Discussion Response 250 words - Homeland Security

User Generated

zevprpernzzna64

Other

Amercian Homeland Security

Description

Responses should be a minimum of 250 words and include direct questions. You may challenge, support or supplement another student’s answer using the terms, concepts and theories. Also, do not be afraid to respectfully disagree where you feel appropriate; as this should be part of your analysis process at this academic level.

Forum posts are graded on timeliness, relevance, knowledge of the weekly readings, and the quality of original ideas. Sources utilized to support answers are to be cited in accordance with the APA writing style by providing a general parenthetical citation (reference the author, year and page number) within your post, as well as an adjoining reference list. Refer to grading rubric for additional details concerning grading criteria.

Grading: Forums are graded using the following rubric: SSGS Discussion Forum Grading Rubric

Respond to:

The Irish lawyer and politician John Philpot Curran said, “The condition upon which God hath given liberty to man is eternal vigilance.” The question has become is it moral for eternal vigilance to infringe upon our civil liberties? The advancement in technology has become overwhelming in the information age. Computers and social media have created realms in which we have a reasonable expectation of privacy that make Katz V. U.S. seem archaic by comparison.

According to a 2011 study conducted by the Pew research group, “fewer Americans think it will be necessary to sacrifice civil liberties to combat terrorism”. (Doherty, 2013) However, the government’s demands regarding the San Bernardino shooter Syed Farook’s encrypted iPhone has ignited a debate on whether Apple should be required to create a device with the ability to override the iPhone’s encryption measures that in the wrong hands is a threat to American civil liberties. I understand Apple’s argument to protect civil liberties, however I also believe exigent circumstances do exist to supersede those rights. According to the Supreme Court, “the public safety exception is triggered when police officers have an objectively reasonable need to protect the police or the public from immediate danger.” (Benoit, 2011) One of the key words in that statement is “Immediate”. If there is a threat, to the public especially with the increased number of active shooter type attacks, exigent circumstances to view information stored on electronic devices should be allowed. The exceptions should be that it is only used to mitigate the immediate threat, not for a prolonged investigation or subsequent crimes. At that point other investigative techniques are available to law enforcement officers that are not as time sensitive.

“Ivan Fong, JD ’87, former general counsel of the Department of Homeland Security (DHS) agrees that data collection has to stay within constitutional limits, while lauding the importance of intelligence in national security investigations.” (Rigoglioso, 2014) To this point “use of unmanned aerial vehicles, or drones, by the military has increased dramatically as part of the effort to combat terrorism overseas. But use of drones in the U.S., for a variety of purposes, may also be on the rise.” (Rigoglioso, 2014) As the power of these drones continue to increase, it is easier for criminals and terrorists to use the technology on U.S. citizens. Therefore law enforcement must also step up UAV surveillance technology to combat threats. How do U.S. citizens combat the escalating technology war, and how can law enforcement limit use of this technology without impeding their work? I believe leveraging technology even more may be part of the solution. No UAV zones should become an important public conversation along with citizen being afforded rights against unwanted surveillance. I turn transparent monitoring of devices operating and potentially violating people rights needs to be strictly enforced without surveilling people in the process. While this may seem impossible, I believe new technologies can accomplish the task. Public awareness of technology is mportant. First Citizens must understand the threats that UAV can cause from criminal activity and they also must have the awareness to the governments use of the same technology to protect them.

References:

Doherty, C. (2013). Balancing Act: National Security and Civil Liberties in Post-9/11 Era. Pew Research Center. Retrieved from:http://www.pewresearch.org/fact-tank/2013/06/07/balancing-act-national-security-and-civil-liberties-in-post-911-era/

Benoit, C. A. (2011). The Public Safety Exception to Miranda. FBI Legal Digest. Retrieved from: https://leb.fbi.gov/articles/legal-digest/legal-digest-the-public-safety-exception-to-miranda

Rigoglioso, M. (2014). Civil Liberties and Law in the Era of Surveillance. Stanford Lawyer, Issue 91. Retrieved from: https://law.stanford.edu/stanford-lawyer/articles/civil-liberties-and-law-in-the-era-of-surveillance/

