Frog street press writing paper
Wednesday, August 26, 2020
Course Schedule of Philosophy
I will answer my PDA simply after 4 pm. In the event that you can't contact me please leave a message that incorporates a concise depiction of your inquiry or concern, and I will restore your call as quickly as time permits (however consistently inside 24 hours). I Welcome! I came to training as a ââ¬Å"adult learnerâ⬠having gotten a partner degree from MATCH when I was 30. I moved on from Marquette University 4 years after the fact with degrees in instruction, composing and English. At that point 4 years after the fact I earned ace degrees in training and PC innovation from Cardinal Stretch University. Right now I am taking a shot at my doctorate in education.Course Description This five-week course in basic reasoning and casual rationale assists understudies with building up the capacity to reason plainly and basically. It incorporates a prologue to the controls of inductive and deductive rationale, misleading thinking, and critical thinking strategies. Accentuation is put o n the distinguishing proof and the board of the recognition procedure, utilization of suppositions, enthusiastic impacts, and language in different types of business correspondence. Themes and Objectives Critical Thinking: Purpose and Process Define ââ¬Å"thinking. â⬠Identify the basic reasoning process.Relate the phases of subjective improvement to rationale and basic reasoning. The relationship of rationale to basic reasoning. The Perception Process and its Influences Outline the perceptual procedure. Disclose Describe perceptual squares to clear and basic reasoning: individual obstructions, detecting, and physiology. Suppositions: Critical Thinking and the Unknown Recognize suspicions in different circumstances. Look into important and unjustifiable suppositions. Create strategies for checking suppositions and making choices. Rationale versus Emotion Define the job of feeling in thinking and argument.Identify the effect of enthusiastic impact on close to home and expert ad equacy. Clarify the effect of sentiments on the basic reasoning procedure. Investigation of the Use of Language in Thinking and Argument Explain the job of language in the basic reasoning procedure. Distinguish the force and constraints of language in communicating contemplations. Investigate the effect of language assorted variety. Components and Composition of Argument Explore the job of basic intuition in influence. Recognize contentions from sustenance. Distinguish the pieces of a contention and their relationship to one another. Portray the job of relationship in contention. Distinguish the techniques utilized in arranging musings. Separate among inductive and deductive modalities of thinking. Investigate the structure and utilization of arguments in thinking. Characterize the ideas of truth, legitimacy, and sufficiency in a deductive contention. Examples of Fallacious Reasoning Apply sound normal thinking to critical thinking. Perceive misrepresentations in composed, oral, and visual contentions. Basic Thinking Techniques Synthesize comprehension of deceptions in thinking and contention. Create unconstrained oral arguments.IW51101 *For on-ground understudies, these are oral and [emailâ protected] introductions with notes. 1 101 Total 11001 Course Changes Please note that the teacher's assignments may differ from the first schedule you got from the understudy page. Assignments in this record take need. While the understanding assignments and learning targets continue as before, a portion of the assignments in this schedule have been altered for this specific segment. *** The teacher maintains all authority to change this archive wily nil as he sees fit! *** Policies and ProceduresThe University confides in every understudy to keep up elevated expectations of trustworthiness, scholastic honesty, and moral conduct. Every single individual task MUST mirror every understudy's own unique exertion. During the course understudies must accomplish determined lear ning results so as to meet the course destinations. Your task evaluations will be reliant on the achievement of those goals. All assignments are assessed based on accomplishment, and not on exertion. College of Phoenix Grading Guidelines can be found in your Program Handbook.A understudy who meets course destinations will procure an evaluation of ââ¬Å"Câ⬠. So as to acquire an evaluation of ââ¬Å"Aâ⬠or ââ¬Å"Bâ⬠the understudy assignments. Except if in any case indicated, all papers are to be typewritten, twofold divided, and edit and remedied for linguistic, spelling, and typographical blunders. Source material must be refered to inside the body of the paper and referenced toward the finish of the paper. All references must be refered to inside the body of the paper. The arrangement for all typewritten work keeps the guidelines in The Little, Brown Compact Handbook (Custom fourth De. College of Phoenix). Every single composed task will be assessed as indicated in the Grading Criteria for Written Assignments found toward the finish of this prospectus and on my educator's page. Participation and support Attendance at every workshop is compulsory! In this multi week course just a single unavoidable nonappearance will be allowed, and you should tell one of the educators ahead of time. Should a nonattendance happen the understudy is