SlideShare a Scribd company logo
1 of 11
1
WMD PROLIFERATION: A NEW PHASE TO TERRORISM
2
WMD Proliferation: A New Phase to TerrorismMax Little
American Military University
HLSS498
Professor Stork
12, March, 2016
Research Question
The research question is: How will weapons of mass destruction
proliferation develop into a new phase of terrorism in South
West Asia? To develop this research question the first topic that
was review was weapons of mass destruction (WMD)
proliferation. In order to answer the question about WMD
proliferation there has to be a basic understanding of what
WMD proliferation is. This is developed by asking: What is
WMD proliferation? Why does WMD proliferation happen?
How does WMD proliferation happen?
Once the basic understanding of WMD proliferation is reached,
there must be general knowledge basis that there is research
developed on WMD proliferation. Once it is determined, that
there is enough research to develop understanding of WMD
proliferation, this can develop particular questions that research
can be built upon. Some of these questions that can be built
upon would be: How will WMD proliferation affect the security
of the United States? Who are the main countries to be cautious
about as WMD proliferators? What are the contributing factors
that develop into WMD proliferation?
To develop the final attributes to the research question this is
done by evaluating the questions that were previously stated.
Some of these evaluations of the questions would be: Is this
research question a common interest to other researchers and
others that would examine the material? This is the
understanding that answer this research question would be
valuable to the field of WMD proliferation. The question is
found to be valuable because WMD proliferation is a current
problem that needs to be solved. This determines the question to
be feasible with the methodologies of reading other published
works on WMD proliferation. This crates the ability to reach
the research question of: How will weapons of mass destruction
proliferation develop into a new phase of terrorism in South
West Asia? Creating a research question that is focused and not
to narrow.
Purpose statement
The goal of this paper is to examine the effects of WMD
proliferation in Pakistan and the areas around the region. That
nature of this topic is to create a comparative and chronological
analysis of how WMD proliferation adds to the extreme
political agenda of terrorists. Constant political instability in
Pakistan provides an example of how this could lead to nuclear
material or technologies being obtained by terrorist
organizations (Kerr, P. & Nikitin, 2012).
More extensive and expanding nuclear programs in Pakistan
could lead to accidental WMD proliferation in and around South
West Asia (Kerr, P. & Nikitin, 2012). This paper will examine
weapons of mass destruction and proliferation. The focus will
be on that WMD proliferation could develop into a new phase of
terrorism due to political instability, improper security, and a
nuclear arms race in South West Asia.
To develop the purpose statement the scope, purpose, and
direction of the paper needs to be determined. The reader will
be able to identify what to expect in the paper, and what the
paper will specifically focus on. A common beginning to the
purpose statement was developed from the research question.
The common beginning for a purpose statement that was used
was “This paper will examine…” It gave a promise to the reader
that there was a development to the argument that Weapons of
mass destruction proliferation could develop into a new phase
of terrorism due to political instability, improper security, and a
nuclear arms race in South West Asia. This does not provide a
conclusion, but just a preview of what the paper will include.
This purpose statement was included at the end of the
introduction since this is where purpose statements are
commonly located. This specific purpose statement was
expressed in more than one sentence throughout the purpose
statement paragraph. The purpose statement was designed to
satisfy the requirements of the current assignment of the
research paper for HLSS498.
Design statement
This paper will include primary and secondary research sources.
These sources will be found from the APUS Library that will
include a minimum of six peer reviewed resources. Two other
resources will also be found that will add to a total of eight
resources. From these resources a comparative analysis will be
conducted to conclude what information is relevant to proving
the thesis in the purpose statement to be correct. This would
include reading and reviewing all resources that a relevant to
the information provided. This could include adding more
resources than what was initially determined to be enough.
The paper will then have to be focused on the different criteria
that are set out for this paper. This would include a
Focus/Thesis that provides understating of the current
assignment and articulates a very clear hypothesis to the reader.
Content/Subject Knowledge will have to be shown to prove
there is a demonstration of deep knowledge of the subject and
the readings. Critical Thinking Skills will have to be present to
show problem solving, ideas and conclusions that are well
argued, and making sure that any assumptions are very well
articulated. This will be done by developing the paper in a word
document that meets the APA guidelines with citations and
resources. This will develop into a 10 – 12 page paper that
