StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Privacy, Security in the 21st Century - Essay Example

Cite this document
Summary
The emergence of various technologies which can be used for surveillance has brought about various reactions from society, both pro and con. Given the valid interests of public safety and protection, governmental agencies have increased their efforts at research and design to the point that their ability to use new technology to observe the actions of individuals has reached unprecedented levels…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Privacy, Security in the 21st Century
Read Text Preview

Extract of sample "Privacy, Security in the 21st Century"

YOUR FULL YOUR The Night has a Thousand Eyes: New Surveillance Technologies The emergence of various technologies which can be used for surveillance has brought about various reactions from society, both pro and con. Given the valid interests of public safety and protection, governmental agencies have increased their efforts at research and design to the point that their ability to use new technology to observe the actions of individuals has reached unprecedented levels. From the use of satellites which have the ability to read vehicle license numbers from space to "modern devices which give police the power to see through the walls of people's homes and detect minute amounts of contraband"(Julie 127), the ability of authorities to know what Americans are doing at any point in time is astounding.

For many, these developments are welcome because they feel that they have nothing to hide from authorities and they implicitly trust governmental agencies to act in their safety interests. Others, however, find even the old surveillance technologies to be disturbing. The ubiquitous security surveillance camera, for example, still has the power to stir controversy; witness the post-9/11 reaction to the National Park Service's plan to put round-the clock security cameras in the national parks within the nation's capitol (DeBose 1).

For those people concerned with any new-found surveillance ability, the constitutionally-guaranteed right to privacy is violated by the merest hint of "big brother" monitoring their activity. The advance of technology, however, is not subject to public opinion; it is simply a fact that newer and better means of obtaining information are going to continue to be developed. Appropriately applied, these new methods have the ability to greatly enhance the safety and security of the general public and there is no question that science will continue to advance these capacities.

The burden of balancing privacy with technology will have to be placed upon the courts. Liberty and Security: A Safe Perspective The provided quotes from Benjamin Franklin and H. L. Mencken demonstrate the perspectives of two different philosophical positions in two different worlds. For Franklin, the idealist who was living in a day when airplanes didn't fly into buildings, there is no security interest that justifies the sacrifice of individual freedom. For Mencken, the pragmatist, there is no freedom issue that justifies the sacrifice of safety; and certainly Mencken would feel even more justified in his position today.

The two philosophical positions provide a perfect context for the modern social debate of where is the line going to be drawn between individual freedom and social safety. Individual rights are important. In fact, the nation was founded upon that very principle and civil libertarians are already decrying the decay of those liberties in the face of governmental efforts to provide the necessary security required by modern events. The problem, of course, is that the government is charged with the duty to provide for the welfare of the public.

In discharging that duty, there has always been a trade off between freedom and public interest. The simple example is that there is a fundamental freedom of speech accorded to each individual; that freedom, however, does not include crying "fire" in a crowded building unless it is a truthful warning. Many Americans are, in fact, willing to forego certain individual freedoms for the sake of security and embrace the new surveillance technology being implemented by governmental authorities. These individuals would heartily agree with Stephen Pomper's assertion that his "first reaction to this James Bond-style technology is to embrace it, in the hopes that someday it will save my skin.

As for the intrusion, it hardly bothers me; I figure I have nothing to hide" (48). Between these two extremes, typically, is the reasonable answer. Given the modern technological response to the recent heinous acts of certain individuals, the government will have ample opportunity to trample individual rights; like the right to privacy. I don't believe most Americans, however, are willing to die in a fiery crash just so a criminal can claim liberty. I know I'm not.Beyond Fear: Identification, Authentication, and AuthorizationIn Schneier's book, he provides a guide for understanding the nature of a security system's function by distinguishing and defining three important components: Identification, or who your are; authentication, or proof of who you are; and authorization, or what you are allowed to do (182).

Seemingly straightforward, the requirement of this information is necessary to proper security; yet it is fraught with libertarian issues in the American constitutional system. What appears to be justifiable information has been decried by some as an unreasonable inquiry that violates personal privacy. In balance of the individual need for privacy and society's need for safety, I believe that the proposed scheme is entirely sensible. By way of example, consider the case of protestors at a health clinic.

These individuals have every right to express their opinions under our system of laws. They do not, however, have the right to terrorize clinic workers or destroy property; which makes the case that the principles identified by Schneier would not be a violation of their privacy rights (see Colb). A scheme of requiring any individual to provide suitable identification would ensure the security and safety of all. Individual A, properly identified as a nurse, obtains access to the clinic and all its sectors.

Individual B, a properly-identified patient of the clinic, obtains access to the facility and those areas appropriate for authorized visitors. Individual C, a properly-identified protestor, obtains access to neither and is escorted to the area across the street for which First Amendment protests are designated. Under this sensible regimen, the disparate rights of the individuals are reasonably protected while the security of all is ensured. As with most modern security issues, the rights of individuals must be properly balanced with the safety of the group and a sensible practice is that of proper identification, authentication, and authorization.