answerable for any assignment(s) due in that workshop.Points for homeroom interest are reliant on your quality in the study hall for the whole workshop! In the event that you are missing in any way, shape or form investment focuses for that workshop will be deducted from your evaluation. Showing up over 15 minutes late for class or leaving class early will likewise bring about point findings; every event will be assessed independently. In the event that you should be unavoidably missing for the learning group introduction it must mirror your contribution (by sound or video tape) with the end goal for you to partake i n the evaluation for that assignment.Learning groups have a significant influence in accomplishing the instructive results in the degree programs at University of Phoenix. Groups will be framed in the primary workshop of the course, and understudies are relied upon to focus on five hours of learning group exercises every week notwithstanding participation at the workshops. Through the way toward finishing group sanctions and meeting logs, and taking an interest in homeroom conversations, understudies will have the chance to think about the discovering that has happens as a component of the collaboration together.The learning group introduction in Workshop Five will be assessed based on content (10 focuses) and introduction style (10 focuses). On the off chance that you have questions in regards to what is controlled by style it is dependent upon you to demand this data from your teacher. All learning colleagues will get a similar evaluation for the booking, paying little mind to sin gular style contrasts. Late assignments It is accepted that understudies will perform expertly in planning work required for this class.All assignments must be submitted on their due date. Assignments will be acknowledged as long as multi week late however that will bring about a programmed grade decrease of 10% of the complete potential focuses for that task. I won't acknowledge assignments early). Fragmented Incomplete may be considered on an individual premise. Scholarly Honesty Academic trustworthiness is profoundly esteemed at the University of Phoenix. You should consistently upchuck work that speaks to your unique words or ideas.If any words or thoughts utilized in a class posting or task accommodation don't speak to your unique words or thoughts, you should refer to every single significant source and clarify the degree to which such sources were utilized. Words or thoughts that require reference incorporate, however are not restricted to, all printed version or electronic d istributions, regardless of whether copyrighted or not, and all verbal or visual correspondence when the substance of such correspondence obviously begins from a recognizable source. It would be ideal if you see the I-JOB Catalog for more data about scholarly genuineness, remembering results of scholastic dishonesty.Privacy and Confidentiality for the Online Classroom One of the features of the I-JOB scholastic experience is that understudies can draw on the abundance of models from their associations in class conversations and in their composed work. Nonetheless, it is basic that understudies not share data that is secret, favored, or restrictive in nature.
Saturday, August 22, 2020
Arnica: Water and Bottle Essay
Technique: Empty 100ml Olive oil into a jug and blend it in with 20ml Arnica Q. Shake the container and the Arnica will shape an emulsion with the Olive Oil. Wet the fingertips with the emulsion and part your hair and apply the oil on the underlying foundations of the hair and invest some energy in rubbing it into the scalp which should show a slick sparkle. This is done day by day for best outcomes after a shower. Make a Wet portion of Arnica 30 as follows: Request Arnica 30c in a 5ml in the Liquid Dilution in Ethanol in a container with a dropper plan. Get a 500ml container of Spring Water from the closest market. Spill out about 3cm of water from the container to leave some airspace. Addition 3 drops of the cure into the jug and shake the jug hard before you take a capfull which is a portion twice every day. This is best taken before anything else and last thing before bed. Shaking the jug hard is homeopathic succussion and this shaking must be done each time before a capful of the jug is tasted as coordinated. Take a container of the Fish Liver Oil day by day. Keep away from brutal shampoos. Use Johnsons Baby Shampoo. Maintain a strategic distance from Coffee, protected meats like wieners, ham and bacon, and all canned cola drinks as they antitoxin the treatment. Drink a lot of water and exercise day by day for at any rate 45 minutes like strolling or running relying upon your age. The thought is to work it out. This is fundamental to advance the dissemination of blood in the body which Arnica will assist with advancing. Patients who experienced serious male pattern baldness who were losing more than 200 hairs every day have affirmed that they found in about seven days that the loss of their hair had been captured. They likewise saw that the new development was clearly obvious over their scalp when their hair was separated in around a month and a half. For my situation I despite everything have a decent head of silver hair at age 82 in spite of the fact that it has weakened to about a large portion of the hair I had 40 years prior.
