NCJ Number
193450
Date Published
2002
Length
15 pages
Annotation
This paper examines the ways that technology can detect and prevent terrorism.
Abstract
Among the ways that technology can help find terrorists before a strike occurs include: improved data sharing, “smart ID cards” with biometric identifiers, “smart visas” and improved border security, digital surveillance, and face recognition technology. Improvement of data sharing consists of two efforts: the National Crime Information Center (NCIS) should be expanded to accept more information from Federal, State and local agencies, and other databases should be more fully integrated to the extent allowed by law; and Congress should fund matching grants to States to facilitate the purchase of handheld computers that can both query and enter information into databases. In regard to smart cards, which are cards that have been implanted with tiny computer chips that contain information, Congress should mandate that any standardization efforts by State motor vehicle agencies include upgrading all ID cards to smart cards. The current visa program also should be upgraded to include the issuance of visas as smart cards with biometric data. Internet surveillance is an important tool of terrorists, but the government has long had highly restricted authority to conduct surveillance on electronic communications. It is in the interest of the Government to address privacy concerns without throwing out important tools to monitor criminal use of computers and the Internet. Face recognition, the ability of cameras to scan crowds to capture images of faces, is also a powerful tool of law enforcement, but has been resisted because of privacy concerns. This is a promising technology that deserves further government testing. Defending the Nation against future terrorist attacks includes the following principles: direct anti-terrorism efforts toward systemwide improvements; recognize the economic benefits of investment in domestic defense; keep privacy issues in perspective; focus technology procurement on speedy deployment and interoperability; and coordinate domestic defense research and development. 32 Notes