Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
Check Instructions
Style:
MLA
Subject:
History
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 7.2
Topic:

United States of Secrets

Essay Instructions:

Please read what I upload carefully.
https://www(dot)pbs(dot)org/video/frontline-united-states-secrets-part-one/

Essay Sample Content Preview:
Name:
Instructor:
Institution:
Date:
United States of Secrets
The U.S. has always been at war with entities around the world. As a result, there has always been an existential threat from virtually any quarters around the globe, from military, terrorist to even biological. Some of these threats can even emanate from right within the nation’s borders. The biggest threat however, has always come from radical Islam that in turn translates to terrorism. Terrorism has always been a challenge to the United States because it controls significant interests in various parts of the world.
What Factors Led to The Creation of the Program?
Therefore, domestic and foreign surveillance existed even before the occurrence of the 9/11 attack. However, the manner in which the 9/11 attack was conducted influenced the creation of the program. The 9/11 attack was planned and executed without the knowledge of US security agencies. The perpetrators successfully targeted important installations in the country, such as the World Trade Center (PBS, 2014). In those circumstances, the program was established as a response to future attacks; to try and repel a repeat of such attacks in the future. In a nutshell, it was basically designed to ensure that the nation was in a capable position to protect itself and its citizens from any potential attacks of a similar or even greater kind in the future.
What Did the Program Consist Of?
The program consists of a rapid surveillance system and operatives that operate without warrants and collect all sorts of information. The whole surveillance process is based on the idea that majority of communication worldwide is handled by US internet hubs. These hubs are companies that mostly handle data on people, especially the sensitive information (Pokempner, 2019). As a result, it is easy to locate conspirators and the threat they pose to the country. As a result, a mass web of screening of every piece of information coming in and out of the country via electronic means occurs, where the data is monitored and assessed. The threat levels of all the information is thereafter assessed as well, and the respective individuals are put under secret investigatio...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to terrorism essays:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!