SlideShare a Scribd company logo
Balancing National Security and Civil Liberties
U.S. policy makers have struggled to strike a balance between
national security and civil liberties long before September 11th.
However, the tragedy that occurred on 9/11 brought the debate
front and center. Prior to 9/11, government agencies accessed
individuals' private records. The FBI, citing national security
concerns, gained access to private records with a simple letter
requesting phone companies or banks for the account
information of any suspected individual.
Since 9/11, the rules regarding accessing information have been
further eased with national security at stake. With the
implementation of the USA Patriot Act, the U.S. government
can now request access to entire databases without explanation.
The overriding rationale is to give the government the ability to
investigate and search for terrorist suspects and thus prevent
future terrorist attacks. Today, national security agencies
actively compare the activities of millions with terrorist
profiling data from databases in its possession. Supporters of
the USA Patriot Act and similar legislation believe that actions
are justified to protect the lives of Americans. Critics argue that
these actions infringe too much on civil liberties.
To prepare for this Discussion:
Review Chapter 7 of your course text
Introduction to Homeland Security
. Reflect on the balance between security and freedom.
Review the article "National Security versus Civil Liberties."
Focus on how the U.S. government controls information post-
9/11. Also, examine the author's arguments concerning post-
9/11 restrictions on civil liberties, limited rights to due process,
and the issue of privacy and government surveillance.
Review Chapters 4 and 5 from the video "Spying on the Home
Front." Think about whether the use of private database
information is necessary to protect homeland security.
Reflect on your position on the proper balance between security
and civil liberties.
Think about what trade-offs you feel are acceptable and are not
acceptable to protect national security.
With these thoughts in mind:
Post by Day 4
your position on the proper balance between security and civil
liberties. Include an explanation of what trade-offs might be
involved. Justify your position and use specific examples.

More Related Content

More from AMMY30

After reviewing the Coleman (2016) article on executive compensation.docx
After reviewing the Coleman (2016) article on executive compensation.docxAfter reviewing the Coleman (2016) article on executive compensation.docx
After reviewing the Coleman (2016) article on executive compensation.docx
AMMY30
 
After reviewing the chapter on Recognizing Contributions, perform .docx
After reviewing the chapter on Recognizing Contributions, perform .docxAfter reviewing the chapter on Recognizing Contributions, perform .docx
After reviewing the chapter on Recognizing Contributions, perform .docx
AMMY30
 
After reviewing the chapter on Recognizing Contributions, perform a .docx
After reviewing the chapter on Recognizing Contributions, perform a .docxAfter reviewing the chapter on Recognizing Contributions, perform a .docx
After reviewing the chapter on Recognizing Contributions, perform a .docx
AMMY30
 
After reviewing the background materials and doing your own research.docx
After reviewing the background materials and doing your own research.docxAfter reviewing the background materials and doing your own research.docx
After reviewing the background materials and doing your own research.docx
AMMY30
 
After reviewing the articles and videos, please address the followin.docx
After reviewing the articles and videos, please address the followin.docxAfter reviewing the articles and videos, please address the followin.docx
After reviewing the articles and videos, please address the followin.docx
AMMY30
 
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
After reviewing Georgia v. Randolph and Fernandez v. Californi.docxAfter reviewing Georgia v. Randolph and Fernandez v. Californi.docx
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
AMMY30
 
After reviewing chapter 11 of the E-Text and the Required Resources .docx
After reviewing chapter 11 of the E-Text and the Required Resources .docxAfter reviewing chapter 11 of the E-Text and the Required Resources .docx
After reviewing chapter 11 of the E-Text and the Required Resources .docx
AMMY30
 
After reading Library ArticlesDevine, K., Kloppenborg, .docx
After reading Library ArticlesDevine, K., Kloppenborg, .docxAfter reading Library ArticlesDevine, K., Kloppenborg, .docx
After reading Library ArticlesDevine, K., Kloppenborg, .docx
AMMY30
 
After reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docxAfter reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docx
AMMY30
 
After reading through Chapter 1, the focus was on targeting the five.docx
After reading through Chapter 1, the focus was on targeting the five.docxAfter reading through Chapter 1, the focus was on targeting the five.docx
After reading through Chapter 1, the focus was on targeting the five.docx
AMMY30
 
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docxAfter reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
AMMY30
 
