|
WHAT TO DO
1. You are required to submit at least 2 blog entries.
2. Your first entry requires you to state your opinion on any one of the questions under discussion.
3. Your second entry requires you to comment on a classmate's entry.
4. Your entries must be at least five days apart.
5. Your entry must be at least 50 words in length.
6. Each of your entries must be accompanied with your official name. Do not use a ‘nickname'.
|
|
|
TAG BOARD
|
|
|
CREDITS
design (c) maystar designs
powered by blogger
image (c) maystar designs
|
|
|
I would like to comment on Joshua Ng's post. in his last paragraph, he said that terrorists and known opponents may also hack the system and thus gain access to the cameras themselves, and this will allow them to gain valuable information about what the police are monitoring. In the case of terrorists, it will allow them to know when best time to strike.
i disagree with with him as i think that gaining access to the cctvs will not help them to gain valuable information about what the police are monitoring, though they could also use the hacked cctv to their own advantage, using them to monitor the movements of the important people in the area, and destroying edvidence.
But i agree with him when he wrote: In the case of terrorists, it will allow them to know when best time to strike. It is very important to have the right information about what they are after, whether their target is in the right position, weather the area is clear of police and can look for blind spots.
done by russell tan
|
|