Featured Post
Management Theories by Morgan, Fayol and Taylor Research Paper
The executives Theories by Morgan, Fayol and Taylor - Research Paper Example The Fourteen rules that have been set somewhere near Fayol a...
Wednesday, October 16, 2019
Argumentative Research Paper Example | Topics and Well Written Essays - 1250 words
Argumentative - Research Paper Example This essay will argue in support of the points and concerns raised by the author by citing evidence from credible scholarly sources. It was anti-Semitism and fervent nationalism that consolidated government control of German, Italian and Chinese populations respectively in the bygone era. In todayââ¬â¢s geo-political situation, terrorism is the most discussed issue in public discourse. Ever since the September 11, 2001 attacks on America, it has been a major pre-occupation of American diplomatic and military efforts. Since the United States is the leader of the prevailing uni-polar world, terrorism now has implications for all countries associated with it. In the context of the ongoing War on Terror, the concept of Islamist jihad is seen as the ideological springboard for the numerous suicide attacks witnessed recently. As a measure to retaliate and prevent terror attacks, America and its allies have initiated several counter-terror operations in perceived geo-political hotspots. To complement these efforts, the scale and scope of counter-intelligence operations are also upped. (Mcgrath, 2004, p.147) But the term counter-intelligence darkly reminds the reader of the CoIntelPro regime of the Cold War period, where the state abused its power to keep a check on citizen freedoms. Curbing civil liberties under whatever guise is seldom a progressive move, as examples from past and present clearly show: ââ¬Å"Tyrants place populations under surveillance because that is a prime means of control. The Gestapo, the NKVD, the KGB, the Stasi, and the Chinese Politburo all requisitioned private data such as medical, banking, and library records; now, with the Internet, Chinese authorities track citizensââ¬â¢ computer use. One reason dictators demand access to such private data is that this scrutiny breaks down citizensââ¬â¢ sense of being able to act freely against those in powerâ⬠¦Ã¢â¬ (Wolf, Chapter 5, p.81) While counter-terrorism and counter-intelligence operations might have legitimate causes in certain exceptional cases, today it has come to represent hegemony and power. The record of the United States, especially under eight year reign of George W. Bush speaks ill of the notion of counter-intelligence. Interrogators working on the War on Terror project have resorted to such dehumanizing tactics such as solitary confinement in nudity in order to elicit intelligence information from suspects. Interrogators were learnt to have imposed nudity as a way of inducing ââ¬Ëlearned helplessnessââ¬â¢ ââ¬â which is akin to the psychological subjugation of American public to the domination and control by the elite business and political class. The Obama administration continued this tactic with Pfc. Bradley Manning. Whistle-blowers are being held naked in solitary confinement, ââ¬Å"while our political establishment, a complicit media, and a professional class of lawyers and behavioral scientists attempt to veil American atrocities . Current targeted assassinations of American citizens, landmines, torture, and military tribunals sadly converge with the Bush-Cheney era policy of war andà counter-terrorism.â⬠(Glazier, 2009, p.957) The dangers of indirect censorship and control articulated by Noami Wolf are easier to understand when we study the implications of recent legislations. For example, under George W. Bush's reign, the Foreign Intelligence
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.