the chip to send off a radio signal for identification.

It is my opinion HUMANINT is effective in its approach. Many methods have been developed to be used in order to extract information from individuals. I was privileged enough to take a class on Interview and Interrogation a few years ago, given by the man who was one of the people who interviewed O.J. Simpson and was taught his method in 40 hour class. There is a distinct difference between interview and interrogation and usually this is based on the how the subject is approached, how comfortable he/she is made; how and what questions are asked. This particular approach was based on general personality types but is by no means the only approach to the subject, but from the information in the class it was highly effective without engaging in the use of physical force. I believe the use of psychology has come a long way in developing methods to pressure a person without inflicting any pain, while still obtaining the necessary information.

I think HUMANINT can improve but is very effective at this point. I believe it has to do with the person conducting the interview/interrogation and his or her skill and ability to read the other person and apply the correct principle. HUMANINT collection can indeed be misused, just read about the allegations and incarceration of military members who have gone far beyond the basic application and used physical torture and humiliation to conduct the interrogation. I believe it is very easy for this to be illegally used.

CCTV is in wide use today. It can be found just about anywhere: businesses, home, military bases, vehicles, bicycles, patrol cars, etc. In most cases a video can make or break curt case by its admission into the proceedings. Such video has been used not only to exonerate but to convict people on both sides of the law. It's use is extremely important for law enforcement for two reasons: liability and training. For instance, I have regular reviews with my supervisor over traffic stops I have made. This allows me to see myself in action and to discuss what I did well and what could be improved. This type of training allows for accountability and improved public relations. On the other hand, such video can be misused as well. The current media can 'spin' a particular story by showing a portion of an incident and can often lead to unrest, protest and violence. The Ferguson incident is one such event. By showing only a portion of the facts and presents a particular slant to the event the city of Ferguson, Missouri suffered terribly from the riots and violence that took place. In addition, police officers who turn off their cameras or in court state that somehow their body camera wasn't working at the moment can find themselves being investigated for misconduct or worse. It is easy to misuse the camera and its contents.

Biometrics is the ability to identify a person based on physical characteristics. Fingerprint scanners, retina scans and facial recognition are all part of a high tech security movement. My Samsung tablet goes to sleep mode if it can't 'read my eyes', quite frustrating when I'm in the middle of reading an email or browsing the Net. I believe its uses is limited and the technology can be improved and be more effective but in its present state it is very effective and it takes a person with high tech skills to break past such safeguards. The problems arise from its misuse in the area of invasion of privacy. A disgruntled employee in a government installation with such technology and who understands it use could create a method in which a person could be monitored constantly. Take the subways of New York with their myriad of cameras; using facial recognition one could be tracked daily and constantly and every moved tracked. There is potential for information such as fingerprints, as vital as a Social Security number to be leaked and misused.

To conclude, I think all the methods above are in their full use. I believe they are effective and whie there could be improvements, I believe they are being used to their full pontential.

What have you learned from others'' responses?

What were the most compelling points from the interaction with your fellow students?

How did participating in this discussion help in your understanding of the Discussion Board task?

What approaches could have yielded additional valuable information in the students'' networking?

What is still unclear after the discussion with your classmates that needs to be clarified?

Reference no: EM13889841

Questions Cloud

What is ge current level of diversification : What is GE's current level of diversification? Historically, has GE become more or less diversified? Why has GE been moving in this direction
Define the control process and describe the control steps : Define the control process and describe the control steps. Be sure to expand on the description of Baseline Plan and Measuring the Progress and Performance using an Earned Value (EV) system.Describe Cost Variance and Schedule Variance. Then, assume t..
Graphically depict the interaction among : Big Bob's Burger Barn would like to graphically depict the interaction among its lunch ordering customers and its three employees.
List two possible organic growth strategies : List two possible organic growth strategies and two external growth strategies for Brownstone Restaurants, Inc. to grow its Fillis Bistro unit.
Identify a person based on physical characteristics : Describe and discuss information sharing and knowledge management technologies used to facilitate information sharing and intelligence gathering among Homeland Security agencies.
What is the speed of the hoop : A hoop and a disk, both of 0.90- m radius and 2.0- kg mass, are released from the top of an inclined plane 3.5 m high and 8.5 m long. What is the speed of each when it reaches the bottom? Assume that they both roll without slipping. a)  What is the s..
Unethical business practices degrade the quality : How is the International Organization for Standardization trying to encourage ethical business behavior?
What is the kinetic energy of the shell : A hollow spherical shell has mass 8.50 kg and radius 0.230 m . It is initially at rest and then rotates about a stationary axis that lies along a diameter with a constant acceleration of 0.910 rad/s2 .
What is the final equilibrium temp of the mixture : If 200 g of water is contained in a 300 aluminum calorimeter at 20 Celsius and 20 g of steam at 100 Celsius is introduced into the calorimeter, what is the final equilibrium temp of the mixture?

Reviews

Write a Review

Other Subject Questions & Answers

  What are the assumptions being made about the role of women

What are the assumptions being made about the role of women in Persian society? What are the assumptions being made about the nature and use of power and authority?

  Explain why the project manager would use fishbone or

question 1. explain how the project manager measures and satisfies the customersponsor. question 2. describe why the

  Different processes to your hypothetical study

How could you incorporate these different processes into your hypothetical study in a manner that complies with current ethical guidelines?

  Inappropriate behaviour in a counsellor-client situation

Describe a scenario in which a failure to establish boundaries might be responsible for inappropriate behavior on either the part of the client or the counsellor.

  Genetic and environmental factors-nature of people

Explain, based on what you know about attachment theory, how you think genetic and environmental factors have influenced the nature of people with high attachment-related anxiety and low attachment-related avoidance.

  Find the number of seats or tables needed

Assuming a capacity cushion of 20 percent. Find the number of seats/tables needed. (assume 4 seats per table)(Round up your answer to the next whole number.)

  Ramifications of company internal surveillance policies

Your manager recently sent a memo outlining new company surveillance policy. As a result of this policy, each computer on your company network will be monitored with special type of software that will alert your manager when you're using your comp..

  After a severe storm three sisters april may and june stood

after a severe storm three sisters april may and june stood on their front porch and noticed that the tree in their

  Ethical issues presented in the simulation

What were the ethical issues presented in the simulation? What decision-making steps did you take to ethically address these issues?

  Home countries reshaped ethinic idenify and attitudes

How have structural conditions in the home countries reshaped ethinic idenify and attitudes among Arab immigrants in the United States?

  Main parts of the central nervous system

What are the two main parts of the Central Nervous System? What are the two subsystems of the Peripheral Nervous System? List any four neurotransmitters, and tell me what they do.

  What are the consequences of de jure segregation

What are the consequences of de jure segregation? Of de facto segregation? Which is most difficult to prove? Please explain, I am not understanding this question.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd