Identity, security and democracy

Must be APA format, answer posts thoroughly, must have at least one verifiable, legitimate reference if needed no less than 150 words. Due Sunday September 1, 2019 @ 8PM EST @ 28 hours.

 

Week 2 Discussion #1.1

Girimonti

I think that in a perfect world, there would be a distinct balance in regards to security vs. privacy. Realistically, it seems that that balance ratio may not be achievable due to the ever lingering threats that could stand to pose harm to the public. I personally believe that the use of bio-metric technology is well suited as a separate layer of physical security that, when properly deployed, can be extremely effective at keeping personal things such as personal information secure. The ironic fact is that while it can be used to protect our personal information there is a real concern that it could actually be used to gain access to personal information. In the wrong hands, the use of bio-metrics can be detrimental to those who use it to protect valuable information or to keep potential plans confidential.

One of the main concerns I have in regards to the three categories is function creep. While this may be nothing more than a personal worry, it is not hard to let the mind drift off to the possibility that any personal information may be used for information other than what is stated at the time of collection. “When biometrics is instead used to offer an identity to individuals solely for the purpose of categorization, we can then consider this to be an unwelcome risk of this technology.” (Mordini, 2009) Issues such as categorization as mentioned above could be an alarming threat, however there seems to be very little evidence to suggest that this is an actual occurring practice. I think that ethically there is very little concern other than what the potential could be if these programs or technology fell into the wrong hands of those who intend to use them for malicious purposes

References:

Mordini, E., & Green, M. (2009). Identity, security and democracy: the wider social and ethical implications of automated systems for human identification. Amsterdam: Ios Press.

 

Response #1.1

 

Discussion #1.2

 

Wilkerson posted Aug 27, 2019 7:24 PM

Subscribe

I feel that there is a valuable use for biometrics in the safety of the Nation. But, the use must be regulated and guarded. I have been fingerprinted several times throughout my life and have also had my DNA taken. I exist in several databases and have had that information breached. But still, my stance is the benefits outweigh the possible draw backs. I have identity theft monitoring for the possibility that the data breach compromised my SSN. And by having my DNA on file I can be cleared of any false accusations. I am not so naive as to think that this information could not be used by criminals or enemies for nefarious purposes. But, I have faith in our system and ultimately those individuals would be discovered and defeated. I can accept fingerprinting, DNA acquisition and retinal scans to access secured areas. But I do not think data mining of my electronic and online footprint is as acceptable. There should be limits on the use of that information. Stopping terrorist plots and criminal behavior is perfectly acceptable. Selling the fact that I looked for a couch is not acceptable. I should not log off my computer after just looking up a price for widget A and turn on my phone to see ads for the same widget.

Response #1.2

Where the last two discussions below formed there opinion.

D2.2 will bring us in contact with cultural relativism at the local level. You may not initially see the connection but as we move through this discussion, I will post my comments and I am confident that you will see cultural relativism at work. Mayor Keegan served the city that I worked for. This scenario impacted me in a couple of profound ways. I will share those impacts as we move through the discussion.

 Instructions:

 1) Put on the hat of the City Manager and or City Council Members

 2) Has a breach of ethics occurred in this situation?

 3) If so, what was the breach? If not, why not?

 4) In your capacity of City Manager/City Council Member, what actions would you recommend?

 5) Take off the official hat and tell us your personal reaction.

 Case Study Article: Wednesday, July 17, 2002-                                                           Section B

 

 Headline: “Keegan copies article’s words, uses as his own”

By Chip Scutari-The Arizona Republic

       Congressional candidate John Keegan cut and pasted several paragraphs from an article on the Heritage Foundation Web site and used it as his own answer in a newspaper questionnaire that is used to help make recommendations in statewide elections.

     Most of Keegan’s answer about Social Security is taken verbatim from an article written by David C John for the popular conservative think tank. The Peoria mayor was responding to questions that The Arizona Republic asks every congressional candidate. Keegan, a Republican, is running in the 2nd Congressional District, which covers much of the West Valley, northwestern Arizona and the Hopi Reservation in northeastern Arizona.

