On September 11, 2001 the world came to a stand still as a terroristic attack targeting our country killed 2,977 people. As fear ran high in every American house hold, the government quickly acted and on October 26 President George W. Bush passed the USA PATRIOT Act. The full title, "Uniting and Strenghtening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act", suggest how the government quickly acted in response to the new threat that we were experianceing. Although some may argue that it violates our civil liberties, the Patriot Act serves as an asset to help protect U.S. citizens by stopping terrorist attacks, giving the law enforcement tools to make investigations easier, and increases national security. What the Patriot Act does is it provides us with a tool to strengthen the ability that the government has to stop terrorist attacks from happening on U.S. soil.
It evolve over time and President George W. Bush’s "Terrorist Surveillance Program" had created PRISM. This program gave NSA access to “Big Data” like phone’s metadata and data that are sent over the internet (Gellman B and Poitras L). This issue became aware to the public at June 6th, 2013, when Edward Snowden revealed to the items to The Guardian.
“The Real” written by Eyre to inform readers of the real ID act and other surveillance laws based on the US Government. He talks about the surveillance that is emplaced today, and how privacy is a right. He also explains how the theory of surveillance came into effect. It helps me by giving the important laws that have been passed. The book informs the reader with actual dates the laws of surveillance, security, and privacy were passed.
After the gruesome attacks of 9/11, the United States government passed a legislation called the Patriot Act in attempt to cut down on the terror attacks. This act gives the NSA, or National Security Agency, the ability to oversee our actions. The NSA’s approach to surveilling the population is obtaining the information by tapping into technology, such as phone calls, internet pages and searches, and viewing emails and texts. Thus, controversy has triggered due to the fact that these actions are unconstitutional, and much terrorism that remains. The NSA should be greatly altered because they invade the privacy of Americans, unlawfully goes against the constitution, and we lose our rights.
From Orwell’s novel, “1984”, it can be determined that his opinion on the most powerful means of control by the government would be the government’s use of fear to instill paranoia among the people. One powerful piece of corroboration for fear to paranoia would be Oceania’s obvious, and constant, use of technology to fulfill this goal. Take, for instance, the telescreens. Because of their existence in every buildings’ rooms and corners, they can be easily used to keep an eye on party members, and if need be, used to track their location and arrest them. Winston experiences the surveillance inflicted by the government during one of his daily workouts,as right when he stopped trying in order to ponder the conspiracies surrounding the party,
This weekend I am engaged in extensive sessions with members of my National Security Council, as we plan a comprehensive assault on terrorism” Whitehouse.gov (2001) Here, the Former President has associated the attackers with “terrorism” and has explained that the National Security Team is planning a comprehensive assault on terrorism. Again, security is the primary issue, and it is the first topic of the speech. Further into the speech, in his words, “In Washington D.C. the political parties and both houses of Congress have shown a terrorist attack designed to tear us apart has instead bound us together as a nation” Again, unity is the key to the nation being safe from terrorists. Whereby, Former President Bush associates disunity with the goal of terrorist attack. To not be unified is to play into the terrorists hands.
During Orwell’s time, both communism and totalitarianism were on the rise. Many critics have “hailed it (the novel) as an attack on a specific political system: Stalinist communism” (“Critical Reception” 12). In this sense, Big Brother was modeled after Stalin with aspects of Adolf Hitler to highlight the horrors that would await America should the amount of control allocated to the government continue to increase. As seen in 1984, the Party used telescreens to conduct constant surveillance. “The telescreens received and transmitted simultaneously…so long as he remained within the field of vision…he could be seen as well as heard” (Orwell 3).
He continues to support his point of view by saying “Immediately following the first attack, I implemented our government’s emergency response plans.” In the second part of the speech President Bush uses Pathos in the quote “I have directed the full resources of our intelligence and law enforcement communities to find those responsible and to bring them to justice. We will make no distinction between the terrorist who committed the act and those who harbored them.” The quote uses pathos because it makes the audience feel angry and makes them want to personally help find who attack the Twin Towers. The only fallacy that the President uses in this part of the speech is appeal to authority. President Bush uses appeal to authority when he says “Our military is powerful, and it’s prepared.” The Fallacies in the second part of the speech did help to persuade the audience because they showed the audience that the United States Government would defend what happened to them on that
During his presidency and after the attacks of 9/11, Bush declared war on terrorism in the form of global containment to a global threat. (Bergen L. Peter, “September 11 Attacks). With this action, Bush has effectively created a political platform and government focus that continues and will continue today on wiping out terrorism, more specifically terrorism in the Middle East. This also pressures other foreign nations as a moral obligation to help the U.S. contain such a threat. Another aspect of war that was influenced is the war readiness being a factor in creating war (Ehrenreich, 598).
The focus of this department was in place to ensure our country’s border security, provide information about terrorist threats and put security measures in place to protect the American public, the government as well as public transportation facilities. Homeland security personnel have been entrusted with training our law enforcement officers to recognize suspicious activity and behavior and investigate threats and respond accordingly. With Homeland Security now in place the Department of Justice felt the need to merge numerous government agencies together. The immigration and Naturalization Service and the U.S. Customs Service were consolidated to the newly formed ICE: Immigration and Customs Enforcement agency. ICE is responsible for enforcing our immigration laws and policies as well as streamlining the deportation process for those who engage in criminal activity and break the
Let’s look at what happen post 9/11. After it’s devastation, the Department of Homeland Security was created to assist in fighting the “war” against terrorism. The DHS implemented many “strategies” to help fight this war, including increasing airport security. American parents protested that TSA agents were groping their kids, and “(Janet) Napolitano (former DHS Secretary) defiantly retorted that if people did not want their children groped, they should yield and use the unpopular full-body machines – the machines being sold by her predecessor, (Michael) Chertoff” (Turley, 3). These full body scanners, which Chertoff had a hand in getting into the airports, were “heavily criticized (and little tested)”, and were sold by a company which was a client of Chertoff’s consulting agency (Turley, 3).
They will want to plug any security holes, continue to patch the systems, and research new exploits. Metasploit’s exploit modules allow for privilege escalation (obtaining root or admin access) and SMB related attacks. For example, when testing client-side exploits at the Police Department, the exploits may fail due to their having limited user rights, requiring a tweak to the exploit module or payload. Another key feature of Metasploit is its meterpreter script, ‘getsystem‘, that will use a number of different techniques to attempt to gain SYSTEM level privileges on the target. This will assist the Police Department in closing privilege escalation attacks, which appear to have occurred in the
The attacks of the World Trade Centers and the Pentagon on September 11th resulted in the legislative response of the Patriot Act. The USA Patriot Act signed into law by both congress and George W. Bush on October 26, 2001, exactly a month and fifteen days after the terrorist attack. Solemnly, the Patriot Act was altered to strengthen U.S.measure to deter and punish terrorist acts against the United States. The Patriot Act was intended to "enhance the penalties that will fall on terrorists or anyone who helps them," the words of George W. Bush. I believe the intents of
Accompanying, Republican congressmen believe birthright citizenship is the link to terrorism. The groups are sending pregnant operatives to America so the offspring will have access to America. These children will serve as Sleeper Agents (Penalver). A Sleeper Agent is a spy that specifically targets another country and help the operative
Officials checked the immigration status of many people. Moreover, President George W. Bush created the Patriot Act which expanded the government’s surveillance powers of phone messages and emails. As a result, many Americans were troubled by the unlimited wiretaps and the collection of phone records. Overall, these federal organizations brought a sense of security and increased the power of the