Information Technology and Security
Information technology has assisted the Homeland Security department in monitoring the country and protecting the citizens and infrastructure from terrorist attacks. The department is also mandated with the task of minimizing damage and assist in recovery in the event of terrorist attacks. The department uses information technology in several ways. First of all the department utilizes integrated surveillance intelligence systems. This is a system that monitors border activity using ground-based sensors and fixed cameras. There is also the use of computer aided detection capabilities. The system assists with the detection and preventing illegal aliens and contraband from entering the United States (Seghetti, Lake & Robinson, 2005).
The organization also utilizes computer assisted passenger pre-screening systems. This is a technology that helps the organization to identify passengers at the airport that require additional security attention. There is a database that contains a list of all the suspected terrorists known as the watch list. The individual’s booking details are checked in the database to prevent such individuals from purchasing airplane tickets. There is also stored data information that assigns a risk score on the passengers and those with high risk scores have to be subjected to higher scrutiny than the rest.
Information technology is also crucial in the monitoring of the travel of foreign nationals in terms of entry, exit and travelling within the country. The United States visitor and immigrant Status indicator technology is an advanced technology that will assist the organization to monitor the foreigners at a higher level. Last but not least, information technology has been used by Homeland Security to monitor the trade of goods in the United States. The system is known as the automated commercial environment and plays a critical role in border security.
Reference
Seghetti, L., Lake, J. & Robinson, W. (2005). Border and Transportation Security:
Selected Programs and Policies. Retrieved from: http://www.fas.org/sgp/crs/homesec/RL32840.pdf