The tactics of the War on Terror Essay Example
The tactics of the War on Terror Essay Example

The tactics of the War on Terror Essay Example

Available Only on StudyHippo
  • Pages: 2 (545 words)
  • Published: April 8, 2022
View Entire Sample
Text preview

The issue of terrorist attacks is a devastating problem both nationally and globally. It requires appropriate strategies to combat the increasing terrorism threats and ensure national security for citizens (Eitzen, Zinn & Smith, 2013). This memo aims to demonstrate the effectiveness of specific tactics implemented by the Obama administration, such as the use of drones and NSA Data-mining, in fighting against terrorism. I strongly agree that the use of drones is a significant tactic in curbing terrorism. Research shows that over 3,300 Jihadist operatives, Taliban, and al Qaeda members have been killed in Pakistan and Yemen, including more than 50 senior leaders (Byman, 2013). This success has been achieved through the effective use of drones under the current regime. The use of drones is particularly beneficial for national security as it allows the current U.S government to minimize military commitments in other countries while ensuring

...

the safety of American citizens.

Support is given to the use of drones as an effective strategy in combatting terrorism, according to Byman (2013). Drones have successfully eliminated high-ranking members of notorious terrorist groups and disrupted their safe havens in countries such as Pakistan and Yemen. They have also eradicated al Qaeda members and other militant organizations that oppose America while being more cost-effective compared to alternative methods. This showcases the crucial role that drones play in creating a safer world by minimizing collateral damage.

Additionally, the administration has implemented a clear policy regarding extrajudicial and extraterritorial killings of terrorist syndicates, which enhances individual security. However, I do not agree with the administration's NSA Data-mining strategy for counterterrorism because it violates the privacy rights of American citizens.

According to Sanger and Savage (2013)

View entire sample
Join StudyHippo to see entire essay

the panel proposed modifications to the agency's methods of collecting data and preparing for cyber attacks abroad. This suggests that the use of NSA Data-mining as a tactic to enhance national security is questionable. The approach disregards the constitutional protection of individuals' privacy and hampers the economic businesses of American citizens. Additionally, it negatively affects American competitiveness, especially in offering crucial cloud services, and impedes involvement in American hardware businesses. Furthermore, NSA proves ineffective in preventing the rising instances of terrorism attacks.

In summary, the administration's current storage practices are a serious risk to public trust, civil liberties, and personal privacy. The NSA's collection of bulk metadata undermines safety and compromises individuals' rights to privacy and liberty. U.S intelligence agencies closely monitor confidential information of individuals, including their phone calls and online activities. This surveillance also extends to overseas clients of major online service providers such as Google and Yahoo. Considering these concerns, I argue that using drones is an essential tactic in combating terrorism.

The NSA's data-mining strategy, despite claiming to promote national security, will violate individuals' privacy and liberty rights while also negatively impacting America's competitiveness in providing cloud services.

References

  1. Byman, D. (2013). Why Drones Work: The Case for Washington's Weapon of Choice. The Brookings Institution. Retrieved 15 April 2016, from http://www.brookings.edu/research/articles/2013/06/17-drones-obama-weapon-choice-us-counterterrorism-byman
  2. Eitzen, D., Zinn, M., ; Smith, K. (2013). Social problems. Pearson Education.
  3. Sanger, D., ; Savage, C. (2013). Obama Is Urged to Sharply Curb N.S.A. Data Mining.

The text is a hyperlink to an article on The New York Times website about a report on

NSA surveillance tactics.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New