meets and exceeds the criteria of the rubric.
The paper design will start with an abstract that gives a quick
summary of the contents explaining WMD proliferation and the
affects. This will lead into an appropriate introduction that
draws the reader into the research of WMD proliferation. The
body of the paper will include how political instability,
improper security, and a nuclear arms race can add to WMD
proliferation. There will be proper conclusions to each subtopic
that easily leads the reader into each different subtopic sections
of the paper. The paper will end with a proper conclusion that
compares all evidence, and provides an ending/resolution to the
focus/thesis.
Research Question:
How will weapons of mass destruction proliferation develop
into a new phase of terrorism in South West Asia?
Thesis:
Weapons of mass destruction proliferation could develop into a
new phase of terrorism due to political instability, improper
security, and a nuclear arms race in South West Asia.Comment
by Matthew Stork: Concise and specific! Well done.
References
Cimbala, S. (2012). Chasing its tail nuclear deterrence in the
information age. Strategic Studies
Quaterly.
Graham, B., & Talent, J. (2008). World at risk: The report of
the Commission on the Prevention
of WMD Proliferation and Terrorism. New York: Vintage
Books.
Kerr, P. & Nikitin, M. (2012). Pakistan’s nuclear weapons:
proliferation and security issues.
Current Politics and Economics of the Middle East.3(2).
Leonard W. & William E. (2010). An end to the fourth wave of
terrorism?.terrorism? Studies in Conflict & Terrorism 33(7),
594-602, DOI: 10.1080/1057610X.2010.483757.
Nagl, J. (2000). Defending against new dangers: arms control of
weapons of mass destruction in
a globalized world. World Affairs.162(4).
Rasler, K. & Thompson, W. (2009). Looking for waves of
terrorism. Terrorism and Political
Violence. 21(1), 28 – 41, DOI: 10.1080/09546550802544425.
Russell, J. (2006). WDM proliferation, globalization, and
international security: Whither the
nexus and national security? Strategic Insights. 5(6).
Sidhu, W. (2006). Proliferation, non-state actors, and the impact
on global security. Geneva
Centre for Security Policy. 19.
Vignard, K. (2008). Engaging non-state armed groups. United
Nations Institute for Disarmament
Research.1.
Yusuf, M. (2009). Predicting proliferation: the history of the
future of nuclear weapons. Foreign
Policy at Brookings. 11.
Running Head: BREACH OF CITIZENS RIGHTS AND
PRIVACY 1
BREACH OF CITIZENS RIGHTS AND PRIVACY
2
Safety vs. Privacy: Breach of Citizen’s Rights and Privacy via
Intelligence and Surveillance
David Jones
Matthew Stork
American Military University
HLSS498
03/12/2017
Throughout the globe in the history of policing, adopting the
modern technology channels and devices has been the forefront
measure to address the rising crime cadence. As a fact,
substantial advances in innovation and technology have
potentially granted diverse intelligence organs supremacy to
conduct surveillance on its citizens. Moreover, constructing an
outline of intelligence information from telephone companies,
governments and electronic messages of citizens for the raison
d'être of security, is an issue that has brood forth diverging
debates across the nation. This has been a long-running debate
whether citizens’ privacy is an issue of access or control in all
security and intelligence agencies in the contemporary time.
This owes to the fact that the American constitution passed by
the Congress protects the American citizens against invasion of
their privacy and rights as outlined in the first and fourth
constitutional amendment (Agrawal, Goldberg, Wartanian &
Yoshino, 2015). Thusly, this expounds on why there exists
assorted controversies in the aforementioned organs since it is
the mandate of the agencies to ensure the security of its citizens
is advocated for at all cost. However, going to certain extends
compromises the privacy and rights of many Americans in
accordance to Oliver (2006). Intelligence profiling is
satisfactory in a political structure but objectionable in a moral
one. Hence, the surveillance and spying on innocent American
citizens ought to be discontinued since this is an unambiguous
breach of fundamental rights and freedoms of American
citizens.
Further, the questions as to who owns an individual’s telephone
and electronic communications information and whether the
data owned by the individual ought to be controlled by the
citizen or accessed by the agencies are still ongoing in the US.
These are hot raged debate agendas between US
telecommunication and technology companies and the nation’s
intelligence and security agencies. Accordingly, diverse human
rights organizations argue that the government security agencies
surveillance, spying and eavesdropping on its American citizens
is tremendously a critical issue. In accordance to the prior
mentioned organs, the preceding mentioned surveillance on the
nation’s citizens is a great control that could be utilized by
security agencies to infringe on the private dominions of any
individual. As an outcome, the agencies can disgrace, humiliate
and even devastate an individual. The previously mentioned
impacts on the individuals can be because of wiretapping on the
individual’s communication devices thus triggering fear and
intimidation to the citizen hereby undermining the person’s
rights and freedoms as outlined in the American constitution
(Weber & Staiger, 2014).
Correspondingly, the European Convention on Human Rights
advocates for the respect of each individual’s privacy in every
