President & National Security Introduction Term Paper

Smart bombs or laser guided bombs are capable of striking a target that is hidden under the bridge by tracing the necessary trajectory which destroys the target by does leaves the bridge intact. Similar technology is stored in unmanned aircrafts or bomb sniffing devices. It saves the loss of life of innocents in the target areas and also helps the safety of U.S. armed service personnel. Bunker buster bombs, for example, were used to target the caves of Afghanistan where the Taliban were hiding. These were able to penetrate and explode only at specified depths, leaving the landscape unscathed. With this kind of covert warfare, come the issues of propaganda. Political issues often cloud the effective management of war. The less innocent casualties on both sides of the issue, the easier the President can make the case for warfare. Face recognition technology also a useful advance. Consider this: Mohammed Atta was the terrorist who flew the first plane into the Twin Towers, and was generally considered the head operation for September 11, 2001. Television coverage of the aftermath showed a hidden camera of Atta...

...

If his face was recognized and identified as a terrorist, the plane would not have flown that day. Mug shots of terrorists are currently stored in the database. Faces, much like fingerprints, are considered unique to a person. While faces might appear similar, face recognition software pinpoints distances between key points on the face. This software can also penetrate disguises. Hidden or close circuit cameras can identify faces, store the face from each frame, calculate the parameters and access a database that identifies these parameters. If a match appears, it might be possible to apprehend the would-be terrorist. High speed computing makes this possible.
Conclusion

Most of the advances in technology have allowed the President to carry out a warfare that is continually evolving. These advances can be used for both preventive measures, ensure that the target is comprehensively destroyed, without making undue casualties. This makes remarkable improvements in how wars are prosecuted. They also make the job of the President much easier.

Sources Used in Documents:

Face recognition technology also a useful advance. Consider this: Mohammed Atta was the terrorist who flew the first plane into the Twin Towers, and was generally considered the head operation for September 11, 2001. Television coverage of the aftermath showed a hidden camera of Atta entering the plane minutes before the ill-fated flight. If his face was recognized and identified as a terrorist, the plane would not have flown that day. Mug shots of terrorists are currently stored in the database. Faces, much like fingerprints, are considered unique to a person. While faces might appear similar, face recognition software pinpoints distances between key points on the face. This software can also penetrate disguises. Hidden or close circuit cameras can identify faces, store the face from each frame, calculate the parameters and access a database that identifies these parameters. If a match appears, it might be possible to apprehend the would-be terrorist. High speed computing makes this possible.

Conclusion

Most of the advances in technology have allowed the President to carry out a warfare that is continually evolving. These advances can be used for both preventive measures, ensure that the target is comprehensively destroyed, without making undue casualties. This makes remarkable improvements in how wars are prosecuted. They also make the job of the President much easier.


Cite this Document:

"President & National Security Introduction" (2008, May 08) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/president-amp-national-security-introduction-29989

"President & National Security Introduction" 08 May 2008. Web.26 April. 2024. <
https://www.paperdue.com/essay/president-amp-national-security-introduction-29989>

"President & National Security Introduction", 08 May 2008, Accessed.26 April. 2024,
https://www.paperdue.com/essay/president-amp-national-security-introduction-29989

Related Documents
Aloud or in Writing, Making
PAGES 55 WORDS 17261

Companies such as XYZ Widget Corporation are well situated to take advantage of burgeoning markets in developing nations, particularly in Asia and Africa. 2. XYZ can grow its business by expanding its operations to certain developing nations in ways that profit the company as well as the impoverished regions that are involved, particularly when marketing efforts are coordinated with nongovernmental organizations operating in the region. 3. Several constraints and challenges must

Direct to Consumer Advertising HISTORY OF DRUG ADVERTISING THE DTC ADVERTISING PHENOMENON CREATING DEMAND DECEPTIVE ADVERTISING - A WOLF IN SHEEP'S CLOTHING CAUSE OF DEATH PROFIT UTILIZATION, PRICING, AND DEMOGRAPHICS LEGISLATION, POLITICS AND PATENTS LEGISLATIVE INITIATIVES REGARDING DTC RECALLED and/or DEADLY DRUGS In order to provide the most efficient method of evaluation, the study will utilize existing stores of qualitative and quantitative data from reliable sources, such as U.S. Government statistical references, University studies, and the studies and publications of non-profit

Wireless Broadband Technology
PAGES 50 WORDS 20344

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

International Regulation of Tourism in Antarctica Since the mid-1980s, Antarctica has been an increasingly popular tourist destination, despite the relative danger of visiting the largest, least explored -- and arguably least understood -- continent on earth. Beginning with the 1959 treaty establishing Antarctica as an international zone free of claims of sovereignty by nation's that had been instrumental in establishing research stations there, there has been almost constant negotiation about how