Out of Control? The Real ID Act of 2005

2011 ◽  
pp. 226-250
Author(s):  
Todd Loendorf

The tragic events of September 11, 2001, created an environment that was conducive to the expansion of surveillance operations. Furthermore, the Bush Administration’s belief that the power of the presidency allows for any action, in the name of national security, led to the gathering of information about both terrorists and ordinary citizens. The Real ID Act of 2005 is a piece of legislation that requires, among other things, that state licensing agencies verify, collect, store, and share an increased amount of personal information. Opponents of this legislation are concerned about the financial, technological, privacy, and security implications of a law that was enacted with little to no due diligence. Currently, the requirements of the Real ID Act have been forced into an immigration bill in the Senate. Fortunately for those opposed to the Real ID Act, the Democratic majority currently in Congress appear to be more concerned with protecting the freedoms and liberties of American citizens than the Republican majority was when they originally passed the Real ID Act legislation in 2005. Ultimately, this chapter seeks to provide the reader with a thorough discussion into the many concerns associated with the Real ID Act.

2009 ◽  
pp. 1511-1528
Author(s):  
Todd Loendorf

The tragic events of September 11, 2001, created an environment that was conducive to the expansion of surveillance operations. Furthermore, the Bush Administration’s belief that the power of the presidency allows for any action, in the name of national security, led to the gathering of information about both terrorists and ordinary citizens. The Real ID Act of 2005 is a piece of legislation that requires, among other things, that state licensing agencies verify, collect, store, and share an increased amount of personal information. Opponents of this legislation are concerned about the financial, technological, privacy, and security implications of a law that was enacted with little to no due diligence. Currently, the requirements of the Real ID Act have been forced into an immigration bill in the Senate. Fortunately for those opposed to the Real ID Act, the Democratic majority currently in Congress appear to be more concerned with protecting the freedoms and liberties of American citizens than the Republican majority was when they originally passed the Real ID Act legislation in 2005. Ultimately, this chapter seeks to provide the reader with a thorough discussion into the many concerns associated with the Real ID Act.


2012 ◽  
pp. 855-872 ◽  
Author(s):  
Alison Attrill

Self-disclosure (SD) refers to revealing personal information about the self to others (Cozby, 1973). SD occurs in cyberspace via synchronous Internet arenas such as instant messaging and asynchronous communication such as email. It has mainly been considered to be a reciprocal tit-for-tat type exchange of personal facts, thoughts, and emotions (Altman & Taylor, 1973) to develop and maintain relationships. Most research has focused on differences between online and offline SD, often demonstrating an accelerated disclosure of personal and intimate information online than offline (e.g., Wallace, 1999) due to a sense of anonymity (Baker, 2005) and reduced fear of social rejection (Pennebaker, 1989) in cyberspace. Recent research considers the many available Internet arenas that possibly promote differences in quality and quantity of online disclosures (Attrill & Jalil, 2011), and the need to consider voluntary and involuntary SD online along with associated privacy and security risks within a theoretical framework.


1942 ◽  
Vol 36 (5) ◽  
pp. 837-849 ◽  
Author(s):  
Byron Price

To a free people, the very word “censorship” always has been distasteful. In its theory, it runs counter to all democratic principles; in practice, it can never be made popular, can never please anyone.Everything the censor does is contrary to all that we have been taught to believe is right and proper. The Post Office Department, for example, has two proud mottoes: “The mail must go through,” and “The privacy of the mail must be protected at all hazards.” But censorship stops the mail, it invades the privacy of the mail, it disposes of the mail as may seem best. The same thing holds true in the publishing business. Censorship limits the lively competition and free enterprise of reporters. It relegates many a scoop to the waste basket. It wields a blue pencil—both theoretical and actual—on news stories, magazine articles, advertisements, and photographs. Censorship also enters the radio industry, where it may edit scripts and in some cases stop entire programs.Yet even the most vociferous critics of the principle of censorship agree that in war-time some form and amount of censorship is a necessity. It then becomes not merely a curtailment of individual liberty, but a matter of national security. It is one of the many restrictions that must be imposed on people fighting for the right to throw off those restrictions when peace returns.


Author(s):  
Kent Roach

This chapter examines the distinct operational and ethical challenges that prosecutors face in national security and especially terrorism cases. The second part of this chapter focuses on the operational challenges that prosecutors face. These include demands for specialization that may be difficult to fulfill given the relative rarity of national security prosecutions; the availability of special investigative powers not normally available in other criminal cases; exceptionally broad and complex offenses; and the demands of federalism and international cooperation. The third part examines ethical and normative challenges that run throughout the many operational aspects of the prosecutorial role in national security cases. These include the challenges of ensuring that often exceptional national security laws are enforced in a manner consistent with the rule of law and human rights. There are also challenges of maintaining an appropriate balance between legitimate claims of secrecy and legitimate demands for disclosure and between maintaining prosecutorial independence and discretion while recognizing the whole of government and whole of society effects of the many difficult decisions that prosecutors must make in national security cases.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Yannis Steffen Oetken ◽  
Christian Hofstadler ◽  
Felix Meckmann

