StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Counterterrorism and Information Systems Your protection versus your rights - Research Paper Example

Cite this document
Summary
Counterterrorism and Information Systems: Your protection versus your rights Name University of Maryland University College In this era of technology, terrorists have managed to infiltrate governments and systems by implanting spies to do groundwork for them, plan then execute their terrorism act (John, 2003)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Counterterrorism and Information Systems Your protection versus your rights
Read Text Preview

Extract of sample "Counterterrorism and Information Systems Your protection versus your rights"

Counterterrorism and Information Systems: Your protection versus your rights of Maryland College In this era of technology, terrorists have managed to infiltrate governments and systems by implanting spies to do groundwork for them, plan then execute their terrorism act (John, 2003). After the 9/11 terrorist attack on American soil, U.S.A managed to instil stringent measures to ensure such events do not occur again. This gave rise to counterterrorism (John, 2003). In order for counterterrorism to be successful, it relies heavily on information collected on various events, people, organizations, and even documents.

Counterterrorism aims at picking up and detecting terrorist’s plans before expecting them by gathering information about their where about, plans and try by all means to have them arrested and prosecuted (John, 2003). The war towards terrorism has never been a smooth path, hence a number of ethical issues had to be broken. A country is always torn by the dilemma of either protecting its citizens from terrorism by use of information technology to feed them with required data to help them fight terrorism and the constitutional rights of individuals to have their personal rights (John, 2003).

It is evident that a sound decision in such a case is necessary as this is an ethical dilemma and one that can cause problems if messed around with. Vital information regarding people’s lives is usually interfered with in the process of counterterrorism (Policy, 2012). For instance, the government usually uses personal databases to extract information about certain people hence breaching their constitutional personal rights (Crenshaw, 2010). Faced with a tough decision on breaking its constitutional mandate to protect its citizens from terrorists and protecting their rights, somehow calls for a proper decision on whether counterterrorism use of information technology is ethical (Policy, 2012).

There usually so many ways which the government can combat terrorism without interfering with the personal rights of their individuals. This can involve sending spies to terrorist zones, of which it has not been successful as they eventually get discovered and stringent punishment administered to them (Policy, 2012). Another alternative to the government combating terrorism will be through fighting together with other countries to ensure that the leaders and the culprits funding them are detained (Shlomo, 2009).

In practical sense, these has been one impossible affair since most of the terrorist groups usually live in hiding and have spies all over when soldiers come to attack them (Lech, 2008). Another alternative that can be used to combat terrorism may be through rigorous checks and racial profiling of individuals from countries prone to harbour terrorist, like Muslim countries (Crenshaw, 2010). This cannot happen since it would cause worldwide rebellion and hatred of the U.S government resulting in more chaos and uncertainty in those regions.

Some of U.S citizens in diaspora working in such countries might face humiliation, discrimination and even subjected to death when such a system is put in place (Lech, 2008). In looking at the alterative provided in trying to make a sound decision on the most preferable way to go about with combating terrorism of a given country, still the use of information systems comes first because of a number of reasons (Lech, 2008). Acquisition of information regarding terrorist by use of information systems is usually silent and not alarming, hence the departments in charge of terrorism are able to take their time and filter out information and narrow down to a few suspects based on their findings (Crenshaw, 2010).

Terrorist usually affect the citizens of a given country by their acts, and it is usually the sole responsibility of the government to protect its citizens (Robert, 2006). Protecting millions of lives usually surpasses the rights of a single individual (Crenshaw, 2010). Terrorism is a worldwide menace, and if provided with the rightful condition, can cause immense havoc to the world (Robert, 2006). Hence the need to institute measures to monitor and detect any terrorism activity likely to occur before it happens.

In addition, in using information technology in counterterrorism, it somehow eliminates the issue of racial profiling related to individuals that come from Muslim states and regions that harbour terrorist groups. Furthermore, it would be beneficial in using information technology in combating terrorism as it would save the government cost and time of sending spies to the war stricken zones (Crenshaw, 2010). Hence, in coming to a conclusion on the ethical choice of using information technology to combat terrorism, I believe it is an ethical decision and which should be supported as it is for the good of it citizens when as it its advantages surpass its disadvantages (Crenshaw, 2010).

Hence in applying the utilitarian approach in ethical decision making, I believe this decision is paramount and beneficial to its citizens in as much as it entails breaking their constitutional mandate of protecting their citizen’s personal rights (Crenshaw, 2010). References Crenshaw. (2010). The consequences of counterterrorism. New York: Russell Sage Foundation. John L. Hennessy, D. A. (2003). Information Technology for Counterterrorism: Immediate Actions and Future Possibilities. New York: National Academies Press. Lech J. Janczewski, A. M. (2008).

