Saturday, November 22, 2014


ItGetsGutta: The Rationale
by Christian McCoy

Click this link to listen to ItGetsGutta, produced and performed by Christian McCoy   https://soundcloud.com/christian-mccoy-4/itgetsgutta


Yeah...It Gets Gutta...and my song merely provides a fair warning for individuals not only in the society of Rap/Hip Hop, but also within the society we all live in.  When it comes to the particular concept of this song, some members of our society may be completely unaware--unaware that it can get "gutta" at absolutely any moment. 

"Gutta", as it pertains to the context of my song, is a term some of us use to describe what other people may consider to be a more unpleasant or undesired aspect of life, specifically associated with the streets. Additionally, for a lot of MCs, a gutta lifestyle is what we're most familiar with, either first hand or simply from having to grow up living in an environment where the majority of people live a gutta lifestyle. 

Moreover, to provide some clarity in regards to my songwriting, for the sake of avoiding misinterpretations and assumptions, any song I write that may express messages of violence in any way, is metaphoric, and is really a subliminal statement of how I will "murder" you with bars or through my music--primarily. However, like most MCs, I have experienced a lot of things in the streets and life, generally, that have shaped my mentality to the extent that I would actually do the things I say, given a certain set of circumstances--if I have not already done them. As I am a man that seeks to always be understood by others, I have provided this explanation of my songwriting, but I also know that some people will perceive my songs the way they want to, no matter how I explain them, and I am at peace with that as well.

The concept for ItGetsGutta, initially derived from the feel that is generated by the beat. Weeks before I even made the beat for this song, I was constantly feeling the necessity and desire to create the most gutta and classic Hip Hop beat.  Now keep in mind the aforementioned definition I have provided for the word gutta. In my opinion, Rap/Hip Hop is essentially a product of the gutta lifestyle most of us are familiar with. I believe most MCs would agree that Rap/Hip Hop would not even exist if we were not, first, gutta.  Moreover, as the gutta lifestyle is, in a sense, the soil of the Hip Hop genre of music, we can also make reference to certain sounds or patterns that are gutta and fundamental to Hip Hop as well. In this case, the drum pattern of my song--as basic as it is--is one that I could not get out of my head, literally, for weeks before I made the beat.  I was literally telling myself, as I would travel from my job, "I'm about to make the most gutta fuckin' beat", and I would make that exact drum pattern aloud saying, "that's fuckin' Hip Hop...I'm Hip Hop"--true story.    

In regards to the lyrics...this is who I am all day!  I immediately felt so comfortable on the beat, as I'm sure any true MC would.  Obviously, I'm an avid fan of Jay Z, because as I was making the beat, the first bar came to me instantly, and I just went with it--"I remove ya roof, nigga, let the sun shine in". Borrowing that line seems as if it gave me the energy I needed to lace the track the rest of the way--'preciate that, Hov. 

Additionally, I feel like the way I approached the beat is exactly the way many of the greats have approached similar beats in the past, which is what I have been able to pick up from them as a fan. Thus, from a certain perspective, I'm just emulating them, but only because it's the type of music I want to hear. Yeah, I'll admit, I pretty much only create music I want to listen to, but if I share it with you, and you like it, my happiness is then maximized. 

My initial aim was to, sort of, galvanize the legendary faction of the Rap/Hip Hop community as well as listeners like myself.  On the contrary, however, as soon as the song begins, it's like I just take control, in a way that is determined to wake up those unconscious heads that may be unfamiliar with this gutta sound and lifestyle.  As I also feel like people are gradually forgetting about the particular feel you may get when you hear this song, my intention was to remind them that it still gets gutta or the essential "Holy Spirit" of Hip Hop is right here.  

Finally, the track takes a bit of a detour at the bridge, and conveys a more violent message, while still staying aligned with the overall theme. My intention here is to simply highlight the fact that no one is safe, because anyone can get murdered by anyone--regardless how civilized, upstanding, or totally meaningless they may appear to be. There are many people that are living very comfortable lives--comfortable as in complacent--on whatever level, and often neglect to consider what others are going through or what may be going on in the minds of others at any given time. Of course, nobody owes anybody anything, however, common courtesy is a must in this world! Innocent people are dying all the time just because a poor man like me is just tired of going without, and abruptly decides to kill you cause you've got what I want. Watch how you talk to people, treat people how you would like to be treated, and never underestimate anyone--especially me...'cause "I'll close ya curtain for dat cake, nigga"! 


