In the lives of Americans September 11th, 2001 will forever be embedded in our memories. This was the day that international Terrorism first struck America. A day that America’s security was exposed from there on TSA, and Homeland Security was built. I remember before the devastating attacks we were able to walk up to any terminal in the airport and wait for any of our family members board the aircraft. Since those devastating attacks Americans have seen new policies in security and new implementations in transportation, but the cost to our new security and technology is the peoples’ privacy has agonized. Aside technological advances in terrorist attacks, local police departments have found new ways to help with security, but have hurt the people’s privacy. Drones, are the new tool in fighting crime in Los Angeles, California. The Drones or also known as “small Unarmed Ariel Systems” have flown one since the beginning of this year. (Mather, 2017) Many of the native Los Angeles residence have complained about having a drone recording over their homes. One lawyer states “The history of this department is of starting off with supposedly good intentions about the new toys that it gets… only to them get too tempted by what they can doo with those toys.” Yes, the technology is great it will help crime, and give street patrol units an “eagle eye” on the city that they love, and protect. On the other hand, there will always be the desire to use the technology to other advantages. Instead of building a tall fence from your curious neighbor to the right or left you will also need to block on top from the police. Another technological advance that has interfered with the publics’ privacy, is RFID tags. In an article titled “The End of Privacy” the good old days are gone were Big Brother merely watched you. Instead Big Brother will be coming home with you in what you buy, wear, drive, and read. The wireless technology will allow objects to be tagged and tracked, this will be taking its place in the panoply of tools that business and government agencies use to collect information about us. (The End of Privacy) The technology is rapidly moving from science fiction to the forefront. For instance, RFID is being place on
In society today many citizens feel violated with the security methods taken by homeland security. “On September 11, 2001, terrorist attacks against the United States marked the beginning of the global war on terrorism. The methods used are justifiable as they provide protection against possible threats or attacks. This attack on U.S. soil increased surveillance of both American citizens and foreign nationals” (Andrew, C., & Walter,
On September 11th, 2001 the future of the United States changed forever. With almost 3,000 people dying from a terrorist attack that spanned the Eastern U.S., new tactics had to be created to prevent an event like this from ever happening again. Forty-five days after the attack, the USA Patriot Act was passed (Source 5). While only some Americans approved of it, the act was created to protect from terrorism across the country.
On September 11, 2001, the Unites States suffered massive destruction caused by terrorism. Four planes were hijacked by terrorist. Nearly, three thousand lives were lost when two planes crashed into the World Trade Towers, one crashed into the Pentagon, and the final plane crashed in Pennsylvania before it could reach its final destination. An immense fear spread across the country and out of this fear came the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct the Terrorism, also known as the USA Patriot Act.
Every year there is an increased rate of PTSD in veterans and is negatively affecting society in the U.S. today. In addition, security such as the TSA, NSA, and Homeland Security is engrained in the lives of U.S. citizens and immigrants. “The effects of the tragedy on travel and tourism continue to be felt today, however, in the form of higher travel costs, vastly stricter security and safety checks and procedures and the creation of the Transportation Security Administration (TSA)” (Burger). This demonstrates that society today has become more secure and willing to give up some privacy for safety. Another issue is the paranoia of terrorists in the United States.
The Homeland Security Act of 2002 impacted the American people without many of them realizing it. The act called for increased monitoring of computer networks, phone lines, and online history inside the United States and allowed the government to deport suspects (ACLU). What was created by the act has snaked its way into all aspects of our lives, creating a sense of order and restricting some freedom. However, some say that this imposition into our daily lives limits our freedoms and actions allowed us by the Constitution. Many interest groups voice strong resentment for the act while others try to demonstrate the strengths and triumphs of the Homeland Security Act. This paper will show the differing viewpoints of those that feel that the
September 11, 2001. Four planes were hijacked by terrorists. Two were flown into the World Trade Centers in New York, one was crashed into the Pentagon, and the last crashed in Pennsylvania before reaching the primary target in Washington D.C.. Within two hours of the crash, both trade centers, standing 110 stories tall, were practically deteriorated, and a wing of the Pentagon was severely damaged. Over 3,000 people died because of this deadly attack. Two days after the attack, the White House had learned that these attacks were linked to members of Al Qaeda, an Islamic fundamentalist terrorist group based in Afghanistan, but with terrorist cells around the world, especially in the United States. No one knew when or if more terroristic attacks would follow. In order to make these terroristic attacks less likely, the government needed ways to protect it’s citizens and land. In 2006, the Patriot Act was passed nearly unanimously by the Senate (98-1), with support from members across the political spectrum. The congress and the president should be allowed to bypass certain requirements if there is suspected terrorism. There is privacy given, but in order to protect the citizens a very small amount of privacy needs to given up. Being able to go through suspected terrorists gives all citizens and land more protection, lets the government prevent future terrorist attacks, and gives the Central Intelligence Agency and Federal Bureau of Investigation a purpose.