After reading the U.S. Constitution and the Amendments respond t.docx
After reading the U.S. Constitution and the Amendments respond t.docxAfter reading the U.S. Constitution and the Amendments respond t.docx
After reading the U.S. Constitution and the Amendments respond t.docx
AMMY30
 
After reading the two short primary source documents listed below, c.docx
After reading the two short primary source documents listed below, c.docxAfter reading the two short primary source documents listed below, c.docx
After reading the two short primary source documents listed below, c.docx
AMMY30
 
After reading the section titled Dominant Microprocessor Company In.docx
After reading the section titled Dominant Microprocessor Company In.docxAfter reading the section titled Dominant Microprocessor Company In.docx
After reading the section titled Dominant Microprocessor Company In.docx
AMMY30
 
After reading the section titled Dominant Microprocessor Compan.docx
After reading the section titled Dominant Microprocessor Compan.docxAfter reading the section titled Dominant Microprocessor Compan.docx
After reading the section titled Dominant Microprocessor Compan.docx
AMMY30
 
After reading the paper for this week, Steinfield C, LaRose R, C.docx
After reading the paper for this week, Steinfield C, LaRose R, C.docxAfter reading the paper for this week, Steinfield C, LaRose R, C.docx
After reading the paper for this week, Steinfield C, LaRose R, C.docx
AMMY30
 
After reading the Martin Luther King, Jr. speech in the attached lin.docx
After reading the Martin Luther King, Jr. speech in the attached lin.docxAfter reading the Martin Luther King, Jr. speech in the attached lin.docx
After reading the Martin Luther King, Jr. speech in the attached lin.docx
AMMY30
 
After reading the material from Shafer-Landau concerning the appeal .docx
After reading the material from Shafer-Landau concerning the appeal .docxAfter reading the material from Shafer-Landau concerning the appeal .docx
After reading the material from Shafer-Landau concerning the appeal .docx
AMMY30
 
After reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docxAfter reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docx
AMMY30
 
After reading the essay, Why Rational People Buy into Conspiracy Th.docx
After reading the essay, Why Rational People Buy into Conspiracy Th.docxAfter reading the essay, Why Rational People Buy into Conspiracy Th.docx
After reading the essay, Why Rational People Buy into Conspiracy Th.docx
AMMY30
 

More from AMMY30 (20)

After reviewing the Coleman (2016) article on executive compensation.docx
After reviewing the Coleman (2016) article on executive compensation.docxAfter reviewing the Coleman (2016) article on executive compensation.docx
After reviewing the Coleman (2016) article on executive compensation.docx
 
After reviewing the chapter on Recognizing Contributions, perform .docx
After reviewing the chapter on Recognizing Contributions, perform .docxAfter reviewing the chapter on Recognizing Contributions, perform .docx
After reviewing the chapter on Recognizing Contributions, perform .docx
 
After reviewing the chapter on Recognizing Contributions, perform a .docx
After reviewing the chapter on Recognizing Contributions, perform a .docxAfter reviewing the chapter on Recognizing Contributions, perform a .docx
After reviewing the chapter on Recognizing Contributions, perform a .docx
 
After reviewing the background materials and doing your own research.docx
After reviewing the background materials and doing your own research.docxAfter reviewing the background materials and doing your own research.docx
After reviewing the background materials and doing your own research.docx
 
After reviewing the articles and videos, please address the followin.docx
After reviewing the articles and videos, please address the followin.docxAfter reviewing the articles and videos, please address the followin.docx
After reviewing the articles and videos, please address the followin.docx
 
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
After reviewing Georgia v. Randolph and Fernandez v. Californi.docxAfter reviewing Georgia v. Randolph and Fernandez v. Californi.docx
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
 
After reviewing chapter 11 of the E-Text and the Required Resources .docx
After reviewing chapter 11 of the E-Text and the Required Resources .docxAfter reviewing chapter 11 of the E-Text and the Required Resources .docx
After reviewing chapter 11 of the E-Text and the Required Resources .docx
 
After reading Library ArticlesDevine, K., Kloppenborg, .docx
After reading Library ArticlesDevine, K., Kloppenborg, .docxAfter reading Library ArticlesDevine, K., Kloppenborg, .docx
After reading Library ArticlesDevine, K., Kloppenborg, .docx
 
After reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docxAfter reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docx
 
