Preview
Preview

Fighting Terrorism Without Invading Privacy Essay

:: 9 Works Cited
Length: 1806 words (5.2 double-spaced pages)
Rating: Aqua      
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

“In the long, twilight struggle against Communism, we had been reminded that the very liberties that we sought to preserve could not be sacrificed at the altar of national security “ (“Obama’s Speech On…” 1). One of these very civil liberties, recently recognized by the United Nations, is the “right to privacy in the digital age”. Although the actions of the United Nations are not legally binding, it is evident that the right to Internet privacy is becoming increasingly important in the international world. Breaches in Internet privacy have become commonplace as Social Security and credit card numbers are stolen along with passwords to bank accounts and social media sites. Breaches in Internet privacy have become especially problematic in countries such as the United States and the United Kingdom where the war on terrorism is a major issue and the Internet is used by a large portion of the population. To resolve the issue of the invasion of technological privacy while continuing to effectively combat terrorism, each country must find a balance between fighting terrorism and surveilling citizens through the use of a 5D plan: deterrence, diplomacy, disclosure, democracy, and defense.
Forty-nine of the 100 most popular websites collect data on the internet through a series ways such as logging in, a mailing list, and user profiles. Yet only 17 included a privacy policy and Election Privacy Information Center (EPIC) found that none were sufficient in protecting Internet privacy. ("Privacy Statistics" 1). Furthermore, EPIC found that one of the most prominent issues of these websites was the frequency that these companies sell personal information to a third party as well as the inability to change personal information. Even more impor...


... middle of paper ...


...ence Center. Web. 4 Mar. 2014.
"Obama’s Speech on N.S.A. Phone Surveillance." The New York Times. The New York Times, 17 Jan. 2014. Web. 03 Mar. 2014. .
Oestrich, Marc. "The Real Cost of Net Neutrality." The Heartland Institute. N.p., n.d. Web. 16 Mar. 2014. .
"Privacy Statistics." Databases in Cyberspace. Web. 16 Mar. 2014. .

"The United Nations Global Counter-Terrorism Strategy." The United Nations Global Counter-Terrorism Strategy. Web. 23 Mar. 2014. .





Click the button above to view the complete essay, speech, term paper, or research paper








This essay is 100% guaranteed.


