SlideShare a Scribd company logo
1 of 4
Article Critique
This assignment provides you with an opportunity to read an
article and then to share your thoughts about the article by
critiquing the details, including the decisions made.In order to
access the resource below, you must first log into the myCSU
Student Portal and access the AcademicOneFile database within
the CSU Online Library.This article includes details and
assertions about the ethical choices/decisions made by Edward
J. Snowden, a formerNational Security Agency (NSA)
contractor. Here is the reference citation for the article:Securing
our liberty. (2013). Commonweal, 140(12), 5.After reading the
article, draft a two-page response by discussing the U.S.
government’s decision to acquire phone andinternet data
without disclosing its intentions to citizens. For this
assignment, consider the NSA as an organization (i.e.,business)
and Snowden as a manager. How have the decisions of this
event impacted the fairness of the U.S.government, its citizens,
and Snowden? How did ethics, perhaps, influence Snowden’s
decision to leak information? Inthis event, what is the greater
good and also the consequences/sacrifices of that greater good?
Based on the details ofthis event, what can we learn about
making important decisions as a leader and manager?This event
was covered by several news and media organizations, so there
should be plenty of articles in the library.Conduct a bit more
research in the online library related to this event involving
Edward Snowden and the U.S.government—see what else you
can discover about the event to determine an appropriate
punishment, if any, forSnowden’s conduct. Include at least one
additional source from the library in your response.The purpose
of this assignment is for you to think critically about managers
(and other leaders) making importantdecisions, and the process
managers use to make important decisions. Consider how
important it is to collect all of thefacts before making an
important decision, such as those involving fairness and
ethics.Use APA Style to format your response. Proofread your
work, and submit it in Blackboard for grading.Information about
accessing the Blackboard Grading Rubric for this assignment is
provided below.
Below is the article.
Edward J. Snowden, the thirty-year-old former National
Security Agency contractor who handed over a treasure trove of
classified documents about U.S. government surveillance to the
Washington Post and Britain's Guardian, is a hero to some and a
traitor to others. He claims to have acted out of a sense of
outrage over the NSA's indiscriminate collection of the phone
and internet records of Americans, decrying the danger such
intrusive government oversight poses to democracy and privacy.
Snowden subsequently fled to Hong Kong, and from there to
Moscow. His eventual destination appears to be Ecuador, Cuba,
or Venezuela.
Snowden's efforts to elude U.S. authorities cast an ambiguous
light on his motives; the countries where he has sought refuge
are not known for upholding the sort of democratic values he
claims to be defending. While demanding accountability from
the U.S. government, he appears to be seeking immunity for his
own actions. Snowden's purposes and fate, however, should be
of secondary concern. However misguided his actions may have
been, they have reopened a much-needed debate about the reach
and authority of what is often called the National Security
State. While defending the NSA programs, even President
Barack Obama seems to welcome that debate. "You can't have
100 percent security and also then have 100 percent privacy and
zero inconvenience," Obama noted when asked about Snowden's
leaks. "We're going to have to make some choices as a society.
... There are trade-offs involved."
Administration officials and members of Congress say the
government's extensive surveillance programs are crucial to
preventing terrorist attacks, and that Snowden has done real
damage to efforts to keep Americans safe. Because almost all
the relevant information remains classified, it is difficult to
assess that claim. NSA officials have now promised to make
public details of some of the dozens of terrorist plots they say
the massive data-collection effort, called Prism, has helped
thwart. That sort of disclosure is long overdue. Although Prism
was approved by the Foreign Intelligence Surveillance Act court
and is monitored by the intelligence committees of Congress,
many Americans were shocked to learn that the government now
stores their phone and internet records for possible use in future
investigations. While the government is prohibited from
listening to the tracked calls, it uses sophisticated algorithms to
trace calling patterns. If a series of related calls seems
suspicious, the NSA or FBI then gets a warrant from the FISA
court to investigate further. No abuse of those procedures has
come to light. Still, the mere existence of such records in the
government's hands, information that might easily be exploited
for political purposes, should concern every American.
It is axiomatic that fighting clandestine terrorist groups requires
clandestine methods. Sources and allies must be protected; in
preemptive actions the element of surprise must be preserved.
Secrets about ongoing investigations cannot be compromised
without jeopardizing counterterrorism efforts. It is harder to
justify keeping such details secret after the fact. Judgments
about the trade-offs between privacy and safety cannot be made
unless the American people know what the government has done
in our name. Even if everything the government does to combat
terrorism is technically legal, not everything legal is prudent,
wise, or morally justified.
As a nation, we rely on a system of checks and balances to
prevent an excessive concentration of state power. Those checks
and balances are strained to the breaking point during times of
war, and especially during a war as ill-defined and open-ended
as the fight against terrorism. Congress is notoriously
pusillanimous when it comes to national-security issues. The
courts, meanwhile, are loath to intervene, preferring to leave the
conduct of "war" to the other two branches. The executive
rarely passes up an opportunity to expand its war-making
powers. The result is the steady accumulation of influence by
the nation's security agencies. As political philosopher and
former Clinton administration official William A. Galston
recently observed, "It may be true that as currently staffed and
administered, the new institutions of surveillance do not
threaten our liberties. It is also true that in the wrong hands,
they would make it much easier to do so."
Devising checks and balances that will reduce that threat should
be a goal that unites all Americans. Given the complexity of the
issues, perhaps a first step would be to convene a truly credible
bipartisan study commission. Bring together representatives
from the legislative, executive, judicial, military, and security
branches, as well as members of the fourth estate. The
commission's mandate should be to inform the American people
about the hard choices we face. The trade-offs between liberty
and security should not remain a secret any longer.
June 25, 2013
Source Citation (MLA 7
th
Edition) "Securing our liberty."Commonweal140.12 (2013):
5.Academic OneFile. Web. 12 Nov. 2015. URL
http://go.galegroup.com/ps/i.do?id=GALE%7CA338120396&v=
2.1&u=oran95108&it=r&p=AONE&sw=w&asid=9e2cb301e1f5d
09dfad265ac7a1a5ddb