Saturday, July 19, 2014


Issues Plaguing America
            Frankly speaking, my opinion is that the primary issues Americans must address, ultimately reside within the mentalities of the authoritative personnel throughout the public and private sectors.  Three things specifically?  Politics, leadership, and the individual.  What’s more, these three things—as obvious as it may be—are totally interrelated. 
First, in America, everyone is a politician and #LifeIsACampaign (P.E.A.C.E. to Big Chris Matthews).  Everything is based on the science of politics in America, if nowhere else.  That said, because this is true (and it is true because I said so), whether on Capitol Hill or at Walmart, individuals are constantly trying to get ahead one way or another, and oftentimes do not have the most meaningful motivation for their advancement.  Additionally, when people obtain positions of authority, it is easy for them to get caught up in the mere idea of having authority while being completely oblivious to the perpetual need to innovate, create and make a difference.  So the issue here is that the way of politics causes decision makers to make inadequate decisions, subconsciously or consciously seeking popularity more than reasonable solutions to problems—there is just too much politics.   
            Next, it does not seem to me that individuals in authoritative positions fully understand that these positions require authentic leadership abilities.  A leader does not always make the most popular decision, a leader is not always out front showing off, and a leader must often work in ways others are either unwilling to or lack the ability to.  There are a number of people in authoritative positions that think they have no business performing certain duties once they have obtained their position.  However, I know, firsthand, that seeing a superior get his/her hands dirty can be the most motivating experience for subordinates.  As a person in a position of authority, your job is to motivate people to do things a certain way by using your ability to lead, not only the power of your position.  This is a perspective, in my opinion, that does not seem to be a prominent part of the overall thinking associated with public or privately organized entities, and like “too much politics”, causes inadequate decision making as well as problems ultimately remaining unsolved. 

            Finally, it is imperative that an individual in a position of authority possess all of the above knowledge, wisdom and understanding, which will be apparent in his/her everyday conversation and actions.  If it is not noticed that an individual is equipped in this way, he/she is absolutely the wrong person to assume the responsibilities of an authoritative position.  Moreover, an individual should make an honest self-assessment to determine if they are aligned with all of the above before they even consider accepting the responsibilities of such a position.  Individuals must be honest with themselves about themselves, and also about others they may have the responsibility of appointing.  When individuals disregard the holistic perspective presented here, we simply have the wrong individual in an authoritative position, which is most certainly an issue I believe Americans must work diligently to resolve in order to be more effective in resolving the more noticeable issues.  

Saturday, June 28, 2014


All That: The Explanation
            All That is a song that was created out of a mixture of frustration, anger, and confidence. The fact that the beat for All That was essentially the first real beat I have ever made to actually coincide with a written song, had and has great meaning to me—it was empowering!  While writing the lyrics to the song and as the song was holistically coming together, it was like I was morphing into this Hip Hop mogul, sitting at my desk in my room.  As I was writing All That, lots of things were going through my mind—not being able to find a job and earn money, the fact that there are some people making money with music, in the mainstream, living very lavish lives, who couldn’t create a song better than me on my worse day, the fact that I can’t do the things I would really like to do for my son—I was literally prepared to kill!  With all of those underlying thoughts subconsciously, yet potently moving through my head, I started more consciously thinking, “Dude, I’ve got my own entertainment brand, I can spit, I’ve got a great ear for great music, I’m a businessman, I can make a good beat, I’m full of ideas…every role necessary to get the spaceship to the moon, I can effectively fulfill…every element the game requires is within me…I’m all that shit…I’m All That!” 
If you listen, you can clearly hear the frustration and anger in the first few lines: “you gon’ gimme that or meet my clique dressed in all black”, “You’ll get smashed quick for this cash, ya lil duffel bag boy quick to feel Christian’s wrath”, “Wanna stay alive, nigga? Better pay attention to me”.  Here, it’s obvious that I’m saying, that I’m here to take what you have, and if you’re not compliant, this encounter will be a bad experience for you—I’m prepared to kill you to obtain the money, the fame, and the existence that you have.  The messages in these lines not only express great frustration and anger, but weariness as well.  I will never forget how I was feeling as I was writing the lyrics to All That.
                                                Download ALLthat from iTunes