state. The charter also grants the citizens a channel to enforce
their rights in cases of invasion under the code law by the
authorities. Similarly, the US constitution clearly outlines in its
first and fourth amendments’ the concept of privacy and
intellectual freedom of every citizen. Therefore, these privacy
protection charters vastly provide the American citizens with a
shield from violation of their privacy by the government,
intelligence and security organs (Bygrave, 2014).
Consequently, the First Amendment lawfully depicts the notion
of intellectual autonomy to citizens in the US constitution. The
First Amendment shields citizen’s rights of speech and press
alongside their correlated freedoms of religion thought and
inquest (McCord, 2013). Thereby, we can ascertain that the first
constitutional amendment advocates for citizens right to speak
hereby-protecting infringement of their freedom of speech and
promoting their right to receive and dispose information with
null fear of intimidation. Nonetheless, the surveillance of
citizens and control of their data by the security agencies
contravenes their right to pass truthful information or receive
crucial data via their devices. This reciprocates to an
impediment to their attaining of personal satisfaction and
freedom of speech in fear of judgment and mortification
(Richards & Cornwell, 2014).
Conversely, the Fourth Amendment in US Bill of Right also
protects American citizens from encroachment of their privacy.
The bill shields the citizen’s houses, persons, papers and affects
against irrational searches and apprehension without affirmation
form the relevant authorities. This palpably implies that it is of
utmost value for law enforcers to pursue cybercriminals after
their attainment of digital evidence, which is to be obtained
with null breach of Americans citizens’ privacy. Hence, the
previously mentioned bill of rights clearly outlines that privacy
has a critical role to partake in providence of intellectual
privacy of every American citizen (Solove & Schwartz 2015).
Agencies such as the National Security Agency (NSA) and
Foreign Intelligence and Surveillance (FISA) have been
revealed to monitor thousands of American citizens’ electronic
mails and messages without warrants. As an outcome, these
agencies have been on the vanguard towards creating the
tension in US citizens that they are vulnerable to risks of being
targeted as terrorists and criminals hereby limiting their
freedom of speech. For instance, ‘the Snowden Revelations’ in
2013 vis-à-vis NSA alongside diverse internet companies
plainly portray the puzzle of surveillance and the ‘Big Data.”
Actually, Snowden disclosed that the big data comprised
particular surveillance drifts highly correlated with IT and
networks thus intensifying the surveillance of majority of
citizens via the interconnected networks. This as Snowden
stated created a channel of suspicion and fear in citizens despite
them having nothing to conceal since they are being monitored
and controlled through the big data. Ethically, Snowden
regularly asked on whether anyone desired to live in a society
that big corporations were breaching their privacy while the
organizations themselves were more obscure (Lyon, 2014).
In summation, we can assert that there is particular status quo in
the nation that calls for intelligence and security agencies
intercession in the lives of citizens for example crime
prevention scenarios. However, the interventions ought to be in
alignment with the constitutional rights and freedom of the
American citizens alongside principled legislation restrictions
that do not violate the ideal of intelligence privacy as outlined
in the human rights charter. This implies that the surveillance,
spying and wiretapping of citizen’s international and local
communication ought to be regulated more cautiously. This is
during profiling intelligence information from citizens,
corporate, government and telecommunication companies to
eradicate fear and mutual suspicion among citizens that
encumbers their personal fulfillment and expression.
References
Agrawal, N., Goldberg, A., Wartanian, R., & Yoshino, K.
(2015). Mapping Global Surveillance
and Proposing
Solution
s to Respect Human Rights. Retrieved on 2015 from,
https://pdfs.semanticscholar.org/36a9/5f793d87f54b23fb36a8be
df43a765860440.pdf
Bygrave, A, L. (2014). Data Privacy Law: An International
Perspective. Retrieved on 2014
from,
https://script-ed.org/wp-
content/uploads/2014/10/liddle.pdfLyon, D. (2014).
“Surveillance, Snowden, and Big Data: Capacities,
Consequences, Critique.”
Sage Journals. Doi.10.1177/2053951714541861
McCord, G. (2013). What You Need to Know About Privacy
Law: A Guide for Librarians and
Educators: A Guide for Librarians and Educators. Santa
Barbara, Calif: Libraries
Unlimited, An Imprint of ABC-CLIO, LLC.
Oliver, W. M. (2006). The fourth era of policing: Homeland
security. International Review of
Law Computers & Technology. Abingdon, United Kingdom:
Taylor and Francis.
Richards, M, N. & Cornwell, F, J. (2014). “Intellectual Freedom
and Privacy.” Washington
University School of Law. Retrieved from,
https://poseidon01.ssrn.com/delivery.php?ID
Solove, J, D. & Schwartz, M, P. (2015). “An Overview of
Privacy Law.” GWU Law School
Public Law. Research Paper No. 2015-45; GWU Legal Studies
Research Paper No. 2015-
45.
Weber, H, R. & Staiger, N, D. (2014). “Bridging the gap
between individual privacy and public
security.” Groningen Journal of International Law, Vol. 2. No.
2.

