Thursday, September 26, 2019

Short Essay Example | Topics and Well Written Essays - 500 words - 3

Short - Essay Example This paper argues that insecurity can be fought without necessarily invading privacy. Following the recent leaks of the spying operations of the National Security Agency (NSA), it is evident that the government sees is traditionally rational to eavesdrop on almost all Americans’ communications for suspicious actions (Editorial Board, 2013). This breach shows that the security agency downplays the privacy rights of the citizens. Even though the society has become increasingly dependent on digital technologies, with most of the details being readily available online, the government has forcibly argued that security is one of its primary mandates. On the contrary, the fact that data gathered by the NSA is normally obtained without the consent of the originators raises some serious questions: why would security threats within the American population find the NSA activities as tactic threatening? Should individuals suspected of posing security threats to millions of innocent civilians enjoy immunity from eavesdropping? If yes, what should be the extent of their pri vacy? In light of these questions, one might think that the recent breaches of privacy would underscore the American society’s security scares as legitimizing their deliberate loss of own individual privacy (Editorial Board, 2013). If this is factual, it would imply that the citizens have become used to the notion of sacrificing their individual privacy in order to stay safe from terror activities. This is not the case, however. As such, the government forcefully argues that an individual who surrenders essential freedom would be safer. Regardless, Editorial Board (2013) said the likely loss of both privacy and security calls for a proper way to balance the two fundamental issues. Instead of gathering personal data on virtually all American citizens, the security agencies need to concentrate on real threats to

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.