Handwritten Lyrics for All That 

First Verse




Second Verse




Additionally, as the first verse expressed my frustration and anger and was filled with such negative thoughts and energy, the second verse expressed my confidence and exemplified my “glass half full” mentality with lines like, “The hall of fame’s my destination, can’t be late for my appointment at the space station”,  and “I’m on the pace to make it like Dr.Dre, Diddy, and Jay did, go’on cut that cake, miss”—to me, mentally, I had transformed into exactly what I know I’ve always been…a uniquely powerful and, overall, great individual! Moreover, I felt a sense of relief when I began to write the second verse.  After getting those feelings I expressed in the first verse “off my chest”, I was honestly more “relaxed” mentally in regards to the composition of the song.  I was ready to convey to listeners who I am, what I am offering, and where I intend to end up.  Furthermore, if I must say so myself, it was all said pretty well.  All That along with a few other songs I have recorded are available for your listening pleasure on www.soundcloud.com.  Please do not hesitate to listen, like (or offer feedback of any kind), and share all of my music with your friends…P.E.A.C.E. and Love.
Sincerely,
Christian McCoy                        







Wednesday, February 19, 2014


 The Protected Privacy That’s Unsecured
Okay, so it seems that privacy rights and associated legislation primarily refer to the personal information American citizens willingly submit to organizations, information government agencies collect during investigations and general surveillance, individuals’ personal property, as well as environments which warrant an expectation of privacy.  That said, any right to privacy we have has been articulated by Supreme Court Justices via judicial opinions and court rulings, informed by perpetual interpretations of the Bill of Rights and other constitutional provisions and amendments, or explicitly expressed in various pieces of federal and state legislation.  Additionally, the general concept of the right to privacy is a derivative aspect of our civil liberties, and can also be linked to civil rights—which may also be considered as rights, enumerated or implied, in the Constitution.  Moreover, with the plethora of federal and state legislation regarding privacy, along with liberties and rights depicted in the national Constitution, United States’ citizens can be confident that their privacy is as well protected as it is unsecured.  Our real concerns about privacy rights and, more specifically, privacy invasions, should be centered on the ever-growing technological abilities of ordinary citizens, and the possibility of business organizations and government agencies neglecting to operate within company and legislative guidelines.
Although civil rights do not particularly pertain to privacy rights, there is an association, given certain situations.  Civil rights have more to do with unfair or uncivilized treatment by public organizations on the basis of race, gender, religion, sexual orientation or other personal characteristics.  The recent IRS scandal is a sufficient example of the relation between privacy and civil rights.  The Internal Revenue Service was accused of unfairly targeting “conservative groups who applied for tax-exempt status” (www.nationaljournal.com).  In this scenario, the behavior of the IRS was nothing less than the agency discriminating against conservative groups, clearly infringing upon their freedom to privately conduct their own business, legally, in their own way.  Another example, is the racial profiling of individuals.  This is discrimination as well, as it invades a person’s right to be left alone, on the basis of his or her ethnic background.  It is necessary that we are aware of the link between civil rights and the right to privacy provided in these two examples, as we strive to better mitigate these things in the future.
            Further, the concept of privacy rights can be likened to an offspring of civil liberties.  According to civilrights.findlaw.com, civil liberties “typically include basic rights and freedoms that are guaranteed by law—either explicitly identified in laws and constitutions, or interpreted through the years by courts and lawmakers” (2014).  Freedom of speech, the right to privacy, the right to be free from unreasonable searches and seizures, the right to a fair court trial, the right to marry, and the right to vote are all included in our civil liberty package deal.  However, the right to privacy stands out in this list because of its implied nature.  Although it is “guaranteed by law”, it is not “explicitly identified” in the constitution. 
              When discussing privacy rights, it is fundamentally significant to, establish an adequate understanding of the subject and the development of its jurisprudence.  With no explicit right to privacy expressed in our national constitution, any right to privacy we have is recognized as mere implications noticed when observing our civil liberties and other provisions and amendments, found in the Constitution.  These implications are the soil to the federal “common law approach” used in the development of privacy jurisprudence, while the Bill of Rights is the primary point of reference (www.intechopen.com, 2014).  Moreover, the 14th Amendment and its “guarantee” of liberty has also been used by the Supreme Court to determine a “fairly broad right of privacy”, providing the Court leverage to decide on a variety of different cases (law2.umkc.edu, 2014).  Ultimately, the Bill of Rights and other constitutional provisions and amendments encompass our civil liberties and civil rights, and has simply allowed us to determine the who, what, when, where, and how of privacy rights.