     The first paragraph of Keegan’s answer and John’s article both read: “Social Security reform will not affect today’s senior citizens. The program has more than enough resources to pay them full benefits for the rest of their lives.”

     There is no attribution contained in his answer. The third and fourth paragraphs also are lifted word-for-word from the same article on the Heritage Foundation Web site. Near the end of his questionnaire, Keegan includes a line that says:

     “In preparing these answers, I drew on a variety of sources; some were think tanks that I admire such as the Hoover Institution, Empower America and Heritage Foundation.”

     Keegan said that he’s comfortable with that attribution.

     “I like the stuff they write.” Keegan said. “I like their stuff on things that I don’t have a personal background on.

     Since 1994, the Heritage Foundation has written a ‘candidates briefing book to guide lawmakers on crucial election issues. Keegan said he leans on that book for advice on different topics.

     In addition to questions about Social Security, the survey asks the West Valley congressional candidates about national security, taxes, immigration and Luke Air Force Base. The answers along with research and candidate interviews help The Arizona Republic editorial board make its recommendations

 Not first controversy

      This isn’t the first time Keegan has been embroiled in a campaign controversy. In 1994, it was found that he had more than 20 forged signatures on his nominating petitions that he sent to the Secretary of State’s Office. He eventually quit that legislative race, which then political newcomer Scott Bundgaard eventually won.

     Bundgaard, who has battled Keegan in the past, said he’d let voters decide about Keegan’s ‘problem’.

     “We’ve got more serious issues facing this country, like cutting taxes, improving education and making health care accessible,” Bundgaard said. These issues are more important than whether a candidate is copying someone else’s homework. I trust the voters to decide whether this problem is important to them.

     Bundgaard, a state senator, and Keegan are locked in a seven-way GOP primary to fill Bob Stump’s seat in Congress. Stump has issued a ringing endorsement of Lisa Atkins, his chief aide of 26 years, to succeed him. Former state legislator and children’s advocate Trent Franks is also running.

     The Atkins campaign didn’t want to comment.

     The three other Republicans running in the 2nd Congressional District are Dick Hensley, Dusko Jovicic and Mike Schaefer.

     Keegan’s wife Lisa was Arizona’s superintendent of public instruction from 1994 to 2001, when she left to work for a think tank in Washington, DC.

     In the summer of 1994, Keegan acknowledged that the signatures might have been forged as he tried to run for the statehouse.

     At the time, he said he had hired a college student know to him only as “Bob” to collect signatures. But when “Bob” was never found, Keegan bowed out of the race.

 

Discussion #2.1

 

Girimonti posted Aug 29, 2019 8:58 PM

 

Subscribe

I believe that a breach of ethics has occurred. Mr. Keegan failed to answer the questions from a personal and professional standpoint and instead used others work, word for word, for his response. The breach of ethics did not necessarily occur when he failed to give credit to this association in particular but I believe it came during a crucial time in his campaign where his answers needed to come from personal knowledge and experience rather than citing an outside source.

My actions would be a simple apology for the answers as well as a direct question and answer session regarding the matters that were cited. Instead of drawing out the matter into political litigation I think the main message would be a sincere apology for taking “shortcuts” and a personal defense of character to hopefully mend the broken trust between Mr. Keegan and the public.

Personally I feel that this is a slight breach of ethics but more of a testament to the type of character that is representative of this person. Whether or not this candidate used these answers to intentionally take a shortcut, there isn’t much evidence to show that this was done with any type of malicious intent. I think that in the world of politics a small infraction such as this can, and usually is, drawn out with the intention of smearing another candidate look bad.

 

 

 

Response #2.1

Discussion #2.2

Jilcott

The expectation for a manager is that they are either a subject matter expert in a field or know where they can get the most accurate information.  Should Keegan have given the Heritage Foundation credit fo there work? Absolutely!! Is he required to? I don’t think so.

