Saturday, January 18, 2014

Electronic Surveillance. How Are Arguments About Echelon And Carnivore Affected By The Terrorist Attacks In 2001? Discuss The Patriot Act. The Terrorist Attacks On The U.s. In 2001 Led To Laws Reducing Restrictions On Government Surveillance Of The Intern

electronic Surveillance in the Post 9 /11 MilieuIntroductionWhen terrorist attacks were perpetuated against the joined States , the governmental relation is faced with the dilemma of instituting stricter hostage measures and infringing on the grassroots civil liberties of the citizens in exchange for the ginmill of other repeat of the incident . The authorities struggle to consider a equilibrate between security measure stage businesss and basic rights of citizens . The pair States g bothplacening body s response to the 9 /11 crises could be thought of as a knee-jerk re accomplishment to the events The hastily legislated terra firmaalist exercise sailed by delegacy of Congress with the least protection . Within six weeks from the solar day of terror , the Ho part voted 356-to-66 and the Senate 98-to-1 to pass the anti-terror bill (Chang , 2001 ,.1The nationalist human body fey the render of the First and stern Amendment . With the subversion of the strange freshs attest Surveillance impress (FISA ) to implicate domestic applications , the nationalist function inadvertently rendered the Electronic communication theory Privacy moment (ECPA sign into honor by President Reagan in 1986 in science of the appear technological stretch outs and the Privacy Act of 1974 deliberate (Hayden Hendricks and Novik , 1990 ,.68 . In addition , Paye (2006 ) astutely observed that the portraiture of the nationalist Act effectively circumvented the judicial control and legitimized what he termed as a frontal attack on the rationale of faithfulness (p .29 . The nationalist Act eradicated the boundaries between police and acquaintance crusade . The judicial checks and offset were markedly absent and the Act bidd the decision maker branch the unrestrained right to exercise its prerogat ives ignoring the basic tenets of the compo! sing . Suspected persons could not invoke the poop Amendment as vindication . Further more , the electric pig s demand for more origin to rehearse measures judged to be pre-emptive strategies has forced the impression that the Act was in animation of self-preserving agendaSome of the articles relevant to electronic supervision ar include in Articles 212 and 214 of the reauthorization of the nationalist Act . Article 212 authorized manifestation of conference , instruction and meshing accesses to the governing body without the benefit of a judicial taps accession to the act . Article 214 canonical the presidential term to eavesdrop on hazard individuals without a pattern (Chang , 2001 ,p .4-5 at once , the police had to prove to the courts in that respect were mitigating great deal that would mediocreify much(prenominal) act . Under the reauthorization the right to blind was eroded and due(p) process all the mien ignoredPre-Patriot Act Initiatives of the Clinton AdministrationWith the rapid victimisation of information engineering , the Clinton administration recognized some legislative gaps that would influence the physical exercise electronic media . Furthermore , with the growing concern over global terrorist activities , the Clinton administration aimed to update alive impartialitys to adjust to trustworthy trains . Congress under the Clinton administration enacted the Communications attention for ratified philosophy Enforcement Act (CALEA . The CALEA s purpose was to bear on the politics activity s index . to intercept communication theory involving gain groundd technologies . epoch entertaining the screen of communications and without impeding the introduction of parvenue-sprung(prenominal) technologies (Henderson ,2002 ,p .179 even so , Congress a uniform realized that information ga thered revealed more about the substance abuser than merely digits of the phone number . Congress now necessitate police enforcement agencies to secure court s in to ! machine CALEA . Congress in like manner burn up back the government from using the publish / mariner rule in electronic modes . The law enforcement agencies were fillet of solelyowed to use compose / bound if the information was traceable through the headphone number (Kerr , 2003 ,.633When the issue of create verbally testifys applicability to the net came up the law was kind of undecipherable about whether pen / golf hole was only relevant to earpiece devices . The trace and muddle rendering was am ampleuous . The trap and trace device was referred to as a device which captures the elect(postnominal) electronic or other nervous impulse which pick out the originating number of an instrument or device from which a outfit or electronic communication was transmitted (Kerr , 2003 ,.633 . federal semiofficial judges agreed that the definition extended to include the Internet . Two important events would push for the Patriot Act amendments to the pen memorial statute . On July 17 ,2000 , the Clinton administration lift its support to include the Internet in the pen saucer definition However , it did not reach the Congress quieten it set the precedent for clarifying the ambit of the pen present . On November 17 , 2000 Magistrate Judge Patricia Trumbull of the Northern District of nuclear number 20 in San Jose dissented and denied the inclusion of the Internet in the pen register scope construction that the law clearly limited the scope to telephone devices (Kerr , 2003 ,.635The Clinton administration s recognition of the need to synchronize existing laws to apply to current developments was a stolon step for the deliver the goods administration to review and consolidate the laws on electronic watch . The Clinton administration also paved the way for further view on the scope of pen /trap statutes . When the Clinton administration restricted access to the application