Cyber warfare and cyber terrorism. New York: Idea Group Inc. Policy, E.-b. C. (2012). Evidence-based Counterterrorism Policy. New York: Springer. Robert L. Popp, J. Y. (2006). Emergent Information Technologies and Enabling Policies for Counter-Terrorism. New York: John Wiley & Sons. Shlomo Argamon, N. H. (2009). Computational methods for counterterrorism. New York: Springer.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Counterterrorism and Information Systems Your protection versus your Research Paper”, n.d.)
Counterterrorism and Information Systems Your protection versus your Research Paper. Retrieved from https://studentshare.org/information-technology/1472226-counterterrorism-and-information-systems-your
(Counterterrorism and Information Systems Your Protection Versus Your Research Paper)
Counterterrorism and Information Systems Your Protection Versus Your Research Paper. https://studentshare.org/information-technology/1472226-counterterrorism-and-information-systems-your.
“Counterterrorism and Information Systems Your Protection Versus Your Research Paper”, n.d. https://studentshare.org/information-technology/1472226-counterterrorism-and-information-systems-your.
  • Cited: 0 times

CHECK THESE SAMPLES OF Counterterrorism and Information Systems Your protection versus your rights

Counterterrorism in Four Democracies

Additionally, the suspect is provided protection by certain provisions of the Bill of rights.... Just war may be grounded along with the concept that the history of the Americans in the achievement of freedom has been long and tremendous, that even the powers of the government have been frameworks in a purposeful endeavor intended to safeguard individual rights.... This is because the United States Constitution contains a series of laws that will guide law enforcement and provides protection for the rights of everyone (Emerson & Haber, 1952)....
3 Pages (750 words) Assignment

Counterterrorism Book Report/Review

The manual goes on to talk about training, measures related to buying and transporting weapons, member safety, special tactical operations ,espionage , information-gathering using open and covert methods, coded language ,kidnapping and assassinations, explosives ,use of poisons ,interrogation and investigation and imprisonment of "infidels".... Then put yourself into the position of a counterterrorism specialist.... hellip; What implications for counterterrorism are contained in that training manual If you were to develop a counterterrorism strategy, what might a piece (or pieces) of that strategy be in light of the manual The discovery of the 180 pages long Al Qaeda manual which was seized from the Manchester ,England home of a bin Laden disciple, was a shocking moment for Britain and new dilemma for the counterterrorism forces and think tanks of Britain....
5 Pages (1250 words) Book Report/Review

Good Intelligence Is Critical to a Successful Counter-Terrorism Strategy

For most liberal social scientists, the world have been much safer compared before considering that the threat of nuclear extinction is not anymore present in the globe; yet the realist scholars would choose to differ.... hellip; This means that countries all over the world are not anymore aware of who could pose threats against them....
14 Pages (3500 words) Essay

Immigration and Customs Enforcement

ICE changed this by creating a host of new systems to better address national security threats and to detect potential terrorist activities in the United States.... Intelligence planned to engage in strategies to monitor all means of communications and dissemination of information.... In fact, before 9/11, immigration and customs authorities were not widely recognized as an effective counterterrorism tool in the United States....
12 Pages (3000 words) Research Paper

Combating Future Terrorism

Terrorism entails the systematic, although unauthorized, use of intimidation, terror or extreme violence as coercion means to achieve political objectives.... Although the international community does not provide a legally binding definition or one based on criminal law, common… Such acts may also target or deliberately ignore the safety of civilians....
10 Pages (2500 words) Essay

How Secure is Your Data, Information and Information Systems Technology

This study, How Secure is Your Data, Information and information systems Technology, outlines that there are both similarities and differences in the security issues that you raised when compared to mine.... ?Journal Of Management information systems,29(3), 157-188.... Using Accountability to Reduce Access Policy            Violations in information systems.... ?Journal Of Management information systems, 29(4),            263-290....
1 Pages (250 words) Assignment

International Order and Security

This work called "International Order and Security" describes the USA, UN agencies, NGOs, volunteers, and donors amongst humanitarian organizations.... The author outlines the work of global governance, the main problems associated with terrorist networks.... nbsp;… Every nation must have watched the impact of terrorism and realized the need to keep alert from such recurrence....
10 Pages (2500 words) Essay

Counterterrorism Efforts

The government is also working with foreign partners in counterterrorism and sharing terrorists.... This is backed by strengthening the security offered for travels and documents through improving the methods used to share information with all American partners.... In the paper “counterterrorism Efforts” the author looks at the efforts that have disrupted the activities of the terrorist after the attacks on the United States of America on September 11....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us