1
WMD PROLIFERATION: A NEW PHASE TO TERRORISM 2
WMD Proliferation: A New Phase to TerrorismMax Little
American Military University
HLSS498
Professor Stork
12, March, 2016
Research Question
The research question is: How will weapons of mass destruction proliferation develop into a new phase of terrorism in South West Asia? To develop this research question the first topic that was review was weapons of mass destruction (WMD) proliferation. In order to answer the question about WMD proliferation there has to be a basic understanding of what WMD proliferation is. This is developed by asking: What is WMD proliferation? Why does WMD proliferation happen? How does WMD proliferation happen?
Once the basic understanding of WMD proliferation is reached, there must be general knowledge basis that there is research developed on WMD proliferation. Once it is determined, that there is enough research to develop understanding of WMD proliferation, this can develop particular questions that research can be built upon. Some of these questions that can be built upon would be: How will WMD proliferation affect the security of the United States? Who are the main countries to be cautious about as WMD proliferators? What are the contributing factors that develop into WMD proliferation?
To develop the final attributes to the research question this is done by evaluating the questions that were previously stated. Some of these evaluations of the questions would be: Is this research question a common interest to other researchers and others that would examine the material? This is the understanding that answer this research question would be valuable to the field of WMD proliferation. The question is found to be valuable because WMD proliferation is a current problem that needs to be solved. This determines the question to be feasible with the methodologies of reading other published works on WMD proliferation. This crates the ability to reach the research question of: How will weapons of mass destruction proliferation develop into a new phase of terrorism in South West Asia? Creating a research question that is focused and not to narrow.
Purpose statement
The goal of this paper is to examine the effects of WMD proliferation in Pakistan and the areas around the region. That nature of this topic is to create a comparative and chronological analysis of how WMD proliferation adds to the extreme political agenda of terrorists. Constant political instability in Pakistan provides an example of how this could lead to nuclear material or technologies being obtained by terrorist organizations (Kerr, P. & Nikitin, 2012).
More extensive and expanding nuclear programs in Pakistan could lead to accidental WMD proliferation in and around South West Asia (Kerr, P. & Nikitin, 2012). This paper will examine weapons of mass destruction and proliferation. The focus will be on that WMD proliferation could develop into a new phas ...
Procuring digital preservation CAN be quick and painless with our new dynamic...
1WMD PROLIFERATION A NEW PHASE TO TERRORISM .docx
1. 1
WMD PROLIFERATION: A NEW PHASE TO TERRORISM
2
WMD Proliferation: A New Phase to TerrorismMax Little
American Military University
HLSS498
Professor Stork
12, March, 2016
Research Question
The research question is: How will weapons of mass destruction
proliferation develop into a new phase of terrorism in South
West Asia? To develop this research question the first topic that
was review was weapons of mass destruction (WMD)
proliferation. In order to answer the question about WMD
proliferation there has to be a basic understanding of what
WMD proliferation is. This is developed by asking: What is
WMD proliferation? Why does WMD proliferation happen?
How does WMD proliferation happen?
Once the basic understanding of WMD proliferation is reached,
2. there must be general knowledge basis that there is research
developed on WMD proliferation. Once it is determined, that
there is enough research to develop understanding of WMD
proliferation, this can develop particular questions that research
can be built upon. Some of these questions that can be built
upon would be: How will WMD proliferation affect the security
of the United States? Who are the main countries to be cautious
about as WMD proliferators? What are the contributing factors
that develop into WMD proliferation?
To develop the final attributes to the research question this is
done by evaluating the questions that were previously stated.
Some of these evaluations of the questions would be: Is this
research question a common interest to other researchers and
others that would examine the material? This is the
understanding that answer this research question would be
valuable to the field of WMD proliferation. The question is
found to be valuable because WMD proliferation is a current
problem that needs to be solved. This determines the question to
be feasible with the methodologies of reading other published
works on WMD proliferation. This crates the ability to reach
the research question of: How will weapons of mass destruction
proliferation develop into a new phase of terrorism in South
West Asia? Creating a research question that is focused and not
to narrow.
