National Security vs. the Right to Privacy

analytical Essay
2936 words
2936 words

"Security is mostly a superstition. It does not exist in nature. Life is either a daring adventure or nothing." -- Helen Keller Security has been a common topic of controversy since the terrorist attacks of September 11, 2001, and even before then it was a constant subject. The image of buildings collapsing and billowing smoke has been engraved into the minds of Americans and will remain there for years to come. Security is an issue that we encounter everyday. Whether it is driving down the freeway or walking into the grocery store; we are cautious of what is going on around us. Men and women across this country are dedicated to enforcing laws; laws that are designed to ensure the security of our communities and our nation. In an effort to project a feeling of security, the government has set up a department whose sole purpose is to protect; the department of Homeland Security. We install surveillance cameras in banks, stores, restaurants, and homes. Those that we feel need more protection, such as celebrities and politicians, are constantly surrounded by body guards. One cannot work with children without having a detailed background check and receiving priority clearance. If one is willing to look hard enough or spend enough money, they can retrieve information on any specific person, and barely break a sweat. Security is not something that can be compromised; however, it does not have to come at the expense of our privacy. It is possible to maintain our own identities, while guaranteeing the security of our nation. As Bruce Schneier argues in his commentary, Protecting privacy and liberty, security and privacy are not two sides of an equation. (773) In an article for an Internet security company, Schne... ... middle of paper ... ...h. 68 (2001): 105-113. Spring 2001. Academic Search Elite. EBSCOhost. University Library, Indianapolis, IN. 15 March 2005. Schneier, Bruce. “Protecting privacy and liberty.” Nature. 413 (2001): 773. 25 October 2001. Academic Search Elite. EBSCOhost. University Library, Indianapolis, IN. 15 March 2005. Sopinka, John. “Freedom of Speech and Privacy in the Information Age.” The Information Society. 13. (1997): 171-184. April-June 1997. Academic Search Elite. EBSCOhost. University Library, Indianapolis, IN. 15 March 2005. Swartz, Nikki. “The World Moves Toward Freedom of Information.” The Information Management Journal. (2004): 20-23. November-December 2004. Academic Search Elite. EBSCOhost. University Library, Indianapolis, IN. 15 March 2005. “Preserving Life and Liberty.” “Airport Security Hasn’t Improved, Reports Conclude.” AOL News. 16 April 2005.

In this essay, the author

  • Opines that security is mostly a superstition. it does not exist in nature.
  • Explains that security has been a common topic of controversy since the terrorist attacks of september 11, 2001.
  • Argues that security is not something that can be compromised; however, it doesn't have to come at the expense of our privacy.
  • Analyzes how schneier addresses the issue of security in an article for an internet security company.
  • Explains that giving airline pilots firearms, reinforcing cockpit doors, better authentication for airport maintenance workers, armed air marshals traveling on flights, and teaching flight attendants are all suggested security measures that have no effect on individual privacy or liberties.
  • Opines that security can be achieved without hindering privacy, but it is not necessary to constantly berate innocent citizens.
  • Opines that airport security personnel should be given adequate training and authority in order to make intelligent decisions in determining necessity of patting down every other person making a flight.
  • Opines that airport security is no safer today than it was prior to september 11th. it is important to find more efficient and less hindering ways to ensure security.
  • Analyzes how airport security rips away privacy, citing bacard and nesson.
  • Analyzes how rita cain, a law professor at the bloch school of business and public administration, debates that the constitutional right of privacy does not provide consumers any protection against use or abuse of personal data by private sector parties
  • Explains that the restrictions placed on the trade of private information are nearly non-existent in the united states.
  • Analyzes how cain argues that after the terrorist attacks on the united states, issues about privacy now focus on national security needs to protect against further violence.
  • Explains that learning of a terrorist group’s plans in advance, monitoring its efforts and frustrating those efforts, or denying all those who do not pass some test of loyalty access to likely targets or to the resources needed to attack those targets.
  • States that the declaration of independence and the bill of rights were designed to protect against government intrusion in the lives of the united states of america.
  • Explains that the usa patriot act was implemented in 2001 following the attacks of september 11th. it calls for increased security for criminal investigations and other areas that will help reduce the chances of terrorist attacks.
  • Analyzes how government secrecy has become the norm in the post-september 11th world, citing nikki swartz's essay for the information management journal.
  • Opines that security and privacy are a difficult balance. it depends on what you feel is important.
  • Explains that all men are created equal and endowed with certain unalienable rights, such as life, liberty, and the pursuit of happiness. governments are instituted among men to secure these rights.
  • Cites bacard, andre, and academic search elite. privacy in the computer age.
  • Opines that the united states is a world apart. cain, rita marie. academic search elite.
  • Cites charp, sylvia, academic search elite, university library, indianapolis, in. "security and privacy."
  • Cites fjetland, michael, j.d., "global commerce and the privacy clash." the information management journal.
  • Analyzes heymann, philip, and philip's article, civil liberties and human rights in the aftermath of september 11.
  • Explains kroll, robert e., "can the fourth amendment go high tech?" aba journal. academic search elite.
  • Cites nesson, charles. "threats to privacy." social research.
  • Explains schneier, bruce, "protecting privacy and liberty." nature 413 (2001): 773.
  • Explains sopinka, john, "freedom of speech and privacy in the information age." the information society. academic search elite.
  • Cites swartz, nikki, and academic search elite. the world moves toward freedom of information.
Get Access