Government, Technology, and Society in the Post-9/11 World “The policy

 

Government, Technology, and Society in the Post-9/11 World

 “The policy of American government is to leave its citizens free, neither restraining them nor aiding them in their pursuits.”

— Thomas Jefferson

Among the many objects to which a wise and free people find it necessary to direct their attention, that of providing for their safety seems to be the first.”

— John Jay

The Preamble to the U.S. Constitution reads:

We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defense, promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this Constitution for the United States of America.

The two words “domestic Tranquility” are important, as the framers wanted to prevent a repetition of the social upheaval during the last years under the Articles of Confederation. The new Constitution would ensure that the federal government had the authority to squelch disorder, thus keeping the nation secure. Yet, tension between the desire for “domestic Tranquility” and safeguarding the civil liberties of the people began shortly after the Constitution was ratified. 

Due to the voluminous criticism regarding America’s undeclared war with France in 1798, the Adams administration compelled the U.S. Congress to pass the Alien and Sedition Acts. The legislation declared that anyone making or publishing “false, scandalous and malicious” declarations about the government would be fined or imprisoned. (These acts were either repealed or allowed to expire after Jefferson’s victory over John Adams in 1800.)

During the U.S. Civil War (1861–1865), Abraham Lincoln suspended the writ of habeas corpus in order to allow the union army to detain civilians who threatened military operations and shut down opposition newspapers.

World War I saw the passage of the Espionage Act in 1917 and the Sedition Act in 1918. The latter act empowered the federal government to punish any expression of opinion considered “disloyal, profane, scurrilous or abusive.” In WWII, Franklin D. Roosevelt issued Executive Order 9066 which resulted in the internment of 100,000 Japanese Americans. Both Congress and the Supreme Court would acquiesce in this presidential order. Because of war hysteria, this action was supported by a majority of Americans.

The common theme in those examples is warfare. To ensure domestic tranquility and keep citizens safe during conflict, the government seemingly infringed on various civil liberties. Governmental leaders proclaim that citizens must be secure; therefore, legislation is adopted with that goal in mind.

Following the end of World War II, the Soviet Union and the United States faced off in the Cold War, and new concerns about national security emerged. In this uncertain environment, the National Security Act of 1947 was passed, which established the National Security Council, as you have learned, as well as the CIA. This was a momentous law “in that it created the skeleton, at least, of what was to become an overpowering national security apparatus” (Weisberger, 1985).

The emergence of new forms of technology during the Cold War helped the government in its effort to “secure” Americans from possible communist threats, both foreign and domestic. During the Cold War, the United States witnessed a significant expansion of government surveillance, both overseas and at home, based on emerging technology. As the academic John MacWillie (2008) has written

surveillance is an ancient practice—one that has always entailed human beings “watching over” others, primarily focused on narrowly defined targets and territories. However, since the 1940s, the scope of this practice, increasingly abetted by sensors, computers, software applications, networks, and other technologies, has progressively shifted from individual targets to an undifferentiated persistent stare over entire populations across vast dimensions of space and time.

One example of this new understanding of surveillance is the response of the government following 9/11.

After the Al Qaeda attacks on U.S. soil on September 11, 2001, Congress passed the Homeland Security Act of 2002. This legislation formed the Department of Homeland Security (Congress, 2002). The Department of Homeland Security’s mission is

to secure the nation from the many threats we face. This requires the dedication of more than 240,000 employees in jobs that range from aviation and border security to emergency response, from cybersecurity analyst to chemical facility inspector. Our duties are wide-ranging, and our goal is clear – keeping America safe. (DHS, 2019)

At the same time Congress formed the Department of Homeland Security, Congress passed the USA PATRIOT Act (Congress, 2001). According to the Director of National Intelligence (n.d.), the purpose of the PATRIOT Act is to

deter and punish terrorist acts in the United States and around the world. Section 314 helps law enforcement identify, disrupt, and prevent terrorist acts and money laundering activities by encouraging further cooperation among law enforcement, regulators, and financial institutions to share information.

Yet, according to Rigoglioso (2014), the PATRIOT Act was

designed to make it easier for the government to collect data that would help combat terrorism. At the same time, the incredible evolution in technology over the past two decades has revolutionized both the tools available to the government for surveillance and those used by individuals to live their lives.

