While those laws have helped in the past, domestic surveillance quickly grew into a problem. Former NSA contractor Edward Snowden revealed that mass surveillance was being conducted on a majority of civilians by the NSA and PRISM. These scandals got citizens unease thinking in the back of their minds they might have been or are currently monitored. The Boston Marathon bombing where a known Islamic extremist planted two pressure cooker bombs killing 3 people and injuring 264 others is a prime example on why mass surveillance has failed us. Russia warned the U.S. about the terrorist that became an extremist and was possibly involved with extremist groups, FBI had questioned him, and the CIA had placed h...
... middle of paper ...
...Sharply Defends Domestic Spying without Court Approval and Calls Senate's Failure to Renew the Patriot Act 'Inexcusable.'." Los Angeles Times: 0. Dec 20 2005. ProQuest. Web. 7 Nov. 2013.
Rich, Frank. “When Privacy Jumped The Shark” New York.com. New York, June 2013. Web. 7 Nov 2013.
Deibert, Ronald. "Why NSA spying scares the world." CNN.com. CNN, June 2013. Web. 31 Oct 2013.
Goodman, Amy. Hoelzer, Jennifer. “Senate Insider Speaks Out: Ex-Wyden Staffer on Secret Laws, Domestic Spying and Obama’s NSA Reforms.” Democracy now.org. Democracy now, 12 Aug. 2013. Web. 8 Nov 2013.
Snowden, Edward. “Edward Snowden on Why He Stood Up to the NSA.” Democracy now.org. Democracy now, 12 Aug. 2013. Web. 8 Nov 2013.
Rehab, Ahmed. “Why Racial Profiling Makes for Dumb Security” Dialogues 7th ed. Eds. Gary Goshgarian and Kathleen Kruger. New York: Parson-Longman, 2011. 493-95. Print.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- ... Many security experts refer to data mining as finding a needle by making a bigger haystack. Oftentimes, information collected through domestic surveillance is already collected using less intrusive techniques. Writing about biological terrorism, distinguished authority in cybersecurity, Garfinkel: argues that “researching vaccines and treatments, training local law enforcement personnel, tracking radioactive and chemical materials, and restricting access to biological and chemical poisons” is a more productive use of resources than the sweeping surveillance programs (Etter).... [tags: Security, Surveillance]
889 words (2.5 pages)
- ... It is necessary for me to first address this pertinent question. What is an authentic apology. This is a relevant, critical question for me to ask myself as the lawyer representing this particular client in order to ensure that he knows the components and is truly aligned with these components. Taft (2000) defines an authentic apology as one involving the expression of genuine sorrow, regret, and remorse for an act. In my client’s situation, he was involved in a domestic violence incident with his wife.... [tags: Domestic violence, Violence, Morality]
1626 words (4.6 pages)
- Introduction In recent years the National Security Agency (NSA) has received extensive scrutiny as a result of their disclosed participation in nationwide surveillance programs that ultimately violates thousands of innocent American’s privacy rights. Only recently has the exposure been brought the forefront of media headlines, still the NSA privacy violations date back to the early 2000s when the domestic spying program known as the “President’s Surveillance Program,” was implemented by President George W.... [tags: spied computer games, oreign surveillance]
1117 words (3.2 pages)
- The intelligence community has conducted surveillance operations on a domestic and international level for years. The methodology of surveillance operations has been the same for decades; to collect data and to interdict with plots carried out to cause harm, destruction and death. According to Mike Rodgers, the Chairman of the House Permanent Select Committee on Intelligence, the surveillance program has prevented over fifty terrorist attacks in the U.S and abroad. Technology has advanced tremendously since the Cold War era.... [tags: surveillance, nsa, intelligence community]
2020 words (5.8 pages)
- The government of the United States of America is a constitutional republic that is based on laws. The Constitution is the supreme law and is what our country bases its laws upon. In such a nation like ours, we come across the ethical question of is it justified to violate the normal rights of one’s own citizens to ensure the safety of the country. This can also be rephrased to include the statement is domestic surveillance ethical. What is better for the country: security or liberty. Although some may argue that the safety of a nation and its people is more important than liberty, it is not justifiable to violate the rights of citizens to ensure their safety.... [tags: Ethics, Immanuel Kant, Deontological ethics]
1699 words (4.9 pages)
- As seemingly tangible evidence of a promising and greatly developed future society, technological advancement and innovation is typically celebrated and generously compensated by our contemporaries. In fact, individuals with a remarkable technological genius are deeply respected and almost venerated for their creations. Modern technology is, undeniably, used at the advantage of the American public, as it aids not only in disburdening the general population of the inconvenience of quotidian chores and in facilitating the accessibility of luxurious commodities to the lower classes but it also encourages the progression of the globalization of our society.... [tags: Privacy vs Government Surveillance]
2485 words (7.1 pages)
- ... As such, no intelligence agency shares any information as to the amount of terrorist plots it has foiled and the public is simply left to assume that the agencies’ espionage policies are effective. This makes it difficult to trust the information provided by the government as it may be biased in order to exaggerate the effectiveness of the espionage programs, or it may be simply incorrect altogether. There is, however, irrefutable evidence from the opponents of the NSA which counters the claim that the espionage is keeping the public safe.... [tags: Terrorism, Central Intelligence Agency]
1230 words (3.5 pages)
- In the past few years the National Security Agency has been all over the news, and not in a good way. Former contractor of the National Security Edward Snowden leaked classified documents to several media outlets on such a scale the world took notice. The day the world learned about the Prism program among others was June, 5, 2013 when Ed Snowden gave the specifics of the programs to The Guardian, and the Washington Post. Ed Snowden turned those secrets over as a member of the NSA but fled the country before the leaks so he would not be imprisoned by the authorities.... [tags: Domestic Surveillance]
2540 words (7.3 pages)
- "The poorest man may in his cottage bid defiance to all the force of the Crown. It may be frail; its roof may shake; the wind may blow through it; the storm may enter; the rain may enter -- but the King of England cannot enter; all this force dares not cross the threshold of the ruined tenement" (William Pitt the Elder). This idea of freedom and security against the government was the foundation for the United States when it was established in 1776. However, times have drastically changed since then.... [tags: USA Patriot Act, Government, Privacy]
1107 words (3.2 pages)
- Subject: Cyber Security and Surveillance: Bulk Data/Metadata Summary: The recent leaks, disclosures, and actions of government agencies – namely the National Security Administration (NSA) – have caught the public’s attention and focused it on the protection of privacy and civil liberties. The NSA participates in a bulk data collection program that has accumulated phone data over the past five years in order to track persons suspected of threat to the nation. This collection of mass data without issued warrants violates the Fourth Amendment and brings the potential abuses with this program into view.... [tags: nsa, collection, government]
848 words (2.4 pages)