Last Updated 11 Feb 2020

Human Rights, Terrorism and Counter-Terrorism

Words 415 (1 page)
8 views

When it comes to protecting and saving lives of the American people, private invasion used in order to locate and capture potential terrorist should be unlimited.

The 911 attack has provided active proof to the American peoples of the damage that terrorist groups can impose on our society. Therefore, invading the privacy of individuals may prevent future terrorist attacks. Better technology and training to detect terrorist are important steps to reduce terrorist attacks.To achieve this objective, government must authorize national and local leaders to design programs, training, and funding. Thus, high priority should be given to developing programs to detect and prevent intended attacks before they occur. In this report, the Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals examines behavioral surveillance technologies in Counterterrorism programs and make decisions about deploying and evaluating those and other information programs of their effectiveness and risk to personal privacy.Modern data collection and analysis techniques have had remarkable success in solving information-related problems in the commercial sector; for example, they have been successful used to detect consumer fraud.

Highly automated tools and techniques can not be easily used to detecting and seizing a terrorist attack. Well managed tools, such as counterterrorism program are likely to return significant rates of false positives, because the law abiding citizens and businesses, false positives can result in privacy invasion.The government agencies and private-sector corporations detect the activity of terrorist groups through their communications, transaction, and behaviors. Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, ends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist attacks.

Order custom essay Human Rights, Terrorism and Counter-Terrorism with free plagiarism report

GET ORIGINAL PAPER

In my conclusion, the United States government should periodically review the nation laws, policies, and procedures that protect individuals’ private information for relevance and effectiveness in light of changing technologies and circumstances. Congress should reexamine existing law to consider how privacy should be protected in context of information based program for counterterrorism. Reference U. S. Congressional Research Service, Privacy: Total Information Awareness Programs and Related Information Access, Collection, and Protection Laws (RL31730)

Human Rights, Terrorism and Counter-Terrorism essay

This essay was written by a fellow student. You can use it as an example when writing your own essay or use it as a source, but you need cite it.

Get professional help and free up your time for more important courses

Starting from 3 hours delivery 450+ experts on 30 subjects
get essay help 124  experts online

Did you know that we have over 70,000 essays on 3,000 topics in our database?

Cite this page

Explore how the human body functions as one unit in harmony in order to life

Don't let plagiarism ruin your grade

Run a free check or have your essay done for you

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Save time and let our verified experts help you.

Hire writer