Today, government’s use of technology to fight terrorism, both abroad and at home, reignites the evolving debate between the balance between civil liberties and national security.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Review the rubric to make sure you understand the criteria

  Review the rubric to make sure you understand the criteria for earning your grade. Review the initial product development and market demand report from your peer as submitted to the 2.3 Discussion (Attached word doc). You will need to do appropriate research on the industry and category so that you

https://www.ted.com/talks/nithya_ramanathan_a_simple_solution_to_maintaining_life_saving_vaccines?utm_campaign=tedspread&utm_medium=referral&utm_source=tedcomshare watch the Ted talk above and answer the questions

 https://www.ted.com/talks/nithya_ramanathan_a_simple_solution_to_maintaining_life_saving_vaccines?utm_campaign=tedspread&utm_medium=referral&utm_source=tedcomshare      watch the Ted talk above and answer the questions below. i need it done 250 words. i need it done 24hours.    How does the Ted Talk you selected and viewed break down the traditional stereotype and provide the reader with a different perspective of the person, community, or

Effective communication is a staple of our healthcare culture.  Working with patients, peers, and interprofessional teams requires that nurses manage information and evidence toward influencing safe a Nursing Assignment Help

Effective communication is a staple of our healthcare culture.  Working with patients, peers, and interprofessional teams requires that nurses manage information and evidence toward influencing safe and positive patient outcomes. Please address the following: Describe caring attributes of the culture where you currently practice. Which attributes stand out as having

Read the following Clinical Case: Jason is 11 years old

Read the following Clinical Case: Jason is 11 years old and has Type 1 Diabetes. He was diagnosed with Diabetes when he was 5 years old. He is comfortable taking his “blood sugar” readings during the day. He likes to participate in sports and is on the soccer team, which

Part 1: Choose two theories of delinquent behavior from the

  Part 1: Choose two theories of delinquent behavior from the following: Strain Theory Social Disorganization Theory Drift Theory Differential Association Theory Labeling Theory Social Control Theory Positivism and Rational Choice Systems Theory and Other Biosocial Theories Cognitive Theories of Desistance Using the two theories you have chosen, address the

Week 2 Activity – Stocks Overview Investing in stocks is

  Week 2 Activity – Stocks Overview Investing in stocks is an option when planning for retirement or other financial management decisions. In this activity, you will research how to evaluate stocks as an investment option. Instructions In a 1–2-page paper, please respond to the following: Explain the differences in

Technological Pedagogical Content Knowledge (TPACK)

The classroom is Elementary English containing students of Grade 2. As such, the classroom environment has twenty students of whom ten are boys, and ten are girls. The locality of the community is organized with low-class and middle-class families. It means that the children within the learning environment are diverse.

Assume you are an HR business partner and leader in

  Assume you are an HR business partner and leader in a full-size HR department for your organization. Based on what you have learned about business employment law, what three or four concepts, tools, methods, or practices would you recommend as important best-practice approaches to help organizations implement better policies

write 400–600 What is your definition of the term strategic

 write 400–600     What is your definition of the term strategic plan in the context of an organization? How is a strategic plan related to the mission of an organization? How is a strategic plan related to the vision of an organization? Now, personalize the above and discuss how

You are thinking of opening a small copy shop. It

You are thinking of opening a small copy shop. It costs $5000 to rent a copier for a year, and it costs $0.03 per copy to operate the copier. Other fixed costs of running the store will amount to $400 per month. You plan to charge an average of $0.10

Presentation on power point: • The project should be carried

  Presentation on power point:    • The project should be carried out in a collaborative manner. All participants should have opportunities to contribute, all voices should be heard • Discussion should identify key themes in case studies related to social locations and addressing oppressions; linking practice and personal experience to

Assignment 1: Where to Play: Playing Field, Competition & Your

 Assignment 1: Where to Play: Playing Field, Competition & Your Organization Due Week 4, Sunday, midnight of your time zone (Weight: 25%) Introduction “Find out everything that you can about the playing field. You should know what your competitors’ salespeople eat for breakfast.” – Jack Welch – As the Chief

The fear of intimacy

Research Paper Instructions You will write an 8 page Research Paper on a major topic approved by your instructor and found within your course textbooks. You will choose a topic and augment your research by using at least 8 professional references in addition to the textbook and the Bible. Papers

equired Reading: https://bmchealthservres.biomedcentral.com/articles/10.1186/s12913-018-3400-7 Or https://link.springer.com/article/10.1186/s12913-018-3400-7 Risk management is one of

  equired Reading: https://bmchealthservres.biomedcentral.com/articles/10.1186/s12913-018-3400-7 Or https://link.springer.com/article/10.1186/s12913-018-3400-7 Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate

For this assignment, Find an advertisement for a job. This

  For this assignment, Find an advertisement for a job. This can be a job you are hoping to apply for soon.  You will create an up-to-date professional ‘resume and cover letter’ for a specific current job posting.    IMPORTANT: You will need to include a link to this ad or