Thursday, August 13, 2020
A Day in the Life of An Over-Committed 2nd Year SIPA Student COLUMBIA UNIVERSITY - SIPA Admissions Blog
A Day in the Life of An Over-Committed 2nd Year SIPA Student COLUMBIA UNIVERSITY - SIPA Admissions Blog 8.00AMâ"Alarm goes off. I could go for the run I planned to take, but instead I hit the snooze button. Up too late last night working on a problem set. 9.00AMâ"Alarm goes off again. This time Iâm up, eating yogurt (breakfast is the most important meal of the day) making a caffeinated beverage, searching around for a business casual outfit (there are some professional events today, so better look the part) and getting my bag ready to walk the 10 blocks from my apartment on Central Park West up to 118th and Amsterdam. 10.00AMâ"Arrive at the All Ivy Sustainable Development Fair to scope out potential employment opportunities. Graduation is only a few months away and then I have some loans to pay off, so better work the network and pass out some business cards. 11.00AMâ"Meeting with my Capstone group and our advisor to discuss plans for our upcoming trip to Haiti over spring break, review our survey questionnaire, complete the stakeholder analysis and mapping exercise, and assign tasks for the next week. Thereâs a lot to do, but thank goodness weâve got a solid, hardworking group. Group work is not so bad when you can count on your team. 1.00 PMâ"Grab a quick lunch with two of my group members at Brads. Tucking into sandwiches and salad we discuss life before SIPA. Jeremy lived in Italy for 7 years- he used to work for the FAO and before that he was posted there as a sergeant in the US Air Force. Heâs a Macroeconomics TA and will be proctoring the 1st yearsâ midterm exam later today. He and his Italian wife speak French at home and are planning to visit a new US state every month this year. Ben is from California and is doing the long distance thing with his girlfriend in medical school. Heâs interested in conflict resolution, worked interviewing refugees in Zambia with the UN Relief Works Agency last summer, and heâs also interned with CARE in the Gaza Strip. He speaks Arabic and is working part time as a Program Assistant at the State Department Office downtown. Iâm always amazed by SIPA students- their amazing talents, their diverse backgrounds, and how they manage to do everything theyâre doing while at school. 2.00 PMâ"Swing by the Office of Admissions to log a few hours: update Apply Yourself and filing new documents that have come in, respond to a number of emails, answer phone calls from prospective students, and sit down with one or two who have just come out of the 12PM info session. Answer questions they may have about student life and the different programs. 4.00PMâ"Attend the MPA-DP Development Practitioners Seminar for MPA Development Practice students. Every week development professionals join us to talk about their careers and the challenges theyâve faced in the field, allowing us to ask lots of questions at the end. Today Maha Bahamdoun, a Yemeni national who has managed UNDP projects all over North and sub-Saharan Africa, fields questions like, âDo you feel the work youâve done has lived up to the idealistic expectations you had when you entered the UN? Are you still excited to go to work every day?â Good question! 5.30PMâ"Another amazing SIPA classmate- a dual degree student with Sciences Po in Paris, Alisia, teaches a free yoga class at Barnard. Work up a good sweat and get those shakras flowing. This is making up for the run I missed. 7.00PMâ"Hurry home to shower and change before heading to Aprylâs house warming party (sheâs MIA Urban and Social Policy). Wine, cheese, and appetizers count as dinner, right? 10.00PMâ"House party is winding down as people talk about checking out the SIPA Pan Africa Network (SPAN) or Latin American Students Association (LASA) parties tonight. It is a Friday, so I can sleep in tomorrow⦠until I remember Iâm going to a museum in the morning with a friend in Queens, and then a group meeting for my Tools for Advocacy class, and dinner with another friend whoâs swinging through town⦠Iâd better get a good nightâs sleepâ¦. Well, Ok, maybe just one hour at the SPAN party, I love the music⦠Ok, and one hour at the LASA party, I LOVE the dancing⦠2.00AMâ"Finally back in bed. Itâs already tomorrow. Just another day in the life of an over-committed 2nd year SIPA student!
