Quiet Revolution On Real ID Details A Essay

PAGES
3
WORDS
1307
Cite

¶ … Quiet Revolution on Real ID details a middle path between the extremes on both sides of the issue. It is informative as well balanced. In the wake of 9/11, we can not afford to sit quietly back and wait for tragedy to happen again. In that tragedy, fake ids allowed a small group of terrorists to perpetrate the largest and most devastating attack on American soil in its history. What becomes largely apparent is that the delay of Real ID can make such days (or even worse) a reality for Americans. The solution that the authors of the article not only make sense but are critical to our survival as a nation, especially in the light of the threat of terrorist nuclear weapons to America. As recently as 25 April, 2011, an Investor's Daily article spoke about Wikileaks allegations about Khalid Sheikh Muhammad's threat of a "nuclear hellstorm" if Osama Bin Laden be caught or killed ("Investors.com") . It is rare that an issue so polarizes the public. While there have been calls from many quarters to reform and overhaul the national identification system. Using the word system is almost amusing when it is applied to the ad hoc conglomeration of federal, state and local identification systems. Finally, in 2005, the Congress acted on these pleas to transform and overhaul the system with the passage of the Real ID Act. In the article, Ying defines three different ways to reform system and how the 9/11 incident created a new window for the reform of the system and the development of the movement to do so in the period between 2001 and 2005 (Ni, and Ho 1063).

The closest thing to a national ID is represented by the social security card. Unfortunately, the social security card was never designed for this purpose and has been subject to a great amount of abuse and identity theft. State driver's licenses have also been employed as a de facto national ID. Like social security cards, the driver's license system has been the victim of the same abuses, including its...

...

Plugging in other easily counterfeited ID "systems" does not make things any better. In addition to the counterfeiting issue, there is also the problem of accessing the records due to different databases, as well as storage and access methods. The present issue is to create a "core" ID system that will interface conveniently with the other system (ibid, p. 1064).
The first of the three options used by other countries include the establishment of a national ID card system where the federal government establishes and maintains the system exclusively. Advantages include the ability to start the system from scratch using the latest technology and complete uniformity and access (such as biometric smart cards). Unfortunately, the main downside is political, with resistance coming from advocacy groups that fear government power and its impact upon individual privacy. The second approach entails the "data clearinghouse" approach where a federal agency coordinates and stores data gathered by local and state agencies but does not engage in the gathering itself. Politically, this is more acceptable due to less financial expense and the use of present technology. Downsides include the patchwork nature of the system and the lack of interoperability of the various systems. The third or federated approach attempts to strike a balance by using one system, the state drivers license, but by redefining their format and use. While the guidelines will be federal, the states will still be responsible to administer the system and gather and store data. A readable "zone" on the card will allow data uniformity and the ability for all parts of the system to read the database. Advantages include state management and federal coordination. In addition, core technologies are similar and coordinated. Unfortunately, the downsides include the decision about which standards to use…

Sources Used in Documents:

Works Cited

Ahers, Mike M. "Obama administration delays rule to improve driver's license security."

CNN. 2011. Web. 30 Apr 2011.

<http://edition.cnn.com/2011/POLITICS/03/04/real.id/>.

Ni, A.Y., and A.T.K. Ho. "The Real ID Act and U.S. National Identification System
http://www.nyclu.org/publications/no-freedom-without-privacy-real-id-acts-assault-americans-everyday-life-2009
.
http://www.nyclu.org/publications/no-freedom-ithout-privacy-real-id-acts-assault-americans- veryday-life-2009>.
<http://judiciary.house.gov/news/2011/march/REAL%20ID%20Letter.html>.
Honolulu StarAdvertiser. 2011. Web. 30 Apr 2011. <http://www.staradvertiser.com/news/20110428_State_drivers_licenses_ID_cards_do_not_conform_to_federal_rules.html>.


Cite this Document:

"Quiet Revolution On Real ID Details A" (2011, April 30) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/quiet-revolution-on-real-id-details-a-50718

"Quiet Revolution On Real ID Details A" 30 April 2011. Web.19 April. 2024. <
https://www.paperdue.com/essay/quiet-revolution-on-real-id-details-a-50718>

"Quiet Revolution On Real ID Details A", 30 April 2011, Accessed.19 April. 2024,
https://www.paperdue.com/essay/quiet-revolution-on-real-id-details-a-50718

Related Documents

Social Media and the Red Shirt Revolution Most scholars are in conflict with regard to the subject of revolution in the age of social media. Until now, revolution has been considered a top-down process. In Thai situation, things might have been different. The Red Shirt Revolution in Thailand was one of the first of the "Twitter" revolutions, that is one that was fueled by social media and Web 2.0 technology. Since

popularized social and cultural trends are merging, intentionally or not, toward laying the foundation for generating a new narrative about what it means to learn across a lifespan in an environment conducive to healthy living. It seeks to examine the coalescing of what is called lifelong learning side-by-side with the theories and practices related to the evolution of ecological thinking and environmental awareness. The idea that life can be

Wireless Broadband Technology
PAGES 50 WORDS 20344

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

(Vander Ploeg, 2003) Key findings stated in the report of Vander Ploeg include the following: Unlike the overall indications of municipal infrastructure needs, which identify water and wastewater infrastructure as having the greatest investment needs, western cities biggest needs exist in the transportation sector. In each of the cities except Vancouver, roads, bridges, interchanges, sidewalks and public transit make up at least half of the annual infrastructure deficit; This may be related

During this penultimate period of violence under Rojas, the violence that wracked Colombia assumed a number of different characteristics that included an economic quality as well as a political one with numerous assassinations taking place. These were literally contract killings there were sponsored by opposition forms. There were also horrendous genocidal acts that were carried out by gangs combined with authentic revolutionary fighting in some regions of the country. The fourth

Aristoxenos, two centuries after Pythagoras released his model, sought to discredit the standing theories held by Pythagorean devotees. In his works, he established that numbers are not relevant to music, and that music is based on perception of what one hears, not any mathematical equation. Descartes as well as Vincenzo Galilei (Galileo's father) both also discredited the music-to-math theories that formed the revolutionary basis for Pythagoras' music work, but not