9/11 Security Issues

Great Essays
We live in a society now that is more inter-connected than any other in history. There are cameras in every phone and on every street corner, microphones in all 'smart' devices and a seemingly infectious apathy towards these windows in to our private lives. Post 9/11 saw the world, primarily the United States, crack down on its security by instituting legislation like the Patriot Act, which was a law basically stripping away the basic rights granted to an American citizen if the government deemed you a threat. Now that the innate fear of terrorism has fallen since then, a massive discussion has arisen regarding what information the government can ethically obtain through digital means and what is really ‘too far’ and should not be breached …show more content…
For those unfamiliar, the FBI recently was found to have hired some of Best Buy's Geek Squad technicians as paid informants to track down and eliminate child pornography. For most this issue is pretty cut and dry; if the FBI wants to hunt child abuse/pornography then let them. But when you examine the consequences of this FBI policy you realize that there are a couple of constitutionally-questionable practices that compromises the integrity of what the FBI says they are trying to accomplish. For example, there was a case of a surgeon out of California who brought in his computer to Geek Squad for repairs. An employee ended up alerting the FBI after finding an image on the guys computer, but when brought to court to prosecute the judge threw out all charges because the FBI obtained this information without obtaining a warrant. This is where the issue lies: warrants are there to protect the unlawful search and seizure of your private articles, and when you bring your computer in for repairs it’s not like you are signing a forfeiture of your rights. You expect that all your personal info will remain your personal info and typically that’s how it works. What the FBI argues is that when you bring in your computer to Geek Squad for repair they aren’t looking through your personal info, rather they are merely keeping an eye out for child …show more content…
The government only cares about criminals, so they have no reason to care about your family pictures from 2008, or your favorite Italian restaurant”. Perhaps they’re correct in the sense that the government doesn’t care about those things, but the fact remains they still know and store this information and can use it to their advantage if the money’s right, a la Mark Zuckerberg/Cambridge Analytica. And if you really have nothing to hide the government’s policies will probably never affect you, but the constitution was written with the intent to protect citizens from a large and autocratic government and those who are pro-privacy will argue vehemently that the articles in the constitution protect digital information as well. However, it is true that designing effective laws regarding the privacy of the non-physical is a tough task, and its success will depend on bipartisan cooperation from the government and

Related Documents

  • Improved Essays

    The Government introduces you to a precedent that has to do with DLK’s case because in this case they intended for their info to be private, but the government used something that goes above the five senses so you would need a warrant to use it. This is important because in DLK’s case he intended for his info to be private, but since the government used a thermal imager without a warrant just like the bug in the Katz case, they found out he was growing marijuana in his home. No one else would want someone else to find out something that they are doing if it is private. While some may argue that the government can do that without a warrant if they are suspicious, no one would want their private info to be found or heard by the government. In conclusion, the Government should not invade your privacy unless given a warrant to do…

    • 820 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    9/11 Security Tactics

    • 179 Words
    • 1 Pages

    9/11 an undetected, and unplanned terrorist attack in the United States. The United States had security tactics in place prior to the event, but it has been heightened even more. Those areas of security that have been heightened include air, land, border, and sea security. Even though security is now tight in the U.S. law enforcement still has been unsuccessful in preventing more attacks. As a part of our nation's global tactic, the U.S. has been successful in freezing access to money that is used to fund terrorist attacks.…

    • 179 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    9/11 Security Strategies

    • 142 Words
    • 1 Pages

    A lot of things had to happen to us for us to be where we're at right now. Being in a vulnerable state from our last terrorism after 9/11 has equipped us to change our approaching and dealing with problems in every mode of transportation. The SMART Port Security Act, the SAFE Port Act, and the Small Vessel Security Strategy all in placed to mitigate the drugs smuggling, weapon trafficking, piracy, human trafficking, and terrorism. Couple years back on the news there was an incident that had happened in Tunisia where innocent civilians were murder. during the investigation, it had come to light that the execution was orchestrated.…

    • 142 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    9/11 Security Policy

