SlideShare a Scribd company logo
1 of 1
Electronic surveillance has become a controversial practice in
the United States and elsewhere. The fear is that civil liberties
can be jeopardized by unregulated interception of telephone
conversations, e-mail, and fax transmissions. Detractors argue
that government use of these technologies can conceivably
move well beyond legitimate application against threats from
crime, espionage, and terrorism. Absent strict protocols to rein
in these technologies, a worst-case scenario envisions state
intrusions into the everyday activities of innocent civilians.
Should this happen, critics foresee a time when privacy, liberty,
and personal security become values of the past.
1. Is it sometimes necessary to sacrifice a few freedoms to
protect national security and to ensure the long-term viability of
civil liberty?'
2. How should new technologies be regulated? Can they be
regulated?
3. How serious is the threat from abuses in the use of new
technologies?

More Related Content

Similar to Electronic surveillance has become a controversial practice in the U.docx

Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxphilipnelson29183
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethicssyed ahmed
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docxbriancrawford30935
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.pptHODCSEKncet
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for LegislatorsKristin Judge
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 

Similar to Electronic surveillance has become a controversial practice in the U.docx (20)

Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
Stalking2
Stalking2Stalking2
Stalking2
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 

More from shandicollingwood

This is the second part of Margaret SangerSignificant Contribution.docx
This is the second part of Margaret SangerSignificant Contribution.docxThis is the second part of Margaret SangerSignificant Contribution.docx
This is the second part of Margaret SangerSignificant Contribution.docxshandicollingwood
 
this is the scenariothis is a discussion I need a paragraph under .docx
this is the scenariothis is a discussion I need a paragraph under .docxthis is the scenariothis is a discussion I need a paragraph under .docx
this is the scenariothis is a discussion I need a paragraph under .docxshandicollingwood
 
this is the scenaro this is a discussion not a paperHSA515 Wee.docx
this is the scenaro this is a discussion not a paperHSA515 Wee.docxthis is the scenaro this is a discussion not a paperHSA515 Wee.docx
this is the scenaro this is a discussion not a paperHSA515 Wee.docxshandicollingwood
 
This is the questionNavigate through the official website for .docx
This is the questionNavigate through the official website for .docxThis is the questionNavigate through the official website for .docx
This is the questionNavigate through the official website for .docxshandicollingwood
 
This is the scenarioHSA515 Week 1 Scenario Script Health Care.docx
This is the scenarioHSA515 Week 1 Scenario Script Health Care.docxThis is the scenarioHSA515 Week 1 Scenario Script Health Care.docx
This is the scenarioHSA515 Week 1 Scenario Script Health Care.docxshandicollingwood
 
This is the reading and the chart that has to be completed is includ.docx
This is the reading and the chart that has to be completed is includ.docxThis is the reading and the chart that has to be completed is includ.docx
This is the reading and the chart that has to be completed is includ.docxshandicollingwood
 
This is the question. Please can you use APA format. I need refere.docx
This is the question. Please can you use APA format. I need refere.docxThis is the question. Please can you use APA format. I need refere.docx
This is the question. Please can you use APA format. I need refere.docxshandicollingwood
 
this is the lecture that goes with the discussionHSA525 Week 4.docx
this is the lecture that goes with the discussionHSA525 Week 4.docxthis is the lecture that goes with the discussionHSA525 Week 4.docx
this is the lecture that goes with the discussionHSA525 Week 4.docxshandicollingwood
 
This is the last part of your course project. There are two parts to.docx
This is the last part of your course project. There are two parts to.docxThis is the last part of your course project. There are two parts to.docx
This is the last part of your course project. There are two parts to.docxshandicollingwood
 
This course is Diversity, not HRMUtilizing the resources from th.docx
This course is Diversity, not HRMUtilizing the resources from th.docxThis course is Diversity, not HRMUtilizing the resources from th.docx
This course is Diversity, not HRMUtilizing the resources from th.docxshandicollingwood
 
This course introduces themes in literature and provides guided stud.docx
This course introduces themes in literature and provides guided stud.docxThis course introduces themes in literature and provides guided stud.docx
This course introduces themes in literature and provides guided stud.docxshandicollingwood
 