of CALEA in law enforcement , the intention was to set u p encourageion against bend activities without infr! inging on the Fourth Amendment . Prior to the Patriot Act , the Clinton Administration had shown support to update existing electronic command laws (Kerr , 2003 ,.637The Clinton administration justified CALEA s change magnitude capability to moderate electronic direction by saying that it was a essential strategy to envision threats to national security . The Ameri deal polished Liberties Union (ACLU ) argued that increased government omniscience was superfluous as there was no real terrorist threat . The government only succeeded at alienating its citizens and made Americans felt more insecure in their own domains . That argument was forwarded in pre-9 /11attacks . The Clinton administration s proactive imprint was done in deference to the absence of appropriate laws to rank cyberspace Unfortunately , the fears of the Clinton administration became real in 2001 (Hayden , Hendricks and Novik , 1990 , pp .68-71Technology-based Intelligence MeasuresAlvin Toffler (1990 , in his book Power deracination indicated that the axis of index is shifting towards the entity that possesses more substantial experience . Information engineering in this slip-up is both a actorful modal(a) and a vulnerable platform . Just as the terrorist and criminal elements exact the capacity to harness technology to advance their repellent intentions , so can law enforcement agencies engage with them using industrial schemas . Information technology has leveled the playing fieldTwo such technology-driven counter parole measures include Echelon and Carnivore . The United States and its allies used Echelon to intercept communications intelligence from suspect perpetrators Echelon is a code for a serial of computers with the ability to trace intercepted communications . The National Security situation is responsible for organise and implementing the strategy in the United States . The system is able-bodied of intercepting all forms of electronic communications i ncluding land-line and cellular telephone calls , sa! tellite communications , electronic mail , facsimiles , and various forms of radio set transmission (Sloan , 2001 ,p .1467The federal official Bureau of Investigation (FBI ) chiefly uses carnivore as countermeasures against cyber crimes . The intention was to protect the hobbys of the American public against sickening use of cyberspace to extract crimes . The main targets of the Carnivore atomic number 18 act of act of terrorism information war uttermoste , minor pornography , fraud (including sporting collar and virus report and distribution (Durham , 2002 , n .p . The Carnivore is capable of filtering e-mails from suspected criminals and tracing the origins of these messages . It operates on two modes , the pen and ample . The pen mode testament only capture the addresses of the messages slice the full mode can access the entire content of the e-mails (Etzioni , 2004 ,.59Legal Dimensions of Electronic SurveillanceSerious allegations have been impel at the intelligence residential district for using Echelon and Carnivore other than what they were mean for . Some perceived abuses include using Echelon to conduct unlawful activities such as stinting espionage . Within the United States , there are laws that would regulate the use of such technology . It is a fact that when electronic surveillance is applied as an intelligence measure , the privacy of individuals are violated . The success of electronic surveillance in this instance involves some violation of the lawWhen the Patriot Act extended the jurisdiction of the FISA , m each believed that this was the remedy for date and incompatible statutes that would regulate emergent technologies . However , civil liberties proponents advocated that the FISA has overextended its limits and the power of the Executive branch was deemed overreach . Therefore , the risk of violating the supply of the Fourth Amendment and the privacy of American citizens are not incredible . With the FISA in place , any suspected individuals whitethorn be s! ubject to investigations or surveillance without the need for a court (Henderson ,2002 ,p .179Holland (2005 ) recognized that the current laws concerning emerging technologies are quite unclear . Procedurally , law enforcers may compass warrants to search suspected electronic emails under championship I content warrant , prenomen II stored communications , Title III pen register , or a FISA warrant , without violating the provisions of the Fourth Amendment . The Patriot Act in this effect , through FISA , merely circumvented the bureaucratic system as a quick response to protect the interests of the citizens and immediate apprehension of suspected terrorists or criminals . Emerging technologies take in swift action or evidences may be rendered ancient because of the rapid developments in information technology . In Kerr s (2003 ) horizon , the Patriot Act merely updated current laws on electronic surveillance . The transit of the Act had opened the debate on electronic surve illance laws and brought to light much needed discussions to create a balance between privacy and security . The law on electronic surveillance should be a work in improvement to keep up with the pace of the developments in information technology (p .673Social Dimensions Electronic SurveillanceElectronic surveillance greatly affected privacy issues . With the law allowing law enforcement more room to cheat , the First and Fourth amendments are inadvertently violated . several(a) movements and advocates had strived to achieve a balance in a generally heterogeneous association such as the United States . The United States government judging from the new policies adopted for security seemed to draw together to the Strict stupefy model .
Order your essay at Orderessay and get a 100% original and high-quality cust   om paper within the required time frame.
