SlideShare una empresa de Scribd logo
1 de 5
Introduction
The use of the ‘state of art’ technology to surveil our daily activities and perusing those
records of those activities possess a great threat to the right to privacy. Bugging, wiretapping,
and other modes of communications spying are regulated by the Constitution, specifically in the
Fourth Amendment's barring of unreasonable seizures and searches (Wittes 30). It is a great
contradiction that, most types of transaction and physical surveillance are not officially
acknowledged by the constitution as searches that violates the Fourth Amendment.
Consequently, much of this surveillance, even though constitute a search in effect, is not
formally regulated by law. Without requiring our consent and our knowledge, the government is
able to constantly surveil many of our schools’ daily activities, via global positioning systems,
closed circuit TV, and a wide variety of other state of art technologies. With just a keystroke,
records that contain our financial information, e-mail logs, phone and, and even private medical
information can be easily accessed by law enforcement agencies. These acts of surveillance by
the US government, from the increasing using of global positioning systems and closed-circuit
TVs and to a wide range of state of the technologies that can be used to access records on daily
activities in schools pose an insidious insult on the Americans’ freedom that the law has failed to
deal with. (Slobogin 2007), quotes ‘This failure results from the unwillingness of courts and the
legislatures to acknowledge how pervasive and routine our government surveillance system in
our schools has become’. In order to ensure that the government’s employment of this powerful
tool is not misused, the Constitution, and specifically the Fourth Amendment to the Constitution
must stand firm. Whereas some of these technologically backed investigative methods have been
around for a long time, most of them are recent in their origin, and their employment by the law
enforcement agencies has increased alot in the years as a result of the terrorist attacks of the
September 11, 2001.
Background
The new technologies have provided the US government unprecedented means of accessing our
personal information. To ensure that all people can have the right to seek information and
express themselves without fear, there has to be reasonable checks on governments’ power to
access, collect, and keep individuals’ data. Both our security and freedom can be protected,
however only through reasonable laws and policies that respect human rights. One of most recent
transgression by the government in tapping into the new technology involves the use of local
drones. These drones are to be used as a crime combating tool for law enforcement agencies.
However, flying drones over our schools and spying on us while we carry out our daily lives
does not represent an example of protecting our rights. Infact it violates them. The regional use
of drones to spy on Americans kids at school violates the Fourth Amendment and restrains our
rights to privacy.
Theorized Effect of the Technology on Democracy.
Constitution 3.0 is particularly disquieting due to the fact that emerging technologies
raise knotty constitutional challenges; and that the Supreme Court’s history with these issues is at
most spotty (Wittes 117). The Court’s freedom of speech jurisprudence, for instance, is mired by
a series of gross miscomprehensions regarding communications technologies, for instance as its
assumption in Olmstead v. United States that an individual making a telephone call has no right
of privacy because of projecting their voice outside of their homes, or their assertion in the Reno
v. American Civil Liberties Union (ACLU) that internet users rarely encounter contents by
accident. The general pattern is a Supreme Court purporting to adapt what it thinks it knows
about free speech regarding a given new communications media. The obvious result is a clumsy
effort to graft a set of interpretive rhetorics onto constitutional issues that might well call for
different strategies.
Grigsby points out, that the repercussions of imprecise interpretive tricks are especially
dire when they look like they are constitutionally forward looking, and this is poses a problem
when the Courts analyzes technology in the light of its opinions. Every time the Courts try to
analyze how new the technology fits into constitutional assessment, they find themselves in
guesswork that impacts how the Constitution is being interpreted later on, and they do so
whether they have guessed it right or wrong about the new technology they are struggling with.
The most bracing question is whether our legal institutions are genuinely capable of coming up
with coherent and meaningful responses to the changes that new technologies come with.
The essays in Constitution 3.0 is depicts the possibility that the importance of personal
self governance as a defense against intrusion of our privacy is fading away even as the ways in
which we can restrain intrusion of our conscience are increasing. In a nut shell, while we
appreciate the self direction and our personal daily functions, we are actually losing our right to
control how much data regarding us is available in cyberspace in addition to having almost no
control on how the government and marketers intend to use that data (Wittes 221) .
Ideological analysis
Privacy issues now seem always to be in the news. It is often debated by the US
Presidential candidates, and it is the subject of several legislative hearings, in the nation (Grigsby
259). Lack of sensitivity to privacy concerns can jeopardize the careers of government officers.
Privacy is obviously an issue whose time has come.
There are many compelling reasons to believe that the modern challange of information
privacy has evolved without the regard neither to specific cultural traditions nor to the effect of
different ideological beliefs. On the one hand, technology itself possesses a powerful force for a
cross national convergence. The definition of the privacy challange and the diverse responses via
information privacy or data protection laws has alot to do with cross fertilization of ideas that
occurs via a community of privacy experts. Lessons have to be drawn about how best to address
and respond to the problem (Grigsby 109). This would ultimately led to harmonization attempts
by the international organizations. The different concerns for privacy definately have their
source in diverse historical experiences. In general terms, however, one can argue that the forces
leading to convergence have been quite overwhelming, and have consequently led to similar
public concerns, and somehow similar policy feedback.
Recommendations.
The use of aerial objects for surveillance should be subject to stringent regulation to ensure that
their employment does not invade on the privacy that Americans have all the time enjoyed and
rightly deserve. Iam of the view that innocent Americans should not have to get worried that
their activities will be spied on by drones. To this end, I recommend that the use of drones should
be outlawed for indiscriminate mass surveillance, or for surveilling based on the First
Amendment-protected activities (Grigsby 98).
Refference:
Grigsby, Ellen. Analyzing Politics. Cengage Learning, 2008.
Rosen, Jeffrey, and Benjamin Wittes, eds. Constitution 3.0: Freedom and technological change.
Brookings Institution Press, 2011.
80223977 school surveillance

