Technology solution

 

Name:

Course:

Institution:

Instructor:

Date:

Technology solution

During the 1996 summer Olympic Games in Atlanta, several security vulnerabilities existed and

Contributed to some of the security crisis that followed. First off there was the crash of the TWA flight 800 just two days before the Olympics. This was security vulnerability because the event had one hundred and ninety seven countries participating from the world and the participants were using planes to travel to Atlanta from their respective countries. In addition, some of the fans from all over the globe who were set to attend the games were also likely to travel through planes. This posed a risk to their well-being when traveling especially since there were rumors that the plane had either been hit with a missile or bombed by terrorist. Due to this accident, new strict security measures were put in place and no other plane crash was reported during the Olympic Games.

The other security vulnerability during the Olympic Games was communication. When the security guard Richard Jewell noticed an attended bag, he alerted the officers who delayed in relaying the information to the right personnel. They started evacuating the immediate areas after several minutes but the bomb exploded before the bomb squad would arrive at the scene. This communication delay resulted in the bomb detonating, killing one person and injuring hundreds before the bomb squad arrived.

The other vulnerability was the influence of the local politician that made the Olympic planners set aside one site that did not require tickets and much screening procedures on entry. This reduced the chance of detecting any bomb or ammunition that the people had on them. It increased the risk of any security catastrophe because any one was eligible to enter and exit the centennial Olympic park that was the free site set aside. In addition, the park was open late into the night, which increased the risk since during the night a person would easily be disguisable and easier to strategically station a bomb. This vulnerability resulted to a person placing a bag with a bomb inside it at the centennial Olympic park and leaving it there without being detected and discovered until much later.

The closed circuit televisions (CCTV’s) are the most common security technology that is utilized. Advanced use of the CCTV technology includes smart video surveillance, which alerts the relevant authority of any suspicious activities and abandoned packages (Syed, & Baiocchi, 2001). In addition, the combination of this technology with radiation detection and threat sensors allow visual tracking of any source of radiological threat. This technology would have addressed the security vulnerability of the bomb left behind to detonate by detecting the abandoned bag and the culprit who left it.

The RFID technology, which is under the U.S visit program, requires countries to produce an ‘e-passport’ that contains an RFID chip that can store biographic information, a digital photo and other biometrics details. This technology allows faster and more secure identification of any suspicious activity and enhances more efficient border and port travel for visitors in the U.S. it also increases the  chances of sharing information among the various domestic and foreign agencies.

Sensor networks, which include metal detectors, bar code readers, X-ray scanning technology and explosives detection canines are some of the methods employed in detecting any explosives, fake passports, and any ammunition a person has under their clothes or inside their luggage (Balog, 2002). It is used in malls, airports, stadiums; transport services and many other places .This technology would have been used in detecting the bomb inside the bag when the person who brought it was entering the centennial Olympic park. In addition, the canines would have detected the bomb if they were patrolling inside the park for more security purposes.

Satellite imagery is a technology that consist aerial photograph of the earth or any other planet, which are made by artificial satellite placed in outer spaces. The satellite is placed in a circular sun-synchronous polar orbit at an altitude of 510 km, in order to give high-resolution satellite for fast maneuvering between target images. This enables high performances of this technology, which is the reason it is used for intelligence purposes. This technology would have been employed during the 1996 Olympic Games, to clarify the rumors that the TWA flight 800 did not crash because of missile attack or bomb explosion

Bio detection is a technology that uses biological weapon sensors to monitor the air continuously for any biological aerosols. They use filters to collect any organism in the air that may contain germs for mass wipeout and diseases like anthrax, plague and smallpox. Then the filters are collected every day and taken to the lab for analysis. This technology is employed throughout thirty states to counter biological attack by any terrorist or country against the United States.

Unmanned aerial vehicles (UAV’s) are remotely piloted or self-piloted aircraft that carry sensors, cameras or any communication equipment. They are used for intelligence purposes in collecting and gathering intelligence from the enemy or for security management. In addition, they are capable of providing attacks in high-risk missions and target a ground and aerial gunnery that stimulates the enemy aircraft or missile.

All this technologies would have greatly reduced the security vulnerabilities experienced during the 1996 summer Olympic Games if they were in existence then. Although a few were in use, they did not have the level of technology that they have today. The RFID would have been used to detect any terrorist or fugitive trying to enter or exit the country. The UAV’s would have intelligently picked any suspicious plane in the sky that posed the threat to other planes.

References

International Conference on Intelligent Multimedia and Distance Education, Syed, M. R., & Baiocchi, O. R. (2001). Intelligent multimedia, computing and communications: Technologies and applications of the future.New York, NY: John Wiley & Sons.

Balog, J. N., United States., Transit Cooperative Research Program., Transit Development Corporation., & National Research Council (U.S.). (2002). Public transportation security. Washington, D.C: NationalAcademy Press.

 

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]