1. The fact that new technologies such as information technologies are increasingly becoming necessarily and fundamental to how we do business, communicate, and live substantially raises the possibility of abuse by, through, and because of these same technologies. For instance, the Internet of Things (IoT) refers to a network of devices that have the ability to automatically and continuously “talk to” each other without human participation. In the classic IoT example, your house’s refrigerator monitors the amount of food you have; and when supplies run low, it will automatically contact the local supermarket to order and have delivered refills. While extremely convenient, the risk is that if a hacker can access just one of the many devices involved the operation, he potential could also access you bank account, address and other personal information. In short, increase use of technology increases the vectors of a criminal attack and the risk that any attack will be successful.
2. New technologies can and should be regulated. Technology was been regulated since the first “tech” was invented. There is no reason why new tech should not be regulated. The best way to ensure that tech is regulated is to focus on the tech developers and manufacturers. Accordingly, once minimum standards of safety and security are determined, developers and manufacturers should be required to implement to standards into their products or face penalties. . For example, new technologies can be required to contain a basic level of security, such as not allowing a consumer to use it unless a strong password is used. Similar to cars needing to have seat belts or air bags, this will at least provide a minimum level of security and protection for consumers against abuse. Another way that new technologies might be regulated is through public shaming and criticism. Under this approach which is currently quite common, people with experience with the technology write or express their own views of it. If the technology is bad or dangerous, they information will get out and people will stop buying it. Accordingly, the developer or manufacturer will either have to upgrade the product according to the requirement reported or abandon the product altogether.
3. This is the age-old question of modern life. While a balance between ensuring that the nation and community is secure with the freedom of individuals to be all they can be is necessary, that balance should never require the personal freedom should be sacrificed without a clearly stated reason. The primary reason for this is that, historically speaking; temporary limits on personal freedom without an explanation or reason almost always lead to permanent limits on personal freedoms without explanation or reason. Most people can understand that sometimes, for example, a person needs to be stopped and searched. However, the reason that they are stopped and search should be made clear, and the search or limiting of the freedom should be ask quick as necessary to determine if there is a problem.
4. No, the protocols used for domestic surveillance should and must be different than the protocols for foreign surveillance. First, under the Constitution, citizens and visitors into the country are automatically afforded rights to be free from “unreasonable searches and seizures.” Practically speaking, what this means is that absent a probable cause, reasonable suspicion, or an exigent circumstance, a warrant for surveillance is needed. While that may produce some inconveniences, it is still possible to achieve all the goals of surveillance even if an officer has to wait for a warrant. On the other hand, operating abroad is an exigent circumstance that necessarily requires agents to attack swiftly and covertly or risk discovery and attack. Moreover, the Constitution does not have authority outside of the U.S., so there is no legal reason to follow rights that a person might have in the U.S. Accordingly, foreign surveillance that would be illegal in the U.S. against a domestic target would be suitable in a foreign territory.
The Future Of Terrorism Critical Thinking Examples
Type of paper: Critical Thinking
Topic: Technology, Reason, Violence, Surveillance, Cyber Crimes, Freedom, New Technologies, Victimology
Pages: 3
Words: 650
Published: 10/19/2020
Cite this page
- APA
- MLA
- Harvard
- Vancouver
- Chicago
- ASA
- IEEE
- AMA