Saturday, May 23, 2020
Global Atmospheric Circulation and Related Effects
Solar radiation warms the air over the equator, causing it to rise. The rising air then proceeds south and north toward the poles. From approximately 20Ã ° to 30Ã ° North and South latitude, the air sinks. Then, the air flows along the surface of the earth back toward the equator. Doldrums Sailors noticed the stillness of the rising (and not blowing) air near the equator and gave the region the depressing name doldrums. The doldrums, usually located between 5Ã ° north and 5Ã ° south of the equator, are also known as the Intertropical Convergence Zone or ITCZ for short. The trade winds converge in the region of the ITCZ, producing convectional storms that produce some of the worlds heaviest precipitation regions. The ITCZ moves north and south of the equator depending on the season and solar energy received. The location of the ITCZ can vary as much as 40Ã ° to 45Ã ° of latitude north or south of the equator based on the pattern of land and ocean. The Intertropical Convergence Zone is also known as the Equatorial Convergence Zone or Intertropical Front. Horse Latitudes Between about 30Ã ° to 35Ã ° north and 30Ã ° to 35Ã ° south of the equator lies the region known as the horse latitudes or the subtropical high. This region of subsiding dry air and high pressure results in weak winds. Tradition states that sailors gave the region of the subtropical high the name horse latitudes because ships relying on wind power stalled; fearful of running out of food and water, sailors threw their horses and cattle overboard to save on provisions. (Its a puzzle why sailors would not have eaten the animals instead of throwing them overboard.) The Oxford English Dictionary claims the origin of the term uncertain. Major deserts of the world, such as the Sahara and the Great Australian Desert, lie under the high pressure of the horse latitudes. The region is also known as the Calms of Cancer in the northern hemisphere and the Calms of Capricorn in the southern hemisphere. Trade Winds Blowing from the subtropical highs or horse latitudes toward the low pressure of the ITCZ are the trade winds. Named from their ability to quickly propel trading ships across the ocean, the trade winds between about 30Ã ° latitude and the equator are steady and blow about 11 to 13 miles per hour. In the Northern Hemisphere, the trade winds blow from the northeast and are known as the Northeast Trade Winds; in the Southern Hemisphere, the winds blow from the southeast and are called the Southeast Trade Winds.
Tuesday, May 12, 2020
Tok Essay Ways of Knowing - 826 Words
Tok Essay Ways Of Knowing Using one way of knowing is not enough if you want to determine if something is true or if something is believed to be true. The different ways of knowing are sense perception, reasoning, emotion and memory. Plato once stated that knowledge is ââ¬Å"Justified true beliefâ⬠which just goes to show that in order to obtain knowledge, we need to know certain thing as a fact, not belief. When we believe something is true, we do not know it for certain. We just have faith in the fact that it is true. To test if our beliefs are real and true, we can use the different ways of knowing to confirm or abolish our beliefs. However these ways of knowing each have their own advantages and disadvantages. Sense perception isâ⬠¦show more contentâ⬠¦Another part of reasoning is proportion. Putting something in proportion gives us a more accurate view of something we are trying to find out. However, this can make reasoning fallible because external forces can influence it. Emotion is a very flawed way to make the distinction between belief and truth. This is because things that influence us very easily mislead our emotions and so we cannot determine a truth by only using our emotion. For instance some person that loves to play video games might start to dislike it because he keeps losing. The more times he loses the more upset he gets and the more he starts to dislike the game. Pretty soon he might lose interest and start to dislike video games altogether. It is also very easy to cloud peopleââ¬â¢s judgment by playing on their emotions causing them to hold a false truth or belief. Memory is another fallible devise used to distinguish truth from belief. The older you get the harder it is to recall things set early on in your life, or even earlier that same day. This poses a very big problem because sometimes when you have to identify someone that you have only seen once, you could have major difficulties recalling their features. For instance, in a police investigation, the victims usually have to give an accurate description of the suspect. Speaking fromShow MoreRelatedTo what extent do ways of knowing prevent us from deluding ourselves? Justify your answer with reference to at least one area of knowledge1618 Words à |à 7 Pagesï » ¿To what extent do ways of knowing prevent us from deluding ourselves? Justify your answer with reference to at least one area of knowledge Ways of knowing are the core of TOK for us to get knowledge in different Areas of Knowledge. The two key terms on this essay