Although the Predator provides a technological advantage, the degraded aspect of the equipment, DHS drones do not have the same vulnerability protection as military drones, leaves it vulnerable to hacking, GPS spoofing …show more content…
NA). The pilot program will “use personally identifiable information (PII) collected from refugee applicant interviews and a subset of data from subjects apprehended at or near the US border” (Kimery, 2015, p. NA). In a time when, the number of refugees seeking asylum is increasing, this technology may be the answer to how the U.S. both protects its borders and provides relief to refugees from around the world. The non-U.S. citizen aspect of this program may slow the asylum process down as refugee photos and fingerprints are compared to those of known or suspected terrorists. However, the benefits of such a program are evident when you consider the current civil war in Syria, the number of Syrian refugees seeking asylum around the world and the potential for terrorists to infiltrate our borders using fake Syrian credentials. It’s a starting point and as a pilot program its intent is to “determine functional and technical requirements for a multi-modal biometric