Más contenido relacionado

La actualidad más candente

Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Final Paper Com 300
Final Paper Com 300Final Paper Com 300
Final Paper Com 300William Beer
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Presentación3
Presentación3Presentación3
Presentación3Mikecdr
 
From Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back DoorsFrom Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back DoorsJack Pringle
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsKati Mccarthy
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the InternetMaurice Dawson
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillancemmicka
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextInfo_Studies_Aberystwyth
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Actgbsmith5
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawNitya Nand Pandey
 

La actualidad más candente (20)

Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Final Paper Com 300
Final Paper Com 300Final Paper Com 300
Final Paper Com 300
 
The Right to Privacy
The Right to PrivacyThe Right to Privacy
The Right to Privacy
 
Wired-feature
Wired-featureWired-feature
Wired-feature
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Presentación3
Presentación3Presentación3
Presentación3
 
From Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back DoorsFrom Breaking Down Doors to Building Back Doors
From Breaking Down Doors to Building Back Doors
 
Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Covert government surveillance
Covert government surveillanceCovert government surveillance
Covert government surveillance
 
Reboot11 Elvira Berlingieri
Reboot11 Elvira BerlingieriReboot11 Elvira Berlingieri
Reboot11 Elvira Berlingieri
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 
Censorship
CensorshipCensorship
Censorship
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 

Destacado

Perjalanan Homeschooling Keluarga Ichsan Ruzuar
Perjalanan Homeschooling Keluarga Ichsan RuzuarPerjalanan Homeschooling Keluarga Ichsan Ruzuar
Perjalanan Homeschooling Keluarga Ichsan RuzuarMoi Kusman
 
Pedoman HUT Ke 45 KORPRI Tahun 2016
Pedoman HUT Ke 45 KORPRI Tahun 2016Pedoman HUT Ke 45 KORPRI Tahun 2016
Pedoman HUT Ke 45 KORPRI Tahun 2016Muhammad Sirajuddin
 
07. Гаспадарка і рэлігія старажытных славян
07. Гаспадарка і рэлігія старажытных славян07. Гаспадарка і рэлігія старажытных славян
07. Гаспадарка і рэлігія старажытных славянAnastasiyaF
 
Prélèvements sociaux sur les revenus du patrimoine Français de Monaco
Prélèvements sociaux sur les revenus du patrimoine Français de MonacoPrélèvements sociaux sur les revenus du patrimoine Français de Monaco
Prélèvements sociaux sur les revenus du patrimoine Français de MonacoThomas Giaccardi
 
BRN Symposium 03/06/16 Welcome and introduction Symposium 2016
BRN Symposium 03/06/16 Welcome and introduction Symposium 2016BRN Symposium 03/06/16 Welcome and introduction Symposium 2016
BRN Symposium 03/06/16 Welcome and introduction Symposium 2016brnmomentum
 
03. Умацаванне велікакняжацкай улады
03. Умацаванне велікакняжацкай улады03. Умацаванне велікакняжацкай улады
03. Умацаванне велікакняжацкай уладыAnastasiyaF
 
MAIN CANOPY BAJAJ HR(22.09.2016)
MAIN CANOPY BAJAJ HR(22.09.2016)MAIN CANOPY BAJAJ HR(22.09.2016)
MAIN CANOPY BAJAJ HR(22.09.2016)sufiyan shaikh
 
Elastic Plastic Foundation
Elastic Plastic FoundationElastic Plastic Foundation
Elastic Plastic FoundationMiguelito Manya
 
08. Гаспадарчае жыццё
08. Гаспадарчае жыццё08. Гаспадарчае жыццё
08. Гаспадарчае жыццёAnastasiyaF
 