More Related Content

Similar to 1WMD PROLIFERATION A NEW PHASE TO TERRORISM .docx

Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docx
Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docxRunning head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docx
Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docxjeanettehully
 
relating-the-pendulum-of-democracy-with-oncology-research-1eSo
relating-the-pendulum-of-democracy-with-oncology-research-1eSorelating-the-pendulum-of-democracy-with-oncology-research-1eSo
relating-the-pendulum-of-democracy-with-oncology-research-1eSoChristian Schmidt
 
ARMS RACE IN SOUTH ASIA
ARMS RACE IN SOUTH ASIAARMS RACE IN SOUTH ASIA
ARMS RACE IN SOUTH ASIAÅįjâž Ali
 
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...Strategic Latency and World Power: How Technology Is Changing Our Concepts of...
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...Lawrence Livermore National Laboratory
 
Leveraging science diplomacy for public good in africa
Leveraging science diplomacy for public good in  africaLeveraging science diplomacy for public good in  africa
Leveraging science diplomacy for public good in africaAbdeslam Badre, PhD
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxambersalomon88660
 
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docxAppraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docxjewisonantone
 
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docxaryan532920
 
Multi-Organizational Confluence Sample
Multi-Organizational Confluence SampleMulti-Organizational Confluence Sample
Multi-Organizational Confluence SampleG R
 
FosherJCLISSciConsumptionWinter2015
FosherJCLISSciConsumptionWinter2015FosherJCLISSciConsumptionWinter2015
FosherJCLISSciConsumptionWinter2015Kerry Fosher
 
Standard Outline FormatPurpose The purpose of an outline is to.docx
Standard Outline FormatPurpose  The purpose of an outline is to.docxStandard Outline FormatPurpose  The purpose of an outline is to.docx
Standard Outline FormatPurpose The purpose of an outline is to.docxsusanschei
 
Tool Opinion SpaceTypical Actions Opinion mapping softwa.docx
Tool  Opinion SpaceTypical Actions  Opinion mapping softwa.docxTool  Opinion SpaceTypical Actions  Opinion mapping softwa.docx
Tool Opinion SpaceTypical Actions Opinion mapping softwa.docxjuliennehar
 
Persuasive Essay On Capital Punishment. Essay on Capital Punishment Internat...
Persuasive Essay On Capital Punishment. Essay on Capital Punishment  Internat...Persuasive Essay On Capital Punishment. Essay on Capital Punishment  Internat...
Persuasive Essay On Capital Punishment. Essay on Capital Punishment Internat...Monica Clark
 

Similar to 1WMD PROLIFERATION A NEW PHASE TO TERRORISM .docx (20)

Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docx
Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docxRunning head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docx
Running head GUN CONTROL DILEMMA ANNOTATED BIBLIOGRAPHY 1GU.docx
 
relating-the-pendulum-of-democracy-with-oncology-research-1eSo
relating-the-pendulum-of-democracy-with-oncology-research-1eSorelating-the-pendulum-of-democracy-with-oncology-research-1eSo
relating-the-pendulum-of-democracy-with-oncology-research-1eSo
 
Studies61 4-dec-2017-extracts
Studies61 4-dec-2017-extractsStudies61 4-dec-2017-extracts
Studies61 4-dec-2017-extracts
 
Book studies 63-1-mar2019
Book studies 63-1-mar2019Book studies 63-1-mar2019
Book studies 63-1-mar2019
 
ARMS RACE IN SOUTH ASIA
ARMS RACE IN SOUTH ASIAARMS RACE IN SOUTH ASIA
ARMS RACE IN SOUTH ASIA
 
PRP
PRPPRP
PRP
 
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...Strategic Latency and World Power: How Technology Is Changing Our Concepts of...
Strategic Latency and World Power: How Technology Is Changing Our Concepts of...
 
Leveraging science diplomacy for public good in africa
Leveraging science diplomacy for public good in  africaLeveraging science diplomacy for public good in  africa
Leveraging science diplomacy for public good in africa
 
WMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docxWMD Proliferation, Globalization, and International Security.docx
WMD Proliferation, Globalization, and International Security.docx
 
Book studies62-4-december-2018 1
Book studies62-4-december-2018 1Book studies62-4-december-2018 1
Book studies62-4-december-2018 1
 
Book studies62-4-december-2018
Book studies62-4-december-2018Book studies62-4-december-2018
Book studies62-4-december-2018
 
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docxAppraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docx
 
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
MHS 5201, Weapons of Mass Destruction 1 Course Learni.docx
 
Multi-Organizational Confluence Sample
Multi-Organizational Confluence SampleMulti-Organizational Confluence Sample
Multi-Organizational Confluence Sample
 
Strategic analysis-case-studies
Strategic analysis-case-studiesStrategic analysis-case-studies
Strategic analysis-case-studies
 
FosherJCLISSciConsumptionWinter2015
FosherJCLISSciConsumptionWinter2015FosherJCLISSciConsumptionWinter2015
FosherJCLISSciConsumptionWinter2015
 
