SlideShare a Scribd company logo
Summarize the article "Trading liberty for illusions" by Wendy Kaminer in 300 words by
following these steps: - the central idea of the passage - what, who, why, where, when and how -
the author's conclusion - the subject of the description and it's key feature(s)
Solution
The central idea of the article is about how the September 11 attacks have affected the civilian
population. In such circumstances, people are really scary and it is the responsibility of the
government to take all necessary precautions to secure its citizens. But the actions adhered to go
beyond the logical approach to safety by using several surveillance devices to track criminals or
abnormal behavior.
Kaminer accuses government of ignoring the civil liberties and the processes followed were
pointless and demonstrated its failures. She further adds that Americans have had to trade their
privacy with security, which means there is no privacy. The ways facial recognition was used
and abused, she says it constitutes a threat to security and liberty, not a promise of security.
The hard-core trained criminals fooled the intelligence surveillance system by suppressing their
emotions, behaviors, and facial expressions which proved the systems to be highly inefficient.
This leaves technology surveillance system a very controversial topic in the United States. She
goes on to say that the government is divided between using law as it was intended or breaking
law to meet special interest breaching security of the people it is supposed to protect. The
government should not exploit the gullibility of the citizens, for dissenters will start questioning
the credibility of the American philosophy.
What she concludes is that though technological advancement is geared up at improving security,
it should be relied upon as the most accurate measure against threat. The government need a
sober approach to security and privacy and should not rely upon the existing systems, laws, and
technology.
*****

More Related Content

Similar to Summarize the article Trading liberty for illusions by Wendy Kam.pdf

80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
skimkiper
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informaticsmali chum
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
elishaoatway
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
The Medicare Bill
The Medicare BillThe Medicare Bill
The Medicare Bill
Tammy Moncrief
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
Jill Lyons
 

Similar to Summarize the article Trading liberty for illusions by Wendy Kam.pdf (9)

80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informatics
 
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docxEdward J. Snowden, the thirty-year-old former National Security Agen.docx
Edward J. Snowden, the thirty-year-old former National Security Agen.docx
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
The Medicare Bill
The Medicare BillThe Medicare Bill
The Medicare Bill
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 

More from michaelazach6427

Compare and contrast protein import into the ER and into the nucleus.pdf
Compare and contrast protein import into the ER and into the nucleus.pdfCompare and contrast protein import into the ER and into the nucleus.pdf
Compare and contrast protein import into the ER and into the nucleus.pdf
michaelazach6427
 
Discuss some of the various ways MySQL allows you to explore a datab.pdf
Discuss some of the various ways MySQL allows you to explore a datab.pdfDiscuss some of the various ways MySQL allows you to explore a datab.pdf
Discuss some of the various ways MySQL allows you to explore a datab.pdf
michaelazach6427
 
Dimitri and Rita eat some donuts for breakfast and then spend the mo.pdf
Dimitri and Rita eat some donuts for breakfast and then spend the mo.pdfDimitri and Rita eat some donuts for breakfast and then spend the mo.pdf
Dimitri and Rita eat some donuts for breakfast and then spend the mo.pdf
michaelazach6427
 
detail the importance of cell culture to the field of virologySo.pdf
detail the importance of cell culture to the field of virologySo.pdfdetail the importance of cell culture to the field of virologySo.pdf
detail the importance of cell culture to the field of virologySo.pdf
michaelazach6427
 
Ageism disproportionately affects women since they outlive me. T.pdf
Ageism disproportionately affects women since they outlive me. T.pdfAgeism disproportionately affects women since they outlive me. T.pdf
Ageism disproportionately affects women since they outlive me. T.pdf
michaelazach6427
 
Could you please help me on this questionThe duty cycle of a conv.pdf
Could you please help me on this questionThe duty cycle of a conv.pdfCould you please help me on this questionThe duty cycle of a conv.pdf
Could you please help me on this questionThe duty cycle of a conv.pdf
michaelazach6427
 
A random sample of five observations from the first population resul.pdf
A random sample of five observations from the first population resul.pdfA random sample of five observations from the first population resul.pdf
A random sample of five observations from the first population resul.pdf
michaelazach6427
 
Biomembranes contain many different types of lipid molecules. What a.pdf
Biomembranes contain many different types of lipid molecules. What a.pdfBiomembranes contain many different types of lipid molecules. What a.pdf
Biomembranes contain many different types of lipid molecules. What a.pdf
michaelazach6427
 
2. The Lorenz curve measures inequality in person income distributio.pdf
2. The Lorenz curve measures inequality in person income distributio.pdf2. The Lorenz curve measures inequality in person income distributio.pdf
2. The Lorenz curve measures inequality in person income distributio.pdf
michaelazach6427
 
1.) In some forms of epigenetic modification, when a gene is “marked.pdf
1.) In some forms of epigenetic modification, when a gene is “marked.pdf1.) In some forms of epigenetic modification, when a gene is “marked.pdf
1.) In some forms of epigenetic modification, when a gene is “marked.pdf
michaelazach6427
 
