Modern Surveillance and Technologies

National Security Presidential Directive-47/Homeland Security Presidential Directive-16 (NSPD-47/HSPD-16) outlines a plan for U.S. aviation security. Until very recently, the security threats of online platforms have been presented as nothing more than mirages, haunting policymakers but with little grounding in reality.

Based on information obtained by ISIS from Facebook, Twitter, and Instagram social media postings, the terrorist group has successfully penetrated the United States and executed 10 U.S. service members, and promises to kill more. These acts enrage the American public, disrupting economic, transportation, and communications sectors of the country. Since confirming the group’s digital presence, intelligence community reports indicate the group infiltrated the United States by air, entering several airports undetected and without suspicion.

Briefly discuss modern surveillance technologies currently in place to screen passengers entering and transiting the United States from foreign countries.
Read Intruders breach U.S. airport fences about every 10 days and look at the graph of security breaches.
Which city had the highest number of breaches?
Which city had the lowest?
What conclusions can you draw from this graph?
Should airport security authorities scan a passenger’s Facebook, Twitter, and Instagram social media postings for any indications of a potential threat to the United States? What are the ethical implications? Explain.

This question has been answered.

Get Answer