NCJ Number
193451
Date Published
2002
Length
3 pages
Annotation
This article reviews the use of various technologies to detect terrorists.
Abstract
The first task in detecting terrorists is to investigate foreign nationals before they enter the United States. And there needs to be a better system of detecting patterns of suspicious activities by potential terrorist once they enter the United States. Next, there should be development of a better nationwide database that allows State and local law enforcement officials, border control agents, and intelligence agents to share information with each other more effectively. The FBI has the National Crime Information Center (NCIC), but it needs to be expanded into something much larger. It should combine information from State and local agencies with information from Federal agencies such as the Immigration and Naturalization Service, the Department of Transportation, and the CIA. Such a database is only as effective as the identification system on which it is based. One solution is to develop a system of digitized cards. The United States needs a national identity card. If everyone had an ID card, the privacy of law-abiding citizens would be increased because the cards would make it easier for police agencies to find the right targets. The new smart ID cards should be uniform and connected to a national database. In addition, the United States should introduce new technology at airports and vulnerable public venues. At airports, improved scanners can detect bombs and hidden non-metallic weapons, such as plastic knives. In communications, new technology such as wireless text pagers with global positioning systems can act as bulletin boards in crisis situations, getting messages to law enforcement in the best position to respond and moving health care personnel to areas of most urgent need. Networked databases can help alert officials to the possibility of a bioterrorist attack by tracking clusters of suspicious symptoms. Web cameras with heat sensors can help close holes on unpatrolled sectors of the U.S. borders or monitor vulnerable infrastructure.