Will th ebelow code work andif not please help me fix it. Basically .pdf
Will th ebelow code work andif not please help me fix it. Basically .pdfWill th ebelow code work andif not please help me fix it. Basically .pdf
Will th ebelow code work andif not please help me fix it. Basically .pdf
michaelazach6427
 
The visual system that a mountain biker would use to identify changes.pdf
The visual system that a mountain biker would use to identify changes.pdfThe visual system that a mountain biker would use to identify changes.pdf
The visual system that a mountain biker would use to identify changes.pdf
michaelazach6427
 
Which of the following is NOT a benefit of breathing through the nose.pdf
Which of the following is NOT a benefit of breathing through the nose.pdfWhich of the following is NOT a benefit of breathing through the nose.pdf
Which of the following is NOT a benefit of breathing through the nose.pdf
michaelazach6427
 
Which is not a secure MAC address learning for port securityA. St.pdf
Which is not a secure MAC address learning for port securityA. St.pdfWhich is not a secure MAC address learning for port securityA. St.pdf
Which is not a secure MAC address learning for port securityA. St.pdf
michaelazach6427
 
what is the transport process for a methane gas leakSolutionS.pdf
what is the transport process for a methane gas leakSolutionS.pdfwhat is the transport process for a methane gas leakSolutionS.pdf
what is the transport process for a methane gas leakSolutionS.pdf
michaelazach6427
 
what is a shared derived charterer and how is it useful for construc.pdf
what is a shared derived charterer and how is it useful for construc.pdfwhat is a shared derived charterer and how is it useful for construc.pdf
what is a shared derived charterer and how is it useful for construc.pdf
michaelazach6427
 
TF Unsaturated fatty acids have double or triple bonds creative kin.pdf
TF Unsaturated fatty acids have double or triple bonds creative kin.pdfTF Unsaturated fatty acids have double or triple bonds creative kin.pdf
TF Unsaturated fatty acids have double or triple bonds creative kin.pdf
michaelazach6427
 
samples, then compuie ine im samples, then cop me 9. Patient Waiting .pdf
samples, then compuie ine im samples, then cop me 9. Patient Waiting .pdfsamples, then compuie ine im samples, then cop me 9. Patient Waiting .pdf
samples, then compuie ine im samples, then cop me 9. Patient Waiting .pdf
michaelazach6427
 
The figure below shows two normal distributions. A and B. The distrib.pdf
The figure below shows two normal distributions. A and B. The distrib.pdfThe figure below shows two normal distributions. A and B. The distrib.pdf
The figure below shows two normal distributions. A and B. The distrib.pdf
michaelazach6427
 
Random signal analysis question (19). Not sure whether true or false.pdf
Random signal analysis question (19). Not sure whether true or false.pdfRandom signal analysis question (19). Not sure whether true or false.pdf
Random signal analysis question (19). Not sure whether true or false.pdf
michaelazach6427
 

More from michaelazach6427 (20)

Compare and contrast protein import into the ER and into the nucleus.pdf
Compare and contrast protein import into the ER and into the nucleus.pdfCompare and contrast protein import into the ER and into the nucleus.pdf
Compare and contrast protein import into the ER and into the nucleus.pdf
 
Discuss some of the various ways MySQL allows you to explore a datab.pdf
Discuss some of the various ways MySQL allows you to explore a datab.pdfDiscuss some of the various ways MySQL allows you to explore a datab.pdf
Discuss some of the various ways MySQL allows you to explore a datab.pdf
 
Dimitri and Rita eat some donuts for breakfast and then spend the mo.pdf
Dimitri and Rita eat some donuts for breakfast and then spend the mo.pdfDimitri and Rita eat some donuts for breakfast and then spend the mo.pdf
Dimitri and Rita eat some donuts for breakfast and then spend the mo.pdf
 
detail the importance of cell culture to the field of virologySo.pdf
detail the importance of cell culture to the field of virologySo.pdfdetail the importance of cell culture to the field of virologySo.pdf
detail the importance of cell culture to the field of virologySo.pdf
 
Ageism disproportionately affects women since they outlive me. T.pdf
Ageism disproportionately affects women since they outlive me. T.pdfAgeism disproportionately affects women since they outlive me. T.pdf
Ageism disproportionately affects women since they outlive me. T.pdf
 
Could you please help me on this questionThe duty cycle of a conv.pdf
Could you please help me on this questionThe duty cycle of a conv.pdfCould you please help me on this questionThe duty cycle of a conv.pdf
Could you please help me on this questionThe duty cycle of a conv.pdf
 
A random sample of five observations from the first population resul.pdf
A random sample of five observations from the first population resul.pdfA random sample of five observations from the first population resul.pdf
A random sample of five observations from the first population resul.pdf
 