Being a student and a professional are on two different sides of this spectrum. It makes a student look like a cheater because they are doing this for a grade but when giving this information to the public the majority of them wouldnt care wher it came from as long as they do not have to look it up. I think the major problem would be how his integrity would suffer, especially after he is outted. It makes him look lazy for the most part and that could harm his reputation greatly and when you are in a public office that is all you have.

Lut us not believe that this is the only place this has happened in politics. Every day we have politicians spitting out information as their own, and we can be sure that they were not even the ones that researched it or even wrote the information for how it was disseminated.

Describe, in detail, the structure (org chart so to speak) and positions of the ideal security department

Describe, in detail, the structure (org chart so to speak) and positions of the ideal security department. Also, write a brief job description for yourself as the Chief Security Officer of this security organization.

TECHNICAL GUIDANCE:

  • Your paper should be a minimum 2-3 pages (the Title Page and References page will be additional pages).
  • Type in Times New Roman, 12 point and double space. Please provide a separate heading for each question.
  • Students will follow the APA 6 Style as the sole citation and reference style used in written work submitted as part of coursework. See http://www.apus.edu/content/dam/online-library/resources-services/Fuson_2012_APA.pdf
  • Use scholarly or other relevant sources.
  • Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize: books, peer reviewed journals, articles, archived documents, etc. (may be electronic of course and the APA manual lists all the types of possible resources and reference formats, hint…hint), and valid web sites (use caution with these).
  • This assignment will be graded using the attached rubric.

Complete the ICS 215 form (this is a worksheet and does not become part of the Incident Action Plan) to determine the resource needs for your discipline to accomplish incident objectives

Task #4: Simulated Tactics/ Planning Meeting (Individual) (7.2 points) (submitted Week #8)

This is step is being completed as an individual task.  In an incident, the actual tactics and planning meetings would be completed as a command and general staff group.  The tactics meeting is where the specific actions that need to be taken to meet incident objectives are determined.  This leads to the identification of specific resources that will be needed to accomplish incident objectives (personnel, equipment, and other typed resources).  For this task, you will focus on your assigned response discipline and consider the organization and resources needed to successfully accomplish the incident objectives.  You should quickly realize how large a task this is if you engaged it across the response disciplines. Use the DHS Resource Typing Library Tool (https://rtlt.preptoolkit.fema.gov/Public)  examine specific resource types.  The resources listed within the Central City materials may not be named consistent with the types resources as these are a relatively recent development for some response disciplines.

  1. Complete the ICS 215 form (this is a worksheet and does not become part of the Incident Action Plan) to determine the resource needs for your discipline to accomplish incident objectives.  Make sure that your allocations are realistic and could be obtained with the initial short time period of the incident.  Use the Central City Document to specifically identify resources available in the vicinity. Upload ICS-215 to the Assignments Folder.
  2. Use the incident map to specifically describe where you will stage and assign requested resources.  (Ex. – If you are making a perimeter make sure you show how your resources will secure a perimeter – 1 Central City Police Officer at the corner of 1st Street and Third Avenue).  You will need to write a 2-3 page narrative, but can also support it with a map if you have the technology available to manipulate the map.  Using a map is not required, but you must specifically describe how the resources will be assigned and the function they will perform.  (Remember if you going to have 100 firefighters you need to explain to me where they came from)  Upload description to the Assignment Folder.
  3. For one of the groups you created in the operations section in task #3 complete an ICS-204 form that details the personnel and the control operations to be completed by the group.  Be specific in location and action.  (Just as in completing the ICS-215 consider what it would take to complete ICS 204s for each element in your discipline and across all of the response disciplines) Upload to assignments folder.

GRADING AND SUBMISSION INSTRUCTIONS FOR THIS TASK:

Complete the ICS 215 form and upload to assignment folder.

Upload description of resources and uses to the Assignment Folder.

Complete ICS 204 form and upload to the assignment folder.