Works CitedColb, Sherry F. "What is a Search Two Conceptual Flaws in fourth Amendment Doctrine and Some Hints of a Remedy." Stanford Law Review 55(1) (2002): 119-163.DeBose, Brian. "Park Service Widens Watch; to Put Cameras at Memorials." The Washington Times 22 Mar. 2002: B01.Julie, Richard S. "High-Tech Surveillance Tools and the Fourth Amendment: Reasonable Expectations of Privacy in the Technological Age. American Criminal Law Review 37(1) (2000): 127-140.Pomper, Stephen. "Why Surveillance Technology Should Worry Even Those with Nothing to Hide.

" Washington Monthly 36(1-2) (2004): 48-51.Schneier, Bruce. Thinking Sensibly about Security in an Uncertain World. New York: Copernicus Books (Springer Verlag), 2003.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy, Security in the 21st Century Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Privacy, Security in the 21st Century Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1509848-privacy-security-in-the-21st-century
(Privacy, Security in the 21st Century Essay Example | Topics and Well Written Essays - 500 Words)
Privacy, Security in the 21st Century Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1509848-privacy-security-in-the-21st-century.
“Privacy, Security in the 21st Century Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1509848-privacy-security-in-the-21st-century.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy, Security in the 21st Century

Business Strategy of Google Inc

Google as a brand has an overbearing presence over the internet and prevails in different verticals of service and product on the internet.... Though a very strong brand with an equally stronger business, yet a SWOT analysis can only provide us focused analysis of its actual position.... hellip; On analyzing the situation, it becomes clear that in this era of innovation & technological prowess, it is not safe to seat on past or present laurels....
9 Pages (2250 words) Essay

Privacy,Security, Freedom:Social Concerns for the 21st Century

Justice Douglas, in Griswold, 1965, began firmly framing a constitutional right to privacy where one had previously existed only in shadow.... 479 (1965), began firmly framing a constitutional right to privacy where one had previously existed only in shadow.... Hence, the doctrine of privacy rights was born.... The first is Incrementalism; the idea that privacy is not taken away in a day by one major act, but rather eroded over time....
6 Pages (1500 words) Essay

Privacy,Security, Freedom:Social Concerns for the 21st Century

In terms of being “born free,” I am not sure Rousseau means freedom in the same sense that an American in the 21st century perceives it.... Even in 21st century America, we are born to individuality while being constrained on many sides.... A few years ago, the response to a direct question about privacy, security, and freedom might have been a more academic or philosophical discussion about freedom in… As the government moves to respond to the public's concerns about safety and security, there is becoming an ever-increasing concern among some citizens that the privacy of the individual is Patricia James YOUR Rousseau Discussion About myself: Tell ‘em what you want ‘em to know, PJ....
2 Pages (500 words) Essay

The Asia-Pacific Maritime Disputes, Boundaries and Strategy

on the best way to deal with international maritime partnerships with the hope of increasing maritime security in the region of the Asia Pacific.... This journal article portrays the condition of maritime coalitions in the region of Asia Pacific and the potential they have in safeguarding vessels out at sea that are crucial to the security of energy in those areas.... This journal highlights the different types of the latest correlations to ensure Maritime security....
4 Pages (1000 words) Annotated Bibliography

Historical Facts and Incidents of 21st Century

hellip; It is fundamental to note that there is no century in recorded history that has experienced so many social and political transformations and such far-reaching ones as the 21st century.... The paper "Historical Facts and Incidents of 21st century" uses some historical facts and incidents that have occurred over the past five years to explain how politics has influenced all ways of life thus resulting in changes social, political, and economic arena.... All these coldhearted acts of this century are insinuated by the headline-making political events, which have transformed not only the economy but also the society and the political entity we live in....
8 Pages (2000 words) Research Paper

How Private Entities Help International Security

The paper "How Private Entities Help International security" discusses that the world has changed with the changing times, and it is about time that positive developments also start taking place for the wellness of the different societies of the world.... These are some of the reasons why international security has been kept at risk by a number of players – directly or indirectly, formally or informally; yet the stance, on the whole, has been vivid and clear – security has been marred but the issue needs to be resolved, the sooner the better....
7 Pages (1750 words) Essay

Privacy in the 21st Century

The paper "Privacy in the 21st century" resumes today to gain modern society benefits, humans must relinquish privacy to a certain extend.... nbsp;… Privacy in the 21st century has raised a lot of debates.... This paper discusses the arguments put forward about how privacy has disappeared in the 21st century.... Before the 21st century, people wandered around easily and anonymously.... The implications include driver's licenses, phone directories, social security numbers, revenue authority pins, cable TV, and credit cards....
5 Pages (1250 words) Essay

Credit Card Security and Privacy

For close to a half a century, credit cards have become popular in different parts of the world.... Within this, it is also necessary to establish and understand security and privacy issues that are associated with credit cards.... This in turn makes it possible to evaluate the different available measures that can be used to improve the current situation of security threat that credit cards and its holders face....
21 Pages (5250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us