Standard Outline FormatPurpose The purpose of an outline is to.docx
Standard Outline FormatPurpose  The purpose of an outline is to.docxStandard Outline FormatPurpose  The purpose of an outline is to.docx
Standard Outline FormatPurpose The purpose of an outline is to.docx
 
terrorist_group_proclivity_toward_wmd
terrorist_group_proclivity_toward_wmdterrorist_group_proclivity_toward_wmd
terrorist_group_proclivity_toward_wmd
 
Tool Opinion SpaceTypical Actions Opinion mapping softwa.docx
Tool  Opinion SpaceTypical Actions  Opinion mapping softwa.docxTool  Opinion SpaceTypical Actions  Opinion mapping softwa.docx
Tool Opinion SpaceTypical Actions Opinion mapping softwa.docx
 
Persuasive Essay On Capital Punishment. Essay on Capital Punishment Internat...
Persuasive Essay On Capital Punishment. Essay on Capital Punishment  Internat...Persuasive Essay On Capital Punishment. Essay on Capital Punishment  Internat...
Persuasive Essay On Capital Punishment. Essay on Capital Punishment Internat...
 

More from felicidaddinwoodie

Business UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docxBusiness UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docxfelicidaddinwoodie
 
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docxBusiness UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docxfelicidaddinwoodie
 
Business UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docxBusiness UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docxfelicidaddinwoodie
 
Business System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docxBusiness System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docxfelicidaddinwoodie
 
Business StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docxBusiness StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docxfelicidaddinwoodie
 
Business StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docxBusiness StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docxfelicidaddinwoodie
 
Business Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docxBusiness Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docxfelicidaddinwoodie
 
Business Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docxBusiness Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docxfelicidaddinwoodie
 
Business RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docxBusiness RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docxfelicidaddinwoodie
 
Business ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docxBusiness ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docxfelicidaddinwoodie
 
Business ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docxBusiness ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docxfelicidaddinwoodie
 
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docxBUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docxfelicidaddinwoodie
 
Business Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docxBusiness Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docxfelicidaddinwoodie
 
Business Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docxBusiness Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docxfelicidaddinwoodie
 
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docxBusiness Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docxfelicidaddinwoodie
 
Business PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docxBusiness PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docxfelicidaddinwoodie
 
Business Planning and Program Planning A strategic plan.docx
Business Planning and Program Planning          A strategic plan.docxBusiness Planning and Program Planning          A strategic plan.docx
Business Planning and Program Planning A strategic plan.docxfelicidaddinwoodie
 
Business Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docxBusiness Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docxfelicidaddinwoodie
 
Business Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docxBusiness Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docxfelicidaddinwoodie
 
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docxBUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docxfelicidaddinwoodie
 

More from felicidaddinwoodie (20)

Business UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docxBusiness UseWeek 1 Assignment #1Instructions1. Plea.docx
Business UseWeek 1 Assignment #1Instructions1. Plea.docx
 
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docxBusiness UsePALADIN ASSIGNMENT ScenarioYou are give.docx
Business UsePALADIN ASSIGNMENT ScenarioYou are give.docx
 
Business UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docxBusiness UsePractical Connection WorkThis work is a writte.docx
Business UsePractical Connection WorkThis work is a writte.docx
 
Business System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docxBusiness System AnalystSUMMARY· Cognos Business.docx
Business System AnalystSUMMARY· Cognos Business.docx
 
Business StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docxBusiness StrategyOrganizations have to develop an international .docx
Business StrategyOrganizations have to develop an international .docx
 
Business StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docxBusiness StrategyGroup BCase Study- KFC Business Analysis.docx
Business StrategyGroup BCase Study- KFC Business Analysis.docx
 
Business Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docxBusiness Strategy Differentiation, Cost Leadership, a.docx
Business Strategy Differentiation, Cost Leadership, a.docx
 
Business Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docxBusiness Research Methods, 11e, CooperSchindler1case.docx
Business Research Methods, 11e, CooperSchindler1case.docx
 
Business RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docxBusiness RequirementsReference number Document Control.docx
Business RequirementsReference number Document Control.docx
 
Business ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docxBusiness ProposalThe Business Proposal is the major writing .docx
Business ProposalThe Business Proposal is the major writing .docx
 
Business ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docxBusiness ProjectProject Progress Evaluation Feedback Form .docx
Business ProjectProject Progress Evaluation Feedback Form .docx
 
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docxBUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
BUSINESS PROCESSES IN THE FUNCTION OF COST MANAGEMENT IN H.docx
 
Business Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docxBusiness Process Management JournalBusiness process manageme.docx
Business Process Management JournalBusiness process manageme.docx
 
Business Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docxBusiness Process DiagramACCESS for ELL.docx
Business Process DiagramACCESS for ELL.docx
 
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docxBusiness Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
Business Plan[Your Name], OwnerPurdue GlobalBUSINESS PLANDate.docx
 