More Related Content

More from rosemaryralphs52525

attached assignment requirements as well as will attach below my not.docx
attached assignment requirements as well as will attach below my not.docxattached assignment requirements as well as will attach below my not.docx
attached assignment requirements as well as will attach below my not.docxrosemaryralphs52525
 
Attached below is the template on the research paper. You have to ch.docx
Attached below is the template on the research paper. You have to ch.docxAttached below is the template on the research paper. You have to ch.docx
Attached below is the template on the research paper. You have to ch.docxrosemaryralphs52525
 
Attributes of a Transformational Healthcare System - Collaborati.docx
Attributes of a Transformational Healthcare System - Collaborati.docxAttributes of a Transformational Healthcare System - Collaborati.docx
Attributes of a Transformational Healthcare System - Collaborati.docxrosemaryralphs52525
 
Audience PurposeThey [chickens] know nothing from the mome.docx
Audience PurposeThey [chickens] know nothing from the mome.docxAudience PurposeThey [chickens] know nothing from the mome.docx
Audience PurposeThey [chickens] know nothing from the mome.docxrosemaryralphs52525
 
Be sure to read the reading assignment in your text first!Read t.docx
Be sure to read the reading assignment in your text first!Read t.docxBe sure to read the reading assignment in your text first!Read t.docx
Be sure to read the reading assignment in your text first!Read t.docxrosemaryralphs52525
 
Be sure to write complete sentences, double space, set one-inch .docx
Be sure to write complete sentences, double space, set one-inch .docxBe sure to write complete sentences, double space, set one-inch .docx
Be sure to write complete sentences, double space, set one-inch .docxrosemaryralphs52525
 
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docx
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docxBC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docx
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docxrosemaryralphs52525
 
BCO127Applied Management Statistics Task br.docx
BCO127Applied Management Statistics                      Task br.docxBCO127Applied Management Statistics                      Task br.docx
BCO127Applied Management Statistics Task br.docxrosemaryralphs52525
 
BCOM - CarrCrisis Communication Project CarrThe Scenario.docx
BCOM - CarrCrisis Communication Project CarrThe Scenario.docxBCOM - CarrCrisis Communication Project CarrThe Scenario.docx
BCOM - CarrCrisis Communication Project CarrThe Scenario.docxrosemaryralphs52525
 
Battleground Medical Center is requiring that all Departments partic.docx
Battleground Medical Center is requiring that all Departments partic.docxBattleground Medical Center is requiring that all Departments partic.docx
Battleground Medical Center is requiring that all Departments partic.docxrosemaryralphs52525
 
Basic concept and system disorder assignment.This a research.docx
Basic concept and system disorder assignment.This a research.docxBasic concept and system disorder assignment.This a research.docx
Basic concept and system disorder assignment.This a research.docxrosemaryralphs52525
 