question are ââ¬Å"ways of Knowingâ⬠and ââ¬Å"deluding ourselvesâ⬠. ââ¬Å"Ways of knowing are how we acquire knowledge about the world around us, and figure out our relationship with itâ⬠. (IB Diploma Program, 31) Ways of Knowing help us to understandRead MoreWhat Is the Task of the Historian?966 Words à |à 4 Pageswe would be without identity. History is regarded differently from human sciences because historians canââ¬â¢t directly observe the past. To what extent is history only focused on past events? And to what extent do the human sciences aim to change the way societies behave? Many knowledge issues arise, when looking at the different facets of these two areas of knowledge. There is often this objective vs subjective debate when looking at history. Is historical knowledge socially constructed? Itââ¬â¢s aRead MoreTok Essay1436 Words à |à 6 PagesNew TOK Essay Topic 3: There are no absolute distinctions between what is true and what is false. Discuss this claim. Iââ¬â¢d always believed that the truth was a rather simple idea. To me, it was something that was true or correct or existing in this world. But after all the discussions in TOK, with family and with friends, and after deep rumination on the subject, Iââ¬â¢ve realized thatââ¬â¢s itââ¬â¢s a much more broad, complex and often mind-boggling concept. However, now I see that there are essentiallyRead MoreDiscuss the Roles of Language and Reason in History1695 Words à |à 7 PagesTOK- Essay Question 9 ââ¬Å"Discuss the roles of language and reasoning in historyâ⬠1451 words Nadia Lotze 000 865-015 Mr Skeoch History is the past written by the present. The very nature of this statement creates the predicament of historical knowledge. The historians of the present are under constant pressure of rapidly changing society; therefore what we discover from the past is dependent on our perceptions that are forever changing. History and historical explanations are deduced and manipulatedRead MoreEmotion as a Way of Knowing1456 Words à |à 6 PagesEMOTION ESSAY ââ¬Å"The mind leads, the emotions followâ⬠-Ayn Rand Emotion is a state of psychological stimulation and an expression of distinct responses[1]. Emotional states can be defined by particular bodily responses. Emotion is more similar to conscious thought than feelings are to conscious thought. Feelings are more like sensations, when you touch something you get a feeling[2]. Therefore feelings are processed faster than emotions, because when you touch something there is a slightRead MoreTok Emotion Essay861 Words à |à 4 Pages2011 TOK Mr. de Silva Grade 11 OSC TOK Essay: How do Perception and Emotion Contribute to our Knowledge of the World? Perception is broad concept, often defined through various contexts. Similarly, emotion has assorted definitions. These concepts differ in their timing in the world, for without the initial perception, emotion is a non-existent concept. And without such commodities our knowledge of the world would cease to exist. For our perception and emotion influences the other ways ofRead MorePossession of Knowledge Tok Essay614 Words à |à 3 PagesTOK Outline Essay title ââ¬â ââ¬Å"The possession of knowledge carries an ethical responsibilityâ⬠. Evaluate this claim. What knowledge issues I think are involved â⬠¢ How can you possess knowledge? How do you acquire it and do these ways affect your responsibility of imparting it on others? â⬠¢ How is the knowledge you have affected by your personal ethics? Some people would have no problem giving out certain pieces of knowledge while others would be very trouble giving out exactly the same informationRead MoreThe s Theory Of Knowledge1664 Words à |à 7 PagesAs human beings, we have the natural propensity to acquire knowledge from our evolving environment, through different ways of knowing such as perception, reason, emotion and language. Knowledge can be defined as information acquired from experience or education or the awareness of a situation. Thus, denoting experience, education and awareness as the roots of knowledge. Consequently, if a knower is not able to experience an event or be educated, the concept of knowledge may cease to exist. ThereforeRead MoreHow Can the Different Ways of Knowing Help Us to Distinguish Between Something That Is True and Something That Is Believed to Be True?1871 Words à |à 8 PagesTOK ESSAY 4. How can the different ways of knowing help us to distinguish between something that is true and something that is believed to be true? In order to distinguish between what is true and what we simply believe to be true we will first have to define what truth and belief is and how these two terms differ from each other. This paper will then seek to determine how the four different ways of knowing ââ¬â perception, language, emotions and reason ââ¬â can help us distinguish between truthRead MoreThe Matrix and the Allegory of the Cave Essay948 Words à |à 4 PagesTOK Essay The Allegory of the Cave and The Matrix 03 December 2010 Many people think that what we know is not really what is real. This idea is shown through the story of The Allegory of the Cave and the movie, The Matrix. Both the movie and the story are similar (it is said that The Matrix is based on The Allegory) and the main plots of the two can be compared. In The Allegory of the Cave, the people are chained up by their legs and necks in a cave from an early age, facing a wall. From