Business PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docxBusiness PlanCover Page  Name of Project, Contact Info, Da.docx
Business PlanCover Page  Name of Project, Contact Info, Da.docx
 
Business Planning and Program Planning A strategic plan.docx
Business Planning and Program Planning          A strategic plan.docxBusiness Planning and Program Planning          A strategic plan.docx
Business Planning and Program Planning A strategic plan.docx
 
Business Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docxBusiness Plan In your assigned journal, describe the entity you wil.docx
Business Plan In your assigned journal, describe the entity you wil.docx
 
Business Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docxBusiness Plan Part IVPart IV of the Business PlanPart IV of .docx
Business Plan Part IVPart IV of the Business PlanPart IV of .docx
 
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docxBUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
BUSINESS PLAN FORMAT          Whether you plan to apply for a bu.docx
 

Recently uploaded

Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 

Recently uploaded (20)

Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 

1WMD PROLIFERATION A NEW PHASE TO TERRORISM .docx

  • 1. 1 WMD PROLIFERATION: A NEW PHASE TO TERRORISM 2 WMD Proliferation: A New Phase to TerrorismMax Little American Military University HLSS498 Professor Stork 12, March, 2016 Research Question The research question is: How will weapons of mass destruction proliferation develop into a new phase of terrorism in South West Asia? To develop this research question the first topic that was review was weapons of mass destruction (WMD) proliferation. In order to answer the question about WMD proliferation there has to be a basic understanding of what WMD proliferation is. This is developed by asking: What is WMD proliferation? Why does WMD proliferation happen? How does WMD proliferation happen? Once the basic understanding of WMD proliferation is reached,
  • 2. there must be general knowledge basis that there is research developed on WMD proliferation. Once it is determined, that there is enough research to develop understanding of WMD proliferation, this can develop particular questions that research can be built upon. Some of these questions that can be built upon would be: How will WMD proliferation affect the security of the United States? Who are the main countries to be cautious about as WMD proliferators? What are the contributing factors that develop into WMD proliferation? To develop the final attributes to the research question this is done by evaluating the questions that were previously stated. Some of these evaluations of the questions would be: Is this research question a common interest to other researchers and others that would examine the material? This is the understanding that answer this research question would be valuable to the field of WMD proliferation. The question is found to be valuable because WMD proliferation is a current problem that needs to be solved. This determines the question to be feasible with the methodologies of reading other published works on WMD proliferation. This crates the ability to reach the research question of: How will weapons of mass destruction proliferation develop into a new phase of terrorism in South West Asia? Creating a research question that is focused and not to narrow. Purpose statement The goal of this paper is to examine the effects of WMD proliferation in Pakistan and the areas around the region. That nature of this topic is to create a comparative and chronological analysis of how WMD proliferation adds to the extreme political agenda of terrorists. Constant political instability in Pakistan provides an example of how this could lead to nuclear material or technologies being obtained by terrorist organizations (Kerr, P. & Nikitin, 2012). More extensive and expanding nuclear programs in Pakistan could lead to accidental WMD proliferation in and around South West Asia (Kerr, P. & Nikitin, 2012). This paper will examine
  • 3. weapons of mass destruction and proliferation. The focus will be on that WMD proliferation could develop into a new phase of terrorism due to political instability, improper security, and a nuclear arms race in South West Asia. To develop the purpose statement the scope, purpose, and direction of the paper needs to be determined. The reader will be able to identify what to expect in the paper, and what the paper will specifically focus on. A common beginning to the purpose statement was developed from the research question. The common beginning for a purpose statement that was used was “This paper will examine…” It gave a promise to the reader that there was a development to the argument that Weapons of mass destruction proliferation could develop into a new phase of terrorism due to political instability, improper security, and a nuclear arms race in South West Asia. This does not provide a conclusion, but just a preview of what the paper will include. This purpose statement was included at the end of the introduction since this is where purpose statements are commonly located. This specific purpose statement was expressed in more than one sentence throughout the purpose statement paragraph. The purpose statement was designed to satisfy the requirements of the current assignment of the research paper for HLSS498. Design statement This paper will include primary and secondary research sources. These sources will be found from the APUS Library that will include a minimum of six peer reviewed resources. Two other resources will also be found that will add to a total of eight resources. From these resources a comparative analysis will be conducted to conclude what information is relevant to proving the thesis in the purpose statement to be correct. This would include reading and reviewing all resources that a relevant to the information provided. This could include adding more resources than what was initially determined to be enough. The paper will then have to be focused on the different criteria that are set out for this paper. This would include a
