Controversial Counterterrorism and Security Technologies
Security Technology Goes from Tried & True to Futuristic:
Also See: Top 7 Homeland Security Emergency Preparation Resources
The search for technologies that would prevent terrorism, catch terrorists in the act, and let the rest of us go about our business without the loss of convenience or privacy is not new. The 9/11 attacks accelerated the search, and helped spur both more funding – and more controversy over whether and how these technologies may interfere with our freedom and privacy.
Here: the newest, the most controversial technologies, as well as the tried and true in the counterterrorism toolkit.
Artificial Intelligence:
Artificial Intelligence systems use computers or machines to replicate the human ability to analyze information, and--hopefully--to learn from the information they already have.
Biometrics:
Biometric systems use body parts and features to identify people and authenticate that they are who they say they are.
Electromagnetic Wave based Technologies:
Forensic Analysis Techniques:
Forensics refers to the use of scientific techniques to solve crimes, including terrorism.
Surveillance Techniques:
For more on the state of counterterrorism:
Also See: Top 7 Homeland Security Emergency Preparation Resources
The search for technologies that would prevent terrorism, catch terrorists in the act, and let the rest of us go about our business without the loss of convenience or privacy is not new. The 9/11 attacks accelerated the search, and helped spur both more funding – and more controversy over whether and how these technologies may interfere with our freedom and privacy.
Here: the newest, the most controversial technologies, as well as the tried and true in the counterterrorism toolkit.
Artificial Intelligence:
Artificial Intelligence systems use computers or machines to replicate the human ability to analyze information, and--hopefully--to learn from the information they already have.
- Artificial Intelligence
- Data Mining
- Genetic Algorithms
- Neural Networks
- Rule based systems
Biometrics:
Biometric systems use body parts and features to identify people and authenticate that they are who they say they are.
- Body Scanning
- Brain Scanning
- Facial Recognition Software
- Fingerprint Scanning
- Face Thermogram
- Gait Recognition
- Hand Geometry Measurement
- Iris Scanning
- Retinal Scanning
- Voiceprinting
Electromagnetic Wave based Technologies:
- Metal Detectors
- Millimeter Wave Cameras
- Radio Frequency ID
- X-Rays
Forensic Analysis Techniques:
Forensics refers to the use of scientific techniques to solve crimes, including terrorism.
- Mitochondrial DNA Analysis
- Forensic Psychology
Surveillance Techniques:
For more on the state of counterterrorism:
Source...