Wednesday, May 6, 2020
Fantasy vs. Reality Free Essays
Fantasy vs. Reality Blanche is sufficiently self-aware to know that she cannot survive in the world as it is. Reality is too harsh, so she must somehow create illusions that will allow her to maintain her delicate, fragile hold on life. We will write a custom essay sample on Fantasy vs. Reality or any similar topic only for you Order Now ââ¬Å"A womanââ¬â¢s charm is fifty percent illusionâ⬠(scene 2) she acknowledges to Stanley. Later in the story line when Mitch wants to switch the light on so that he can get a realistic look at her, she tells him that she does not want realism, she wants magic. When Mitch turns on the light during that scene it reveals much more to the audience than just what she really looks like, but it shows that all this time she has been living her life in the dark, hiding herself in the murky shadows of her promiscuity. Her ultimate goal was to manipulate reality until her fantasy becomes reality. She wants life to be lived in a permanent romantic glow, like the light that lit up the entire worlds when she first fell in love. But in this play, reality dominates. The realism of the setting, with its down-to-earth characters and the sounds of the busy life of this corner of New Orleans, suggests that Blancheââ¬â¢s illusions are not going to be sufficient. The fact that Blanche is probably aware of this too is what wins her the sympathy of the audience. Eventually, her thin hold on reality disappears altogether and she takes refuge in an illusory world in which she is about to go on a trip with her imaginary rich beau. The more desperate Blanche becomes in her loneliness, the more deeply she digs herself into an alternate reality, where she is the author of her own demise. Fantasy can be a hard mind set to overcome for most people. The more a person repeats a lieââ¬âthe more that person starts to believe it is reality. This is one of many themes that can be related to everyday life. How to cite Fantasy vs. Reality, Papers
Sunday, May 3, 2020
NSAs invasion of privacy free essay sample
Whether it is calling someone on your phone or online shopping on the computer, people are more connected than ever to the internet. However, a person might be oblivious to the fact that they are being watched using these technologies. The NSA (National Security Agency) is an intelligence organization for the U. S. to protect information systems and foreign intelligence information. Recently the NSA has been accused of invading personal privacy through web encryption, tracking, and using personal information for their own uses and without permission. The surveillance of the NSA produces unlawful invasion of privacy causing an unsecure nation. The NSA surveillance executed an unlawful invasion of privacy through tracking. They were caught tracking peopleââ¬â¢s cellphones, but the information gathered was supposedly never used. They have no right to track peopleââ¬â¢s cellphones because it is considered an invasion of privacy. According to Wyden the NSA is quite secretive about the collection of tracked cell data. ââ¬Å"â⬠¦the intelligence leadership has decided to leave most of the real story secret-even when the truth would not compromise national securityâ⬠(qtd. in ââ¬Å"NSA Chief saysâ⬠). The NSA is keeping information from people which create a less secure nation. This clarifies that the NSA is hiding more than just the information on the tracked cellphones. McDonald described the NSAââ¬â¢s surveillance as, ââ¬Å"Itââ¬â¢s like peekaboo, right? You have an entire world watching you and you just donââ¬â¢t know itâ⬠(qtd. in Chuang). She describes what it is like to be under NSA surveillance and not know anything about it. McDonald clarifies that by having the NSA track a person they are invading their privacy. This demonstrates that the NSA can track a person at any given time to see what theyââ¬â¢re doing and the person could be clueless about it. The author states that, ââ¬Å"The Times reported that the NSA was exploiting huge collections of personal data to create sophisticated graphs of some Americansââ¬â¢ social connections. The newspaper said the private data included Facebook posts and banking, flight, GPS location and voting records. â⬠(ââ¬Å"NSA Chief saysâ⬠). This implies that the NSA unlawfully tracked people using private data for exploiting. The NSA exploited many sources in order to attain information for their own use. They gave out information unlawfully that people could have been able to track the person. Nevertheless, tracking is acceptable if they track someone who is threatening the nation, however all information gathered must be reported. In summation, the NSA should be accused of unlawfully tracking because it is not only an invasion of privacy, but it also makes the nation unsecure by keeping information, tracking and exploiting. The NSA executed an unlawful invasion of privacy by