Purpose statement
The goal of this paper is to examine the effects of WMD
proliferation in Pakistan and the areas around the region. That
nature of this topic is to create a comparative and chronological
analysis of how WMD proliferation adds to the extreme
political agenda of terrorists. Constant political instability in
Pakistan provides an example of how this could lead to nuclear
material or technologies being obtained by terrorist
organizations (Kerr, P. & Nikitin, 2012).
More extensive and expanding nuclear programs in Pakistan
could lead to accidental WMD proliferation in and around South
West Asia (Kerr, P. & Nikitin, 2012). This paper will examine
3. weapons of mass destruction and proliferation. The focus will
be on that WMD proliferation could develop into a new phase of
terrorism due to political instability, improper security, and a
nuclear arms race in South West Asia.
To develop the purpose statement the scope, purpose, and
direction of the paper needs to be determined. The reader will
be able to identify what to expect in the paper, and what the
paper will specifically focus on. A common beginning to the
purpose statement was developed from the research question.
The common beginning for a purpose statement that was used
was “This paper will examine…” It gave a promise to the reader
that there was a development to the argument that Weapons of
mass destruction proliferation could develop into a new phase
of terrorism due to political instability, improper security, and a
nuclear arms race in South West Asia. This does not provide a
conclusion, but just a preview of what the paper will include.
This purpose statement was included at the end of the
introduction since this is where purpose statements are
commonly located. This specific purpose statement was
expressed in more than one sentence throughout the purpose
statement paragraph. The purpose statement was designed to
satisfy the requirements of the current assignment of the
research paper for HLSS498.
Design statement
This paper will include primary and secondary research sources.
These sources will be found from the APUS Library that will
include a minimum of six peer reviewed resources. Two other
resources will also be found that will add to a total of eight
resources. From these resources a comparative analysis will be
conducted to conclude what information is relevant to proving
the thesis in the purpose statement to be correct. This would
include reading and reviewing all resources that a relevant to
the information provided. This could include adding more
resources than what was initially determined to be enough.
The paper will then have to be focused on the different criteria
that are set out for this paper. This would include a
4. Focus/Thesis that provides understating of the current
assignment and articulates a very clear hypothesis to the reader.
Content/Subject Knowledge will have to be shown to prove
there is a demonstration of deep knowledge of the subject and
the readings. Critical Thinking Skills will have to be present to
show problem solving, ideas and conclusions that are well
argued, and making sure that any assumptions are very well
articulated. This will be done by developing the paper in a word
document that meets the APA guidelines with citations and
resources. This will develop into a 10 – 12 page paper that
meets and exceeds the criteria of the rubric.
The paper design will start with an abstract that gives a quick
summary of the contents explaining WMD proliferation and the
affects. This will lead into an appropriate introduction that
draws the reader into the research of WMD proliferation. The
body of the paper will include how political instability,
improper security, and a nuclear arms race can add to WMD
proliferation. There will be proper conclusions to each subtopic
that easily leads the reader into each different subtopic sections
of the paper. The paper will end with a proper conclusion that
compares all evidence, and provides an ending/resolution to the
focus/thesis.
Research Question:
How will weapons of mass destruction proliferation develop
into a new phase of terrorism in South West Asia?
Thesis:
Weapons of mass destruction proliferation could develop into a
new phase of terrorism due to political instability, improper
security, and a nuclear arms race in South West Asia.Comment
by Matthew Stork: Concise and specific! Well done.
5. References
Cimbala, S. (2012). Chasing its tail nuclear deterrence in the
information age. Strategic Studies
Quaterly.
Graham, B., & Talent, J. (2008). World at risk: The report of
the Commission on the Prevention
of WMD Proliferation and Terrorism. New York: Vintage
Books.
Kerr, P. & Nikitin, M. (2012). Pakistan’s nuclear weapons:
proliferation and security issues.
Current Politics and Economics of the Middle East.3(2).
Leonard W. & William E. (2010). An end to the fourth wave of
terrorism?.terrorism? Studies in Conflict & Terrorism 33(7),
594-602, DOI: 10.1080/1057610X.2010.483757.
Nagl, J. (2000). Defending against new dangers: arms control of
weapons of mass destruction in
a globalized world. World Affairs.162(4).
