American National Security and Technology Evolution

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Introduction

The CIA and the NSA are the faces of the United States security and intelligence agencies. Since the establishment of both the CIA and the NSA, there has been progressing in technology. It is undeniable to acknowledge the fact that the CIA was previously used for special operations in other countries or any operations. Before the CIA was mandated with the intelligence services and collection of important information, the agency used conventional technologies during operations. Between 1947 and 1961, numerous reforms oversaw the CIA undertake the mandate of collection of scientific intelligence services on matters of security.

On the other hand, the NSA has also been mandated to processing of intelligence information since its establishment in the year 1962. However, there are fundamental differences between the NSA and the CIA. For example, the National Security Agency (NSA) is mandated to encryption of foreign codes and securing of information using coding. This means that NSA process data for the security of the United States government. On the other hand, the role of the Central Intelligence Agency (CIA) is to gather information from international sources. The CIA only gathers, which is of concern or interest to the United States. In this respect, the evolution of technologies used by both agencies has changed over time.

Surveillance technology

Over the years, the United States security agency has used surveillance technologies as a means of spying and collecting data. The NSA has been on the receiving edge for using computerized networks that hack into other networks and collect data without the knowledge of others (Aid, 2010). In the meantime, NSA has resolved to use an intelligence remote computer tampering to keep track of all computers imported into the American soil (Aid, 2010). Another development is the use of EMF to detect bioelectric fields in humans (Aid, 2010). This means that an individual is tracked like a robot within the United States. This development has caused an outrage in the United States since people feel that this development infringes on their liberties and personal rights to privacy.

The CIA has also resolved to use surveillance technologies. The use of drones is the recent evolution of CIA technology. The drones are unmanned aircraft that can fire a missile (Richelson, 2002). The drones are remote-controlled and can hover within a certain territory without detection (Richelson, 2002). Drones technology has previously been used by the CIA to kill terrorists in Afghanistan and other regions (Richelson, 2002). Amid the success of this technology, there have been several complaints about the use of such technologies in warfare. Most certainly, the use of drones violates international law. The technology is equated to assassination tactics since they are unauthorized by the United Nations Security Council. To be precise, the use of drones is likened to state killings.

Conclusion

The evolution of technology by the NSA from conventional decrypting computers to the use of EMFs and the EMF brain stimulation is an example of how security has become a critical issue. Initially, the CIA was known to conduct operations as snipers and mercenaries. Today, the CIA is using advanced surveillance technology to gather information by using drones. The CIA is also trying to safeguard the interest of the United States by using drones as a counter-terrorism strategy.

References

Aid, M., M. (2010). The secret sentry: The untold history of the National Security Agency. New York, NY: Bloomsbury USA.

Richelson, T., J. (2002). The wizards of Langley: Inside the CIA’s directorate of science and technology. New York, NY: Basic Books.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!