This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Surveillance Analysis

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Surveillance Analysis

Question 1

Regarding my prior knowledge of surveillance activities by security agencies, I was aware that the various agencies contain a database that reveals the identity of country citizens. In particular, I knew that the government undertakes records since the birth of a child until his adulthood when he acquires a national identity card. Upon receiving the information, security agencies preserve it in their databases for reference purposes upon the occurrence of security threat or crime. However, I was not aware that security agencies do acquire individual interaction records and monitor personal activities on social media platforms. Following a study on the assigned texts, I identified that various security agencies often review communications and social media activities to monitor the existence of a security threat to the country. Furthermore, I discovered that government agencies monitor the conduct of people through aerial drowns and secret helicopters.

Question 2

Surveillance plays a crucial role in determining security threats to the country. In relation, security agencies can identify planned terrorism activities based on communications developed among terrorist group members. Furthermore, the information on intended terrorism might get determined upon reviewing social media activities such as email communications, and Facebook posts that cause alarm. The identification of such events may help combat them before their occurrence and subject the culprits to justice. Also, surveillance can get applied to source evidence in various cases, such as murder cases. In consideration, police can investigate a possible threat to the deceased through their communication systems upon which they can identify suspects.

Question 3

Despite the positive application of surveillance in enhancing the security of a nation, data obtained from surveillance systems can get abused to serve the interest of particular individuals. The TigerSwan activities serve as a critical example of how surveillance data can be misused to oppress a specific group of people. In particular, TigerSwan seeks to diminish the actions of the movement opposing the Dakota Access Pipeline by identifying their protest activities as a threat to the country (Brown, Parrish & Speri, 2017). In this regard, they relate protests to violence and develop false information concerning the water activists leading the protests. The move seeks to facilitate the development of pipeline activities by private companies at the expense of water pollution within the region.

Similarly, the use of personal information by the Nazi regime to identify the oppress Jews community outlines a negative impact related to surveillance activities. Furthermore, the significant acquisition of American data by security agencies undermines the privacy of the citizens. In relation, the surveillance activities undermine the right to privacy among citizens.

Question 4

Technological surveillance plays a crucial role in ensuring the security of citizens and the county at large. In relation, the move aligns with the continued advancement in technology that demands the development of high-security systems to curb criminal activities. However, the government should ensure that surveillance companies adhere to the Freedom Act upon which they will uphold the privacy of citizens. Furthermore, effective adoption of the Freedom Act will restrict surveillance activities to areas and individuals that pose security threats other than the entire population that may not develop crime activities. Also, the regulation restricts agencies from developing mere threat assessments that lack security interests. In this regard, the law seeks to limit companies from exploiting innocent persons on a threat basis.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Brown, A., Parrish, W. & Speri, A. (2017). Leaked documents reveal counterterrorism tactics used at standing rock to “Defeat pipeline insurgencies. Retrieved on 19th June 2020 from https://theintercept.com/leaked-documents-reveal-security-firms- counterterrorism-tactics-at-standing-rock-to-defeat-pipeline-insurgencies/

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask