Wednesday, October 16, 2019
Chapter 3, Security Surveys and the Audit, in the Fennelly textbook Essay
Chapter 3, Security Surveys and the Audit, in the Fennelly textbook - Essay Example The advanced Covert Body Scans would detect concealed weapons in these cases in a detailed manner, such as which conventional methods like body taps would not. The Covert Body Scans would also ease up the long passenger queues caused by the current slow security systems, thus saving time for passengers and other officials. On the onset of security threats, many travel avenues heighten security measures leading to long queues, cancelled trips and inconvenienced passengers. The covert security scanners would see an end to this since they can scan people as they move through, thus eliminating long, stagnant queues. These systems are also useful in that they are multipurpose in nature that is they can detect a wide variety of security threats from airborne pathogens and illegal immigrants, to concealed weapons (Fennelly, 2013). The implementation of the covert security scanners is acceptable wherever imminent threat to human lives is constant, either directly or indirectly. Such locations include airports, academic institutions, the Mexican border, entries to prominent buildings like major banks and the white house. As indicated earlier, these security systems are a necessity wherever there is a threat to human life. Statistics indicate that more security threats occur in the private sectors than the public ones. These include private institutions like schools, banks, and shopping malls. Some, however, would argue that this development would be an infringement of the right to confidentiality. There requires to be a balance between the value of life and the preservation of privacy. Furthermore, Homeland security assesses and mitigates privacy implications that could result from developed security systems. Such security technologies would definitely be of immense assistance in safeguarding lives and property if implemented. The covert security scanners expose objects in as acute
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.