  • 4. Focus/Thesis that provides understating of the current assignment and articulates a very clear hypothesis to the reader. Content/Subject Knowledge will have to be shown to prove there is a demonstration of deep knowledge of the subject and the readings. Critical Thinking Skills will have to be present to show problem solving, ideas and conclusions that are well argued, and making sure that any assumptions are very well articulated. This will be done by developing the paper in a word document that meets the APA guidelines with citations and resources. This will develop into a 10 – 12 page paper that meets and exceeds the criteria of the rubric. The paper design will start with an abstract that gives a quick summary of the contents explaining WMD proliferation and the affects. This will lead into an appropriate introduction that draws the reader into the research of WMD proliferation. The body of the paper will include how political instability, improper security, and a nuclear arms race can add to WMD proliferation. There will be proper conclusions to each subtopic that easily leads the reader into each different subtopic sections of the paper. The paper will end with a proper conclusion that compares all evidence, and provides an ending/resolution to the focus/thesis. Research Question: How will weapons of mass destruction proliferation develop into a new phase of terrorism in South West Asia? Thesis: Weapons of mass destruction proliferation could develop into a new phase of terrorism due to political instability, improper security, and a nuclear arms race in South West Asia.Comment by Matthew Stork: Concise and specific! Well done.
  • 5. References Cimbala, S. (2012). Chasing its tail nuclear deterrence in the information age. Strategic Studies Quaterly. Graham, B., & Talent, J. (2008). World at risk: The report of the Commission on the Prevention of WMD Proliferation and Terrorism. New York: Vintage Books. Kerr, P. & Nikitin, M. (2012). Pakistan’s nuclear weapons: proliferation and security issues. Current Politics and Economics of the Middle East.3(2). Leonard W. & William E. (2010). An end to the fourth wave of terrorism?.terrorism? Studies in Conflict & Terrorism 33(7), 594-602, DOI: 10.1080/1057610X.2010.483757. Nagl, J. (2000). Defending against new dangers: arms control of weapons of mass destruction in a globalized world. World Affairs.162(4). Rasler, K. & Thompson, W. (2009). Looking for waves of terrorism. Terrorism and Political Violence. 21(1), 28 – 41, DOI: 10.1080/09546550802544425. Russell, J. (2006). WDM proliferation, globalization, and international security: Whither the nexus and national security? Strategic Insights. 5(6). Sidhu, W. (2006). Proliferation, non-state actors, and the impact on global security. Geneva Centre for Security Policy. 19. Vignard, K. (2008). Engaging non-state armed groups. United Nations Institute for Disarmament
  • 6. Research.1. Yusuf, M. (2009). Predicting proliferation: the history of the future of nuclear weapons. Foreign Policy at Brookings. 11. Running Head: BREACH OF CITIZENS RIGHTS AND PRIVACY 1 BREACH OF CITIZENS RIGHTS AND PRIVACY 2 Safety vs. Privacy: Breach of Citizen’s Rights and Privacy via Intelligence and Surveillance David Jones Matthew Stork American Military University HLSS498 03/12/2017 Throughout the globe in the history of policing, adopting the modern technology channels and devices has been the forefront measure to address the rising crime cadence. As a fact, substantial advances in innovation and technology have potentially granted diverse intelligence organs supremacy to conduct surveillance on its citizens. Moreover, constructing an outline of intelligence information from telephone companies, governments and electronic messages of citizens for the raison d'être of security, is an issue that has brood forth diverging debates across the nation. This has been a long-running debate whether citizens’ privacy is an issue of access or control in all security and intelligence agencies in the contemporary time. This owes to the fact that the American constitution passed by the Congress protects the American citizens against invasion of their privacy and rights as outlined in the first and fourth constitutional amendment (Agrawal, Goldberg, Wartanian &
  • 7. Yoshino, 2015). Thusly, this expounds on why there exists assorted controversies in the aforementioned organs since it is the mandate of the agencies to ensure the security of its citizens is advocated for at all cost. However, going to certain extends compromises the privacy and rights of many Americans in accordance to Oliver (2006). Intelligence profiling is satisfactory in a political structure but objectionable in a moral one. Hence, the surveillance and spying on innocent American citizens ought to be discontinued since this is an unambiguous breach of fundamental rights and freedoms of American citizens. Further, the questions as to who owns an individual’s telephone and electronic communications information and whether the data owned by the individual ought to be controlled by the citizen or accessed by the agencies are still ongoing in the US. These are hot raged debate agendas between US telecommunication and technology companies and the nation’s intelligence and security agencies. Accordingly, diverse human rights organizations argue that the government security agencies surveillance, spying and eavesdropping on its American citizens is tremendously a critical issue. In accordance to the prior mentioned organs, the preceding mentioned surveillance on the nation’s citizens is a great control that could be utilized by security agencies to infringe on the private dominions of any individual. As an outcome, the agencies can disgrace, humiliate and even devastate an individual. The previously mentioned impacts on the individuals can be because of wiretapping on the individual’s communication devices thus triggering fear and intimidation to the citizen hereby undermining the person’s rights and freedoms as outlined in the American constitution (Weber & Staiger, 2014). Correspondingly, the European Convention on Human Rights advocates for the respect of each individual’s privacy in every state. The charter also grants the citizens a channel to enforce
