StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Electronic Chip Surveillance - Essay Example

Cite this document
Summary
The prime purpose of the paper "Electronic Chip Surveillance" is to discuss some antiterrorism legislation meant to fight terrorism the US government passed at the awakening of terrorist attacks set by the Islamic terror group al-Qaeda in September 2011…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Electronic Chip Surveillance
Read Text Preview

Extract of sample "Electronic Chip Surveillance"

Electronic Chip SurveillanceIn September 2011, the US experienced a sequence of four successive synchronized terrorist attacks believed to have been set by the Islamic terror group al-Qaeda. The areas affected by the attack were in New York City and the Washington, D.C. metropolitan area. This attack left 3000 people dead and several injured, destruction of properties worth billions of dollars among other loses. Also in this attack, four passenger airlines were hijacked by these terrorists with the aim of using them in suicide attacks.

It was, therefore, at the awakening of these attacks that the US government passed several antiterrorism legislation meant to fight terrorism. This legislation aimed at coordinate the combating of terrorism activities. One of this legislation was the Terrorist Surveillance Program, electronic monitoring system established by the National Security Agency (NSA) in the United States. This system’s main function was to interpret al-Qaeda communications. The electronic chip surveillance involved electronic monitoring of people’s movements and actions through an electronic device that had a connection to a given tag embedded within their bodies and having all the crucial details about them (Thompson).

The Real Id Act of 2005 then followed this, which was legislation mandating electronic chip surveillance (RFID) in all drivers' licenses and state IDs. The electronic chip was a wireless transmission of frequencies that allowed data transfer in order to automatically identify and track objects. This act was meant to govern the issuance of the national Identity cards and state driving license together with several other immigration matters related to terrorism. The law establishes certain requirement for them to obtain a driving license and ID cards that are acceptable in the federal government.

This was as stipulated by homeland security, which is an American universal team explaining the force applied by the nation in controlling terrorism attacks in the United States and its environs. The real act was meant to lay down confederate standards for the driver license remitted by the state and other licenses that are not for driving. According to this act, the state retained the freedom to give out other licenses that do not comply to the Act and IDs. The only thing to be noted in this case, however, was to ensure that there was a clear indication that the federal government for identification did not recognize these documents.

The syndicate security identification had the task of doing the security maintenance. People without the complying travel documents could not travel in the passenger aircraft unless they went through a thorough scrutinization. In the case of US v. Jones, the government, placed a GPS device on Jones’ car and tracked him for a period of one month without obtaining a warrant for the exercise. They then charged and convicted the defendant based on information gathered from this surveillance (United States v. Jones ). Consequently, Jones appealed by arguing that the law enforcement officers obtained the information illegally since they did not have a warrant.

Therefore, based on majority opinion, the Supreme Court should uphold that the search on Jones was unconstitutional since the government did not have a warrant to do so. However, the Police Department had a warrant to legitimize the search, it was only effective within 10 days, but they installed the chip on the 11th day. This brings in the issue of the Fourth Amendment, which protects citizens against unwarranted searches and seizures. The government argued that the Fourth Amendment should not be applied in the case since the defendant was travelling on public streets.

Nevertheless, the technology was of an intrusive nature and tracking a person over a period revealed a lot of personal information; thus, violated the defendant’s right to privacy. Moreover, the search was unconstitutional because such devices invade the privacy of a person. Like in the dog-sniff case of Florida v. Jardines, the act was unconstitutional because it invaded the privacy of Jardines (Florida v. Jardines). Nevertheless, the case opens the door for reforming the Fourth Amendment doctrine especially on understanding the level of privacy provided for by the law.

For instance, the government argued that jones already revealed or exposed this information to the public; thus, they should not be considered anymore. On the other, the current digital era also presents a challenge because there are so many channels through which personal information is bound to go out, even without revealing it yourself. So long as one has sufficient legal and physical barrier on personal information, the government should not conduct unwarranted searches. Hence, it means that the majority opinion of the Supreme Court judges bases their decision on property law, which protects the citizens against seizure and searches that are unconstitutional.