Rasler, K. & Thompson, W. (2009). Looking for waves of
terrorism. Terrorism and Political
Violence. 21(1), 28 – 41, DOI: 10.1080/09546550802544425.
Russell, J. (2006). WDM proliferation, globalization, and
international security: Whither the
nexus and national security? Strategic Insights. 5(6).
Sidhu, W. (2006). Proliferation, non-state actors, and the impact
on global security. Geneva
Centre for Security Policy. 19.
Vignard, K. (2008). Engaging non-state armed groups. United
Nations Institute for Disarmament
6. Research.1.
Yusuf, M. (2009). Predicting proliferation: the history of the
future of nuclear weapons. Foreign
Policy at Brookings. 11.
Running Head: BREACH OF CITIZENS RIGHTS AND
PRIVACY 1
BREACH OF CITIZENS RIGHTS AND PRIVACY
2
Safety vs. Privacy: Breach of Citizen’s Rights and Privacy via
Intelligence and Surveillance
David Jones
Matthew Stork
American Military University
HLSS498
03/12/2017
Throughout the globe in the history of policing, adopting the
modern technology channels and devices has been the forefront
measure to address the rising crime cadence. As a fact,
substantial advances in innovation and technology have
potentially granted diverse intelligence organs supremacy to
conduct surveillance on its citizens. Moreover, constructing an
outline of intelligence information from telephone companies,
governments and electronic messages of citizens for the raison
d'être of security, is an issue that has brood forth diverging
debates across the nation. This has been a long-running debate
whether citizens’ privacy is an issue of access or control in all
security and intelligence agencies in the contemporary time.
This owes to the fact that the American constitution passed by
the Congress protects the American citizens against invasion of
their privacy and rights as outlined in the first and fourth
constitutional amendment (Agrawal, Goldberg, Wartanian &
7. Yoshino, 2015). Thusly, this expounds on why there exists
assorted controversies in the aforementioned organs since it is
the mandate of the agencies to ensure the security of its citizens
is advocated for at all cost. However, going to certain extends
compromises the privacy and rights of many Americans in
accordance to Oliver (2006). Intelligence profiling is
satisfactory in a political structure but objectionable in a moral
one. Hence, the surveillance and spying on innocent American
citizens ought to be discontinued since this is an unambiguous
breach of fundamental rights and freedoms of American
citizens.
Further, the questions as to who owns an individual’s telephone
and electronic communications information and whether the
data owned by the individual ought to be controlled by the
citizen or accessed by the agencies are still ongoing in the US.
These are hot raged debate agendas between US
telecommunication and technology companies and the nation’s
intelligence and security agencies. Accordingly, diverse human
rights organizations argue that the government security agencies
surveillance, spying and eavesdropping on its American citizens
is tremendously a critical issue. In accordance to the prior
mentioned organs, the preceding mentioned surveillance on the
nation’s citizens is a great control that could be utilized by
security agencies to infringe on the private dominions of any
individual. As an outcome, the agencies can disgrace, humiliate
and even devastate an individual. The previously mentioned
impacts on the individuals can be because of wiretapping on the
individual’s communication devices thus triggering fear and
intimidation to the citizen hereby undermining the person’s
rights and freedoms as outlined in the American constitution
(Weber & Staiger, 2014).
Correspondingly, the European Convention on Human Rights
advocates for the respect of each individual’s privacy in every
state. The charter also grants the citizens a channel to enforce
8. their rights in cases of invasion under the code law by the
authorities. Similarly, the US constitution clearly outlines in its
first and fourth amendments’ the concept of privacy and
intellectual freedom of every citizen. Therefore, these privacy
protection charters vastly provide the American citizens with a
shield from violation of their privacy by the government,
intelligence and security organs (Bygrave, 2014).
Consequently, the First Amendment lawfully depicts the notion
of intellectual autonomy to citizens in the US constitution. The
First Amendment shields citizen’s rights of speech and press
alongside their correlated freedoms of religion thought and
inquest (McCord, 2013). Thereby, we can ascertain that the first
constitutional amendment advocates for citizens right to speak
hereby-protecting infringement of their freedom of speech and
promoting their right to receive and dispose information with
null fear of intimidation. Nonetheless, the surveillance of
citizens and control of their data by the security agencies
contravenes their right to pass truthful information or receive
crucial data via their devices. This reciprocates to an
impediment to their attaining of personal satisfaction and
freedom of speech in fear of judgment and mortification
(Richards & Cornwell, 2014).
