StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Monitoring U.S. citizens' phone conversations to detect potential terriorist threats - Essay Example

Cite this document
Summary
This catastrophe not only brought to fore the potential terrorist threats to the US lives and property, but also resulted in the placement of Homeland Security concept…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Monitoring U.S. citizens phone conversations to detect potential terriorist threats
Read Text Preview

Extract of sample "Monitoring U.S. citizens' phone conversations to detect potential terriorist threats"

Monitoring US Citizens’ Phone Conversations to Detect Potential Terrorist Threats of the Name of the Concerned Professor June 27, 2011 Monitoring US Citizens’ Phone Conversations to Detect Potential Terrorist Threats 9/11 was a conclusive turning point in the way the Americans envisaged and planned their national security. This catastrophe not only brought to fore the potential terrorist threats to the US lives and property, but also resulted in the placement of Homeland Security concept aimed at mitigating such threats (White, 2005).

Yet, this in no way justifies the monitoring of US citizens’ phone conversations to detect potential terrorist threats. Such provisions threaten the quintessential American way of life. Liberty and freedom have always been a fundamental part of the American ethos and values. The very spirit of American political life and popular expectations simply do not allow the state to extend its sway beyond a point where it not only interferes with the personal and professional lives of people and individuals, but rather tempers with the privacy of their private and professional phone conversations.

National security is really very important. However, the concerns for national security cannot be allowed to irrationality expand to a level where they start hampering the normal activities of the citizens. The act of monitoring the phone conversations of citizens is also unconstitutional and violates the Fourth Amendment rights of the citizens, which constitute a part of the Bill of Rights (Dripps, 2007). Superficially speaking, the Fourth Amendment to the constitution of the United States of America intends to protect the citizens from illegal search and seizures.

Surprisingly, the very purpose of this Amendment was to check the abuse of general search warrants in the American Revolution (Dripps, 2007). In the historical Katz v. United States judgment, the US Supreme Court declared any state intrusion into an area where a citizen has the reasonable expectation and right to seek privacy, to be an illegal search and a violation of the Fourth Amendment (Dripps, 2007). Thus, monitoring of the phone conversations of the US citizens is a legal and ethical violation of their privacy.

This in no way means that the law enforcement agencies simply cannot have an access to the phone conversations of the people doubted of having terrorist links. They can do so as per the ways and procedures laid down by the US laws. As per the Fourth Amendment, the law enforcement personnel can resort to a legal search (here monitoring of phone conversations), provided such a procedure is pursuant to a valid court warrant sanctioned on the basis of the information provided by a law enforcement personnel to the court, under an oath (Bloom, 2003).

Hence the US constitution allows the monitoring of phone conversations, provided such acts are subject to accountability to a court of law. So, a blanket monitoring of phone conversations under the guise of national security is merely an abuse of state machinery and totally unethical. History is replete with many horrendous acts committed in the name of national security. So, such a proposal deserves to be opposed and resisted by all the law abiding and ethical American citizens. Reference ListBloom, Robert M. (2003). Search, Seizure and Warrants.

Westport, CT: Praeger. Dripps, A Donald. (2007). Reconstructing the Fourth Amendment. Constitutional Commentary, 2.4, 533-544. White, Jonathan R. (2005). Terrorism and Homeland Security. New York: Wadsworth Publishing.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Monitoring U.S. citizens' phone conversations to detect potential Essay - 1”, n.d.)
Monitoring U.S. citizens' phone conversations to detect potential Essay - 1. Retrieved from https://studentshare.org/english/1577977-monitoring-us-citizens-phone-conversations-to-detect-potential-terriorist-threats
(Monitoring U.S. citizens' Phone Conversations to Detect Potential Essay - 1)
Monitoring U.S. citizens' Phone Conversations to Detect Potential Essay - 1. https://studentshare.org/english/1577977-monitoring-us-citizens-phone-conversations-to-detect-potential-terriorist-threats.
“Monitoring U.S. citizens' Phone Conversations to Detect Potential Essay - 1”, n.d. https://studentshare.org/english/1577977-monitoring-us-citizens-phone-conversations-to-detect-potential-terriorist-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF Monitoring U.S. citizens' phone conversations to detect potential terriorist threats

Current United States Policy on Commercial Aviation Security and Potential Policy

The present technology has sometimes failed to detect terrorists smuggling explosives.... Current United States Policy on Commercial Aviation Security and Potential Policy Name: Institution Current United States Policy on Commercial Aviation Security and Potential Policy Executive Summary The United States has continued to face terrorist threats in the commercial aviation industry over the decades.... hellip; The threats that emerge because of globalization are real since not everyone is happy with the development of other countries....
15 Pages (3750 words) Research Paper

The Aspects of Terrorism in the United States

New Terrorist threats Name: Institution: Abstract The aspect of terrorism has been continuously ignored and the severity of the tenets of terrorism not understood by many states.... New Terrorist threats Prior to the events of September 11, 2001, the United States, and much of the world for that matter, was blissfully ignorant with regards to the terrorist threat....
9 Pages (2250 words) Research Paper

Machiavelli on Powers of NSA and Defense Spending

The organization carries out extensive global monitoring with the aim of detecting and intercepting potential security threats to the country (Aid, 2009).... billion in the collection and monitoring of millions of American phone conversation.... Machiavelli on Powers of NSA and Defense Spending Name: Institution: Introduction Operating under the jurisdiction of the department of defence, the National Security Agency is the country's largest intelligence organ....
8 Pages (2000 words) Research Paper

The Age of New Media

Therefore the governments of the world are supposed to come out with measures which can detect such designs and take corrective steps.... Though the modus operandi defers depending upon the importance and strategic nature of the surveillance, but one factor common in all such acts is the monitoring of our actions in different measure....
11 Pages (2750 words) Essay

Evolution of security cameras and computer monitoring software

Safety and security have become the most important needs of contemporary world in all spheres ranging from personal homes to offices, public places and every place that has a potential threat of terrorism, illegal activities, or any other form of harm to life and possessions.... These are equally important for protection of official possessions, infrastructure, data and information, storage systems of products and official data, etc in all spheres of life including offices, business units, production houses, hospitals, manufacturing plants, hospitality and entertainment setups, travel mediums, financial institutions, etc; infact, this list would include all the places having potential risk of attracting loss, damage, or harm from external sources....
12 Pages (3000 words) Essay

The Age of New Media

Therefore the governments of the world are supposed to come out with measures which can detect such designs and take corrective steps.... This paper outlines the role of the communication system, surveillance, surveillance society, new media and monitoring, and history of the development of information society....
11 Pages (2750 words) Essay

Marketing Activities of Social Media

The paper "Marketing Activities of Social Media" defines key performance indicators for qualitative measurement of marketing activities of social media.... The most popular is the assessment of opinions of common people regarding a brand, organization, political system, national security measures....
16 Pages (4000 words) Essay

An Assessment of The Role of Media in the Gulf War

This work called "An Assessment of The Role of Media in the Gulf War" describes the role of media prior to the Gulf War.... The author takes into account the role of the media in the Gulf War and how they were used as tools for the government to manufacture consent and ensure the remarkable implementation of the ideas behind the propaganda model....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us