Therefore, the law enforcers had no right to conduct the exercise without a warrant, as it violates the Fourth Amendment. Work CitedFlorida v. Jardines. No. 569 U.S. Supreme Court. 2013. Web.Thompson, Richard M. "United States v. Jones: GPS MOnitoring, Property, and Privacy." CRS Report for Congress. 2012. Print.United States v. Jones . No. 615 F. 3d 544. The Supreme Court. 23 January 2012. Web.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Electronic Chip Surveillance Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/law/1495639-majority-opinion-electronic-chip-surveillance
(Electronic Chip Surveillance Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/law/1495639-majority-opinion-electronic-chip-surveillance.
“Electronic Chip Surveillance Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/law/1495639-majority-opinion-electronic-chip-surveillance.
  • Cited: 0 times

CHECK THESE SAMPLES OF Electronic Chip Surveillance

Radar Coastal Surveillance

The primary aim of the present research is the determination of the extent to which radar systems efficiently and effectively execute the requirements and tasks associated with coastal surveillance.... The primary aim of the present research is the determination of the extent to which radar systems efficiently and effectively execute the requirements and tasks associated with coastal surveillance.... Proceeding from an acknowledgement of this argument, this study will review all of radar technology, coastal surveillance requirements and existent methods for radar coastal surveillance to determine the optimal system, or systems for the execution of coastal surveillance responsibilities....
20 Pages (5000 words) Essay

Surveillance Is an Endemic Feature of Modern Life

The paper "surveillance Is an Endemic Feature of Modern Life" states that digital surveillance is here to stay.... hellip; Categorical Suspicion involves surveillance that is concerned with the identification of threats to law and order – especially by terrorists.... But today, it has assumed enormous proportions with the government coming in with its highly sophisticated identification and surveillance tools especially after the 9/11 terrorists attack....
5 Pages (1250 words) Essay

Paper and Coin Currency vs Electronic Money Transfer Systems

in our pocket, Soon enough we may see the times when we'll have all our banking records, personal details, identification tags, etc in a smart chip embedded in the ring of our middle.... In the paper “Paper and Coin Currency vs electronic Money Transfer Systems” the author analyzes the trend for an alternative to paper and coin currency.... The fact is, technologies like electronic Money Transfer or electronic Funds Transfer have proved their utility beyond doubt and we believe in this capability because we understand the intricacies of this technology....
4 Pages (1000 words) Assignment

Physical Security Principles Paper

Some of the common physical security measures taken by the people includes storing valuables under lock and… locking the houses, employing security personnel to guard ground, building, factories and other governmental or commercial establishments and surveillance.... (“The rise of physical security information management”, 2007) The traditional physical security systems such as human surveillance and locks and boundaries are being integrated with the modern IT systems....
5 Pages (1250 words) Essay

Critical Evaluation of whether Britain Constitutes a Total Surveillance Society

This assignment "Critical Evaluation of whether Britain Constitutes a Total surveillance Society?... being a surveillance society in which all details of personal lives are gathered, stored and processed with the computer as a database.... hellip; surveillance is a system in which the behaviour of people is monitored in a secretive manner.... Under surveillance, an individual or a group of people is observed by government organizations....
9 Pages (2250 words) Assignment

Surveillance Technology

This term paper focuses on surveillance Technology.... There are types of surveillance technologies available today are described, along with their applications.... The major categories discussed will be cameras or video surveillance, biometrics, Internet and etc.... hellip; Criticisms and limitations of surveillance technology are also discussed, as are the justifications for its continued usage by law enforcement agencies....
8 Pages (2000 words) Term Paper

Unplugging Philco

The main hero dares to get out of his zone of comfort by unplugging himself from governmental surveillance and gets into the secret and extremely weird society of Unpluggers, people united by the idea of freedom and quiet life.... This paper, Unplugging Philco, declares that the modern dystopia written according to the best traditions of “1984” and “Brave New World” has it all what is needed for a demanding reader:  clever and up-to-date message, cultural criticism, sarcastic approach and the free flow of words....
5 Pages (1250 words) Book Report/Review

What Will Provide the Best Input Control - EAC System or Biometrics

hellip; An electronic Access Control System (EAC) is a mechanism for security control which is used physically or automatically in order to manage the entry and exit of protected areas of an organization or site of work.... It has been viewed that both biometrics and electronic Access Control System have almost similar requirements wherein the user of the system must authenticate his or her admission before entering the building....
14 Pages (3500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us