Conversely, the Fourth Amendment in US Bill of Right also
protects American citizens from encroachment of their privacy.
The bill shields the citizen’s houses, persons, papers and affects
against irrational searches and apprehension without affirmation
form the relevant authorities. This palpably implies that it is of
utmost value for law enforcers to pursue cybercriminals after
their attainment of digital evidence, which is to be obtained
with null breach of Americans citizens’ privacy. Hence, the
previously mentioned bill of rights clearly outlines that privacy
has a critical role to partake in providence of intellectual
privacy of every American citizen (Solove & Schwartz 2015).
9. Agencies such as the National Security Agency (NSA) and
Foreign Intelligence and Surveillance (FISA) have been
revealed to monitor thousands of American citizens’ electronic
mails and messages without warrants. As an outcome, these
agencies have been on the vanguard towards creating the
tension in US citizens that they are vulnerable to risks of being
targeted as terrorists and criminals hereby limiting their
freedom of speech. For instance, ‘the Snowden Revelations’ in
2013 vis-à-vis NSA alongside diverse internet companies
plainly portray the puzzle of surveillance and the ‘Big Data.”
Actually, Snowden disclosed that the big data comprised
particular surveillance drifts highly correlated with IT and
networks thus intensifying the surveillance of majority of
citizens via the interconnected networks. This as Snowden
stated created a channel of suspicion and fear in citizens despite
them having nothing to conceal since they are being monitored
and controlled through the big data. Ethically, Snowden
regularly asked on whether anyone desired to live in a society
that big corporations were breaching their privacy while the
organizations themselves were more obscure (Lyon, 2014).
In summation, we can assert that there is particular status quo in
the nation that calls for intelligence and security agencies
intercession in the lives of citizens for example crime
prevention scenarios. However, the interventions ought to be in
alignment with the constitutional rights and freedom of the
American citizens alongside principled legislation restrictions
that do not violate the ideal of intelligence privacy as outlined
in the human rights charter. This implies that the surveillance,
spying and wiretapping of citizen’s international and local
communication ought to be regulated more cautiously. This is
during profiling intelligence information from citizens,
corporate, government and telecommunication companies to
eradicate fear and mutual suspicion among citizens that
encumbers their personal fulfillment and expression.
References
10. Agrawal, N., Goldberg, A., Wartanian, R., & Yoshino, K.
(2015). Mapping Global Surveillance
and Proposing
Solution
s to Respect Human Rights. Retrieved on 2015 from,
https://pdfs.semanticscholar.org/36a9/5f793d87f54b23fb36a8be
df43a765860440.pdf
Bygrave, A, L. (2014). Data Privacy Law: An International
Perspective. Retrieved on 2014
from,
https://script-ed.org/wp-
content/uploads/2014/10/liddle.pdfLyon, D. (2014).
“Surveillance, Snowden, and Big Data: Capacities,
Consequences, Critique.”
Sage Journals. Doi.10.1177/2053951714541861
McCord, G. (2013). What You Need to Know About Privacy
Law: A Guide for Librarians and
Educators: A Guide for Librarians and Educators. Santa
Barbara, Calif: Libraries
Unlimited, An Imprint of ABC-CLIO, LLC.
Oliver, W. M. (2006). The fourth era of policing: Homeland
security. International Review of
Law Computers & Technology. Abingdon, United Kingdom:
11. Taylor and Francis.
Richards, M, N. & Cornwell, F, J. (2014). “Intellectual Freedom
and Privacy.” Washington
University School of Law. Retrieved from,
https://poseidon01.ssrn.com/delivery.php?ID
Solove, J, D. & Schwartz, M, P. (2015). “An Overview of
Privacy Law.” GWU Law School
Public Law. Research Paper No. 2015-45; GWU Legal Studies
Research Paper No. 2015-
45.
Weber, H, R. & Staiger, N, D. (2014). “Bridging the gap
between individual privacy and public
security.” Groningen Journal of International Law, Vol. 2. No.
2.