Based upon your research from this topic, propose a set of security .docx
Based upon your research from this topic, propose a set of security .docxBased upon your research from this topic, propose a set of security .docx
Based upon your research from this topic, propose a set of security .docxrosemaryralphs52525
 
BASIC SAMPLE COVER LETTER Your Street Address BLOCK SYLE-.docx
BASIC SAMPLE COVER LETTER  Your Street Address BLOCK SYLE-.docxBASIC SAMPLE COVER LETTER  Your Street Address BLOCK SYLE-.docx
BASIC SAMPLE COVER LETTER Your Street Address BLOCK SYLE-.docxrosemaryralphs52525
 
Basic Bookkeeping – Level 1 F I N A L E X A M V4.0 CU07.docx
Basic Bookkeeping – Level 1 F I N A L  E X A M V4.0 CU07.docxBasic Bookkeeping – Level 1 F I N A L  E X A M V4.0 CU07.docx
Basic Bookkeeping – Level 1 F I N A L E X A M V4.0 CU07.docxrosemaryralphs52525
 
Basically, answer any and all case questions you like. Format prefer.docx
Basically, answer any and all case questions you like. Format prefer.docxBasically, answer any and all case questions you like. Format prefer.docx
Basically, answer any and all case questions you like. Format prefer.docxrosemaryralphs52525
 
auto- attendant 800 wordsINTRO  Business phone system.docx
auto- attendant 800 wordsINTRO  Business phone system.docxauto- attendant 800 wordsINTRO  Business phone system.docx
auto- attendant 800 wordsINTRO  Business phone system.docxrosemaryralphs52525
 
Based on your research, what is negligent security300 Word Discus.docx
Based on your research, what is negligent security300 Word Discus.docxBased on your research, what is negligent security300 Word Discus.docx
Based on your research, what is negligent security300 Word Discus.docxrosemaryralphs52525
 
Autism spectrum DisorDersFoundations, CharaCteristiC.docx
Autism spectrum DisorDersFoundations, CharaCteristiC.docxAutism spectrum DisorDersFoundations, CharaCteristiC.docx
Autism spectrum DisorDersFoundations, CharaCteristiC.docxrosemaryralphs52525
 
Attached Files Personal data breaches and securing IoT device.docx
Attached Files Personal data breaches and securing IoT device.docxAttached Files Personal data breaches and securing IoT device.docx
Attached Files Personal data breaches and securing IoT device.docxrosemaryralphs52525
 
Attached FilesIT Governance at University of the SoutheastU.docx
Attached FilesIT Governance at University of the SoutheastU.docxAttached FilesIT Governance at University of the SoutheastU.docx
Attached FilesIT Governance at University of the SoutheastU.docxrosemaryralphs52525
 

More from rosemaryralphs52525 (20)

attached assignment requirements as well as will attach below my not.docx
attached assignment requirements as well as will attach below my not.docxattached assignment requirements as well as will attach below my not.docx
attached assignment requirements as well as will attach below my not.docx
 
Attached below is the template on the research paper. You have to ch.docx
Attached below is the template on the research paper. You have to ch.docxAttached below is the template on the research paper. You have to ch.docx
Attached below is the template on the research paper. You have to ch.docx
 
Attributes of a Transformational Healthcare System - Collaborati.docx
Attributes of a Transformational Healthcare System - Collaborati.docxAttributes of a Transformational Healthcare System - Collaborati.docx
Attributes of a Transformational Healthcare System - Collaborati.docx
 
Audience PurposeThey [chickens] know nothing from the mome.docx
Audience PurposeThey [chickens] know nothing from the mome.docxAudience PurposeThey [chickens] know nothing from the mome.docx
Audience PurposeThey [chickens] know nothing from the mome.docx
 
Be sure to read the reading assignment in your text first!Read t.docx
Be sure to read the reading assignment in your text first!Read t.docxBe sure to read the reading assignment in your text first!Read t.docx
Be sure to read the reading assignment in your text first!Read t.docx
 
Be sure to write complete sentences, double space, set one-inch .docx
Be sure to write complete sentences, double space, set one-inch .docxBe sure to write complete sentences, double space, set one-inch .docx
Be sure to write complete sentences, double space, set one-inch .docx
 
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docx
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docxBC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docx
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docx
 
BCO127Applied Management Statistics Task br.docx
BCO127Applied Management Statistics                      Task br.docxBCO127Applied Management Statistics                      Task br.docx
BCO127Applied Management Statistics Task br.docx
 