utilizing personal information. In an article named ââ¬Å"What the NSA might have wanted to learn from tracking your phone,â⬠it states that the NSA did a series of experiments in 2010 and 2011, which gathered location and social network data. This proves that while they were ââ¬Å"experimentingâ⬠they still gathered data unlawfully. The experimenting of the NSA determines that citizens do not know what their information is being used for and are making people feel less secure. It is wrong for the NSA to distribute personal information. ââ¬Å"On a mission to detect untrustworthy employees, nearly 30 government agencies collected and shared personal information of thousands of Americans, many of whom had no ties to the federal governmentâ⬠(qtd. in Kastrenakes). Americans were tracked even when they had done no harm to the federal government. This justifies that they are invading the privacy of those who have done no harm by distributing their personal information without them knowing. Their personal information was shared to the unknown who could have invaded the personââ¬â¢s security. NSA has been able to gather private information such as a personââ¬â¢s address, phone number, family members, and even their social security number. Tracking online can have a positive outcome. Many companies have gathered personal information online to target ads with the userââ¬â¢s preferences, but tracking can allow companies to find out your credit card number, where you live and your interests. Hence, the NSA should be incriminated for utilizing personal information that can endanger a personââ¬â¢s security by using information from social networks, experimenting and distributing information. The NSA performed an unlawful invasion of privacy by using web encryption. Technologist, Christopher Soghoian, states that the NSA used supercomputers to gain access to encryption that provides online privacy and security. ââ¬Å"The encryption technologies that the NSA has exploited to enable its secret dragnet surveillance are the same technologies that protect our most sensitive information, including medical records, financial transactions and commercial secretsâ⬠(qtd. in Winter). Christopherââ¬â¢s explanation of the encryption technologies describes how anyone could be affected by this surveillance. This is considered unlawful because the NSA hacked technologies that protect our private information. This affects the security of the nation knowing that it is possible for someone to gain access to information that people have once though were private to them. This is not the first time that the NSA has tried to gain access to private information. In fact, ââ¬Å"For the past decade, NSA has led an aggressive multipronged effort to break widely used internet encryption technologiesâ⬠(Winter). The NSA has put an enormous amount of effort into hacking web encryption. The NSA has desired to have access to an individualââ¬â¢s personal information. This clarifies that the NSA had always had the intention to hack web encryption and have been planning this for a while. This questions if they are purposely hacking in order to have control of the internet. Encryption not only affects Americans, but it also affects the nation as a whole. ââ¬Å"Experts and critics say that while ââ¬Ëback doorsââ¬â¢ may help intelligence gathering, they weaken the Webââ¬â¢s overall security and trust, and could be used against Americansâ⬠(Winter). The author refutes the idea that web encryption can help intelligence gathering. By creating ââ¬Å"back doorsâ⬠the NSA is making the nation unsecure by creating an easier access for foreign countries to gain information. Forming ââ¬Å"back doorsâ⬠loosens the nationââ¬â¢s web security because it allows foreign countries to easily hack the nationââ¬â¢s internet and acquire information that could be used against the U. S. The plus side to using web encryption is that it helps intelligence gathering and helps detect threats toward the nation and foreign espionage. Even though it may create ââ¬Å"back doorsâ⬠to the internet which spies could have access to, they can easily fix that since they are in charge of protecting U. S. information and tracking the foreign intelligence information. In summation, the NSA should be accused of web encryption because not only does it invade an Americanââ¬â¢s privacy, but it also makes the internet unsecure by exposing Americans to criminal hacking, unlawful surveillance, and communications against the United States. The examination of the NSA produced an unlawful invasion of personal privacy creating an unsecure nation. This issue is significant because the nation should be aware of how corrupted the government is that they unlawfully track citizenââ¬â¢s personal information which creates a less secure nation and a less reliable government. The NSA should be accused of invading personal privacy through web encryption, tracking, and using personal information for their own uses and without permission. The unlawful surveillance should be stopped in order to protect the citizenââ¬â¢s security. ââ¬Å"We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform.
Subscribe to:
Posts (Atom)