Monday, December 30, 2019
HEROISM IN THE ILIAD Essay - 1046 Words
In the Iliad there are many characters that could be considered heroic. But the two main characters that stand out as heroes to me are swift-footed Achilles and flashing-helmet Hector. Numerous times throughout the epic they display qualities and traits that are unsurpassed by anyone on their side. Many times throughout the epic Achilles and Hector are tested for their strength, and will to win in battle, which for both warriors always ends up positive because they always win their battles. Although both fighters are among the elite status in the armies, they each show human and god-like qualities that help them be as a fierce and feared as possible. As soon as we are exposed to Achilles in battle, it is obvious why he is the hero of theâ⬠¦show more contentâ⬠¦Ã¢â¬Å"Would to god you could linger by your ships without a grief in the world, without a torment! Doomed to a short life, you have so little time.â⬠(Homer book 1 line 496) All of these facts add up to Achilles having a clear-cut advantage over the opposition. Another smaller reason for Achilles heroism is his sense of responsibility. A prime example of that is when Patroclus dies. He takes immediate responsibility for Patroclusââ¬â¢ death, and instantly vows to take revenge on Hector for it. When you put all these details together it adds up to the heroism of Achilles throughout the entire epic. The other hero of The Iliad is Hector. He is still a major hero of the story but for much different reasons. Unlike Achilles he is not invincible or half-god. Hector is a hero because of his intangible characteristics that propel him to success. For his country, Hector represents qualities like honor, duty, and pride. Another reason for Hectors heroism is his devotion and loyalty to whatever cause he is fighting for. Unlike his brother Paris, who takes a break from war in the middle, Hector does not stop fighting until there is no more to be fought about. ââ¬Å"Come, now for attack! Weââ¬â¢ll set all this to rights, someday, if Zeus will ever let us raise the winebowl of freedom high in our halls, high to the gods of cloud and sky who live forever-once we drive these Argives geared for battleShow MoreRelatedEpic Heroism And Values Of The Iliad1030 Words à |à 5 PagesHope Schoenhut DWC 101: Paper 1 November 1, 2017 Epic Heroism and Values of the Greek and Roman Culture The image of Achilles killing Hector and the image of Aeneas killing Turnus classify them as epic heroes. In the Greek epic poem the Iliad, Homer portrays Achilles as an enraged warrior fighting for revenge for a woman he loved. In the Roman epic poem the Aeneid, Virgil portrays Aeneas as fleeing the city of Troy to establish a new city. Achilles and Aeneas are epic heroes because they bothRead MoreAnalysis Of Homer s Iliad, Heroism801 Words à |à 4 Pagesââ¬â¹In Homerââ¬â¢s Iliad, heroism plays a major role in the two idols the reader will side with; Achilles or Hector. Societyââ¬â¢s image of a hero demands for an altruistic, strong, and compassionate figure, but Homer refutes this idea of a hero. Homerââ¬â¢s Iliad demonstrates that in a realistic society, there is no such thing as a complete hero, and that true heroism does not exist. ââ¬â¹Achilles, the Achaean trophy soldier, was the creation of a mortal named Paleus and of a Goddess named Thetis. Because of his immortalityRead More The Paradox of Heroism in Homerââ¬â¢s Iliad1951 Words à |à 8 PagesThe Paradox of Heroism in Homerââ¬â¢s Iliad The Iliad presents a full range of valorous warriors: the Achaians Diomedes, Odysseus, and the Aiantes; the Trojans Sarpedon, Aeneas, and Glaukos. These and many others are Homerââ¬â¢s models of virtue in arms. Excelling all of them, however, are the epicââ¬â¢s two central characters, Achilleus, the son of Peleus and, Hector, the son of Priam. In these two, one finds the physical strength, intense determination, and strenuous drive that give them first placeRead MoreEssay about Immense Heroism in Homerââ¬â¢s Iliad1664 Words à |à 7 PagesImmense Heroism in Homerââ¬â¢s Iliad The Iliad opens with the anger of Peleus son, Achilleus, (1.1) and closes with the burial of Hektor, breaker of horses (24.804).1 The bracketing of the poem with descriptions of these two men suggests both their importance and their connection to one another. They lead parallel lives as the top fighters in their respective armies, and, as the poem progresses, their lives and deaths become more and more closely linked. They each struggle to fulfill the heroicRead MoreHeroism Depicted Throughout The Epic Poem, The Iliad And The Knights Tale866 Words à |à 4 PagesHeroism is shown through the ages in a variety of areas all over the world. One of the greatest examples of how heroism is depicted within a literary work is in Homerââ¬â¢s epic poem, The Iliad. Although the ideals of heroism are apparent in the poem, it is important to understand how the same theme can be seen through other works of literature. The Knights Tale, which is one of the greatest stories that Chaucerââ¬â¢s Canterbury Tales has to offer. The Iliad and The Knights Tale are both stories that containRead MoreA Dynamic Greek Epic Poem Iliad1354 Words à |à 6 PagesAncient Greek History is very well known as fascinating due to its many civilization and great heroic people surrounding their history. A dynamic Greek epic poem Iliad portrays the siege of Troy, attributed to Homer. Adventurous and braveness with god-like qualities describe an ancient classic Greek hero in this poem. Iliad is known now as one of the oldest in two surviving ancient Greek