American National Security and Technology Evolution Essay (Critical Writing)

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

The CIA and the NSA are the faces of the United States security and intelligence agencies. Since the establishment of both the CIA and the NSA, there has been progressing in technology. It is undeniable to acknowledge the fact that the CIA was previously used for special operations in other countries or any operations. Before the CIA was mandated with the intelligence services and collection of important information, the agency used conventional technologies during operations. Between 1947 and 1961, numerous reforms oversaw the CIA undertake the mandate of collection of scientific intelligence services on matters of security.

We will write a custom essay on your topic a custom Critical Writing on American National Security and Technology Evolution
808 writers online

On the other hand, the NSA has also been mandated to processing of intelligence information since its establishment in the year 1962. However, there are fundamental differences between the NSA and the CIA. For example, the National Security Agency (NSA) is mandated to encryption of foreign codes and securing of information using coding. This means that NSA process data for the security of the United States government. On the other hand, the role of the Central Intelligence Agency (CIA) is to gather information from international sources. The CIA only gathers, which is of concern or interest to the United States. In this respect, the evolution of technologies used by both agencies has changed over time.

Surveillance technology

Over the years, the United States security agency has used surveillance technologies as a means of spying and collecting data. The NSA has been on the receiving edge for using computerized networks that hack into other networks and collect data without the knowledge of others (Aid, 2010). In the meantime, NSA has resolved to use an intelligence remote computer tampering to keep track of all computers imported into the American soil (Aid, 2010). Another development is the use of EMF to detect bioelectric fields in humans (Aid, 2010). This means that an individual is tracked like a robot within the United States. This development has caused an outrage in the United States since people feel that this development infringes on their liberties and personal rights to privacy.

The CIA has also resolved to use surveillance technologies. The use of drones is the recent evolution of CIA technology. The drones are unmanned aircraft that can fire a missile (Richelson, 2002). The drones are remote-controlled and can hover within a certain territory without detection (Richelson, 2002). Drones technology has previously been used by the CIA to kill terrorists in Afghanistan and other regions (Richelson, 2002). Amid the success of this technology, there have been several complaints about the use of such technologies in warfare. Most certainly, the use of drones violates international law. The technology is equated to assassination tactics since they are unauthorized by the United Nations Security Council. To be precise, the use of drones is likened to state killings.

Conclusion

The evolution of technology by the NSA from conventional decrypting computers to the use of EMFs and the EMF brain stimulation is an example of how security has become a critical issue. Initially, the CIA was known to conduct operations as snipers and mercenaries. Today, the CIA is using advanced surveillance technology to gather information by using drones. The CIA is also trying to safeguard the interest of the United States by using drones as a counter-terrorism strategy.

References

Aid, M., M. (2010). The secret sentry: The untold history of the National Security Agency. New York, NY: Bloomsbury USA.

Richelson, T., J. (2002). The wizards of Langley: Inside the CIA’s directorate of science and technology. New York, NY: Basic Books.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper
Print
Need an custom research paper on American National Security and Technology Evolution written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2020, July 28). American National Security and Technology Evolution. https://ivypanda.com/essays/american-national-security-and-technology-evolution/

Work Cited

"American National Security and Technology Evolution." IvyPanda, 28 July 2020, ivypanda.com/essays/american-national-security-and-technology-evolution/.

References

IvyPanda. (2020) 'American National Security and Technology Evolution'. 28 July.

References

IvyPanda. 2020. "American National Security and Technology Evolution." July 28, 2020. https://ivypanda.com/essays/american-national-security-and-technology-evolution/.

1. IvyPanda. "American National Security and Technology Evolution." July 28, 2020. https://ivypanda.com/essays/american-national-security-and-technology-evolution/.


Bibliography


IvyPanda. "American National Security and Technology Evolution." July 28, 2020. https://ivypanda.com/essays/american-national-security-and-technology-evolution/.

Powered by CiteTotal, free citation service
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1