04. Княжанне Альгерда. Пачатак праўлення Ягайлы
04. Княжанне Альгерда. Пачатак праўлення Ягайлы04. Княжанне Альгерда. Пачатак праўлення Ягайлы
04. Княжанне Альгерда. Пачатак праўлення ЯгайлыAnastasiyaF
 
Test personalidad
Test personalidadTest personalidad
Test personalidadyarenmella
 
01. Уводзіны
01. Уводзіны01. Уводзіны
01. УводзіныAnastasiyaF
 
12. Искусство рококо
12. Искусство рококо12. Искусство рококо
12. Искусство рококоAnastasiyaF
 

Destacado (18)

Perjalanan Homeschooling Keluarga Ichsan Ruzuar
Perjalanan Homeschooling Keluarga Ichsan RuzuarPerjalanan Homeschooling Keluarga Ichsan Ruzuar
Perjalanan Homeschooling Keluarga Ichsan Ruzuar
 
Pedoman HUT Ke 45 KORPRI Tahun 2016
Pedoman HUT Ke 45 KORPRI Tahun 2016Pedoman HUT Ke 45 KORPRI Tahun 2016
Pedoman HUT Ke 45 KORPRI Tahun 2016
 
07. Гаспадарка і рэлігія старажытных славян
07. Гаспадарка і рэлігія старажытных славян07. Гаспадарка і рэлігія старажытных славян
07. Гаспадарка і рэлігія старажытных славян
 
Prélèvements sociaux sur les revenus du patrimoine Français de Monaco
Prélèvements sociaux sur les revenus du patrimoine Français de MonacoPrélèvements sociaux sur les revenus du patrimoine Français de Monaco
Prélèvements sociaux sur les revenus du patrimoine Français de Monaco
 
BRN Symposium 03/06/16 Welcome and introduction Symposium 2016
BRN Symposium 03/06/16 Welcome and introduction Symposium 2016BRN Symposium 03/06/16 Welcome and introduction Symposium 2016
BRN Symposium 03/06/16 Welcome and introduction Symposium 2016
 
03. Умацаванне велікакняжацкай улады
03. Умацаванне велікакняжацкай улады03. Умацаванне велікакняжацкай улады
03. Умацаванне велікакняжацкай улады
 
MAIN CANOPY BAJAJ HR(22.09.2016)
MAIN CANOPY BAJAJ HR(22.09.2016)MAIN CANOPY BAJAJ HR(22.09.2016)
MAIN CANOPY BAJAJ HR(22.09.2016)
 
Elastic Plastic Foundation
Elastic Plastic FoundationElastic Plastic Foundation
Elastic Plastic Foundation
 
08. Гаспадарчае жыццё
08. Гаспадарчае жыццё08. Гаспадарчае жыццё
08. Гаспадарчае жыццё
 
Yogesh V
Yogesh VYogesh V
Yogesh V
 
04. Княжанне Альгерда. Пачатак праўлення Ягайлы
04. Княжанне Альгерда. Пачатак праўлення Ягайлы04. Княжанне Альгерда. Пачатак праўлення Ягайлы
04. Княжанне Альгерда. Пачатак праўлення Ягайлы
 
La interfaz
La interfazLa interfaz
La interfaz
 
Crisis management
Crisis managementCrisis management
Crisis management
 
Test personalidad
Test personalidadTest personalidad
Test personalidad
 
01. Уводзіны
01. Уводзіны01. Уводзіны
01. Уводзіны
 
كارفور
كارفوركارفور
كارفور
 
algorimo distribuidos
algorimo distribuidosalgorimo distribuidos
algorimo distribuidos
 
12. Искусство рококо
12. Искусство рококо12. Искусство рококо
12. Искусство рококо
 

Último

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Último (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