  • 8. their rights in cases of invasion under the code law by the authorities. Similarly, the US constitution clearly outlines in its first and fourth amendments’ the concept of privacy and intellectual freedom of every citizen. Therefore, these privacy protection charters vastly provide the American citizens with a shield from violation of their privacy by the government, intelligence and security organs (Bygrave, 2014). Consequently, the First Amendment lawfully depicts the notion of intellectual autonomy to citizens in the US constitution. The First Amendment shields citizen’s rights of speech and press alongside their correlated freedoms of religion thought and inquest (McCord, 2013). Thereby, we can ascertain that the first constitutional amendment advocates for citizens right to speak hereby-protecting infringement of their freedom of speech and promoting their right to receive and dispose information with null fear of intimidation. Nonetheless, the surveillance of citizens and control of their data by the security agencies contravenes their right to pass truthful information or receive crucial data via their devices. This reciprocates to an impediment to their attaining of personal satisfaction and freedom of speech in fear of judgment and mortification (Richards & Cornwell, 2014). Conversely, the Fourth Amendment in US Bill of Right also protects American citizens from encroachment of their privacy. The bill shields the citizen’s houses, persons, papers and affects against irrational searches and apprehension without affirmation form the relevant authorities. This palpably implies that it is of utmost value for law enforcers to pursue cybercriminals after their attainment of digital evidence, which is to be obtained with null breach of Americans citizens’ privacy. Hence, the previously mentioned bill of rights clearly outlines that privacy has a critical role to partake in providence of intellectual privacy of every American citizen (Solove & Schwartz 2015).
  • 9. Agencies such as the National Security Agency (NSA) and Foreign Intelligence and Surveillance (FISA) have been revealed to monitor thousands of American citizens’ electronic mails and messages without warrants. As an outcome, these agencies have been on the vanguard towards creating the tension in US citizens that they are vulnerable to risks of being targeted as terrorists and criminals hereby limiting their freedom of speech. For instance, ‘the Snowden Revelations’ in 2013 vis-à-vis NSA alongside diverse internet companies plainly portray the puzzle of surveillance and the ‘Big Data.” Actually, Snowden disclosed that the big data comprised particular surveillance drifts highly correlated with IT and networks thus intensifying the surveillance of majority of citizens via the interconnected networks. This as Snowden stated created a channel of suspicion and fear in citizens despite them having nothing to conceal since they are being monitored and controlled through the big data. Ethically, Snowden regularly asked on whether anyone desired to live in a society that big corporations were breaching their privacy while the organizations themselves were more obscure (Lyon, 2014). In summation, we can assert that there is particular status quo in the nation that calls for intelligence and security agencies intercession in the lives of citizens for example crime prevention scenarios. However, the interventions ought to be in alignment with the constitutional rights and freedom of the American citizens alongside principled legislation restrictions that do not violate the ideal of intelligence privacy as outlined in the human rights charter. This implies that the surveillance, spying and wiretapping of citizen’s international and local communication ought to be regulated more cautiously. This is during profiling intelligence information from citizens, corporate, government and telecommunication companies to eradicate fear and mutual suspicion among citizens that encumbers their personal fulfillment and expression. References
  • 10. Agrawal, N., Goldberg, A., Wartanian, R., & Yoshino, K. (2015). Mapping Global Surveillance and Proposing Solution s to Respect Human Rights. Retrieved on 2015 from, https://pdfs.semanticscholar.org/36a9/5f793d87f54b23fb36a8be df43a765860440.pdf Bygrave, A, L. (2014). Data Privacy Law: An International Perspective. Retrieved on 2014 from, https://script-ed.org/wp- content/uploads/2014/10/liddle.pdfLyon, D. (2014). “Surveillance, Snowden, and Big Data: Capacities, Consequences, Critique.” Sage Journals. Doi.10.1177/2053951714541861 McCord, G. (2013). What You Need to Know About Privacy Law: A Guide for Librarians and Educators: A Guide for Librarians and Educators. Santa Barbara, Calif: Libraries Unlimited, An Imprint of ABC-CLIO, LLC. Oliver, W. M. (2006). The fourth era of policing: Homeland security. International Review of Law Computers & Technology. Abingdon, United Kingdom:
  • 11. Taylor and Francis. Richards, M, N. & Cornwell, F, J. (2014). “Intellectual Freedom and Privacy.” Washington University School of Law. Retrieved from, https://poseidon01.ssrn.com/delivery.php?ID Solove, J, D. & Schwartz, M, P. (2015). “An Overview of Privacy Law.” GWU Law School Public Law. Research Paper No. 2015-45; GWU Legal Studies Research Paper No. 2015- 45. Weber, H, R. & Staiger, N, D. (2014). “Bridging the gap between individual privacy and public security.” Groningen Journal of International Law, Vol. 2. No. 2.