BCOM - CarrCrisis Communication Project CarrThe Scenario.docx
BCOM - CarrCrisis Communication Project CarrThe Scenario.docxBCOM - CarrCrisis Communication Project CarrThe Scenario.docx
BCOM - CarrCrisis Communication Project CarrThe Scenario.docx
 
Battleground Medical Center is requiring that all Departments partic.docx
Battleground Medical Center is requiring that all Departments partic.docxBattleground Medical Center is requiring that all Departments partic.docx
Battleground Medical Center is requiring that all Departments partic.docx
 
Basic concept and system disorder assignment.This a research.docx
Basic concept and system disorder assignment.This a research.docxBasic concept and system disorder assignment.This a research.docx
Basic concept and system disorder assignment.This a research.docx
 
Based upon your research from this topic, propose a set of security .docx
Based upon your research from this topic, propose a set of security .docxBased upon your research from this topic, propose a set of security .docx
Based upon your research from this topic, propose a set of security .docx
 
BASIC SAMPLE COVER LETTER Your Street Address BLOCK SYLE-.docx
BASIC SAMPLE COVER LETTER  Your Street Address BLOCK SYLE-.docxBASIC SAMPLE COVER LETTER  Your Street Address BLOCK SYLE-.docx
BASIC SAMPLE COVER LETTER Your Street Address BLOCK SYLE-.docx
 
Basic Bookkeeping – Level 1 F I N A L E X A M V4.0 CU07.docx
Basic Bookkeeping – Level 1 F I N A L  E X A M V4.0 CU07.docxBasic Bookkeeping – Level 1 F I N A L  E X A M V4.0 CU07.docx
Basic Bookkeeping – Level 1 F I N A L E X A M V4.0 CU07.docx
 
Basically, answer any and all case questions you like. Format prefer.docx
Basically, answer any and all case questions you like. Format prefer.docxBasically, answer any and all case questions you like. Format prefer.docx
Basically, answer any and all case questions you like. Format prefer.docx
 
auto- attendant 800 wordsINTRO  Business phone system.docx
auto- attendant 800 wordsINTRO  Business phone system.docxauto- attendant 800 wordsINTRO  Business phone system.docx
auto- attendant 800 wordsINTRO  Business phone system.docx
 
Based on your research, what is negligent security300 Word Discus.docx
Based on your research, what is negligent security300 Word Discus.docxBased on your research, what is negligent security300 Word Discus.docx
Based on your research, what is negligent security300 Word Discus.docx
 
Autism spectrum DisorDersFoundations, CharaCteristiC.docx
Autism spectrum DisorDersFoundations, CharaCteristiC.docxAutism spectrum DisorDersFoundations, CharaCteristiC.docx
Autism spectrum DisorDersFoundations, CharaCteristiC.docx
 
Attached Files Personal data breaches and securing IoT device.docx
Attached Files Personal data breaches and securing IoT device.docxAttached Files Personal data breaches and securing IoT device.docx
Attached Files Personal data breaches and securing IoT device.docx
 
Attached FilesIT Governance at University of the SoutheastU.docx
Attached FilesIT Governance at University of the SoutheastU.docxAttached FilesIT Governance at University of the SoutheastU.docx
Attached FilesIT Governance at University of the SoutheastU.docx
 

Recently uploaded

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Article CritiqueThis assignment provides you with an opportunity t.docx