This assingment is due Monday May 9th, 2016, at 1130 A.M. Pacific T.docx
This assingment is due Monday May 9th, 2016, at 1130 A.M. Pacific T.docxThis assingment is due Monday May 9th, 2016, at 1130 A.M. Pacific T.docx
This assingment is due Monday May 9th, 2016, at 1130 A.M. Pacific T.docxshandicollingwood
 
This assignments contains 4 small assignments1.In this discussion .docx
This assignments contains 4 small assignments1.In this discussion .docxThis assignments contains 4 small assignments1.In this discussion .docx
This assignments contains 4 small assignments1.In this discussion .docxshandicollingwood
 
this assignment, you will review your current level of adjustment..docx
this assignment, you will review your current level of adjustment..docxthis assignment, you will review your current level of adjustment..docx
this assignment, you will review your current level of adjustment..docxshandicollingwood
 
This assignment requires you to examine your cultural values about d.docx
This assignment requires you to examine your cultural values about d.docxThis assignment requires you to examine your cultural values about d.docx
This assignment requires you to examine your cultural values about d.docxshandicollingwood
 
This assignment should include the outline of PERSUASIVE SPEECH.docx
This assignment should include the outline of PERSUASIVE SPEECH.docxThis assignment should include the outline of PERSUASIVE SPEECH.docx
This assignment should include the outline of PERSUASIVE SPEECH.docxshandicollingwood
 
This assignment should include the following partsØIntroducti.docx
This assignment should include the following partsØIntroducti.docxThis assignment should include the following partsØIntroducti.docx
This assignment should include the following partsØIntroducti.docxshandicollingwood
 
This assignment requires that your format a fake manuscript into APA.docx
This assignment requires that your format a fake manuscript into APA.docxThis assignment requires that your format a fake manuscript into APA.docx
This assignment requires that your format a fake manuscript into APA.docxshandicollingwood
 
This Assignment must be original, no plagerism,Examine the ways .docx
This Assignment must be original, no plagerism,Examine the ways .docxThis Assignment must be original, no plagerism,Examine the ways .docx
This Assignment must be original, no plagerism,Examine the ways .docxshandicollingwood
 
This assignment must be completed by 09052016 at 8PM Pacific Stand.docx
This assignment must be completed by 09052016 at 8PM Pacific Stand.docxThis assignment must be completed by 09052016 at 8PM Pacific Stand.docx
This assignment must be completed by 09052016 at 8PM Pacific Stand.docxshandicollingwood
 

More from shandicollingwood (20)

This is the second part of Margaret SangerSignificant Contribution.docx
This is the second part of Margaret SangerSignificant Contribution.docxThis is the second part of Margaret SangerSignificant Contribution.docx
This is the second part of Margaret SangerSignificant Contribution.docx
 
this is the scenariothis is a discussion I need a paragraph under .docx
this is the scenariothis is a discussion I need a paragraph under .docxthis is the scenariothis is a discussion I need a paragraph under .docx
this is the scenariothis is a discussion I need a paragraph under .docx
 
this is the scenaro this is a discussion not a paperHSA515 Wee.docx
this is the scenaro this is a discussion not a paperHSA515 Wee.docxthis is the scenaro this is a discussion not a paperHSA515 Wee.docx
this is the scenaro this is a discussion not a paperHSA515 Wee.docx
 
This is the questionNavigate through the official website for .docx
This is the questionNavigate through the official website for .docxThis is the questionNavigate through the official website for .docx
This is the questionNavigate through the official website for .docx
 
This is the scenarioHSA515 Week 1 Scenario Script Health Care.docx
This is the scenarioHSA515 Week 1 Scenario Script Health Care.docxThis is the scenarioHSA515 Week 1 Scenario Script Health Care.docx
This is the scenarioHSA515 Week 1 Scenario Script Health Care.docx
 
This is the reading and the chart that has to be completed is includ.docx
This is the reading and the chart that has to be completed is includ.docxThis is the reading and the chart that has to be completed is includ.docx
This is the reading and the chart that has to be completed is includ.docx
 
