Premium Essay

Freedom Vs. Security

Submitted By
Words 281
Pages 2
Freedom versus security is a major issue we have when constructing new laws dealing with national security. Where should the line be drawn and when do our freedoms and rights as American citizens go under fire due to terrorist paranoia? After reading David Haynes’s “ Liberty vs. security: An old debate renewed in the age of terror” I felt highly upset discovering I was being spied through my IPhone in high school. The National Security Agency conducted a mass eavesdropping operation which allowed them to listen to your phone calls with the hopes to catch unexpected terrorist activity. Being in the military I do know there is always a sacrifice for freedom because even though is sounds ironic, freedom is not free sad to say.

Every person

Similar Documents

Premium Essay

Argumentative Essay On Security Vs Freedom

...Security versus Freedom For years the controversial topic of security versus freedom has divided our nation. For centuries the United States has prided itself on being a free country where people are allowed to do things like vote, voice their opinions, peacefully protest, and much more. While freedom vs security has always been an issue, only recently has it become a such a complex and important debate. After September 11th, 2001 happened, the government made drastic security changes in hopes of making America safer for its citizens. Some of those changes had citizens wondering if they were giving up some of their rights in exchange for national security. Security has also been brought up more recently with the rise of technology. Adding technology to the...

Words: 938 - Pages: 4

Free Essay

Poli Sci 100

...also covered in the readings, sometimes in more than one chapter.    Lec. 1-2 What is Politics?    Concepts from the Lecture: Politics ‘Polis’ Plato Machiavelli Modern Age Thomas Hobbes Leviathan   Concepts from the Texts: ‘Simile of the Cave’ ‘fortuna’ philosopher-king Behavioural Approach Class Analysis Elite theory Pluralism Institutionalism ‘Power to’ vs. ‘Power over’    Lec. 3 What is the State? Concepts from the Lecture: Treaty of Westphalia Social Contract Legal-institutionalism Branches of State Levels of State Elitism Pluralism   Additional Concepts from the Texts: Night Watchman State Neo-liberal state Welfare State Liberal Democracy    Lec. 4 The State: Power, Authority, and Sovereignty   Concepts  from the Lectures and Readings: Power Authority Sovereignty Weber’s Typology of Authority Concepts from Readings: See Lec. 3 concepts   Lec. 5 Political Ideologies: Liberalism   Concepts from the Lecture Ideology Left vs. Right ideologies John Locke/ Two Treatises of Government J.S. Mill/ On Liberty Tenets of Liberalism Welfare Liberalism vs. Libertarianism   Concepts from Readings The Republic State of nature Tyranny of the majority Harm Principle ‘Politics as a Vocation’ Equality Rights    Lec. 6 Republicanism, Conservatism and Socialism    Concepts from the Lecture Republicanism Roman ‘Res publica’ Jean Jacques Rousseau Edmund Burke / Reflections on...

Words: 886 - Pages: 4

Premium Essay

Korb Vs Raytheon Case Study

...direct conflict with the corporation’s economic interest. Korb was denied his claim for wrongful discharge and for a violation of the State Civil Rights Act (LAWRENCE J. KORB vs. RAYTHEON CORPORATION. (n.d.). Korb had been with the United States Department of Defense for about four years, were he served as assistant secretary of defense for manpower, installations, and logistics. Korb later left the government and joined Raytheon Corporation as vice president in charge. Korb spoke at the company’s annual alternative defense budget conference, in which he said some things that many people in the Department of Defense did not like nor approve of (LAWRENCE J. KORB vs. RAYTHEON CORPORATION. (n.d.). After being told his job was in jeopardy, due to his recent sayings, he wrote a letter to the editor of the...

Words: 1046 - Pages: 5

Premium Essay

Individual Privacy vs National Security

...Individual Privacy vs. National Security Anthony Sifuentes ENG 122 English Composition II Instructor vonFrohling February 13, 2012 Individual Privacy vs. National Security The need to protect National Security is far more important than individual privacy. The greatest part of living in the United States of America is the freedom that we have. That freedom and the right to live freely is protected by various government agencies. From time to time, the privacy a person has may have to be invaded to guarantee the security of the country and other citizens. Everyone has the right to not have their life controlled by the government, but it has the right to make sure that citizens are not doing anything to threaten the security of the country. Our freedom also comes at a price; that price is the need of the government to monitor some of the things we do so ensure that the United States is not in danger of a terrorist attack or an attempted overthrow of the government. The most glaring example of how National Security is more important than the privacy of an individual is September 11, 2001. The terrorist attacks that day have changed how Americans see our National Security and it must take precedence over anything else. One definition found for national security is: “The measures taken by the state to ensure the security of itself, or its citizens or subjects.” (Thomas, 2007) He goes on to explain that is both a right and a responsibility for a state to protect its...