After reading through Chapter 1, the focus was on targeting the five.docx
After reading through Chapter 1, the focus was on targeting the five.docxAfter reading through Chapter 1, the focus was on targeting the five.docx
After reading through Chapter 1, the focus was on targeting the five.docx
 
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docxAfter reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
 
After reading the U.S. Constitution and the Amendments respond t.docx
After reading the U.S. Constitution and the Amendments respond t.docxAfter reading the U.S. Constitution and the Amendments respond t.docx
After reading the U.S. Constitution and the Amendments respond t.docx
 
After reading the two short primary source documents listed below, c.docx
After reading the two short primary source documents listed below, c.docxAfter reading the two short primary source documents listed below, c.docx
After reading the two short primary source documents listed below, c.docx
 
After reading the section titled Dominant Microprocessor Company In.docx
After reading the section titled Dominant Microprocessor Company In.docxAfter reading the section titled Dominant Microprocessor Company In.docx
After reading the section titled Dominant Microprocessor Company In.docx
 
After reading the section titled Dominant Microprocessor Compan.docx
After reading the section titled Dominant Microprocessor Compan.docxAfter reading the section titled Dominant Microprocessor Compan.docx
After reading the section titled Dominant Microprocessor Compan.docx
 
After reading the paper for this week, Steinfield C, LaRose R, C.docx
After reading the paper for this week, Steinfield C, LaRose R, C.docxAfter reading the paper for this week, Steinfield C, LaRose R, C.docx
After reading the paper for this week, Steinfield C, LaRose R, C.docx
 
After reading the Martin Luther King, Jr. speech in the attached lin.docx
After reading the Martin Luther King, Jr. speech in the attached lin.docxAfter reading the Martin Luther King, Jr. speech in the attached lin.docx
After reading the Martin Luther King, Jr. speech in the attached lin.docx
 
After reading the material from Shafer-Landau concerning the appeal .docx
After reading the material from Shafer-Landau concerning the appeal .docxAfter reading the material from Shafer-Landau concerning the appeal .docx
After reading the material from Shafer-Landau concerning the appeal .docx
 
After reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docxAfter reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docx
 
After reading the essay, Why Rational People Buy into Conspiracy Th.docx
After reading the essay, Why Rational People Buy into Conspiracy Th.docxAfter reading the essay, Why Rational People Buy into Conspiracy Th.docx
After reading the essay, Why Rational People Buy into Conspiracy Th.docx
 

Recently uploaded

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
dot55audits
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
spdendr
 

Recently uploaded (20)

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
 

Balancing National Security and Civil LibertiesU.S. policy m.docx

  • 1. Balancing National Security and Civil Liberties U.S. policy makers have struggled to strike a balance between national security and civil liberties long before September 11th. However, the tragedy that occurred on 9/11 brought the debate front and center. Prior to 9/11, government agencies accessed individuals' private records. The FBI, citing national security concerns, gained access to private records with a simple letter requesting phone companies or banks for the account information of any suspected individual. Since 9/11, the rules regarding accessing information have been further eased with national security at stake. With the implementation of the USA Patriot Act, the U.S. government can now request access to entire databases without explanation. The overriding rationale is to give the government the ability to investigate and search for terrorist suspects and thus prevent future terrorist attacks. Today, national security agencies actively compare the activities of millions with terrorist profiling data from databases in its possession. Supporters of the USA Patriot Act and similar legislation believe that actions are justified to protect the lives of Americans. Critics argue that these actions infringe too much on civil liberties. To prepare for this Discussion: Review Chapter 7 of your course text Introduction to Homeland Security . Reflect on the balance between security and freedom.
  • 2. Review the article "National Security versus Civil Liberties." Focus on how the U.S. government controls information post- 9/11. Also, examine the author's arguments concerning post- 9/11 restrictions on civil liberties, limited rights to due process, and the issue of privacy and government surveillance. Review Chapters 4 and 5 from the video "Spying on the Home Front." Think about whether the use of private database information is necessary to protect homeland security. Reflect on your position on the proper balance between security and civil liberties. Think about what trade-offs you feel are acceptable and are not acceptable to protect national security. With these thoughts in mind: Post by Day 4 your position on the proper balance between security and civil liberties. Include an explanation of what trade-offs might be involved. Justify your position and use specific examples.