SlideShare a Scribd company logo
1 of 1
Download to read offline
Summarize the article "Trading liberty for illusions" by Wendy Kaminer in 300 words by
following these steps: - the central idea of the passage - what, who, why, where, when and how -
the author's conclusion - the subject of the description and it's key feature(s)
Solution
The central idea of the article is about how the September 11 attacks have affected the civilian
population. In such circumstances, people are really scary and it is the responsibility of the
government to take all necessary precautions to secure its citizens. But the actions adhered to go
beyond the logical approach to safety by using several surveillance devices to track criminals or
abnormal behavior.
Kaminer accuses government of ignoring the civil liberties and the processes followed were
pointless and demonstrated its failures. She further adds that Americans have had to trade their
privacy with security, which means there is no privacy. The ways facial recognition was used
and abused, she says it constitutes a threat to security and liberty, not a promise of security.
The hard-core trained criminals fooled the intelligence surveillance system by suppressing their
emotions, behaviors, and facial expressions which proved the systems to be highly inefficient.
This leaves technology surveillance system a very controversial topic in the United States. She
goes on to say that the government is divided between using law as it was intended or breaking
law to meet special interest breaching security of the people it is supposed to protect. The
government should not exploit the gullibility of the citizens, for dissenters will start questioning
the credibility of the American philosophy.
What she concludes is that though technological advancement is geared up at improving security,
it should be relied upon as the most accurate measure against threat. The government need a
sober approach to security and privacy and should not rely upon the existing systems, laws, and
technology.
*****

More Related Content

Similar to Summarize the article Trading liberty for illusions by Wendy Kam.pdf

Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informatics
mali chum
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
elishaoatway
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
Eljay Robertson
 

Similar to Summarize the article Trading liberty for illusions by Wendy Kam.pdf (9)

80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informatics
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
The Medicare Bill
The Medicare BillThe Medicare Bill
The Medicare Bill
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 

More from michaelazach6427

Compare and contrast protein import into the ER and into the nucleus.pdf
Compare and contrast protein import into the ER and into the nucleus.pdfCompare and contrast protein import into the ER and into the nucleus.pdf
Compare and contrast protein import into the ER and into the nucleus.pdf
michaelazach6427
 
Ageism disproportionately affects women since they outlive me. T.pdf
Ageism disproportionately affects women since they outlive me. T.pdfAgeism disproportionately affects women since they outlive me. T.pdf
Ageism disproportionately affects women since they outlive me. T.pdf
michaelazach6427
 
Will th ebelow code work andif not please help me fix it. Basically .pdf
Will th ebelow code work andif not please help me fix it. Basically .pdfWill th ebelow code work andif not please help me fix it. Basically .pdf
Will th ebelow code work andif not please help me fix it. Basically .pdf
michaelazach6427
 
what is the transport process for a methane gas leakSolutionS.pdf
what is the transport process for a methane gas leakSolutionS.pdfwhat is the transport process for a methane gas leakSolutionS.pdf
what is the transport process for a methane gas leakSolutionS.pdf
michaelazach6427
 
what is a shared derived charterer and how is it useful for construc.pdf
what is a shared derived charterer and how is it useful for construc.pdfwhat is a shared derived charterer and how is it useful for construc.pdf
what is a shared derived charterer and how is it useful for construc.pdf
michaelazach6427
 

More from michaelazach6427 (20)

Compare and contrast protein import into the ER and into the nucleus.pdf
Compare and contrast protein import into the ER and into the nucleus.pdfCompare and contrast protein import into the ER and into the nucleus.pdf
Compare and contrast protein import into the ER and into the nucleus.pdf
 
Discuss some of the various ways MySQL allows you to explore a datab.pdf
Discuss some of the various ways MySQL allows you to explore a datab.pdfDiscuss some of the various ways MySQL allows you to explore a datab.pdf
Discuss some of the various ways MySQL allows you to explore a datab.pdf
 
Dimitri and Rita eat some donuts for breakfast and then spend the mo.pdf
Dimitri and Rita eat some donuts for breakfast and then spend the mo.pdfDimitri and Rita eat some donuts for breakfast and then spend the mo.pdf
Dimitri and Rita eat some donuts for breakfast and then spend the mo.pdf
 
detail the importance of cell culture to the field of virologySo.pdf
detail the importance of cell culture to the field of virologySo.pdfdetail the importance of cell culture to the field of virologySo.pdf
detail the importance of cell culture to the field of virologySo.pdf
 
Ageism disproportionately affects women since they outlive me. T.pdf
Ageism disproportionately affects women since they outlive me. T.pdfAgeism disproportionately affects women since they outlive me. T.pdf
Ageism disproportionately affects women since they outlive me. T.pdf
 
Could you please help me on this questionThe duty cycle of a conv.pdf
Could you please help me on this questionThe duty cycle of a conv.pdfCould you please help me on this questionThe duty cycle of a conv.pdf
Could you please help me on this questionThe duty cycle of a conv.pdf
 
A random sample of five observations from the first population resul.pdf
A random sample of five observations from the first population resul.pdfA random sample of five observations from the first population resul.pdf
A random sample of five observations from the first population resul.pdf
 