            Opinions written by Supreme Court Justices reflecting their interpretation of how constitutional provisions and amendments were used to sufficiently rule on certain questionable cases is the essence of the aforementioned common law approach that ever-develops privacy jurisprudence.  Various case law examples assist in providing a more clear understanding of how privacy jurisprudence is developed.  In Meyer v. Nebraska (1923), a “7-2 decision […] held that it was indeed a violation of the Due Process Clause” (atheism.about.com, 2014) to attempt to regulate what parents are allowed to teach their children.  According to atheism.about.com, this was one of the first cases that revealed implied liberty rights in the Constitution (2014).  The conclusions generated in Meyer v. Nebraska have been used in at least two other cases since then.  Because of Griswold v. Connecticut (1965)—one of the cases supported by Meyer—birth control was made legal.  Griswold also provided groundwork for the famous Roe v. Wade as well as Eisenstadt v. Baird—both of which also are examples of case law that has contributed to the jurisprudence of privacy.  The conclusions of the cases mentioned here have primarily contributed their own distinctive element to privacy jurisprudence, which allows us to have a better defined perception of the subject. 
Privacy rights have also been protected by many different laws legislators have specifically enacted for various reasons.  These laws have been established on the federal and state levels.  For example, the Privacy Act of 1974 is a “comprehensive law governing the protection of personal information in the possession of the federal government” (www.gsa.gov, 2014).  The Privacy Act’s intention is to ensure that personal information is used properly and that “agencies institute measures that prevent any misuse of information in their possession” (www.gsa.gov, 2014).  The Gramm-Leach-Bliley Act “imposes restrictions on the ability of financial institutions to disclose non-public personal information about consumers to nonaffiliated third parties and requires financial institutions to provide privacy notices to consumers” (www.cftc.gov, 2014).  The Health Insurance Probability and Accountability Act of 1996 (HIPAA) protects the privacy of personal health information. Additionally, there are 28 federal and state laws related to data privacy alone presented on informationshield.com (2014), which consist of laws such as the Cable Communications Policy Act of 1984, the Electronic Funds Transfer Act, the Information Security Management Act, and many more.  Although some of us may be unaware of it, our personal privacy is legally protected from a variety of perspectives on the national and sub-national levels, and it is clear that the subject has been thoroughly considered by legislators.
            After arriving at the conclusion that our privacy is indeed very well protected legally, why do we yet experience a sense of insecurity about the subject?  Why is it that we yet believe our privacy is not totally protected?  At the end of the day, we are insecure and we lack confidence in privacy protection because there will simply always be “those possibilities”.  Regardless of all of the laws that have been enacted on the federal and state levels, humans are still in control of it all, and some of us simply do not have the best intentions or discipline to make decisions of integrity in certain instances. 
            Edward Joseph Snowden is a computer specialist who once was employed by the Central Intelligence Agency (CIA), and was also a contractor for the National Security Agency (en.wikipedia.org, 2014).  Snowden is responsible for providing classified NSA documents to media outlets.  This was considered the most “significant leak in U.S. history” (en.wikipedia.org, 2014).  Moreover, even though Snowden indicated that his intentions were good, which has garnered support from certain people—and this example does not directly pertain to personal privacy—this is yet the “grandfather” of examples that support a profound point discussed in this paper. 
            Aside from the enactment of the Patriot Act of 2002, the leaking of the NSA documents by Edward Snowden is a factor that played a substantial role in provoking the current cynical mentality regarding privacy rights.  It is because of this leak of information that mass surveillance and government secrecy has been primary topics of conversation in the last year.  It is because of this leak that people seem so concerned with the possibility of their emails and telephone conversations being monitored.  Furthermore, according to wikipedia.org, Snowden specifically expressed that his “’sole motive’” for exposing the information was to “’inform the public as to that which is done in their name, and that which is done against them” (en.wikipedia.org, 2014).  This clearly supports any speculation of government agencies acting outside of legislative guidelines.
            Our ability to use the advanced technology we have developed today is growing in an exponential way.  This means that not only do government agencies and private business organizations need to tighten and maintain their virtual security, but those of us that live on our computers and other devices that allow us to exist virtually, must not hesitate to do the same.  Because the use of computers has become such a necessity, government agencies, private business organizations, and everyone existing virtually is knowingly or unknowingly engaging in a cyber-war.  This means that no computer system, personal data, or any kind of records stored virtually are any more protected than files stored traditionally in someone’s office. 
            Additionally, it seems that we simply cannot escape the technology once we have entered its realm.  It is wise for us, if we are interested in concealing things about our personal selves, to do the least amount of things electronically.  According to hg.org, many people that visit websites that require the submission of personal information, often neglect to read the “terms of use” statement included on most websites of that kind (www.hg.org, 2014).  The terms of use statement on these kinds of websites usually permits the company to track a person’s activity on that website as well as their general online activity “through the use of ‘cookies’” (www.hg.org, 2014).  Further, almost anyone can access your personal information by simply tapping into “public and private databases that gather buy and sell your vital statistics” (www.consumerreports.org, 2014).  Our personal information is often “used for direct marketing” and it may even sold to “third parties” (www.hg.org, 2014).  These facts only make us more wary about the security of our personal information in the hands of government agencies and private business organizations. 
Even ordinary individuals can hack into other peoples’ systems as well as systems belonging to government agencies (e.g. Edward Snowden and NSA documents), and private business organizations.  In 2013, the retail store, Target, had its system hacked, and the personal data of over 110 million customer’s was exposed (ww.bgr.com, 2014).  The breach exposed the credit and debit card information of at least “40 million” customers, according to bgr.com (2014).  Target customers probably would not have even considered something like that happening to them in a million years, nor would customers of any other retail establishment.  However, as mentioned previously, not only has technology advanced, but our ability to use technology has advanced in a remarkable way.  An expert explains that a program called “BlackPOS” (bgr.com, 2014) is possibly the tool that was used in the scam.  Although this is high-tech stuff, money can undoubtedly make almost anything happen these days.  The “malicious program” can be purchased on the black market for as low as $1800, and is a “specialized piece of malware designed to be installed on point-of-sale devices (POS) and record all data from credit and debit cards swiped through the infected system” (bgr.com, 2014).  Obviously, it is just that easy.
            Hence, it is very difficult to experience a sense of complete security after becoming aware of the many possibilities associated with cyber-war and the virtual invasion of privacy.  The use of technology is simply a more intelligent way of committing crimes—normally crimes dealing with the invasion of peoples’ personal information.  However, as we are constantly experiencing a cyber-war, it is important that we implement the necessary measures that will assist us in combat.  Extensive government oversight is needed in regards to enforcing proper use of citizens’ personal information.  As citizens, it is smart for us to limit the things we do electronically—which actually includes a wide range of things that may not be particularly as necessary as they are convenient.  Also, those of us that almost live our entire lives online must expediently take the proper precautions to keep out unwanted virtual guests.  These are just a few things we can do to experience a better sense of comfort as we yet share ourselves with the rest of the world.
            As oxymoronic as it may seem, it is appropriate here to say that our privacy is as well protected as it is unsecured.  While the many federal and state laws that have been established encompasses nearly every aspect of privacy we can think of, there are still individuals that either know our every move or are able to observe certain things about us at absolutely any time.  This is, without a doubt, an invasion of privacy, but can seriously be considered a potential threat to a person’s overall safety as well.  How secure can we really believe our privacy is if a Florida couple can intercept a Republican conference call in 1995 (Lane, 2001)?  There is really no question if the growth of our abilities to develop and use technology is considered.  Since 1995, we have grown from cellular phones that allow us to talk to other people, to cellular phones that allow us to talk to other people, text other people, send pictures to other people, submit a final paper to our college instructors, watch movies, and control things in our homes all from the same essential device we were using in 1995.  If ordinary people can create the type of cellular phones we have today from the ones we had in ’95, they most certainly can hack into Target’s database and steal customers’ personal information, or hack into their boss’ email account, or even hack into the NSA’s database and take classified documents.  Whether our personal information is exposed to a particular employee of the Central Intelligence Agency, a doctor’s office or the local library, it seems safe to believe that someone we do not even know has reached a level of intimacy with most of us to an extent we could never imagine.  Furthermore, it is affirmative: the national constitution’s provisions and amendments express civil liberties and rights that imply our right to privacy, just as legislators have been able to enact federal and state laws that protect it.  However, not only does it seem that laws are meant to be broken, it is fitting here to assert that they will be.      

Thursday, January 30, 2014

  The Truth About Privacy
            Ladies and gentlemen, boys and girls, you can rest assured that government agencies are watching as well as listening.  Executive agencies “across all levels [of government] are increasing engaged in collecting data on individuals” (www.intechopen.com, 2014), and by the looks of it, there is nothing particularly constitutional that can be done about it.  Even though there are more than half of the states in America that have express rights to privacy included in their constitutions that may exceed the privacy provisions mentioned in our national constitution (www.intechopen.com, 2014), the federal government yet has jurisdiction to watch your moves and listen to your conversations as long as their actions are aligned with related established laws.  Moreover, it is apparent that the general controversy regarding constitutional privacy protection, is meaningless unless a case is being explicitly examined by the courts.  Additionally, it is appropriate to understand here that citizens most certainly have a right to privacy, but to be aware of what constitutes privacy and how or when it is invaded is the most meaningful when considering the subject.
            Most American citizens will attest that having their personal privacy protected is of grave importance to them, and some would probably also be willing to express their oppositional perspectives regarding government agencies’ extended use of surveillance tactics.  However, most American citizens probably would not want to admit to their lack of knowledge and understanding of certain aspects of the subject—the ultimate reason for their oppositional perspectives.  For example, although it is merely a result of more exposure, there are too many American citizens that are only vaguely familiar with the national constitution—the essence of our government’s power—and have either forgotten or are simply unaware of the fact that state constitutions even exist.  If citizens are unaware of state constitutions, it is highly probable that they are also unaware of the more extended enumerated provisions of privacy rights that more than half the states in America have included in their constitutions.  Yes, American citizens have privacy rights which are protected by our national and some sub-national governments.  Moreover, the national constitutions’ supremacy clause gives federal provisions the upper-hand in questionable cases—yet another minor important detail that “disagreeables” may be oblivious to, causing them to lean towards the wrong direction when considering the right to privacy.
            Further, for the disagreeables’ sake, it is even more worthy of noting that there is no explicitly stated right to privacy in the U.S. constitution (law2.umkc.edu, 2014).  However, “the U.S. Constitutional system has always taken a […] common law approach to privacy jurisprudence” (www.intechopen.com).  The only specific privacy “protection” we have, derives primarily from questionable cases that have been examined and ruled on by members of the judiciary.  Furthermore, “the word ‘privacy’ is not used anywhere in the U.S. Constitution” (Fradella, Morrow, Fischer, & Ireland, 2011).  Albeit, this information may come as a surprise to many American citizens, it undoubtedly allows a more reasonable and meaningful opinion to be formed when considering the subject.
            Additionally, in acknowledging the meaninglessness of the general controversy surrounding constitutional privacy protection (i.e. without first having sufficient knowledge), it is appropriate to understand why the controversy even exists.  It is ultimately simple: people want to enjoy their privacy.  It is safe to assume that no American citizen wants to be monitored like a child, animal, or prisoner, especially when they have not committed a crime.  More importantly, people would like their personal information such as their financial and medical records to be kept confidential.  The Patriot Act of 2002 is legislation that ultimately allows government agencies to do whatever they want, and average American citizens that are unaware of those important minor legislative details and who rely mostly on the sayings of the “peanut gallery”, are dissatisfied.
            We do have a right to privacy, but historically, through the process of judicial review, privacy has had to be defined by various judicial opinions that have set the precedence for privacy protection.  The Bill of Rights is sort of the apparatus that members of the judiciary use to define privacy when reviewing questionable cases.  Research indicates that the “Bill of Rights remains central to the federal jurisprudence for privacy rights” (www.intechopen.com, 2014), and the constitution’s Fourth Amendment, particularly, has “become a fertile ground for privacy litigation” (www.intechopen.com).  Members of the judiciary have had to dig deep and only use what they believe may have been intended by the Framers as they were constructing Constitution.
            Ultimately, as Horowitz described privacy as a “privilege of personhood, which in turn is a right of citizenship” (1999), it is sensible to assert here that the majority of all Americans would much rather be governed by Horowitz’s description, allowing no difficulty in determining the violation of privacy rights in any situation.  Because the framers neglected to include any explicit indication of the right to privacy as they constructed the constitution and because other elements of the constitution are known to be so supremely assembled, it begs the question whether or not the omission of an explicit indication of the right to privacy was the premeditated intention of the framers.  Moreover, even if the framers did purposely omit an explicit indication of the right to privacy, they did not, however, omit the ever-evolving nature of the constitution. Thus, as provisions in the U.S. Constitution and other legislation are able to bring controversy about privacy to a halt, all there is to do now is continue to edify the existing structure.

References
Fradella, H. F., Morrow, W. J., Fischer, R. G., & Ireland, C. (2011). Quantifying katz: Empirically measuring "reasonable expectations of privacy" in the fourth amendment context. American Journal of Criminal Law, 38(3), 289-373. Retrieved from http://search.proquest.com/docview/912372141?accountid=32521

Horowitz, I. L. (1999). Networking america: The cultural context of the privacy v. publicity debates. Et Cetera, 56(3), 305-314. Retrieved from http://search.proquest.com/docview/204263138?accountid=32521