National Security Strategy Of 2010 Narrative Essay

PAGES
5
WORDS
1659
Cite

The United States has always been a front runner in terms of human rights, democracy, and freedom. However, at the moment it is rather difficult to intervene in a country invoking human rights abuses. Indeed, the United Nations is the responsible body for authorizing such interventions. Still, there are other means through which the U.S. can intervene in support of human rights. If the former presidency considered such interventions to be legitimate and justifiable, for the current presidency, the key point will be negotiations and talks. This is one of the main reasons for which it is foreseen that new relations with countries such as Iran or North Korea could be based on talks. It is difficult to say whether these talks will be successful. In any case, as stated above, the approach is different. As a conclusion, it can be said that the role of the National Security Strategy is essential especially for country such as the U.S. The Obama Administration is yet to publish such a document; still,...

...

The major elements of the Obama security strategy will be the weapons of mass destruction, terrorism, the war in Iraq, climate change, and the new economic strategy that must ensure the recovery of the global and national economy. Even though parts of these themes were addressed before, clearly the Obama administration will answer these challenges differently.
Bibliography

Bender, B. New leadership planned to fight WMD terrorism. The Boston Globe. Online Edition. December 3, 2008. Retrieved 28 March 2010 from, http://www.boston.com/news/nation/articles/2008/12/03/new_leadership_planned_to_fight_wmd_terrorism/

MacAskill, E. Six years after Iraqi invasion, Obama sets out his exit plan. The Guardian. Online edition. 27 February 2009. Retrieved 28 March 2010 from http://www.guardian.co.uk/world/2009/feb/27/obama-iraq-war-end-august-2010

Obama, B. Renewing American Leadeship. Foreign Affairs. July/August 2 -- 7. Retrieved from http://www.foreignaffairs.com/articles/62636/barack-obama/renewing-american-leadership

Reveron, D. "Obama's National Security Strategy Unfolding'." The Atlantic Council. 19 June 2009. Retrieved 28 March 2010, from http://www.acus.org/new_atlanticist/obamas-national-security-strategy-unfolding

The National Security Strategy. 2006. Retrieved 28 March 2010, from http://www.strategicstudiesinstitute.army.mil/pdffiles/nss.pdf

Sources Used in Documents:

Bibliography

Bender, B. New leadership planned to fight WMD terrorism. The Boston Globe. Online Edition. December 3, 2008. Retrieved 28 March 2010 from, http://www.boston.com/news/nation/articles/2008/12/03/new_leadership_planned_to_fight_wmd_terrorism/

MacAskill, E. Six years after Iraqi invasion, Obama sets out his exit plan. The Guardian. Online edition. 27 February 2009. Retrieved 28 March 2010 from http://www.guardian.co.uk/world/2009/feb/27/obama-iraq-war-end-august-2010

Obama, B. Renewing American Leadeship. Foreign Affairs. July/August 2 -- 7. Retrieved from http://www.foreignaffairs.com/articles/62636/barack-obama/renewing-american-leadership

Reveron, D. "Obama's National Security Strategy Unfolding'." The Atlantic Council. 19 June 2009. Retrieved 28 March 2010, from http://www.acus.org/new_atlanticist/obamas-national-security-strategy-unfolding
The National Security Strategy. 2006. Retrieved 28 March 2010, from http://www.strategicstudiesinstitute.army.mil/pdffiles/nss.pdf


Cite this Document:

"National Security Strategy Of 2010 Narrative" (2010, March 28) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/narrative-of-2010-national-security-1085

"National Security Strategy Of 2010 Narrative" 28 March 2010. Web.26 April. 2024. <
https://www.paperdue.com/essay/narrative-of-2010-national-security-1085>

"National Security Strategy Of 2010 Narrative", 28 March 2010, Accessed.26 April. 2024,
https://www.paperdue.com/essay/narrative-of-2010-national-security-1085

Related Documents

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

But the U.S. must also set an example to the world on human rights, and that begins with a rejection of the kind of abuses that were carried out at Abu Ghraib in Iraq during the U.S. occupation of that sovereign nation. Works Cited Biden, Joseph. (2009). Biden Lays Out U.S. Foreign Policy Goals, Approaches. America.gov. Retrieved Dec. 16, 2010, from http://www.america.gov. Blanton, Shannon Lindsey. (2005). Foreign Policy in Transition? Human Rights, Democracy, and

Fearfulness of non-state actors remains salient, but what is particularly interesting is the way Russia and China are singled out as nations with whom the United States is not currently engaged in war with but which nevertheless present peculiar threats. The Department of Defense's National Defense Strategy notes that China's blossoming wealth has also enabled the proliferation of its military, which threatens peace in the Straits of Taiwan and

The ultimate House vote was two hundred and twenty to two hundred and seven. The senate vote was fifty three to forty three. The republicans were collectively opposed in both chambers (3 June 2010, B3). The Future of the Health Care Bill Subsequent to disagreements as political enemies for more than a year, the Obama administration and the health insurance industry realized that they require one another. Both have huge stakes in

Security Programs Implementation of Information Security Programs Information Security Programs are significantly growing with the present reforms in the United States agencies, due to the insecurity involved in the handling of data in most corporate infrastructure systems. Cases such as independent hackers accessing company databases and computerized systems, computer service attacks, malicious software such as viruses that attack the operating systems and many other issues are among the many issues experienced

Nobelprize.org). Pinter went on: "The crimes of the U.S. have been systematic, constant, vicious, remorseless -- not to mention very effective. You have to hand it to America," Pinter explained, "It has exercised a quite clinical manipulation of power worldwide while masquerading as a force for universal good" (Pinter, 2005). He added, cryptically, "It's a brilliant, even witty, highly successful act of hypnosis." Conclusion The timing of his book (2003) prevents Kagan from