Biomembranes contain many different types of lipid molecules. What a.pdf
Biomembranes contain many different types of lipid molecules. What a.pdfBiomembranes contain many different types of lipid molecules. What a.pdf
Biomembranes contain many different types of lipid molecules. What a.pdf
 
2. The Lorenz curve measures inequality in person income distributio.pdf
2. The Lorenz curve measures inequality in person income distributio.pdf2. The Lorenz curve measures inequality in person income distributio.pdf
2. The Lorenz curve measures inequality in person income distributio.pdf
 
1.) In some forms of epigenetic modification, when a gene is “marked.pdf
1.) In some forms of epigenetic modification, when a gene is “marked.pdf1.) In some forms of epigenetic modification, when a gene is “marked.pdf
1.) In some forms of epigenetic modification, when a gene is “marked.pdf
 
Will th ebelow code work andif not please help me fix it. Basically .pdf
Will th ebelow code work andif not please help me fix it. Basically .pdfWill th ebelow code work andif not please help me fix it. Basically .pdf
Will th ebelow code work andif not please help me fix it. Basically .pdf
 
The visual system that a mountain biker would use to identify changes.pdf
The visual system that a mountain biker would use to identify changes.pdfThe visual system that a mountain biker would use to identify changes.pdf
The visual system that a mountain biker would use to identify changes.pdf
 
Which of the following is NOT a benefit of breathing through the nose.pdf
Which of the following is NOT a benefit of breathing through the nose.pdfWhich of the following is NOT a benefit of breathing through the nose.pdf
Which of the following is NOT a benefit of breathing through the nose.pdf
 
Which is not a secure MAC address learning for port securityA. St.pdf
Which is not a secure MAC address learning for port securityA. St.pdfWhich is not a secure MAC address learning for port securityA. St.pdf
Which is not a secure MAC address learning for port securityA. St.pdf
 
what is the transport process for a methane gas leakSolutionS.pdf
what is the transport process for a methane gas leakSolutionS.pdfwhat is the transport process for a methane gas leakSolutionS.pdf
what is the transport process for a methane gas leakSolutionS.pdf
 
what is a shared derived charterer and how is it useful for construc.pdf
what is a shared derived charterer and how is it useful for construc.pdfwhat is a shared derived charterer and how is it useful for construc.pdf
what is a shared derived charterer and how is it useful for construc.pdf
 
TF Unsaturated fatty acids have double or triple bonds creative kin.pdf
TF Unsaturated fatty acids have double or triple bonds creative kin.pdfTF Unsaturated fatty acids have double or triple bonds creative kin.pdf
TF Unsaturated fatty acids have double or triple bonds creative kin.pdf
 
samples, then compuie ine im samples, then cop me 9. Patient Waiting .pdf
samples, then compuie ine im samples, then cop me 9. Patient Waiting .pdfsamples, then compuie ine im samples, then cop me 9. Patient Waiting .pdf
samples, then compuie ine im samples, then cop me 9. Patient Waiting .pdf
 
The figure below shows two normal distributions. A and B. The distrib.pdf
The figure below shows two normal distributions. A and B. The distrib.pdfThe figure below shows two normal distributions. A and B. The distrib.pdf
The figure below shows two normal distributions. A and B. The distrib.pdf
 
Random signal analysis question (19). Not sure whether true or false.pdf
Random signal analysis question (19). Not sure whether true or false.pdfRandom signal analysis question (19). Not sure whether true or false.pdf
Random signal analysis question (19). Not sure whether true or false.pdf
 

Recently uploaded

Recently uploaded (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Summarize the article Trading liberty for illusions by Wendy Kam.pdf

  • 1. Summarize the article "Trading liberty for illusions" by Wendy Kaminer in 300 words by following these steps: - the central idea of the passage - what, who, why, where, when and how - the author's conclusion - the subject of the description and it's key feature(s) Solution The central idea of the article is about how the September 11 attacks have affected the civilian population. In such circumstances, people are really scary and it is the responsibility of the government to take all necessary precautions to secure its citizens. But the actions adhered to go beyond the logical approach to safety by using several surveillance devices to track criminals or abnormal behavior. Kaminer accuses government of ignoring the civil liberties and the processes followed were pointless and demonstrated its failures. She further adds that Americans have had to trade their privacy with security, which means there is no privacy. The ways facial recognition was used and abused, she says it constitutes a threat to security and liberty, not a promise of security. The hard-core trained criminals fooled the intelligence surveillance system by suppressing their emotions, behaviors, and facial expressions which proved the systems to be highly inefficient. This leaves technology surveillance system a very controversial topic in the United States. She goes on to say that the government is divided between using law as it was intended or breaking law to meet special interest breaching security of the people it is supposed to protect. The government should not exploit the gullibility of the citizens, for dissenters will start questioning the credibility of the American philosophy. What she concludes is that though technological advancement is geared up at improving security, it should be relied upon as the most accurate measure against threat. The government need a sober approach to security and privacy and should not rely upon the existing systems, laws, and technology. *****