Fourth Amendment Pros And Cons

1236 Words5 Pages

Continuing technological advances in smart phones, smart televisions, and other smart devices, one might begin feeling slightly outsmarted by their own equipment. Many will offer qualities such as faster internet reception, better image quality, or increased storage space. Who would oppose leaving a lesser product for something better at such a bargain price? Progression in technology also include monitoring devices, such as closed circuit television (CCTV). These devices are often cost effective ways for communities to keep a watchful eye on areas and make the inhabitants feel safe. Therefore, when incidents like the Boston Marathon bombing occurred, and media began to work in tandem with the investigating authorities, it was …show more content…

Olmstead v. United States, Katz v. United States, and United States v. Jones are just a few examples of how society’s outlooks on surveillance has transformed over time. However, the amendment is expressed as a story “of continuity and change” (Thompson 4). With advancing technology, it has become exceedingly difficult to apply an outdated system of government to the rules and regulations much needed for today. Yet, I believe the founding fathers of this country, who wrote and signed the constitution, stood for something timeless – a sense of freedom. “The home has always held a central place in American life,” an ideal which provides a sense of security from the government by the government. Any infringement upon said rights should be …show more content…

The US receives approximately “one million threats” from hackers every day (Harrison and Pagliery). And though this includes businesses, organizations, etc., instances such as the embarrassing hack of SONY in 2014 demonstrate the capabilities of other foreign countries. It is of the utmost importance that the US does not arm itself and rely solely on equipment which can so easily be compromised. CNN Money categorized the three main types of threats “tech users” are nervous about into broad categories, comprised of digital exortion, where cyber thieves blackmail victims with personal files stolen, sophisticated attacks, when hackers “hide malware inside software updates”, and social media. A larger, more intimidating threat still is the knowledge of domestic terrorists unaccounted for. Titled under “Intelligence Crisis,” Schwarz writes openly about the ongoing misconduct from “numerous agencies, including the FBI, CIA and NSA” (5). He appeals to a vast majority by recognizing that the world is changing; and calls for a “new and comprehensive nonpartisan investigation”

Open Document