80223977 school surveillance

  • 1. Introduction The use of the ‘state of art’ technology to surveil our daily activities and perusing those records of those activities possess a great threat to the right to privacy. Bugging, wiretapping, and other modes of communications spying are regulated by the Constitution, specifically in the Fourth Amendment's barring of unreasonable seizures and searches (Wittes 30). It is a great contradiction that, most types of transaction and physical surveillance are not officially acknowledged by the constitution as searches that violates the Fourth Amendment. Consequently, much of this surveillance, even though constitute a search in effect, is not formally regulated by law. Without requiring our consent and our knowledge, the government is able to constantly surveil many of our schools’ daily activities, via global positioning systems, closed circuit TV, and a wide variety of other state of art technologies. With just a keystroke, records that contain our financial information, e-mail logs, phone and, and even private medical information can be easily accessed by law enforcement agencies. These acts of surveillance by the US government, from the increasing using of global positioning systems and closed-circuit TVs and to a wide range of state of the technologies that can be used to access records on daily activities in schools pose an insidious insult on the Americans’ freedom that the law has failed to deal with. (Slobogin 2007), quotes ‘This failure results from the unwillingness of courts and the legislatures to acknowledge how pervasive and routine our government surveillance system in our schools has become’. In order to ensure that the government’s employment of this powerful tool is not misused, the Constitution, and specifically the Fourth Amendment to the Constitution must stand firm. Whereas some of these technologically backed investigative methods have been around for a long time, most of them are recent in their origin, and their employment by the law enforcement agencies has increased alot in the years as a result of the terrorist attacks of the September 11, 2001.
  • 2. Background The new technologies have provided the US government unprecedented means of accessing our personal information. To ensure that all people can have the right to seek information and express themselves without fear, there has to be reasonable checks on governments’ power to access, collect, and keep individuals’ data. Both our security and freedom can be protected, however only through reasonable laws and policies that respect human rights. One of most recent transgression by the government in tapping into the new technology involves the use of local drones. These drones are to be used as a crime combating tool for law enforcement agencies. However, flying drones over our schools and spying on us while we carry out our daily lives does not represent an example of protecting our rights. Infact it violates them. The regional use of drones to spy on Americans kids at school violates the Fourth Amendment and restrains our rights to privacy. Theorized Effect of the Technology on Democracy. Constitution 3.0 is particularly disquieting due to the fact that emerging technologies raise knotty constitutional challenges; and that the Supreme Court’s history with these issues is at most spotty (Wittes 117). The Court’s freedom of speech jurisprudence, for instance, is mired by a series of gross miscomprehensions regarding communications technologies, for instance as its assumption in Olmstead v. United States that an individual making a telephone call has no right of privacy because of projecting their voice outside of their homes, or their assertion in the Reno v. American Civil Liberties Union (ACLU) that internet users rarely encounter contents by accident. The general pattern is a Supreme Court purporting to adapt what it thinks it knows about free speech regarding a given new communications media. The obvious result is a clumsy
  • 3. effort to graft a set of interpretive rhetorics onto constitutional issues that might well call for different strategies. Grigsby points out, that the repercussions of imprecise interpretive tricks are especially dire when they look like they are constitutionally forward looking, and this is poses a problem when the Courts analyzes technology in the light of its opinions. Every time the Courts try to analyze how new the technology fits into constitutional assessment, they find themselves in guesswork that impacts how the Constitution is being interpreted later on, and they do so whether they have guessed it right or wrong about the new technology they are struggling with. The most bracing question is whether our legal institutions are genuinely capable of coming up with coherent and meaningful responses to the changes that new technologies come with. The essays in Constitution 3.0 is depicts the possibility that the importance of personal self governance as a defense against intrusion of our privacy is fading away even as the ways in which we can restrain intrusion of our conscience are increasing. In a nut shell, while we appreciate the self direction and our personal daily functions, we are actually losing our right to control how much data regarding us is available in cyberspace in addition to having almost no control on how the government and marketers intend to use that data (Wittes 221) . Ideological analysis Privacy issues now seem always to be in the news. It is often debated by the US Presidential candidates, and it is the subject of several legislative hearings, in the nation (Grigsby 259). Lack of sensitivity to privacy concerns can jeopardize the careers of government officers. Privacy is obviously an issue whose time has come.
  • 4. There are many compelling reasons to believe that the modern challange of information privacy has evolved without the regard neither to specific cultural traditions nor to the effect of different ideological beliefs. On the one hand, technology itself possesses a powerful force for a cross national convergence. The definition of the privacy challange and the diverse responses via information privacy or data protection laws has alot to do with cross fertilization of ideas that occurs via a community of privacy experts. Lessons have to be drawn about how best to address and respond to the problem (Grigsby 109). This would ultimately led to harmonization attempts by the international organizations. The different concerns for privacy definately have their source in diverse historical experiences. In general terms, however, one can argue that the forces leading to convergence have been quite overwhelming, and have consequently led to similar public concerns, and somehow similar policy feedback. Recommendations. The use of aerial objects for surveillance should be subject to stringent regulation to ensure that their employment does not invade on the privacy that Americans have all the time enjoyed and rightly deserve. Iam of the view that innocent Americans should not have to get worried that their activities will be spied on by drones. To this end, I recommend that the use of drones should be outlawed for indiscriminate mass surveillance, or for surveilling based on the First Amendment-protected activities (Grigsby 98). Refference: Grigsby, Ellen. Analyzing Politics. Cengage Learning, 2008. Rosen, Jeffrey, and Benjamin Wittes, eds. Constitution 3.0: Freedom and technological change. Brookings Institution Press, 2011.