Preview

Privacy Invasion Research Paper

Satisfactory Essays
Open Document
Open Document
432 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Privacy Invasion Research Paper
Privacy Invasion
Rose Thomas
ENG 122
Joyce Walther
December 20, 2010

Privacy Invasion When it comes to protecting and saving lives of the American people, private invasion used in order to locate and capture potential terrorist should be unlimited. The 911 attack has provided active proof to the American peoples of the damage that terrorist groups can impose on our society. Therefore, invading the privacy of individuals may prevent future terrorist attacks. Better technology and training to detect terrorist are important steps to reduce terrorist attacks. To achieve this objective, government must authorize national and local leaders to design programs, training, and funding. Thus, high priority should be given to developing programs to detect and prevent intended attacks before they occur. In this report, the Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals examines behavioral surveillance technologies in Counterterrorism programs and make decisions about deploying and evaluating those and other information programs of their effectiveness and risk to personal privacy. Modern data
…show more content…
Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist

You May Also Find These Documents Helpful

  • Good Essays

    As a result of recent lawsuits against many organizations, companies have developed a policy on proper email practices on company computers. No longer is your personal email regarded as private when accessed on a company's computer. Companies, in order to decrease lawsuits and increase productivity, have purchased email monitoring software to track email usage during work hours. Therefore, with the onslaught of email monitoring, is a private email really private?…

    • 377 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Identity theft is when someone steals another person’s identity through the internet. The identity stolen can be personal information such as account names and security numbers to use it for their own benefit. For example, a Facebook user can steal another Facebook user’s personal details by either hacking or visiting their profile, uploading their profile picture, gaining personal details and using it to create a fake account of that Facebook…

    • 769 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    A Policy Brief of NSA Reform

    • 3654 Words
    • 12 Pages

    I. Introduction: Since the acknowledgment of abused power by the NSA by former NSA contractor, Edward Snowden, long debate about the constitutionality of the collection of private records of American citizens has ensued in the senate. As a result of this issue that has and can continue to transgress on the civil liberty of privacy by all persons and entities, The USA Freedom act has been created which seeks to limit and to regulate the power of US surveillance agencies to collect private information from third parties. The USA Freedom directly addresses issues that are included in the USA Patriot Act, an act that was created to combat and to create protection against the threat of terrorism, which was a fear that heightened in response to the 2001 September 11 attacks (Savage). While this bill proved necessary at the time, in the act, are provisions that overstep constitutional boundaries that go beyond the intention and framework of the original plan.…

    • 3654 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    1984 Pros And Cons Essay

    • 631 Words
    • 3 Pages

    Since 9/11 and other tragedies such as the Boston Marathon bombing surveillance in many ways has increased significantly. One of the most significant ways is through the use and implementation of high-tech security systems, "As the volume and quality of cameras and sensors increases, cities are turning to more advanced face and object recognition software to make sense of the data"(CNN2). One of…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Since 9/11 terrorist attack on the United States, all levels of law enforcement have implemented several new ideas and protocols. There identifying and implementing programs that addresses and mitigates the terrorist. The identification and implementation of these protocols provides and the new threat of terrorism has set into motions a new perspective on security, by establishing the National Response Framework (NRF), the Threat and Hazard Identification and Risk Assessment (THIRA), and the signs for identification of terrorist activity to provide a common set of standards.…

    • 409 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Munchausen syndrome by proxy, MSBP, is a covert form of child abuse in which a parent or guardian, usually the mother, systematically fabricates or induces illness in her child. It proves a difficult syndrome to diagnose because the caretakers of these children are masters of deception. They thrive on deceiving medical and mental health professionals and revel in the attention received (Quisenberry).…

    • 842 Words
    • 4 Pages
    Good Essays
  • Better Essays

    In conclusion, the counter terrorism policies, if well implemented, will be highly effective in the war on terror. This can be fostered through proper frameworks, monitoring, research and sufficient funding of counterterrorism policies. It calls for a strong and efficient classification of terrorist cells in order to prevent attacks at the planning…