This is the question. Please can you use APA format. I need refere.docx
This is the question. Please can you use APA format. I need refere.docxThis is the question. Please can you use APA format. I need refere.docx
This is the question. Please can you use APA format. I need refere.docx
 
this is the lecture that goes with the discussionHSA525 Week 4.docx
this is the lecture that goes with the discussionHSA525 Week 4.docxthis is the lecture that goes with the discussionHSA525 Week 4.docx
this is the lecture that goes with the discussionHSA525 Week 4.docx
 
This is the last part of your course project. There are two parts to.docx
This is the last part of your course project. There are two parts to.docxThis is the last part of your course project. There are two parts to.docx
This is the last part of your course project. There are two parts to.docx
 
This course is Diversity, not HRMUtilizing the resources from th.docx
This course is Diversity, not HRMUtilizing the resources from th.docxThis course is Diversity, not HRMUtilizing the resources from th.docx
This course is Diversity, not HRMUtilizing the resources from th.docx
 
This course introduces themes in literature and provides guided stud.docx
This course introduces themes in literature and provides guided stud.docxThis course introduces themes in literature and provides guided stud.docx
This course introduces themes in literature and provides guided stud.docx
 
This assingment is due Monday May 9th, 2016, at 1130 A.M. Pacific T.docx
This assingment is due Monday May 9th, 2016, at 1130 A.M. Pacific T.docxThis assingment is due Monday May 9th, 2016, at 1130 A.M. Pacific T.docx
This assingment is due Monday May 9th, 2016, at 1130 A.M. Pacific T.docx
 
This assignments contains 4 small assignments1.In this discussion .docx
This assignments contains 4 small assignments1.In this discussion .docxThis assignments contains 4 small assignments1.In this discussion .docx
This assignments contains 4 small assignments1.In this discussion .docx
 
this assignment, you will review your current level of adjustment..docx
this assignment, you will review your current level of adjustment..docxthis assignment, you will review your current level of adjustment..docx
this assignment, you will review your current level of adjustment..docx
 
This assignment requires you to examine your cultural values about d.docx
This assignment requires you to examine your cultural values about d.docxThis assignment requires you to examine your cultural values about d.docx
This assignment requires you to examine your cultural values about d.docx
 
This assignment should include the outline of PERSUASIVE SPEECH.docx
This assignment should include the outline of PERSUASIVE SPEECH.docxThis assignment should include the outline of PERSUASIVE SPEECH.docx
This assignment should include the outline of PERSUASIVE SPEECH.docx
 
This assignment should include the following partsØIntroducti.docx
This assignment should include the following partsØIntroducti.docxThis assignment should include the following partsØIntroducti.docx
This assignment should include the following partsØIntroducti.docx
 
This assignment requires that your format a fake manuscript into APA.docx
This assignment requires that your format a fake manuscript into APA.docxThis assignment requires that your format a fake manuscript into APA.docx
This assignment requires that your format a fake manuscript into APA.docx
 
This Assignment must be original, no plagerism,Examine the ways .docx
This Assignment must be original, no plagerism,Examine the ways .docxThis Assignment must be original, no plagerism,Examine the ways .docx
This Assignment must be original, no plagerism,Examine the ways .docx
 
This assignment must be completed by 09052016 at 8PM Pacific Stand.docx
This assignment must be completed by 09052016 at 8PM Pacific Stand.docxThis assignment must be completed by 09052016 at 8PM Pacific Stand.docx
This assignment must be completed by 09052016 at 8PM Pacific Stand.docx
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Electronic surveillance has become a controversial practice in the U.docx

  • 1. Electronic surveillance has become a controversial practice in the United States and elsewhere. The fear is that civil liberties can be jeopardized by unregulated interception of telephone conversations, e-mail, and fax transmissions. Detractors argue that government use of these technologies can conceivably move well beyond legitimate application against threats from crime, espionage, and terrorism. Absent strict protocols to rein in these technologies, a worst-case scenario envisions state intrusions into the everyday activities of innocent civilians. Should this happen, critics foresee a time when privacy, liberty, and personal security become values of the past. 1. Is it sometimes necessary to sacrifice a few freedoms to protect national security and to ensure the long-term viability of civil liberty?' 2. How should new technologies be regulated? Can they be regulated? 3. How serious is the threat from abuses in the use of new technologies?