Planned Criminal Attacks

One of the most expensive things worldwide is counter terrorism. Preventing, fighting or responding to an attack is an expensive task. Majority countries find themselves in a dilemma, do they invest in the preventive measure or do they generally invest in the security response agencies more than the investigative bodies.

A lot of research has been done revolving around the budget allocated to counter terrorism agencies and the respective results, one of this kind is FBI, billions of monies is allocated to them annually, with the task of making necessary investigations and reporting any planned criminal attack. According to the CPI report almost 90% of planned criminal attacks are prevented something which is commendable and encouraging to the state department of security.

It is clear that with all given advantages of pre terrorism counter activities any terror attack which turns out successful becomes expensive in terms of recovering, in comparison with what could have been spend to prevent the attack. The key question remains, is the FBI justified to be allocated such a huge budget when it cannot prevent all crimes.

In the CPI report one will argue the allocation given to the Federal Bureau of Investigation is worth it. With all their counterterrorism activities and the number of risks they reduce and prevent is recommendable. This view is supported by the fact that the cost used in preventing risk or terrorism is lower than the one incurred incase of a successful attack.

FBI is known for its successful operations and investigations over years and one can confirm that their investigation ways are worth. While the author of CPI report does not mention the use of technology by the FBI in their respective activities one will not be biased to attach high cost to the sorts of technology they employ during their investigations (Mann & Smith 2017).

When the article fails to mention some of the modern technologies employed by the FBI in their activities, one is left feeling the act is an oversight. It is obvious the FBI has employed technology in almost all activities, therefore the article failing to mention this is awkward because almost 80% of the USA population knows that the FBI uses technology in almost all its activities. This makes it worrying when the article fails to capture some of the technologies employed. In the recent past the FBI has employed technology in almost all its activities. Some of this include facial recognition, digital forensic, radio program, GPS tracking, the use of stingrays and gunshot detection devices.

One key thing in counter terrorism, is how one manages to monitor, prevent or handle a criminal attack.in the recent past GIS has proofed to be ab effective technology in suit with counter terrosism.it is able to predict, prevent and tackling terrorism. Geographical information system application starts from establishing the four components in terrorism, that is how it is planned, where it is planned, when it is supposed to occur and who are the planners (Combs 2017).  After establishing this it goes ahead to communicate this information to all responsible departments. In cases where an attack is successful, GIS responds to secure the citizens, property and the scene.in the given scenario the author should have indicated the use of GIS by the FBI indicating how it operates and the results it has bared in the period it was used. Since it is a technology with high levels of success indicating bringing it to light would have been sensible. With one left asking himself or herself how does the FBI predict a criminal attack highlighting this technology would answer all the questions.

This refers to a system which identifies a multidimensional mobile subscriber. Law enforcement agents use this technology to trace a suspected cell phone. This is done secretly and even the owner is unable to recognize whether there is any investigation going on. During the execution of any planned tracking the authority is not required to give permission. Investigating agents conduct their investigation without involving any other department.

This technology is used to intercept messages, record call details which can further be used to investigate any planned criminal attack or activity. Information gathered can therefore be used in a court of law or in legal proceedings. Technology has been a key success factor in all FBI activities. The level of technology and the output clearly shows the importance of integrating technology in investigations. While technology has its short comings, its advantages outdo the challenges and the cost incurred in procurement (Whelan (2016).

References

  1. Combs (2017). Terrorism in the twenty-first century. Routledge.
  2. Mann & Smith (2017). Automated facial recognition technology: Recent developments and approaches to oversight. UNSWLJ, 40, 121.
  3. Whelan (2016). Networks and national security: dynamics, effectiveness and organization. Routledge.