After September 11th 2001, people were scared and didn’t know how to react. They didn’t know how to move past it. Even to this day we still hold a moment of silence for the thousands of people that died. Ever since that day nothing has been the same. Our government has strengthened our security to try to prevent a day like that from reoccurring. They are trying to protect us, but with technology being as advanced as it is, it has given access to too much of our private information. The line between our protection and our privacy needs to be drawn somewhere.
With the widespread use of technology becoming more prominent, acts of cyber terrorism pose an increased threat to safety. Cyber terrorists exploit the internet and its users to commit acts that can be increasingly detrimental to their targets. Some of the terrorist activities include large scale corruption of computer networks by using tools like computer viruses. Certain individuals even have the ability of creating severe damage to government systems, national security systems and even hospital servers. Most of the technology made today only has intentions of making life easier for people. However, skilled users can manipulate the cyber world for negative intentions. Staying informed when it comes to cyber terrorism and cybercrime is important to do because of the increased reliance on technology in society. Steps to improve cyber security before an attack ensures the safety of sensitive information. The topic of cyber security and cyber warfare are interesting topics to keep up to date with. Understanding these topics can be beneficial to my dream of being in the FBI, ensuring the safety of others by working to prevent acts of cyberterrorism.
We need to base our decisions and arguments off of the U.S constitution that has been our guideline for over 200 years. According to a New Associated Press GFC poll, Americans are increasingly placing personal privacy ahead of national security. Over 60 percent of people polled said they value privacy over anti-terror protections. We have to elect politicians that will take action against such outrageous legislations and regulations. I believe we have to fight for our individual liberties before we lose the; nothing comes easy so we must start
The generation we live in today heavily relies on technology to communicate with other people. Unfortunately, not all forms of communication electronically are being used with good purpose. An example of this is the San Bernardino shooting last December. F.B.I. officials have obtained the phone of the terrorist attacker and want to gain access to the iPhone device. They, the F.B.I, wanted Apple to create an entirely new operating system for their use. Essentially providing a decryption key in order to obtain information in the iPhone of the shooter, but if the software were to be in the wrong hands; it could violate the privacy of many iPhone users.
In the first Presidential debate of 2016, the issue of cybersecurity was a pressing topic. While both candidates did their best to point fingers and place blames on the inadequacy of the government to protect their files, the primary focus on cybersecurity pointed to an intriguing development. The development is that cybersecurity is now a forefront issue in our nation, and a whole host of research and new projects are emerging in the field. Unfortunately, this great interest in cybersecurity has not done much to help the standard computer user, who must deal with notoriously poor protection systems called antiviruses. With the new interest in cyber security, it is in the best interest of corporations and users to reflect on the design of antivirus. Such reflection yields the results
On september 11th 2001 the worst attack on US Soil happen. When the both the world trade center as well as the pentagon fell to ash . The lost of million of american lives lost that day: dad’s,mom’s,sons and daughters as well as friends. Now after the horrifying event the evolution of security happen. This was a necessity in which americans could be safe as well have their right of privacy. The evolving of security help to keep terrorism away from entering into the Unites states, as well had an effect on its people, and last what we can change even more to avoid this situation so it will never happen again.
Many critics of drones raise the legitimate concern that the government’s collection of aerial imagery and video will enable pervasive surveillance that allows the government to know what all citizens are doing at all points in time, and even will allow government officials to review footage years after its collection, revealing the most intimate details about a person’s life. This is not a problem unique to drones, but is rather a recurring theme in critiques of all video and still imagery collection. Legislators should adopt
The U.S. Constitution ensures our privilege of security and the privilege to be free from unreasonable search and seizures. But to what degree is unreasonable? I believe that these rights might be misinterpreted depending on the circumstance that is happening. In the event that something is to affect the health and happiness of the common people, in other words, national security. At that point I do believe these rights should to be put on delay for the occasion. I feel that national security is more imperative than protection to a degree. I feel that when all else fails, compromise is unavoidable. There have been an excessive number of “attacks,” and some of these attacks could have been avoided, an example of this is when a terrorist enters this country and hurts a large number of individuals. Likewise another argument is that our borders are permitting a huge number of unlawful, unidentified individuals to this country and we don’t know what they are prepared to do or what they are capable of.
A 11 year old girl is on snapchat. Her phone is not working. Then pops up a message that says there is a problem and if you press this button the problem would be solved. She pressed the button without thinking.It fixed the problem,but 30 minutes later she found her private pictures that she hadn’t posted on snapchat. I wanted to research this project because a ton of people are getting hacked. It’s very dangerous. Especially,when people are hacking confidential government files.Which is very bad for our government,and the people who live in the United States.The countries that are at war with the United States like Russia.North Korea,and etc could steal private information from the united states and show it to other countries.While I was researching the topic of cyber hacking,I had several questions in mind.Do the hackers get paid for hacking peoples accounts?How do the hackers get into people's accounts? What is the point of hacking people? If the hackers are working with companies,what is the company's name?My driving question was: What can we do as a community to solve the problem of hackers.After reading several articles and watching videos.I think that it is a very clear that today's society can find a way to prevent hacking.