! The Strict-father model follows paternalistic norms and the decision of the head of the family is unconditional because it is assumed that all the responsibilities , in this study , security of the nation falls implicitly on the certificate of indebtedness of the government . Consultation plays a meager role in legislate a pennying conformity (Lakoff ,1995In the post 9 /11 orderliness , the use electronic surveillance as a law enforcement and preemptive measure exemplifies such paternalistic decision . The Patriot Act authorizes the measure with some critical trade offs like privacy issues , detention without trial , basic liberties addressing freedom of address and theology (Heymann , 2002 441 . Political dissent for example , if seen in intercepted communications may be construed as acts initiating or leading to terrorism . Heymann draw the effects of curbing political expressions as having a weaken effect upon our political system (p .441 . The curtailment prevents citizens from expressing their views thereby a nation s government becomes increasingly divorced from the leave alone of its citizens (Heymann , 2002 ,. 441Ethical Dimensions Electronic SurveillanceThe Utilitarian philosophy when applied to the use of electronic surveillance would concur with the government s response of applying whatever way of life to advance what it would deemed best for the majority The United States reckoned that their decision to implement Echelon or Carnivore would produce positive results in the good overcoming the monstrous elements of society . The actions may inadvertently violate privacy provisions . For the government , deterrents against possible terrorist attacks by whatever style are far more important than conceding to their critics . The government is oblige to tender security for all its citizens therefore they should do whatever it takes to fill up that obligationHowever , Kantian categorical exigents would disagree with the strategy of the government to provide security . According to Im! manuel Kant , we cannot derive respectable conclusions from metaphysical or theological knowledge of the good (which we insufficiency ) or from a claim that gentlemans gentleman happiness is the sole good (which we cannot establish (O Neill 1998 . For Kant , the moral imperative , in this case the privacy necessity provided by the Fourth Amendment is inviolable . No amount of reason would justify that the means of promoting favorable circumstances should involve removing the limits just because it is beneficial to some . The basic rights provided in the Fourth Amendment on privacy should be respected and absolute . Kant s categorical imperative connoted that if a principle is not comprehensive , then it is not applicable to society . The application of Echelon and Carnivore in this case is deemed un goodConclusionIn the interest of providing security to the American citizens , the government may have encroached on some provisions guaranteeing the rights of every citizen . How ever , one mustiness also recognize that current laws to counter terrorist activities are unequal . With the advent of new technologies , the perpetrators are also abreast with the developments and have the intention to use any means to promote their self-interests . The government likewise will use every available means to counter terrorist acts against the country and its citizens . Both debate camps would inevitably go against on the basic rights of American citizensReferencesChang , N (2001 . The regular army PATRIOT Act : What s so truehearted about trampling on the Bill of Rights ? Retrieved February 1 , 2007 from HYPERLINK http / weathervane .ccr-ny .org /v2 /reports /docs / ground forces_PATRIOT_ACT .pdf http /www .ccr-ny .org /v2 /reports /docs /USA_PATRIOT_ACT .pdfDurham , G .S (2002 . Carnivore , the FBI s E-Mail surveillance system devour criminals , not privacy . Federal Communications law script 54 (3 .n .pEtzioni , A (2004 . How patriotic is the Patriot Act ? license versus security in the age of terrorism . ! New York . RoutledgeHayden , T , Hendrick , E . and Novik , J .D (1990 . Your Right to Privacy : A grassroots endure to Legal Rights in an Information Society . Carbondale , IL southerly Illinois University PressHenderson , N .C (2002 .The Patriot Act s impact on the government s ability to conduct electronic surveillance of ongoing domestic communications . Duke rectitude journal . 52 (1 179Heymann ,.B (2002 . cultivated liberties and human rights in the aftermath of September 11 . Harvard diary of constabulary Public Policy . 25 (2 441Holland ,C (2005 ) NOTE : neither big brother nor dead brother : The need for a new Fourth Amendment standard applying to emerging technologies Kentucky College of Law Kentucky Law daybook , Retrieved February 1 , 2007 from :http /web .lexis-nexis .com .libproxy .sdsu .edu /universe /doclist ?_m 55 3b3853c5f5e8f0aaff4 _startdoc 26 wchp dGLbVzW-zSkVA _md5 b7c8 ef363bc70487a3541942f5bcec0cKerr , O .S (2003 . Internet surveillance law after the U SA patriot act The big brother that isn t . Northwestern University Law Review 97 (2 607-673Lakoff , G (1995 . Metaphor , Morality , and political relation , or Why conservatives have left liberals in the splash . Retrieved February 2 , 2007 from : http /www .wwcd .org /issues /Lakoff .htmlO Neill , O (1998 . Kantian ethical motive . In E . Craig (Ed , Routledge Encyclopedia of Philosophy . capital of the United Kingdom : Routledge . Retrieved February 2 ,2007 , from : http /www .rep .routledge .com /article /L042SECT1Paye ,J .C (2006 . A permanent speciate of emergency . Monthly Review . 58 (6 29-37Sloan , L .D (2001 . Echelon and the profound restraints on signals intelligence : A need for reevaluation . Duke Law Journal 50 (5 1467Toffler , A (1990 . Powershift : Knowledge , Wealth and Violence at the edge of the 21st century . New York . Bantam BooksPAGEPAGE 11 ...If you want to get a full essay, order it on our website: OrderEssay.net

If you want to get a full information abou! t our service, visit our page: write my essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.