Here is the synopsis of our sample research paper on Policymakers For The USA Patriot Act. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
4 pages in length. The writer briefly discusses what the USA Patriot Act is about, who its policymakers are and the importance of special interest groups in circumstances like these. Bibliography lists 6 sources.
Page Count:
4 pages (~225 words per page)
File: LM1_TLCPatAct.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
only escalated to extreme proportions due to the USA Patriot Act that seeks to thwart future terrorism by openly invading ones privacy. According to Jerry Berman, executive director for
the Center for Democracy and Technology (CDT), "the trouble with the bill is that its very sweeping and it can apply not just to suspected terrorists but people and organizations
that may be engaged in lawful actions" (Olsen, 2001). Understanding the relative importance of various policymakers, their respective roles in the overall process and the extent to which balance
of power from nongovernmental and public segments forces certain responses from policymakers is paramount to understanding the intricate association between/among the Acts policymakers: President Bush and Congress. Permission to "tap
phones and track Internet usage in the hunt for terrorists" (Olsen, 2001) was granted by President Bush in October 2001 amidst much controversy pertaining to privacy issues. In his
quest to protect America and the rest of the world from the handful of extremists who seek to destroy the tenets of freedom and democracy, Bush implemented this law as
a means by which to stop the transfer of vital information long before it reaches the wrong hands. "Today, we take an essential step in defeating terrorism while protecting
the constitutional rights of all Americans" (Olsen, 2001). However, many believe that such a step does more to deny constitutional rights than to protect them, ultimately causing one to
wonder "what constitutes a reasonable balance between security interests and the needs of a war on terrorism and the freedoms integral to a democratic society?" (Crotty, 2003, p. PG).
Monitoring and surveillance have come to represent just two of the villainous components of computer use in the late twentieth century, inasmuch as computers
...