Verified Document

National Security Strategy Of 2010 Narrative Essay

The United States has always been a front runner in terms of human rights, democracy, and freedom. However, at the moment it is rather difficult to intervene in a country invoking human rights abuses. Indeed, the United Nations is the responsible body for authorizing such interventions. Still, there are other means through which the U.S. can intervene in support of human rights. If the former presidency considered such interventions to be legitimate and justifiable, for the current presidency, the key point will be negotiations and talks. This is one of the main reasons for which it is foreseen that new relations with countries such as Iran or North Korea could be based on talks. It is difficult to say whether these talks will be successful. In any case, as stated above, the approach is different. As a conclusion, it can be said that the role of the National Security Strategy is essential especially for country such as the U.S. The Obama Administration is yet to publish such a document; still,...

Parts of this document are hidden

View Full Document
svg-one

The major elements of the Obama security strategy will be the weapons of mass destruction, terrorism, the war in Iraq, climate change, and the new economic strategy that must ensure the recovery of the global and national economy. Even though parts of these themes were addressed before, clearly the Obama administration will answer these challenges differently.
Bibliography

Bender, B. New leadership planned to fight WMD terrorism. The Boston Globe. Online Edition. December 3, 2008. Retrieved 28 March 2010 from, http://www.boston.com/news/nation/articles/2008/12/03/new_leadership_planned_to_fight_wmd_terrorism/

MacAskill, E. Six years after Iraqi invasion, Obama sets out his exit plan. The Guardian. Online edition. 27 February 2009. Retrieved 28 March 2010 from http://www.guardian.co.uk/world/2009/feb/27/obama-iraq-war-end-august-2010

Obama, B. Renewing American Leadeship. Foreign Affairs. July/August 2 -- 7. Retrieved from http://www.foreignaffairs.com/articles/62636/barack-obama/renewing-american-leadership

Reveron, D. "Obama's National Security Strategy Unfolding'." The Atlantic Council. 19 June 2009. Retrieved 28 March 2010, from http://www.acus.org/new_atlanticist/obamas-national-security-strategy-unfolding

The National Security Strategy. 2006. Retrieved 28 March 2010, from http://www.strategicstudiesinstitute.army.mil/pdffiles/nss.pdf

Sources used in this document:
Bibliography

Bender, B. New leadership planned to fight WMD terrorism. The Boston Globe. Online Edition. December 3, 2008. Retrieved 28 March 2010 from, http://www.boston.com/news/nation/articles/2008/12/03/new_leadership_planned_to_fight_wmd_terrorism/

MacAskill, E. Six years after Iraqi invasion, Obama sets out his exit plan. The Guardian. Online edition. 27 February 2009. Retrieved 28 March 2010 from http://www.guardian.co.uk/world/2009/feb/27/obama-iraq-war-end-august-2010

Obama, B. Renewing American Leadeship. Foreign Affairs. July/August 2 -- 7. Retrieved from http://www.foreignaffairs.com/articles/62636/barack-obama/renewing-american-leadership

Reveron, D. "Obama's National Security Strategy Unfolding'." The Atlantic Council. 19 June 2009. Retrieved 28 March 2010, from http://www.acus.org/new_atlanticist/obamas-national-security-strategy-unfolding
The National Security Strategy. 2006. Retrieved 28 March 2010, from http://www.strategicstudiesinstitute.army.mil/pdffiles/nss.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

American Foreign Security Policies What
Words: 1788 Length: 5 Document Type: Research Paper

But the U.S. must also set an example to the world on human rights, and that begins with a rejection of the kind of abuses that were carried out at Abu Ghraib in Iraq during the U.S. occupation of that sovereign nation. Works Cited Biden, Joseph. (2009). Biden Lays Out U.S. Foreign Policy Goals, Approaches. America.gov. Retrieved Dec. 16, 2010, from http://www.america.gov. Blanton, Shannon Lindsey. (2005). Foreign Policy in Transition? Human Rights, Democracy, and

Military the Multifaceted American Defense
Words: 607 Length: 2 Document Type: Term Paper

Fearfulness of non-state actors remains salient, but what is particularly interesting is the way Russia and China are singled out as nations with whom the United States is not currently engaged in war with but which nevertheless present peculiar threats. The Department of Defense's National Defense Strategy notes that China's blossoming wealth has also enabled the proliferation of its military, which threatens peace in the Straits of Taiwan and

National Health Care Reform --
Words: 1572 Length: 4 Document Type: Term Paper

The ultimate House vote was two hundred and twenty to two hundred and seven. The senate vote was fifty three to forty three. The republicans were collectively opposed in both chambers (3 June 2010, B3). The Future of the Health Care Bill Subsequent to disagreements as political enemies for more than a year, the Obama administration and the health insurance industry realized that they require one another. Both have huge stakes in

Security Programs Implementation of Information Security Programs
Words: 1415 Length: 4 Document Type: Essay

Security Programs Implementation of Information Security Programs Information Security Programs are significantly growing with the present reforms in the United States agencies, due to the insecurity involved in the handling of data in most corporate infrastructure systems. Cases such as independent hackers accessing company databases and computerized systems, computer service attacks, malicious software such as viruses that attack the operating systems and many other issues are among the many issues experienced

Paradise and Power: Robert Kagan
Words: 1791 Length: 5 Document Type: Book Review

Nobelprize.org). Pinter went on: "The crimes of the U.S. have been systematic, constant, vicious, remorseless -- not to mention very effective. You have to hand it to America," Pinter explained, "It has exercised a quite clinical manipulation of power worldwide while masquerading as a force for universal good" (Pinter, 2005). He added, cryptically, "It's a brilliant, even witty, highly successful act of hypnosis." Conclusion The timing of his book (2003) prevents Kagan from

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now