PurposeThe individual levels involved in real estate management are thoroughly discussed in the literature. This paper provides a structured meta-analysis of the different theoretical approaches in German-speaking countries. It also investigates the integration of transaction management and technical due diligence into the concepts of organisation theory. In this process, the interfaces are analysed and optimised models are developed for transferring the technical due diligence findings to the operational level.Design/methodology/approachInterviews with transaction management experts were conducted based on a narrative literature review. These interviews shed light on how the components of transaction management and due diligence are integrated into the transaction process, with a particular focus on technical due diligence. They also provide insights into how the related results are taken into account in relation to the transaction, and how they are transferred into the operational phase.FindingsIt becomes apparent that the role of transaction management is not clearly defined and delimited in the structural model of the real estate industry. Technical due diligence findings are usually transferred to the operation of the property via several, manual interfaces with corresponding losses of knowledge. The related models derived and developed for the purpose of operational optimisation define the role of transaction management against a technical background and identify the interfaces to be considered.Practical implicationsThe significance of transaction management for subsequent operations is discussed and elaborated on. More specifically, transferring safety-relevant, high-priority findings from the technical due diligence exercise plays a crucial role for the modelling stage. On the implementation level, the derived models serve as a basis for customising the internal organisational structure.Originality/valueIn Germany, there has hardly been any research into the involvement of technical experts in the real estate transaction process to date. This paper provides initial approaches to optimising organisational structures and sustainably integrating technical due diligence findings into real estate operations.


2017 ◽  
Vol 17 (1) ◽  
pp. 45
Author(s):  
Endre Győző Szabó ◽  
Balázs Révész

A magánélet és a biztonság népszerű ellentétpárként tűnhet fel az adatvédelmi gondolkodásban. Leegyszerűsítve olvashatjuk sokszor, hogy ha bizonyos feltételek hiányoznak, aránytalanul nagy áldozatot hozhatunk a személyes magánszféra, a privacy oldalán a biztonság érdekében, és magánszféránk túlzott feláldozása a biztonság oltárán visszafordíthatatlan folyamathoz és orwelli világhoz vezet. Más, a biztonság szempontjait mindenek felettinek hirdető érvelésben viszont a személyes adatok védelmére való hivatkozást alkotmányjogi bűvészkedésnek csúfolják és igyekeznek kisebbíteni a magánszféra-védelem egyébként méltányolandó értékeit. A magánélet és a személyes adatok védelmének pedig nagy a tétje, az adatok illetéktelenek részére való kiszolgáltatása, rosszhiszemű felhasználása egzisztenciákat, családokat tehet tönkre, boldogulási lehetőségeket hiúsíthat meg, ha a védelem alacsony szintre süllyed. Másrészről pedig az információszerzés, illetve előzetes adatgyűjtés a különböző bűnelkövetések, terrorcselekmények előkészületi cselekményei is egyben. Azzal, ha a személyes adataink, magánszféránk védelmében ésszerű lépéseket teszünk, élünk a jog és a technológia adta védelmi lehetőségekkel, adatainkat nemcsak az államtól és a piaci szereplőktől, de a bűnözőktől is elzárjuk, és ezzel mindannyiunk biztonságát szolgáljuk. Egy terület tehát biztosan létezik, ahol a biztonság és magánszféra mezsgyéje összeér: az adatbiztonságé és ezzel összefüggésben a tudatos, felelős felhasználói attitűdé, aminek azonban sokszor az emberi tényező a gátja. Jelen tanulmányban a magánszféra és biztonság kérdéskörének komplexitásáról szólunk, és közös nevezőt keresünk az adatkezelések nézőpontjából, kitérve az új adatvédelmi rendelet (GDPR) magánszféránkat és biztonságunkat egyaránt szolgáló leendő jogintézményeinek bemutatására is. --- Data in security – security in our data? Privacy and security may be deemed as a popular dichotomy. It is often argued that even if security is vital, we might sacrifice too much of our privacy in return. This may be irreversible when it comes to the intrusiveness of surveillance. On the other hand, it is also sometimes argued that the importance of personal data protection deserves less attention than security. There is much at stake when it comes to privacy and the protection of personal data. Misuse of personal information may damage families’ lives and ruin people’s livelihoods, thus this may all have significant repercussions for society as a whole – this is the price to be paid if protection is at a low level. Using sophisticated measures that technology and legal regulations can provide, privacy can be protected. Data security is a common field for the protection of privacy and security – crucial for both endeavours to make people’s lives better. This essay describes the complexity of issues related to privacy and security, while also taking new legislation of the European Union into account.


Author(s):  
Melvyn P. Leffler

This chapter considers the end of the Cold War as well as its implications for the September 11 attacks in 2001, roughly a decade after the Cold War ended. While studying the Cold War, the chapter illustrates how memory and values as well as fear and power shaped the behavior of human agents. Throughout that struggle, the divergent lessons of World War II pulsated through policymaking circles in Moscow and Washington. Now, in the aftermath of 9/11, governments around the world drew upon the lessons they had learned from their divergent national experiences as those experiences had become embedded in their respective national memories. For policymakers in Washington, memories of the Cold War and dreams of human freedom tempted the use of excessive power with tragic consequences. Memory, culture, and values played a key role in shaping the evolution of U.S. national security policy.


Author(s):  
Terence Young

This chapter analyzes the development and use of camping trailers, particularly the history of Airstream trailers and the company's colourful founder, Wally Byam. Byam initially came to Southern California in the 1920s to make his fortune in Hollywood, but he found success only after he began to sell trailer plans and trailers themselves during the early 1930s. After Byam passed away in 1962, the Wally Byam Foundation worked with the Airstream Company and the U.S. State Department to create several programs that used trailer camping as a means to familiarize foreign diplomats and others with the “real America.” Moreover, the experiences of Carolyn Bennett Patterson and the many participants in the trailer camping adventures organized by the Wally Byam Foundation suggest that trailer camping fits within the arc of camping's development.


Sign in / Sign up

Export Citation Format

Share Document