A S S I G N M E N T L I S T ( I C S 2 0 4 ) 1. Incident Name:

2. Operational Period: Date From: Date To: Time From: Time To:

4. Operations Personnel: Name Contact Number(s)

Operations Section Chief:

Branch Director:

Division/Group Supervisor:

3.

Branch: 1 Division: 1 Group: 1 Staging Area: 1

5. Resources Assigned:

Resource Identifier Leader # o

f P

er so

ns

Contact (e.g., phone, pager, radio frequency, etc.)

Reporting Location, Special Equipment and Supplies, Remarks, Notes, Information

 

6. Work Assignments:

7. Special Instructions:

8. Communications (radio and/or phone contact numbers needed for this assignment): Name/Function Primary Contact: indicate cell, pager, or radio (frequency/system/channel) / / / /

9. Prepared by: Name: Position/Title: Signature:

ICS 204 IAP Page _____ Date/Time:

 

 

ICS 204 Assignment List Purpose. The Assignment List(s) (ICS 204) informs Division and Group supervisors of incident assignments. Once the Command and General Staffs agree to the assignments, the assignment information is given to the appropriate Divisions and Groups. Preparation. The ICS 204 is normally prepared by the Resources Unit, using guidance from the Incident Objectives (ICS 202), Operational Planning Worksheet (ICS 215), and the Operations Section Chief. It must be approved by the Incident Commander, but may be reviewed and initialed by the Planning Section Chief and Operations Section Chief as well. Distribution. The ICS 204 is duplicated and attached to the ICS 202 and given to all recipients as part of the Incident Action Plan (IAP). In some cases, assignments may be communicated via radio/telephone/fax. All completed original forms must be given to the Documentation Unit. Notes: • The ICS 204 details assignments at Division and Group levels and is part of the IAP. • Multiple pages/copies can be used if needed. • If additional pages are needed, use a blank ICS 204 and repaginate as needed.

Block Number Block Title Instructions

1 Incident Name Enter the name assigned to the incident. 2 Operational Period

• Date and Time From • Date and Time To

Enter the start date (month/day/year) and time (using the 24-hour clock) and end date and time for the operational period to which the form applies.

3 Branch Division Group Staging Area

This block is for use in a large IAP for reference only.

Write the alphanumeric abbreviation for the Branch, Division, Group, and Staging Area (e.g., “Branch 1,” “Division D,” “Group 1A”) in large letters for easy referencing.

4 Operations Personnel • Name, Contact Number(s)

– Operations Section Chief – Branch Director – Division/Group Supervisor

Enter the name and contact numbers of the Operations Section Chief, applicable Branch Director(s), and Division/Group Supervisor(s).

Resources Assigned Enter the following information about the resources assigned to the Division or Group for this period:

• Resource Identifier The identifier is a unique way to identify a resource (e.g., ENG-13, IA-SCC-413). If the resource has been ordered but no identification has been received, use TBD (to be determined).

• Leader Enter resource leader’s name. • # of Persons Enter total number of persons for the resource assigned, including the

leader.

5

• Contact (e.g., phone, pager, radio frequency, etc.)

Enter primary means of contacting the leader or contact person (e.g., radio, phone, pager, etc.). Be sure to include the area code when listing a phone number.

5 (continued)

• Reporting Location, Special Equipment and Supplies, Remarks, Notes, Information

Provide special notes or directions specific to this resource. If required, add notes to indicate: (1) specific location/time where the resource should report or be dropped off/picked up; (2) special equipment and supplies that will be used or needed; (3) whether or not the resource received briefings; (4) transportation needs; or (5) other information.

 

 

 

 

Block Number Block Title Instructions

6 Work Assignments Provide a statement of the tactical objectives to be achieved within the operational period by personnel assigned to this Division or Group.

7 Special Instructions Enter a statement noting any safety problems, specific precautions to be exercised, dropoff or pickup points, or other important information.

8 Communications (radio and/or phone contact numbers needed for this assignment) • Name/Function • Primary Contact: indicate

cell, pager, or radio (frequency/system/channel)

Enter specific communications information (including emergency numbers) for this Branch/Division/Group.