Unformatted Attachment Preview

Print view Index of pages Back Next Lessons  WEEK 7: Civil Liberties and Homeland Security/Homeland Defense  Lesson WEEK 7: Civil Liberties and Homeland Security/Homeland Defense Lesson Civil Liberties One of the most controversial areas of homeland security continues to be the balance between security and civil liberties. One point of view is that people must give up some individual rights, because the alternative – being defeated by the terrorists – is so horrible even to contemplate, that one simply cannot allow it to happen, whatever the cost in terms of our rights. The other point of view is that says that one cannot lose their values, because that is exactly what the struggle is all about and to give up one’s freedoms is to say that the terrorist wins. One of the liberties which many people have claimed has been greatly infringed upon is the right to privacy. It happens in this context: it is known that America has millions of illegal aliens in the country. It is also known that there are homegrown and non-state terrorist actors are in the country. How does one get them out, and keep them out? One way to do this is by identification. Biggest problem – and the biggest debate – is what can we use to identify a person? There are many proponents of a national identification (ID) card. Will that mean the card is an infallible form of identification, or not? Well, there is evidence that it will, and evidence that it won’t. Here’s why: the physical card itself has to be based upon what are called “breeder” documents – things such as a Social Security card, a birth certificate (and/or certificate of live birth), a driver’s license, a state-issued identification card, passports, etc. The problem is that these documents are notoriously easy to forge or acquire fraudulently. Even if we can produce some sort of valid national identification card, we have no guarantees that this identification wouldn’t be stolen by somebody. Moving beyond the issue of a national ID, the issue many have heard of as regards privacy and civil liberties is the passage of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, better known as the USA PATRIOT Act. The Act was passed a mere 30 days after the 9/11 attacks. As a sidebar, and for better or for worse, our federal and state governments passed a flurry of major and wide-ranging laws and Executive Orders, as well as restructuring, in the wake of September 11, 2001 (9/11). If the government had intended for their actions to be seen by the public as “doing something,” they surely succeeded. One little known part of the USA PATRIOT Act, Title II actually made an expansive list of crimes which do not – repeat do not – require a warrant or court order for monitoring. Some recent additions (and this is because of an increased perception and probability of an attack) are cyber crime, terrorist-related crimes, the activities of hackers, and crimes involving interstate and foreign commerce. Murphy (2012) observed that over 10 years after the attacks of September 11, 2001, there is little indication that the homeland security revolution is slowing (p. 925). This observation is consistent with the findings of Donohue (2009) who noted that laws passed to address terrorism often were applied across a broader spectrum of legal issues and such laws were difficult to remove once passed, even if the law contained sunset provisions. The difficulty of retiring a law can be seen in the continuation of contentious sections of the USA PATRIOT Act past their initial sunset dates. This difficulty is rooted in the fact that passage of the law is normally given a needed to prevent terrorism and when the sunset provision come up it is unlikely that legislators can state that the threat of terrorism is past, repealing the law will not affect the chance of a terrorist event or that a terrorist attack would be more acceptable than the law (Donohue, 2009, p. 372). The issue of civil liberties and security is a continuing discussion with the area of homeland security. The National Security Strategy states that “Advancing our interests may involve new arrangements to confront threats like terrorism, but these practices and structures must always be in line with our Constitution, preserve our people’s privacy and civil liberties, and withstand the checks and balances that have served us so well” (U.S. President, 2010, p. 36). The passage of the USA PATRIOT Act raised a lot of concern with citizens regarding how much civil liberty was being lost and if that signified a win for the terrorists. As the events of September 11, 2001 continue to move to the past there will be continued reflection on whether too many liberties have been surrendered to ensure a safer and more secure nation. Hopefully the future will reflect the observations of D h (2009) th t “Th fi t d ti t t t i t d ith th ld ti f t Donohue (2009) that “The first and most important step is to do away with the old assumptions – foremost among them being the need to align security and freedom on opposite sides of a fulcrum that favors security” (p. 390). Homeland Security In the wake of 9/11, the Department of Homeland Security was formed, by merging 22 agencies. This means that there were many agencies that were not merged – including the Department of Defense, CIA, the Department of Justice (which includes the FBI) and the CDC. To better understand this, one must realize that presently there are 35 different agencies involved in counterterrorism and DHS with its 22 agencies is only one of them. The 9/11Commission, among other things, called for integrated joint action by the federal agencies responsible for homeland security. If one wants accountability, the starting point at the federal level should be aimed at joint action rather than activities of the individual agencies. If one takes just one singular objective – counterterrorism – it is evident that there cannot be a score of agencies doing their own thing. To take it a step further, this federal mandate should be extended to state and local levels. Looking at the state and local levels, one can see that every state in America has created a homeland security department, or something with that function with words that are very close to “homeland security.” Recognizing this fact, one can appreciate the problem of, and the need for, joint action from scores of different agencies at the federal level, is fair to multiply that number by 50 (the 50 states) to get an idea of why accountability can only be obtained from joint action. It gets even more obvious when you know that many locales also have their own counterterrorism agencies. There are approximately 2,800 agencies in this country that deal with counterterrorism. While all of this may show some complexity to the coordination of homeland security efforts, there is yet another issue complicating coordination efforts-new threats. References Donohue, L. (2009). The perilous dialogue. California Law Review 97(2), 357-392. U. S. President. (2010). National Security Strategy Barack Obama. Washington, DC: White House. Retrieved from http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf. BACK NEXT
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: DISCUSSION RESPONSE HOMELAND SECURITY

Discussion Response Homeland Security

Student’s name:
Institutional affiliation:

1

DISCUSSION RESPONSE HOMELAND SECURITY

2

Discussion Response Homeland Security
It is true the question of civil liberties is a hard nut to crack in the post-9/11 era. The
government and especially the Department of Homeland Security (D.H.S.) has become too
sensitive and paranoid about the safety of the state considering the possibilities of terror attacks.
It is both hard ...


Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags