American National Security and Technology Evolution Essay (Critical Writing)

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Introduction

The CIA and the NSA are the faces of the United States security and intelligence agencies. Since the establishment of both the CIA and the NSA, there has been progressing in technology. It is undeniable to acknowledge the fact that the CIA was previously used for special operations in other countries or any operations. Before the CIA was mandated with the intelligence services and collection of important information, the agency used conventional technologies during operations. Between 1947 and 1961, numerous reforms oversaw the CIA undertake the mandate of collection of scientific intelligence services on matters of security.

On the other hand, the NSA has also been mandated to processing of intelligence information since its establishment in the year 1962. However, there are fundamental differences between the NSA and the CIA. For example, the National Security Agency (NSA) is mandated to encryption of foreign codes and securing of information using coding. This means that NSA process data for the security of the United States government. On the other hand, the role of the Central Intelligence Agency (CIA) is to gather information from international sources. The CIA only gathers, which is of concern or interest to the United States. In this respect, the evolution of technologies used by both agencies has changed over time.

Surveillance technology

Over the years, the United States security agency has used surveillance technologies as a means of spying and collecting data. The NSA has been on the receiving edge for using computerized networks that hack into other networks and collect data without the knowledge of others (Aid, 2010). In the meantime, NSA has resolved to use an intelligence remote computer tampering to keep track of all computers imported into the American soil (Aid, 2010). Another development is the use of EMF to detect bioelectric fields in humans (Aid, 2010). This means that an individual is tracked like a robot within the United States. This development has caused an outrage in the United States since people feel that this development infringes on their liberties and personal rights to privacy.

The CIA has also resolved to use surveillance technologies. The use of drones is the recent evolution of CIA technology. The drones are unmanned aircraft that can fire a missile (Richelson, 2002). The drones are remote-controlled and can hover within a certain territory without detection (Richelson, 2002). Drones technology has previously been used by the CIA to kill terrorists in Afghanistan and other regions (Richelson, 2002). Amid the success of this technology, there have been several complaints about the use of such technologies in warfare. Most certainly, the use of drones violates international law. The technology is equated to assassination tactics since they are unauthorized by the United Nations Security Council. To be precise, the use of drones is likened to state killings.

Conclusion

The evolution of technology by the NSA from conventional decrypting computers to the use of EMFs and the EMF brain stimulation is an example of how security has become a critical issue. Initially, the CIA was known to conduct operations as snipers and mercenaries. Today, the CIA is using advanced surveillance technology to gather information by using drones. The CIA is also trying to safeguard the interest of the United States by using drones as a counter-terrorism strategy.

References

Aid, M., M. (2010). The secret sentry: The untold history of the National Security Agency. New York, NY: Bloomsbury USA.

Richelson, T., J. (2002). The wizards of Langley: Inside the CIA’s directorate of science and technology. New York, NY: Basic Books.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, July 28). American National Security and Technology Evolution. https://ivypanda.com/essays/american-national-security-and-technology-evolution/

Work Cited

"American National Security and Technology Evolution." IvyPanda, 28 July 2020, ivypanda.com/essays/american-national-security-and-technology-evolution/.

References

IvyPanda. (2020) 'American National Security and Technology Evolution'. 28 July.

References

IvyPanda. 2020. "American National Security and Technology Evolution." July 28, 2020. https://ivypanda.com/essays/american-national-security-and-technology-evolution/.

1. IvyPanda. "American National Security and Technology Evolution." July 28, 2020. https://ivypanda.com/essays/american-national-security-and-technology-evolution/.


Bibliography


IvyPanda. "American National Security and Technology Evolution." July 28, 2020. https://ivypanda.com/essays/american-national-security-and-technology-evolution/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
1 / 1