If radios are being used, enter function (command, tactical, support, etc.), frequency, system, and channel from the Incident Radio Communications Plan (ICS 205).

Phone and pager numbers should include the area code and any satellite phone specifics.

In light of potential IAP distribution, use sensitivity when including cell phone number.

Add a secondary contact (phone number or radio) if needed. 9 Prepared by

• Name • Position/Title • Signature • Date/Time

Enter the name, ICS position, and signature of the person preparing the form. Enter date (month/day/year) and time prepared (24-hour clock).

 

  1. ICS 204 2:
    1. Date From:
    2. Date To:
    3. Time From:
    4. Time To:
  2. ICS 204 1:
    1. Incident Name:
  3. ICS 204 4:
    1. Branch Director:
    2. Division/Group Supervisor:
    3. Operations Section Chief:
  4. ICS 204 3:
    1. Branch:
    2. Division:
    3. Group:
    4. Staging Area:
  5. ICS 204 5:
    1. Resource Identifier 2:
    2. Resource Identifier 3:
    3. Resource Identifier 4:
    4. Resource Identifier 5:
    5. Resource Identifier 6:
    6. Resource Identifier 7:
    7. Resource Identifier 8:
    8. Resource Identifier 1:
    9. Resource Identifier 9:
    10. Resource Identifier 10:
    11. Leader 1:
    12. Leader 2:
    13. Leader 3:
    14. Leader 4:
    15. Leader 5:
    16. Leader 6:
    17. Leader 7:
    18. Leader 8:
    19. Leader 9:
    20. Leader 10:
    21. # of Persons 1:
    22. # of Persons 2:
    23. # of Persons 3:
    24. # of Persons 4:
    25. # of Persons 5:
    26. # of Persons 6:
    27. # of Persons 7:
    28. # of Persons 8:
    29. # of Persons 9:
    30. # of Persons 10:
    31. Contact (e:
      1. g:
        1. , phone, pager, radio frequency, etc:
          1. ) 1:
          2. ) 2:
          3. ) 3:
          4. ) 4:
          5. ) 5:
          6. ) 6:

The Constitutional Role of Judges from 1:09 into video to 1:15. Then 2:04 to 2:10.

The Constitution speaks in a very clear voice on some matters. For example, it says that the United States House of Representatives shall be apportioned according to the population in the states, or that the Senate shall be composed of two senators per state. But other clauses are not so clear. For example, what is meant by the 8th Amendment’s prohibition of cruel and unusual punishment, the 2nd Amendment’s reference to the right to bear arms, or the 4th Amendment that deals with unreasonable searches and seizures? Does the 8th Amendment, for example, allow the government to execute people for certain crimes? Does the 2nd Amendment allow people to own guns? Does the 4th Amendment allow the state to search your home without a warrant? These and many other issues are open to interpretation due to the words in the Constitution.

Two Supreme Court justices, Scalia and Breyer,  discussed two different ways of viewing the Constitution–the “original meaning” of the document and the “living Constitution.” For example, the “originalists” (Scalia) argue that the 8th Amendment’s prohibition against cruel and unusual does not prohibit the death penalty.  Those who support the “living Constitution” argument (Breyer) say that the Constitution should reflect new circumstances and “evolving standards of decency.”

Please view the videos on the Constitution. Focus on the different ways that Justices Breyer and Scalia interpret the Constitution.

1. Original Intent and the Living Constitution  start 12 minutes into the video

2. The Constitutional Role of Judges  from 1:09 into video to 1:15. Then 2:04 to 2:10.

We will focus on the Eighth Amendment to the Constitution for our discussion this week

The Eighth  Amendment to the Constitution says the following:

“Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted.”

Your question for the week: Does the United States Constitution prohibit or allow the use of the death penalty in the United States? 

You must make your argument from the “originalist” or “living Constitution” perspective.  Do not just state your personal opinion. Use arguments from Scalia (originalist) or Breyer (living Constitution) to support your argument.