Words: 2496 - Pages: 10

Premium Essay

The Federalist John Jay

...having to balance between providing more security for the people and less liberties or more liberties and less security. Both security and liberty do not always have to be opposing factors for one another, but they often are, as they are always trading off with each other. There has of course been several cases where the government...

Words: 799 - Pages: 4

Premium Essay

Paper

...Bailout Battered women SEE ALSO Wife Abuse Abused women Conjugal abuse Birth control Birth control; Contraception Birth control; Contraception Black Reparations Movement Reparations; Slavery--Law and legislation Reparations Body language Body language; Gesture; Nonverbal communication Nonverbal communication Bullying Bullying Bullying; Cyberbullying Business ethics Business ethics; Corporations - Corrupt practices Business ethics; Business enterprises, Corrupt practices Capital punishment (Death Penalty) Capital punishment; Death row Capital punishment Cancer Cancer--Prevention SEE ALSO types of cancer, such asBreast--Cancer Neoplasms--Prevention and Control;Cancer Treatment Censorship SEE ALSO Freedom of the Press Censorship; Prohibited books Censorship; USA Patriot Act 2001-US AND Civil liberties; Filtering software;Banned books Child abuse SEE ALSO Domestic violence Abused children; Child abuse Child abuse Child custody/support Custody of children Child custody Children of alcoholics Children of alcoholics; Alcoholics--Family relationships Children of alcoholics Cloning...

Words: 1762 - Pages: 8

Premium Essay

How America Became a World Power

...Republican motherhood Raise virtuous, well-educated sons That is what is necessary in a republic E.g. Abigail Adams Question How successful were the Articles of Confederation as a constitution? Evidence Congress didn’t have the power to collect taxes or to regulate commerce Written notes… Constitution Written notes… Article II Presidential (executive branch) powers Commander in chief Enormous power that is used regularly Undeclared wars are now commonplace – the president orders military action (criticism of an imperial presidency – perhaps president should ask Congress regardless) Negotiate treaties Senate has to approve by 2/3 majority, however Veto Negotiated legislation President sets the budget and sets agenda Can be overridden by a 2/3 majority of Congress Andrew Johnson had numerous vetoes overridden (also Truman) Obama has vetoed the fewest bills since James Garfield Divided congress with great difficulty passing bills Primary reason: president is an integral part of the legislative process Appoint federal justices and government employees (e.g. heads of CIA and Federal Reserve) Enforce laws executive orders Order of the president without Congressional approval that has the force of law Only operates within the framework of an existing piece of legislation or constitutional power Order based on a certain interpretation Example: Harry Truman integrates the armed forces Ends segregation of blacks and whites in the army Issue pardons Electoral...

Words: 1054 - Pages: 5

Free Essay

The United States Constitution vs the Patriot Act

...The Patriot Act Vs The United States Constitution Khadija Nurul Hasan Chaffey College The Patriot Act Vs The United States Constitution             The “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism” Act, or Patriot Act was passed on October 24th, 2001 with almost all legislators in favor of it. The terrorist attacks on the Pentagon and the World Trade Center on September 11, 2001, sparked a nationwide desire for heightened security and increased abilities for law-enforcement agencies to track and stop terrorists. Thus, the Patriot Act was created in response, and passed with the aim of battling terrorism. However there are always two sides to any passing of a political law: those who support it and those who oppose it. Those who support the Patriot Act have consistently countered that the provisions of the Act are necessary to protect the people from future terrorist attacks, and that the law does an adequate job of protecting individual civil liberties; while those who oppose it argue that the Act is an egregious assault on individual liberties as it violates their constitutional rights. The hypothesis of this paper is to dissect and analyze Sections of the Patriot Act to see if they are in violation of the United States Constitution.  Specifically the paper will analyze Sections 505, 215 of the Patriot Act to see if they violate the Constitution. The first violation in question comes from Section 505 of...

