Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Patriot act 2002 usa
Us patriot act homeland security
Introduction to the USA PATRIOT Act
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Patriot act 2002 usa
The Next Great Wall
The attacks of September 11, 2001 on the World Trade Center triggered the passing of the USA Patriot Act “to deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and for other purposes."1 It passed quickly and with little debate. Soon, encryption of information became a topic to address and efforts took place to allow the government backdoor access to anything encrypted by products developed within the United States. This generated much controversy and was opposed by many organizations. It did not take long before the supporters of these encryption bills backed down.
The Chinese government, on the other hand, did not go through such a process. Restrictions on encryption technology imported to or developed within China have been put forth. Their attempts at such control contrast what the United States considers is a denial of our rights to privacy even when addressing national security. The U.S. has acknowledged the significance of supporting free encryption policies while China’s restrictions have shown they are even more limiting, unenforceable and morally wrong in how it affects its citizens as well as its international neighbors.
U.S. Policies
Addressing encryption technology over the last 5 years has been a challenge for establishing policy in the United States. Development of advanced encryption technology heightened towards the end of the 20th century and questions on its usage soon came into play. On February 23, 1999, the Security and Freedom Through Encryption (SAFE) Act was introduced “to affirm the rights of United States persons to use and sell encryption and to relax export controls on encryption."2 In addition, o...
... middle of paper ...
...urnal. (back)
Moore, Tim (2003), IEEE P802.11 Wireless LANs Draft 5.1, Retrieved February 7, 2004, from the World Wide Web: IEEE (MS Word Document). (back)
CNET Asia Staff (2003), China Wi-Fi codes to be controlled by 11 firms, Retrieved January 25, 2004, from the World Wide Web: CNet News. (back)
Freeman, Charles W. III (2004), Deputy Assistant USTR Feb. 5 Testimony, Retrieved February 7, 2004 from the World Wide Web: USInfo.State.Gov. (back)
Shim, Richard (2003), China Implements new Wi-Fi security standard, Retrieved January 25, 2004 from the World Wide Web: CNet News. (back)
Shim, Richard (2003), China Implements new Wi-Fi security standard, Retrieved January 25, 2004 from the World Wide Web: CNet News. (back)
Gossett, Sherie (2002), e-Freedom fighters forge new weapon, Retrieved February 7, 2004 from the World Wide Web: World Net Daily. (back)
"The Triumph of Technique – The Logic of the NSA." LibrarianShipwreck. WordPress.com, 22 June 2013. Web. 08 Feb. 2014.
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
In early June 2013, Edward Snowden, a 29-year-old former defense contractor who had access to NSA database while working for an intelligence consulting company, leaked classified documents reports that the National Security Agency (NSA) is recording phone calls of millions of Americans along with gathering private data and spying foreign Internet activity. The Washington Post later broke the news disclosed PRISM, a program can collect data on Internet users. The leaked documents publicly stated a vast objection. Many people were shocked by the scale of the programs, even elected representatives were unaware of the surveillance range. A nationwide debate over privacy rights have been sparked. Although supporters claim that the NSA only does its best to protect the United States from terrorists as well as respecting Americans' rights and privacy, many civil rights advocates feel that the government failed to be clear about the limit of the surveillance programs, threatening Americans' civil...
.... But this wall must be passable; it must have an opening that anyone can pass through. But the only people that will find the door through are the ones that are willing to be open themselves!” There are so many views, ideas, and aspects of wall due to its extreme complexity, culturally and archeologically. Everything can be linked to everything! This is the ultimate anthropological truth. The Great Wall is truly great.
Citizens feeling protected in their own nation is a crucial factor for the development and advancement of that nation. The United States’ government has been able to provide this service for a small tax and for the most part it is money well spent. Due to events leading up to the terrifying attacks on September 11, 2001 and following these attacks, the Unites States’ government has begun enacting certain laws and regulations that ensure the safety of its citizens. From the Foreign Intelligence Surveillance Act (FISA) of 1978 to the most recent National Security Agency scandal, the government has attempted and for the most part succeeded in keeping domestic safety under control. Making sure that the balance between obtaining enough intelligence to protect the safety of the nation and the preservation of basic human rights is not extremely skewed, Congress has set forth requisites in FISA which aim to balance the conflicting goals of privacy and security; but the timeline preceding this act has been anything but honorable for the United States government.
The 20 Enemies of the Internet. 1999. Radio Free Europe / Radio Liberty. Feb 20, 2001. <http://www.rferl.org/nca/special/enemies.html>.
Strickland, Lee. "Without Civil Liberties Homeland Security Will Fall." University of Maryland. N.p., 23 Dec. 2005. Web. 10 Dec. 2013. .
Watts, Jonathan. "China's Secret Internet Police Target Critics with Web of Propaganda | Technology | The Guardian." The Guardian. 14 June 2005. Web. 21 Feb. 2011.
The Great Wall of China has been called a wonder by many who have seen it. It brings pride to the Chinese nation, and is known for being the only man made structure visible from space. The magnitude of The Great Wall is an architectural achievement as well as an example of the will power of man. Many find it hard to believe that such an amazing sight could have a history so filled with death, slavery and sadness as The Great Wall does. The Great Wall of China is one of the world's most famous architectural triumphs and has helped China throughout its history, even though its creation is marked by tragedy.
Sirico, Robert A. "Don’t Censor the Internet." Forbes 29 July 1996: 48. [Editorial outlining concerns about governmental control of the Internet and alternatives.]
Swift, Mike. "Google admits vacuuming up data from Wi-Fi networks, apologizes." 14 May 2010. Mercury News. 17 June 2010 .
A major reason the U.S. needs to increase restrictions on the type and amount of data collected on individuals from the internet is due to the fact that the United States government can track communications and browsing histories of private citizens without warrant or cause. After the terrorist attacks of September 11, 2001, ...
In the race to be the best, China is clearly outperforming the United States. China has strong economic fundamentals¬ such as “a high savings rate, huge labor pool, and powerful work ethic” (Rachman, Gideon. "Think Again: American Decline). Their economy has grown an astonishing 9-10% over the past thirty years; almost double of what it used to be decades ago. China is also the “world’s greatest manufacturer and its greatest market” (Rachman). The continuing growth of China's economy is a source of concern for not only the U.S. but surrounding nations as well. One could argue that the U.S. need not worry about China’s growth because of the spread of globalization and that western ideologies would influence China to turn to democracy. Yet China has still managed to “incorporate censorship and one party rule with continuing economic success” (Rachman) and remains a communist country. Hypothetically, even if China does resort to a democratic state, this does not gua...
Interests: China’s leaders desire to improve their nation’s economy while preserving political stability. They want to censor political discussions to prevent “westernization” of China,
Melford, RJ 1993, 'Network security ', The Internal Auditor, vol. 50, no. 1, p. 18.