Biomembranes contain many different types of lipid molecules. What a.pdf
Biomembranes contain many different types of lipid molecules. What a.pdfBiomembranes contain many different types of lipid molecules. What a.pdf
Biomembranes contain many different types of lipid molecules. What a.pdf
 
2. The Lorenz curve measures inequality in person income distributio.pdf
2. The Lorenz curve measures inequality in person income distributio.pdf2. The Lorenz curve measures inequality in person income distributio.pdf
2. The Lorenz curve measures inequality in person income distributio.pdf
 
1.) In some forms of epigenetic modification, when a gene is “marked.pdf
1.) In some forms of epigenetic modification, when a gene is “marked.pdf1.) In some forms of epigenetic modification, when a gene is “marked.pdf
1.) In some forms of epigenetic modification, when a gene is “marked.pdf
 
Will th ebelow code work andif not please help me fix it. Basically .pdf
Will th ebelow code work andif not please help me fix it. Basically .pdfWill th ebelow code work andif not please help me fix it. Basically .pdf
Will th ebelow code work andif not please help me fix it. Basically .pdf
 
The visual system that a mountain biker would use to identify changes.pdf
The visual system that a mountain biker would use to identify changes.pdfThe visual system that a mountain biker would use to identify changes.pdf
The visual system that a mountain biker would use to identify changes.pdf
 
Which of the following is NOT a benefit of breathing through the nose.pdf
Which of the following is NOT a benefit of breathing through the nose.pdfWhich of the following is NOT a benefit of breathing through the nose.pdf
Which of the following is NOT a benefit of breathing through the nose.pdf
 
Which is not a secure MAC address learning for port securityA. St.pdf
Which is not a secure MAC address learning for port securityA. St.pdfWhich is not a secure MAC address learning for port securityA. St.pdf
Which is not a secure MAC address learning for port securityA. St.pdf
 
what is the transport process for a methane gas leakSolutionS.pdf
what is the transport process for a methane gas leakSolutionS.pdfwhat is the transport process for a methane gas leakSolutionS.pdf
what is the transport process for a methane gas leakSolutionS.pdf
 
what is a shared derived charterer and how is it useful for construc.pdf
what is a shared derived charterer and how is it useful for construc.pdfwhat is a shared derived charterer and how is it useful for construc.pdf
what is a shared derived charterer and how is it useful for construc.pdf
 
TF Unsaturated fatty acids have double or triple bonds creative kin.pdf
TF Unsaturated fatty acids have double or triple bonds creative kin.pdfTF Unsaturated fatty acids have double or triple bonds creative kin.pdf
TF Unsaturated fatty acids have double or triple bonds creative kin.pdf
 
samples, then compuie ine im samples, then cop me 9. Patient Waiting .pdf
samples, then compuie ine im samples, then cop me 9. Patient Waiting .pdfsamples, then compuie ine im samples, then cop me 9. Patient Waiting .pdf
samples, then compuie ine im samples, then cop me 9. Patient Waiting .pdf
 
The figure below shows two normal distributions. A and B. The distrib.pdf
The figure below shows two normal distributions. A and B. The distrib.pdfThe figure below shows two normal distributions. A and B. The distrib.pdf
The figure below shows two normal distributions. A and B. The distrib.pdf
 
Random signal analysis question (19). Not sure whether true or false.pdf
Random signal analysis question (19). Not sure whether true or false.pdfRandom signal analysis question (19). Not sure whether true or false.pdf
Random signal analysis question (19). Not sure whether true or false.pdf
 

Recently uploaded

Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Summarize the article Trading liberty for illusions by Wendy Kam.pdf

  • 1. Summarize the article "Trading liberty for illusions" by Wendy Kaminer in 300 words by following these steps: - the central idea of the passage - what, who, why, where, when and how - the author's conclusion - the subject of the description and it's key feature(s) Solution The central idea of the article is about how the September 11 attacks have affected the civilian population. In such circumstances, people are really scary and it is the responsibility of the government to take all necessary precautions to secure its citizens. But the actions adhered to go beyond the logical approach to safety by using several surveillance devices to track criminals or abnormal behavior. Kaminer accuses government of ignoring the civil liberties and the processes followed were pointless and demonstrated its failures. She further adds that Americans have had to trade their privacy with security, which means there is no privacy. The ways facial recognition was used and abused, she says it constitutes a threat to security and liberty, not a promise of security. The hard-core trained criminals fooled the intelligence surveillance system by suppressing their emotions, behaviors, and facial expressions which proved the systems to be highly inefficient. This leaves technology surveillance system a very controversial topic in the United States. She goes on to say that the government is divided between using law as it was intended or breaking law to meet special interest breaching security of the people it is supposed to protect. The government should not exploit the gullibility of the citizens, for dissenters will start questioning the credibility of the American philosophy. What she concludes is that though technological advancement is geared up at improving security, it should be relied upon as the most accurate measure against threat. The government need a sober approach to security and privacy and should not rely upon the existing systems, laws, and technology. *****