Invasion Of Security Research Paper

1361 Words6 Pages
Invasion of Security 1 An Invasion of Security Richard Cuoco ENG 122 English Composition II Instructor: Marnie Nollette November 14, 2011 Invasion of Security 2 Within the last ten years there have been events throughout the world that have changed the face of not only America, but the entire world. Thousands of innocent lives have been lost in terrorist attacks on American soil and abroad. Federal, state, and local law enforcement agencies are now attempting to adopt broader and more invasive laws to counter the national security threat. Will the freedoms, liberties, and values of all Americans be compromised by these laws? This paper will discuss some actions that are being taken on the American…show more content…
The requirement for self security then boils down to one must feel subjectively secure while objectively being free from risk. The first approach in the ethical approaches towards security is the utilitarian approach. This approach can be defined as choosing the actions that have the most benefits with the least amount of harm on the people. For example, having increased surveillance of communications can reveal plans and have advanced warnings of terrorist intentions. The downside to this would be that possibly all communications will be monitored and fringes on invasion of privacy. Also used as a deterrent, higher security at airport checkpoints can hinder terrorist plans of calculated plans of attack using our nation’s airplanes. The problem here is now we have longer bag check and security checkpoint lines which causes people to become agitated and irritated that “the lines never…show more content…
When security is tightened the main focus may be set on a specific race, creed, ethnicity, or religion. This could also affect people who appear to be of a certain religion or race but may very well be American citizens. Again this type of security measure could bring to the surface a terror cell but in the process of uncovering these cells, whose rights of privacy have been squandered while the investigation was going on? The common-good approach is based on the thoughts, values and common good of the community. Through this approach the process of security is handled through a local agency using impartial measures regardless of race, creed, color, or religion. The benefit of this is that there could be specialized training in foiling a terror plot and all parties involved will know what to do and when it needs to be done. On the other side, everyone needs to be on the same page and long term investments will need to be made to elaborate on the existing structure or introduce a completely new structure that everyone will need to follow. This takes time which right now with the way these terror cells operate we do not have much of and money. The money aspect is by far the most argued point in this time of national financial crisis. Everyone is unwilling to part with their hard earned cash and I don’t

More about Invasion Of Security Research Paper

Open Document