Words: 1895 - Pages: 8

Premium Essay

Employment Rights

...Lyceum of the Philippines University - Batangas Graduate School | Employment Rights | Trends and Issues | | Ma Chere Gracita C. Reyes-Bilog | 04/25/2015 | Name: Ma Chere Gracita C. Reyes-Bilog C/Y/S: Masters in Business Administration S/T/R/D: MBA 518 / 1-4 PM / SHL 203 / Sat Professor: Dr. Leon R. Ramos, Jr. | Abstract Objectives: A. Cognitive: Identify the different rights of an employee. B. Affective: Develop a better understanding of the rights of the employee. C. Psychomotor: Apply the concepts to real-life situations and work conditions and be guided by the knowledge acquired in developing good corporate governance policies relating the rights of the employees. Definition of terms: Authorized Causes refers to the grounds of dismissal s to the grounds of dismissal that are allowed by law on grounds of business or organizational necessity (Atienza, 2004). Casual Employment refers employment which is neither regular, nor for a fixed period nor seasonal (Labor Code). It is one where an employee is engaged to perform a job, work or service which is merely incidental to the business of the employer, and such ob, work or service, is for a definite period made known to the employer at the time of the employment (Omnibus Rules Implementing the Labor Code). Constitution refers to the standard of validity for all acts, both public and private. It is a written instrument that serves as the fundamental or supreme law of the land (Carmelo...

Words: 5641 - Pages: 23

Premium Essay

From Traditional to Critical Security

...From traditional to critical security Why security? * It is fundamental to international relations. * States will often regard security as one of the most important factor. * Refer to lecture slides What is security? * Security most heavily contested and discussed concepts. * Security is inherently subjective 3 core lines of disagreement between scholars over security ( Test ) * What should we seek to secure? * What do we need to secure? What are most important to states? * Who or what should be responsible for providing security? The state? Or the people? Traditional security studies * Focuses on Military forces, states, armed conflict. * Liberalism was a popular approach to study of IR * Realists opposes them * Concept of security became closesly associated with military dynamics of cold war * Nuclear weapons were developed. * States are responsible for providing their own security * The states is always central for the 3 core lines * Main method for securing the state is to bolster high military grade technology and weapons Critical security studies * It responds to the first question of what should we secure by suggesting that it is the individual or other things * IT suggests that we should secure the individual. * It covers different theoretical approaches. * Professor Keith Krause, Ken Booth and Michael Williams were the key people that wrote on CSS * Read ketih Krause article...

Words: 687 - Pages: 3

Premium Essay

Europian Union

...European Union Structure/Law Gc exit Austerity Mesures : * Gov spending * Reduce pension * -Salaries * -benefits * +taxes Eurozone & EU two different things 1)Intergovernmentalism vs.2) Federalism 1)individual country cooperate 2)Centralize government 1)the government don’t lose the sovergnity(sovranita) Problem in EU * Eurozone 1. Grecs exit 2. how much power to give to ECB * Protectionism 1. Protect local Produces/businesses 2. State aid ITSOS German&France Do we allow Germany to rearm : Comunism expension Corea How does the EU work: Makes legislation/laws legilslative Enforces laws executive Interprets laws Judicial Treates primary sources EU law … .to create institution ….. European commercian / Europian parlament /Europian central bank …..secondary sources = regulation and directives Single market goals , officiency of four freedom , harmonization (2 class orange ) Epo/ohim Europena office patent(brevetto) Office Intelletual property IP Non tangible property –Invention of the mind Copyright Trademark Patent (news-useful-non dovrous Industrial design Irede secret Patent- A government granted time limited monopoly on an invention Iussed by governments 20 years term ( protection- exclusive use/monopoly right Of you disclosure / of what is disclosed in your patent Available to public file patent...