    • 754 Words
    • 4 Pages

    At 8:45 A.M. the first plane crashed into the North tower of the World Trade Center; 20 minutes later the second plane struck the South tower. Within the next two hours, both towers collapsed to the ground. When the smoke cleared and it was all over, around 3,000 people were dead. 9/11/2001 is a day that will always be remembered in American history. On this tragic day, 19 Muslim extremists hijacked four airplanes and attempted to suicide attack the United States.…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Because online activities are treated like any other communications, the rules of privacy should apply. When people engage in online activities they have a legitimate expectation of privacy and this privacy is violated when the government accesses online activities without a warrant. The government should therefore not be allowed to access your online activities without a warrant. Moreover, there are situations where the government does not need a warrant but a court order to access this information. Despite the lesser evidence required for court orders, they nevertheless involve some adjudication on whether it is proper to infringe on the individual’s right to privacy.…

    • 1234 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Many people who find these issues to be of little importance think well I have nothing to hide so they feel comfortable with the idea that their entire digital footprint is accessible by the government. I reject this position. Firstly, because it is a ridiculous stance. Not only does the NSA collect metadata, but it also collects content data like photos, voice communication, videos, text, email, and chat conversations. No sane person would be willing to make all of the contents of their personal communications completely open to the public.…

    • 530 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    By bypassing judges, the agencies have the ability to gather unnecessary information that does not pertain to their investigations. When such irrelevant private information of individuals is viewed or seized, the government is infringing upon the privacy of…

    • 716 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Jen Fifield quotes, “But the rush to protect privacy — which has seen support among legislatures regardless of party — has created some concerns. Companies that produce some of the new technologies, such as the makers of education software and drones, fear the restrictions will stifle innovation and commerce. Others, such as Justin Silverman, executive director of the New England First Amendment Coalition, say some of the restrictions, such as those on drones, body cameras and “revenge porn” — nude or sexually graphic images shared without consent — may infringe on free speech protections.” This quote supports how privacy is invaded among the United States. For the people of the United States, it concerns a large handful of people because their privacy is being…

    • 493 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In our modern day society, individuals are actively on the internet, exposing themselves in every aspect unknowingly. We are oblivious to who is watching and collecting our information. Many of us are oblivious to how far the government is willing to go to uncover any secrets or imminent threats. In Peter Singer’s essay, Visible Man, we explore how we have currently encircled ourselves in an environment that calculates our every choice and action because we constantly reveal our information. Singer explains how we have deliberately invited the government into our private lives.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Recent information leaks from whistle blowers, such as Edward Snowden, and Julian Assange, revealed that the NSA had increased its mass surveillance, specifically with regards to the collection of ‘big data’. While some commentators, say that mass surveillance is a necessary evil (Monk, 2013), and that “you have nothing to fear if you have nothing to hide”, others say that state mass surveillance is a gross misuse of power (Suleman, 2013). This essay will seek to critically discuss both the merits, and shortcomings of mass state surveillance in the digital age. The discussion of this topic is relevant as several whistleblowers have recently leaked information detailing several large scale state surveillance programs. Firstly, this essay will…

    • 1932 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    Privacy is not frequently undermined by a solitary great act, yet rather by a moderate aggregation of little unobtrusive acts. Every act may appear to be innocuous, yet in time the government will be watching and knowing every little thing about us. Solove states that even if you don't have anything to hide, the government can hurt coincidentally, because of mistakes or carelessness. All in all, he fights that when you comprehend the immeasurable measure of privacy concerns connected with government data gathering and observation, the nothing-to-hide argument is less powerful. This essay addresses the ramifications of proceeded with government data accumulation and reconnaissance, before these practices get to be marked into perpetual law as a major aspect of the USA Patriot Act.…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    It is widely debated, as a resident of the United States of America, whether or not it is socially beneficial or even acceptable in any way for the federal government as the National Security Agency otherwise known as the NSA to delve into information that is personal to you for the protection and well-being of the country.(NSA, 2015) Charlie Savage, an author and Washington correspondent for the New York Times, highlight the fact that the NSA is capable of reading SMS (Short Message Service) information between two people, record telephone conversations and even overseeing exchanges through IMs (Instant Messages) when you could be sharing credit or debit card information and passwords, it makes the majority of the United States’ populace wonder…

    • 1404 Words
    • 6 Pages
    Superior Essays