  • 1. Article Critique This assignment provides you with an opportunity to read an article and then to share your thoughts about the article by critiquing the details, including the decisions made.In order to access the resource below, you must first log into the myCSU Student Portal and access the AcademicOneFile database within the CSU Online Library.This article includes details and assertions about the ethical choices/decisions made by Edward J. Snowden, a formerNational Security Agency (NSA) contractor. Here is the reference citation for the article:Securing our liberty. (2013). Commonweal, 140(12), 5.After reading the article, draft a two-page response by discussing the U.S. government’s decision to acquire phone andinternet data without disclosing its intentions to citizens. For this assignment, consider the NSA as an organization (i.e.,business) and Snowden as a manager. How have the decisions of this event impacted the fairness of the U.S.government, its citizens, and Snowden? How did ethics, perhaps, influence Snowden’s decision to leak information? Inthis event, what is the greater good and also the consequences/sacrifices of that greater good? Based on the details ofthis event, what can we learn about making important decisions as a leader and manager?This event was covered by several news and media organizations, so there should be plenty of articles in the library.Conduct a bit more research in the online library related to this event involving Edward Snowden and the U.S.government—see what else you can discover about the event to determine an appropriate punishment, if any, forSnowden’s conduct. Include at least one additional source from the library in your response.The purpose of this assignment is for you to think critically about managers (and other leaders) making importantdecisions, and the process managers use to make important decisions. Consider how important it is to collect all of thefacts before making an important decision, such as those involving fairness and ethics.Use APA Style to format your response. Proofread your
  • 2. work, and submit it in Blackboard for grading.Information about accessing the Blackboard Grading Rubric for this assignment is provided below. Below is the article. Edward J. Snowden, the thirty-year-old former National Security Agency contractor who handed over a treasure trove of classified documents about U.S. government surveillance to the Washington Post and Britain's Guardian, is a hero to some and a traitor to others. He claims to have acted out of a sense of outrage over the NSA's indiscriminate collection of the phone and internet records of Americans, decrying the danger such intrusive government oversight poses to democracy and privacy. Snowden subsequently fled to Hong Kong, and from there to Moscow. His eventual destination appears to be Ecuador, Cuba, or Venezuela. Snowden's efforts to elude U.S. authorities cast an ambiguous light on his motives; the countries where he has sought refuge are not known for upholding the sort of democratic values he claims to be defending. While demanding accountability from the U.S. government, he appears to be seeking immunity for his own actions. Snowden's purposes and fate, however, should be of secondary concern. However misguided his actions may have been, they have reopened a much-needed debate about the reach and authority of what is often called the National Security State. While defending the NSA programs, even President Barack Obama seems to welcome that debate. "You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," Obama noted when asked about Snowden's leaks. "We're going to have to make some choices as a society. ... There are trade-offs involved." Administration officials and members of Congress say the government's extensive surveillance programs are crucial to preventing terrorist attacks, and that Snowden has done real
  • 3. damage to efforts to keep Americans safe. Because almost all the relevant information remains classified, it is difficult to assess that claim. NSA officials have now promised to make public details of some of the dozens of terrorist plots they say the massive data-collection effort, called Prism, has helped thwart. That sort of disclosure is long overdue. Although Prism was approved by the Foreign Intelligence Surveillance Act court and is monitored by the intelligence committees of Congress, many Americans were shocked to learn that the government now stores their phone and internet records for possible use in future investigations. While the government is prohibited from listening to the tracked calls, it uses sophisticated algorithms to trace calling patterns. If a series of related calls seems suspicious, the NSA or FBI then gets a warrant from the FISA court to investigate further. No abuse of those procedures has come to light. Still, the mere existence of such records in the government's hands, information that might easily be exploited for political purposes, should concern every American. It is axiomatic that fighting clandestine terrorist groups requires clandestine methods. Sources and allies must be protected; in preemptive actions the element of surprise must be preserved. Secrets about ongoing investigations cannot be compromised without jeopardizing counterterrorism efforts. It is harder to justify keeping such details secret after the fact. Judgments about the trade-offs between privacy and safety cannot be made unless the American people know what the government has done in our name. Even if everything the government does to combat terrorism is technically legal, not everything legal is prudent, wise, or morally justified. As a nation, we rely on a system of checks and balances to prevent an excessive concentration of state power. Those checks and balances are strained to the breaking point during times of war, and especially during a war as ill-defined and open-ended as the fight against terrorism. Congress is notoriously pusillanimous when it comes to national-security issues. The courts, meanwhile, are loath to intervene, preferring to leave the
  • 4. conduct of "war" to the other two branches. The executive rarely passes up an opportunity to expand its war-making powers. The result is the steady accumulation of influence by the nation's security agencies. As political philosopher and former Clinton administration official William A. Galston recently observed, "It may be true that as currently staffed and administered, the new institutions of surveillance do not threaten our liberties. It is also true that in the wrong hands, they would make it much easier to do so." Devising checks and balances that will reduce that threat should be a goal that unites all Americans. Given the complexity of the issues, perhaps a first step would be to convene a truly credible bipartisan study commission. Bring together representatives from the legislative, executive, judicial, military, and security branches, as well as members of the fourth estate. The commission's mandate should be to inform the American people about the hard choices we face. The trade-offs between liberty and security should not remain a secret any longer. June 25, 2013 Source Citation (MLA 7 th Edition) "Securing our liberty."Commonweal140.12 (2013): 5.Academic OneFile. Web. 12 Nov. 2015. URL http://go.galegroup.com/ps/i.do?id=GALE%7CA338120396&v= 2.1&u=oran95108&it=r&p=AONE&sw=w&asid=9e2cb301e1f5d 09dfad265ac7a1a5ddb