StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Database and Terrorism - Essay Example

Cite this document
Summary
The most recent directive issued by President Barack Obama, the Executive Order 13526, mandates that the government can classify specific types of documents and data that are pivotal to the United States national security. This classification determines those information that…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Database and Terrorism
Read Text Preview

Extract of sample "Database and Terrorism"

What information can be sold or Released to the public? The most recent directive issued by President Barack Obama, the Executive Order 13526, man s that the government can classify specific types of documents and data that are pivotal to the United States national security. This classification determines those information that could be sold or released to the public. This policy is not only sensible but actually is necessary. There are information that could aid the US enemies especially in carrying out terrorist attacks or those acts aimed at exploiting weaknesses and all those state secrets that could endanger national security.

On the other hand, there are information, especially those related to terrorism as well as in national security itself that are permitted to be shared with the public. This is what this paper will explore.The right to know or access information from the government, including those that concern national security, is guaranteed by the US Constitution. Judicial jurisprudence in this regard has consistently upheld that the right to acquire information is an essential component of the First Amendment.

In this regard, there are indeed information that the public has the right to know and must know. For instance, in the event of terrorism, the public must know how to respond and, hence, must acquire information in regard to the nature of attacks and ways how to mitigate it. According to Wessely and Krasnov (2005), authorities should seek partnership with the public, provide measure facts for them to make independent choices rather than providing information that is believed what they should hear. (p. 218)Another area wherein access to information is vital concerns the scientific community.

There is a growing belief among policymakers that suppressing the transfer of knowledge and technology is vital to the security of the United States. Such belief is not unfounded. Between 1998 and 2000, the US faced three national security crises involving the potential loss of scientific and technical information when China stole advanced military technology from the Department of Energy’s premier national security laboratories. (Esano and Uhir 2003, p. 107) Restricting access to scientific data and technology, on the other hand, could prove detrimental to the growth of the research and development in the United States because such restrictions could diminish the amount of scientific and technical data available in public domain and obstruct scientific inquiry.

What must be done is a close collaboration between the security agencies and the scientific community in order outline what are the risks, what are permitted and what are security threats.Finally, there is also the case of historical materials. Documents, for instance, involving World War II, the Korean War, relations with China, and other foreign policy papers that had been declassified were again reclassified. (Welch et al. 2009, p. 353) However, due to public rebuke, mostly from historians and librarians, such reclassification has been suspended by the National Archives director and, hence, are again available to the public.

It is important to underscore that while there is a need to suppress the access of information for the American national security, such policy must not be done in a way that proves disadvantageous to the American interest. After all, information has always been the lifeblood of the science, the fuel that drives the American economy and force that fosters the democratic system.ReferencesEsanu, J. and Uhir, P. (2003). The role of scientific and technical data and information in the public domain: proceedings of a symposium.

Washington D.C.: National Academies Press.Welsch, S., Gruhl, J., Comer, J. and Rigdon, S. (2009). Understanding American Government. Boston: Cengage Learning.Wessely, S. and Krasnov, V. (2005). Psychological responses to the new terrorism: a NATO-Russia dialogue. Amsterdam: IOS Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Database and Terrorism Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Database and Terrorism Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1566158-database-and-terrorism
(Database and Terrorism Essay Example | Topics and Well Written Essays - 500 Words)
Database and Terrorism Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1566158-database-and-terrorism.
“Database and Terrorism Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1566158-database-and-terrorism.
  • Cited: 0 times

CHECK THESE SAMPLES OF Database and Terrorism

Trouble With The Terrorist Watch List Database

TROUBLE WITH THE TERRORIST WATCH LIST database Concepts in the case The main concept is consolidating various databases into one fundamental list; in fact, different agencies have employed data warehouses to queried data collected by various sectors of the government.... The main concept is consolidating various databases into one fundamental list; in fact, different agencies have employed data warehouses to queried data collected by various sectors of the government....
2 Pages (500 words) Case Study

Terrorist Activities & Community Members

It is essential when law enforcement departments are setting up programs on surveying potential terrorism activities, that community members are also included in the process of observing specific activities and people who act suspiciously and could indicate a potential for an upcoming terrorist act (EMD 2013; SARA 2013).... Gathering information from the community is a very valuable component of any law enforcement's information tools which can then be incorporated into any of its database systems for further analyses....
5 Pages (1250 words) Assignment

Terrorism Preparedness & Response

As terrorism is a worldwide problem, nations must act in unity.... As terrorism is a worldwide problem, nations must act in unity.... Some will be reluctant to comply yet may be persuaded to renounce the sponsorship of terrorism.... All new applicants for VISAs will be screened and checked against security database information....
4 Pages (1000 words) Essay

Crimes Against Information

The essay "Crimes Against Information " discusses the threat of cyber-terrorism remains a quick and inexpensive weapon to deliver a detrimental effectholding cyber-terrorists responsible and matching the detriment of their crimes have not been implemented.... Cyber-terrorism is the new crime preference to inflict havoc on the masses of society.... Watson defines cyber-terrorism as "the use of cyber tools to shut down critical national infrastructures  for the purpose of coercing or intimidating a government or civilian population....
6 Pages (1500 words) Essay

Dynamics of Terrorism

The twenty-first century is replete with "floodgates" of globalization and surging flames of terrorism.... How this situation has emerged Why terrorism is still a continuously growing phenomenon despite the so-called "war on terrorism" and "zero tolerance to terrorism" What after all terrorism is What are the different perspectives on terrorism Are terrorist having any special characteristics Can terrorism be defined What are diverse and different views and analyses in this matter Nassar presents an in depth picture on the real and historic causes behind terrorism....
4 Pages (1000 words) Essay

Evaluation of Insecurity System

In order… rectify the this problem and to comply with Intelligence Reform and Terrorist Prevention Act of 2004 enacted by Congress, Department of Homeland Security (DHS) proposes a terrorism Intelligence Data Interoperability System (TIDIS) which combines functions and capabilities of 1) ports of entry and fail to register through proper immigration channels, 2) storing, analyzing and integrating captured data with known criminal/terrorist databases through a data interoperability system, and 3) a GIS (Geographic Information System) module that uses biometrics data to map terrorist movement through U....
12 Pages (3000 words) Essay

Extra credit

The basic definition of terrorism only entails the violent behaviors that are aimed at generating fear; and are conducted due to several reasons including religious, ideological and political… The violent behaviors are targeted without adequate regard for the safety of the non-combatants like the civilians, neutral armed forces, and humanitarian personnel.... The terrorism term is politically ands also emotionally charged; hence a precise and specific definition Extra Credit In global context, terrorism does not have a law definition that is legally binding....
2 Pages (500 words) Book Report/Review

The Risk of Terrorism in Australia

… The paper "The Risk of terrorism in Australia" is a good example of an assignment on social science.... nbsp;The choice of terrorism as a topic is underpinned by a personal desire to explore and analyze the extent of the reality of terrorism in Australian.... Since 9/11, the threat of terrorism has become the sword of Damocles hanging over the heads of civilized nations, including Australia.... The paper "The Risk of terrorism in Australia" is a good example of an assignment on social science....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us