    • 2698 Words
    • 11 Pages
    Better Essays
  • Good Essays

    National Security Agency Director Keith Alexander said surveillance programs have helped thwart more than 50 “potential terrorist events” around the world. Alexander said at least 10 of the attacks were set to take place in the United States, suggesting that most of the terrorism disrupted by the program had been set to occur abroad. And in defense of the program he added “NSA also disclosed that counterterrorism officials targeted fewer than 300 phone numbers or other “identifiers” last year in the massive call-tracking database secretly assembled by the U.S. government.”. FBI Director Sean Joyce said the Web traffic program (NSA data collection) had contributed to arrests averting a plot to bomb the New York Stock Exchange that resulted in criminal charges in 2008 (Gerstein, 2013). Since the government was able to foil 50 plots around the world using the data they collected since 2001, is it worth being spied on? Some may argue that yes since life itself is more important than privacy but that brings me back to my question. Was Ben Franklin incorrect when he stated that “He who would trade liberty for some temporary security, deserves neither liberty nor security.”? Some may argue that technology and society has changed and its time we protect ourselves against extremist by giving up some of our liberties. Bruce Schneier in his bestselling book Data and Goliath explains how we are fed a false narrative of how our surveillance state is able to stop terrorist attacks before they happen. In fact, Schneier argues, the idea that our government is able to parse all the invasive and personal data they collect on us is laughable. He added that The NSA repeatedly uses a connect-the-dots metaphor…

    • 996 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The Fourth Amendment does not allow searches of personal items unless a warrant is used, but by tracking information on people it could help detect terrorism threats sooner. For example, President Obama claims that the data-collection programs “help prevent terrorism (Transcript: Obamas Remarks 4.3).” Even though people do not need a warrant to use these programs, people examine the phone numbers and length of calls, and by doing this it could ultimately protect the country from terrorism threats. Also, the U.S. Patriotism Act enables law enforcement agencies to search through “email and telephone communications, medical, financial, and library records (Legal Information Institute 1.1).” Furthermore, whenever the intelligence gathering community…

    • 188 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Civil Liberties

    • 819 Words
    • 3 Pages

    The United States of America has become one of the strongest nations in the world. Through the unfortunate tragedies that have occurred over the years, we as American citizens have overcome these disastrous events together as one. Since the devastating attack on September 11, 2001 America has come to be more precautious, knowledgeable and prepared for what could come our way in the future. Having a new conspicuous perspective the patriot act was established, according to the Department of Justice's their “first priority is to prevent future terrorist attacks”. The USA Patriot Act stands for ‘Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism’. By passing this act it has allowed the government, the NSA as well as law enforcement agencies to lawfully obtain and monitor the privacy of innocent Americans throughout the nation.…

    • 819 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As the federal government preoccupies itself with fighting foreign terror, it must not neglect the terror that Americans can inflict on one another at home. In the aftermath of the Boston Marathon attack, America can learn a few vital lessons on how to prevent future attacks. One important tool that can be used in preventing future attacks is surveillance. Suspected terrorists need should be looked into and watched thoroughly, including their past history and their internet history. The United States also needs to take advice from other countries on possible terrorist threats.…

    • 720 Words
    • 3 Pages
    Good Essays
  • Good Essays

    government tracking

    • 1009 Words
    • 5 Pages

    Ronald Bailey’s article seeks to explore more than just cell phone tracking technology. He delves in to the ideas surrounding the tracking of individuals both from a historical context and from people who are involved with the cell phone tracking issue today. Those sources are from both the government and private sector and each offers personal insights that might allow us to more thoughtfully determine which is more important, privacy or the prosecution of criminals.…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Developed “to deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and for other purposes” the USA Patriot Act, bears the formal name ‘‘Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA Patriot Act, 2001, p. 1). Heretofore referred to as the “Patriot Act” the USA Patriot Act was signed into law within 6 weeks from initial draft to final approval supporting the enforcement of laws for the ultimate protection of the United States and her citizens by granting access to persons and information with liberal criminal and civil procedure exceptions. The Patriot Act immediately granted broad-based interrogation, surveillance and isolation abilities to law enforcement when investigating “crimes against terror” (US Government, 2011)…

    • 1282 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Individual Privacy vs. National Security is something that many people have argued for years. Many people have forgotten what a disturbance September 11, 2001 was to everyone in America. This was the day that 2,992 lives were stolen in the attacks by the Taliban on U.S. soil. Due to this attack the Transportation Security Administration (TSA) along with the Federal Government has put in place many new security regulations. Many people have lost touch with why these regulations were put in place. As well, many people have lost touch with why TSA is using full body scanners and other security devices.…

    • 1762 Words
    • 8 Pages
    Better Essays
  • Better Essays

    NSA's invasion of privacy

    • 1397 Words
    • 6 Pages

    Whether it is calling someone on your phone or online shopping on the computer, people are more connected than ever to the internet. However, a person might be oblivious to the fact that they are being watched using these technologies. The NSA (National Security Agency) is an intelligence organization for the U.S. to protect information systems and foreign intelligence information. Recently the NSA has been accused of invading personal privacy through web encryption, tracking, and using personal information for their own uses and without permission. The surveillance of the NSA produces unlawful invasion of privacy causing an unsecure nation.…

    • 1397 Words
    • 6 Pages
    Better Essays