StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

To what extent should individusl liberties be compromised in the name of national security - Essay Example

Cite this document
Summary
9/11 has shook the world in such a way that it has forced us to take a re-look and re-evaluation of the many issues pertaining to the nature of the relation between individuals, between the state and the individual, and among nations in the globalised society. As such, a whole…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
To what extent should individusl liberties be compromised in the name of national security
Read Text Preview

Extract of sample "To what extent should individusl liberties be compromised in the name of national security"

Download file to see previous pages

I will be presenting arguments in favor of individual liberties compromised in the name of national security and provide a counter argument, which I espouse. In this regard, I maintain that individual liberties should be minimally compromised, if possible not compromise at all, even in the name of national security due to the fundamental principles which serves as the country – freedom, equality and democracy. And because of the fact that United States is a country of immigrants. Generally, liberty presupposes the idea that a human person is a rational agent, capable of making decisions and has the freedom to act upon the decision that he/she has arrived.

This is necessary in order for the human person to flourish and realize his/her potentialities. This presupposition is deemed inherent in all human beings as human beings. However, in reality, not everybody can do anything that he/she wants because it may cause harm to others. As such, people have decided to enter into an agreement creating the state so that they can live peacefully, continue living together and pursue the good life. In this sense, it can be impugned that the state is created by the people, for the people and through the people.

In return, the state provides protection to life, liberty and properties of the people. However, 9/11 has created the condition wherein the state has to impinge on individual liberties in order to protect the lives and properties of the greater majority since after 9/11 “the home front has become the battlefront” (Wolfowitz 2002 as cited in Krikorian 461). In this sense, there are those who advocate the idea that the state in the name of national security should be given more room to infringe on individual liberties and that individual liberties should be curtailed to the extent that the protection and security of the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“To what extent should individusl liberties be compromised in the name Essay”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1570945-to-what-extent-should-individusl-liberties-be-compromised-in-the-name-of-national-security
(To What Extent Should Individusl Liberties Be Compromised in the Name Essay)
https://studentshare.org/miscellaneous/1570945-to-what-extent-should-individusl-liberties-be-compromised-in-the-name-of-national-security.
“To What Extent Should Individusl Liberties Be Compromised in the Name Essay”, n.d. https://studentshare.org/miscellaneous/1570945-to-what-extent-should-individusl-liberties-be-compromised-in-the-name-of-national-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF To what extent should individusl liberties be compromised in the name of national security

The Value of Digital Privacy in an Information Technology Age

The Value of Digital Privacy in an Information Technology Age name of Author Author's Affiliation Author Note Author's note with more information about affiliation, research grants, conflict of interest and how to contact 1.... Public sectors will have to avail highly developed technologies and security systems to manage the huge amount of information as well as threats.... Determine what measures citizens can take to protect private information or information they do not want to be disclosed....
4 Pages (1000 words) Research Paper

The Use of Closed Material Procedures in National Security Matters

However, in the recent days, the issue of national security has acquired much significance in view of the ever escalating incidents of terror attacks that are especially directed towards developed nations such as the UK and USA.... However, in cases where the examination of any documents by individuals is considered as a breach of national security, individuals are not allowed to examine the relevant document and such materials are known as “closed” materials....
10 Pages (2500 words) Term Paper

National Security Versus Civil Liberty

It looks at which freedom can be sacrificed and to what extent the government should affect civil rights.... The paper "national security Versus Civil Liberty" looks at instances where the civil rights are violated so to emphasis on the importance of the government to ensure that it does not cross the limit.... hellip; This paper looks at the issue of sacrificing a few freedoms to protect national security, both the internal and external security and to ensure the long term viability of civil rights....
6 Pages (1500 words) Coursework

Edward Snowden Did More Harm Than Good

The security and peace of Britain and other populations in the west, then the Snowden leaks have been devastating and have caused a lot of harm (Scruton 2013; Whitehead, Hope and Swinford 2013).... hellip; The compromise occurs on many levels, from the way the secret procedures, tools, technologies and processes of data gathering of the NSA and other intelligence agencies are compromised, to the way the intense scrutiny has made it more difficult for the agencies to do their job of catching and arresting the bad guys....
9 Pages (2250 words) Essay

How IT Security and Robust Technology Compromises Peoples Freedom

This review ''How IT security and Robust Technology Compromises People's Freedom'' discusses that the concept of privacy is difficult to understand.... According to Allan Westin, a US privacy scholar, privacy cannot have an absolute definition because privacy issues are fundamentally concepts of values power....
11 Pages (2750 words) Literature review

Surveillance Is Only Appalling to People with Hidden Agendas

This breach, they insist, takes the globe back to decades ago when civil liberties and humanitarian issues were not accorded due respect.... Those that are in support of it, claim that one should have nothing to worry concerning the issue if they truly have nothing to hide.... They should not in any way attempt to harm themselves or those around them.... he interactions that human beings have with each other are what determine the existence or lack thereof of crime....
7 Pages (1750 words) Essay

The Foreign and Domestic Counterterrorism Policies that the US Have Set in Place

homeland from various attacks has been considered a top priority in the national security Strategy.... However, it is important to note that despite the huge destruction associated with the September 11, 2001 attack, a number of changes have been made in the international terrorism by the United States intelligence community through bodies such as national security Agency, the FBI counterterrorism elements, Central Intelligence Agency and Defense Intelligence Agency....
10 Pages (2500 words) Research Paper

Effects of Ethics on Pursuit of Security

However, during an emergency and national threat they should be compromised.... It is similar to what happens when the autocratic authorities view the civil societies as a threat, and they would shut them.... The author of the current paper "Effects of Ethics on Pursuit of security" argues in a well-organized manner that ethics has a significant indirect impact on security.... nbsp; However, the goodness of the action can compromise the security of other people in society....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us