Title Length Color Rating  
Elimination of the Fourth Ammendment: Freedom and Privacy Essay - How dare the government completely disregard the constitution and eliminate the fourth amendment. It is not necessary to collect all of the US citizen’s data and invade their privacy in order to fight terrorism. The government tells the people it is necessary because they have a secret agenda. The burden of worrying about someone reading one’s emails, listening to one’s phone calls, and ultimately invading one’s privacy is called tyranny. The absence of those worries is called liberty. In recent times the US government has been called out, on numerous occasions by whistle-blowers, about some of the secrets they are keeping from the public....   [tags: liberty, terrorism, American governement, media]
:: 5 Works Cited
869 words
(2.5 pages)
Better Essays [preview]
Essay about Lack of Internet Security and Privacy - Internet privacy and security has become the concern of many individuals throughout recent years. There are a very limited amount of laws that have been enacted to combat computer or cyber related crimes. This has become an issue because as the internet grows increasingly popular so does the criminal and immoral behavior that abounds on it. With these crimes gaining in impact, effectiveness, and frequency, there needs to be more repercussions for these crimes. The United States government needs to increase restrictions on the amount and type of data on individuals from the internet, to prevent the government from invading privacy of citizens and to prevent companies from storing browser hist...   [tags: cloud usage legislation and policy]
:: 2 Works Cited
909 words
(2.6 pages)
Better Essays [preview]
US Strategy in Fighting Terrorism With Military Force Essay - With recent operations by the Pakistani military and drone attacks by the US, these safe-havens are being attacked, but they remain a major refuge for the Taliban and other insurgents. Complicating the matter are allegations of Pakistani Intelligence (ISI) support for the Taliban and Pakistani fears of Indian influence in Afghanistan. Recent US strategy in fighting terrorism with military force revolves around three central ideas – a counterinsurgency (COIN) philosophy recognizing the importance of civilians, covert operations and investigative work, and the use of drones....   [tags: Fighting Terrorism]
:: 37 Works Cited
2602 words
(7.4 pages)
Strong Essays [preview]
Cookies Invading Our Privacy Essay - Cookies Invading Our Privacy Cookies now constitute a real threat to personal privacy, but they are perfectly legal. A cookie is a tiny file that a Web sites place on the user’s hard drive when the user accesses the web page. Each cookie has a specific identification number. The cookie can gather personal information such as email addresses, full names, mailing addresses, and phone numbers, and then it sends the information back to the web site (Samborn 26). Whereas TV, radio, and print record only demographics or neighborhoods, a cookie keeps record of what an individual is actually looking at and doing on the net....   [tags: Internet Technology Computers]
:: 4 Works Cited
367 words
(1 pages)
Strong Essays [preview]
Fighting the War Against Terrorism Essay - While fighting the war against terrorism, though it may be challenging, societies should place the utmost value upon human rights even if that means undermining one’s counter terrorism policy. Along with a terrorist attack comes prejudice and discrimination towards those of similar nationality or religion as the attackers out of fear of another attack. A challenge for liberal democracies such as Canada is creating an effective policy in order to constrain potential terrorist attacks that is also abiding one’s individual rights that come as a part of residing in a democratic society....   [tags: canadian law, arbitrarily detained]
:: 11 Works Cited
1656 words
(4.7 pages)
Powerful Essays [preview]
Essay on The Use of Profiling to Combat Terrorism - Profiling by Israel security forces is a very important factor when it comes to fighting terrorism. Profiling allows for certain types of people with similar characteristics to be grouped and identified to help understand why certain people commit different crimes. Because the profile of a terrorist has changed over time, Israel now uses a type of profiling that is predictive. Instead of looking at the crime after it has already been committed to profile the criminal, Israel uses predictive profiling to determine the suspicion and threat of everybody before any criminal activity is able to occur....   [tags: Terrorism ]
:: 4 Works Cited
1367 words
(3.9 pages)
Strong Essays [preview]
Counter Terrorism Unit Essay - Introduction *Note: information concerning the formation of the CTU is fictional Terrorism is one of the greatest concerns of the 21st century. It is a method that has been embraced by many groups with many different ideologies. It has the potential of causing major devastation, especially with the specter of acts of nuclear, biological, and chemical terrorism. There have been many references by both the media and politicians to a “War on Terror,” and if we are to characterize this as a war, it is a war with an ill-defined and changing enemy, no front lines, and a war that is fraught with moral dilemmas....   [tags: Fighting Terrorism]
:: 37 Works Cited
2690 words
(7.7 pages)
Powerful Essays [preview]
Essay on Terrorism: Safety vs Privicy - Ever since 9-11, we as a country have been divided on many issues. One of the most discussed considers the question of whether retaining our privacy is more important than ensuring our safety. The two texts I will be using to explore this question are: Mobile Phone Tracking Scrutinized by Nikki Swartz Published in the Information Journal, which bills it’s self as “the leading source of information on topics central to the management of records and information worldwide”(347), in March/April 2006 and Reach Out and Track Someone by the author Terry Allen which appeared in the May 2006 edition of In These Times, a publication “dedicated to informing and analyzing popular movements for social e...   [tags: Terrorism Essays]
:: 2 Works Cited
1587 words
(4.5 pages)
Powerful Essays [preview]
Terrorism Essay - On the morning of September 11, 2001 people around the world turned on their televisions and became witnesses the most devastating terrorist act ever carried out on U.S. soil. Much time has passed since then and the United States has changed in the succeeding years. Billions more than before, are now going into defense funds. American citizens have lost many conveniences as well as bits and pieces of privacy. Many American's have even added many words to their vocabulary. Words like Al-Queda and Anthrax are thrown around in everyday conversation....   [tags: September 11 Terrorism ] 1043 words
(3 pages)
Good Essays [preview]
Terrorism Essay - Terrorism The Good, the Bad, the Terrorist. Terrorism by nature is difficult to define. Acts of terrorism conjure emotional responses in the victims as well as in the practitioners. No two writers agree on what is terrorism. Even the U.S. government cannot agree on one single definition. The old adage, "One man's terrorist is another man's freedom fighter" is still alive and well today ("Terrorism Research Center: Definitions" 1)....   [tags: Terrorist]
:: 3 Works Cited
1603 words
(4.6 pages)
Strong Essays [preview]