Bioethics and the National Security State

Journal of Law, Medicine and Ethics 32 (2):198-208 (2004)
  Copy   BIBTEX

Abstract

it is mandatory that in building up our strength, we enlarge upon our technical superiority by an accelerated exploitation of the scientific potential of the United States and our allies. National Security Council, NSC-G8: United States Objectives and Program for National Security April 14, 1950 Innovation within the armed forces will rest on experimentation with new approaches to warfare, strengthening joint operations, exploiting U.S. intelligence advantages, and takingfull advantage of science and technology. George W Bush, The National Security Strategy of the United States of America, September 17,2002.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,571

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Fei chuan tong an quan yu Zhongguo.Yong Fu - 2007 - Shanghai: Shanghai ren min chu ban she.
Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Online Security: What’s in a Name? [REVIEW]Anat Biletzki - 2013 - Philosophy and Technology 26 (4):397-410.

Analytics

Added to PP
2010-08-31

Downloads
28 (#565,512)

6 months
1 (#1,469,469)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Citations of this work

No citations found.

Add more citations

References found in this work

Bioethics after the Terror.Jonathan D. Moreno - 2002 - American Journal of Bioethics 2 (1):60-64.
Remember Saddam's Human Guinea Pigs.Jonathan D. Moreno - 2003 - American Journal of Bioethics 3 (3):53-53.

Add more references