Words: 368 - Pages: 2

Free Essay

Business

...1 Unit 2 Individual Project By BUSN 150-1003B-04 2 Abstract This paper will explain and examine topics related to a court case with Bidders Edge and EBay. EBay is claiming that Bidders Edge was trespassing on their website by accessing their servers without permission to use EBay’s information on the Bidder’s Edge website for their customers. (IPfrontline, 2000). 3 There are many different forms of trespassing. Each state has different laws to prosecute trespassers to the fullest extent. A common element in all computer trespassing crimes is that the trespasser accessed the computer or computer systems without proper authorization. (Iprotect, 2004). Bidders Edge was trying to do something different that EBay’s regular costumers do by using their website to include EBay’s products to list on the Bidder Edge website for their customers to comparison shop for products. A regular EBay customer would go directly to the EBay website to search for a product that they were looking to place a bid on and purchase. (Clampet, 2000). EBay wanted to prevent Bidder’s Edge from gaining access to their products and their website because this would cause EBay’s servers to slow down and also said that Bidder’s Edge system fails to ensure that the information on their website is correct. (Wolverton, 2000). Trespassing can have many different definitions and meanings. The traditional definition of trespassing to personal property is to intrude or cause damage...

Words: 539 - Pages: 3

Free Essay

A Review of the Issues Surrounding Internet Censorship and Cross-National Information Conflict

...internet and by using filtering tools to prevent people from accessing materials that are considered to be inappropriate. While government support the use of internet censorship as a protection of public security and defines the ‘inappropriate material’ to determine what people can view on the internet, others argue that it is simply a tool to take away people from their own right to express freedom of speech and make people blindly accept what they can access on the internet. The paper also addresses the growing problem of cross-national conflict by giving the practice of multinational company Google and addressing the issues of the value system between Chinese and US government. The paper concludes that as the rapid growth of internet technology and international businesses, it has become more difficult to achieve both control of information and the benefits of technology, and there is a need for balance between these two factors.  Table of Contents Abstract I Table of Contents II 1. Introduction 1 2. The nature of internet development and censorship 2 2.1The history and nature of internet development 2 2.2 Methods of internet control 2 2.2.1 Internet filtering technology 3 2.2.2 Internet regulation 3 3. Different views on internet censorship 4 3.1 Public security vs. Political view 4 3.2 Cultural and religious view 5 4. Cross-national information conflict 5 4.1 The nature of cross-national conflict and problems 5 5. Conclusions 6 References 8 Appendix 9   ...

Words: 2688 - Pages: 11

Premium Essay

Pols 1336 Notes

...political values in general and the role of the government in particular * Ideology provides a framework for thinking about politics and policy preferences Ideologies * Modern liberalism is associated with ideas of liberty and political equality: * Tend to favor chance in social, political and economic realms to better protect individuals and produce equality What is the constitution? * Fundamental principles of a government and the basic structures and procedures Two US Constitutions * Articles of confederation ( 1781-1789) * Constitution of the united states (1789-present) Events leading up to the US constitution * By the 18th century, two-tier system of governance had evolved – local colonial assemblies vs Parliament in Britain * Britain’s involvement in the seven years’ war cost money that they tried to recoup from the colonies * Sugar act (1764) * Stamp act (1765) * Colonists responded with...

Words: 2355 - Pages: 10

Premium Essay

Personality & Values

...Personality & Values Organizational Behavior By: Rajitha Fernando Personality • The sum total of ways in which an individual reacts to and interacts with others • Most often described in terms of measurable traits that a person exhibits, such as shy, aggressive, submissive, lazy, ambitious, loyal and timid. (Personality traits) 2 Jungian Personality Theory • Swiss psychiatrist Carl Jung • Jung proposed four main functions of consciousness: 1. Two perceiving functions: Sensation and Intuition 2. Two judging functions: Thinking and Feeling 2 • Each of the functions are expressed primarily in either an introverted or extraverted form • From Jung's original concepts, Briggs and Myers developed their own theory of psychological type, described below, on which the MBTI is based. 3 Myers-Briggs Type Indicator (MBTI) The Myers-Briggs Type Indicator (MBTI) assessment is a psychometric questionnaire designed to measure psychological preferences in how people perceive the world and make decisions. Dichotomies Extraversion (E) – (I) Introversion Sensing (S) – (N) Intuition Thinking (T) – (F) Feeling Judging (J) – (P) Perception 4 Myers-Briggs Type Indicator (MBTI)  Extroversion versus introversion • Extroverted individuals are outgoing, sociable, and assertive. Introverts are quiet and shy  Sensing versus intuition • Sensing types are practical and prefer routine and order. They focus on details. Intuitives rely on unconscious processes and...

Words: 1229 - Pages: 5