epic poems relating the events near the end of Trojan War. Heroââ¬â¢s are known as important figures inRead MoreThe Epic Poem Of Troy1356 Words à |à 6 Pages The Ancient Greek History is famous for its many fascinating civilization and great heroic people surrounding the history. Iliad portrays the siege of a dynamic ancient Greek epic poem of Troy, which is attributed to Homer. Adventurous and braveness with god-like qualities is used to describe the ancient classic Greek heroes in this poem. Iliad is now known as one of the aged surviving ancient Greek epic poems, which directly relates to the events near the end of Trojan War. HeroicRead MoreThe Iliad And The Odyssey1317 Words à |à 6 PagesThroughout The Iliad and The Odyssey, both Achilles and Odysseus go through intense acts of heroism, internal and external hardships, and fluctuations in confidence. During the epic, The Odyssey, the main character, Odysseus, has to endure many hardships which show. He has to show tremendous amounts of heroism and confidence just to keep his crew and himself alive. He has to rival and face many gods that despise him along with many humans. This theme can also be reflected from Homerââ¬â¢s The Iliad, where theRead MoreThe Iliad, By Homer1141 Words à |à 5 PagesThe Iliad, along with the Odyssey, is one of two epics handed down through the Homeric tradition in the Greek Dark Ages, considered by many to be the Heroic Age. However, the key issue lies with the fact that ancient Greeks define a ââ¬Ëheroââ¬â¢ very differently from what we would consider a ââ¬Ëheroââ¬â¢ to be today. In ancient Greec e, a hero is any human descended from the gods and bequeathed with superhuman abilities. By this definition, Achilles is immediately classified as a hero, no matter his actions.Read MoreThe Heroes Of The Epic Of Gilgamesh1215 Words à |à 5 Pagesof Gilgamesh is prideful and selfish in his conquests. Achilles in The Iliad drug his enemyââ¬â¢s body around his friendââ¬â¢s funeral pyre for days on end. Heroines in ancient literature are closest to what is considered a hero today, even if their methods are unconventional. Lysistrata in Lysistrata leads a sex strike in order to end a war, and Antigone in Antigone nobley buries her brother despite it being unlawful. Feminine heroism, as seen in Lysistrata and Antigone, has a more straightforward plan to
Saturday, December 21, 2019
Edc1100 - Society Begins at Home - 2682 Words
EDC1100 Lifespan Development and Learning Course Examiner: Dr Patrick Oââ¬â¢Brien Tutor: Ms Linda De George Walker Critical review of Society begins at home By Sally Weale Due Date: May 30, 2011 Word Count: 1557 The article, Society begins at home, written by Sally Weale for The Age on May 9 2010, takes an objective look at two books written by author Sue Gerherdt, Why Love Matters: How Affection Shapes a Babyââ¬â¢s Brain and The Selfish Society. Weale emphasizes Gerherdtââ¬â¢s main objectives of both books, being how environment and experience at the start of life and through early childhood, namely childcare, effect a childââ¬â¢s development and ultimately society. This essay will analyse and evaluate four issues raised throughoutâ⬠¦show more contentâ⬠¦Weale (2010) writes, the people we become are fundamentally shaped by our earliest experiences and, in particular, the sort of love and attention we receive from our parents/carers. This statement would be of great interest to ethological theorist John Bowlby, formulator of the attachment theory which today is considered by many as the most persuasive theory of early emotional development (Oppenheim amp; Goldsmith, 2007). Bowlby was a strong believer that children required a warm continuous relationship to a mother figure or caregiver and without it they would become emotionally damaged (Penn, 2008, Pg 54). Bowlby theorized that the first attachment a child experiences in the first 6 months of age is most likely to a parent but could be to that of a grandparent or even sibling. Evidence from many studies on parent-child relationships, suggest significant associations between early secure attachment to later good functioning, and early insecure attachment to later emotional and behavioural difficulties (Prior, 2006, Pg 168). The toddler who has a secure attachment that she can rely on for comfort and support is more likely to trust others and be supportive than the toddler whose has an insecure attachment and is ignored, abused or belittled (Shonkoff amp; Phillips, 2000). Non-parental child care is in todayââ¬â¢s economy somewhat unavoidable. What effects does this care have on development? Lev Vygotsky would strongly argue that childcare is essential
Friday, December 13, 2019
Los Zetas Free Essays
RUNNING HEAD: Los Zetas Nolita Oliveira Wayland Baptist University Dr. Paul Lankford Borderland Beat Reporter Overmex (2010, August 26), reported 72 illegal immigrants from El Salvador, Honduras, Ecuador and Brazil, were found dead on a ranch in San Fernando, Tamaulipas, which is 150 km from the U. S. We will write a custom essay sample on Los Zetas or any similar topic only for you Order Now border city of Brownsville. This discovery came from one survivor who found his way to the Navy troops and reported members of the Los Zeta cartel at the nearby ranch. According to the Borderland Beat; 21 rifles, six 5. mm M4 carbines, three 7. 60 mm AK-47, seven 12 gauge shotguns, five . 22 caliber rifles, 101 magazines, two ammunition belts, six thousand 649 cartridges of various calibers, four bullet proof vests, one helmet, four trucks, one with the Ministry of National Defense (SEDENA), were also found at the ranch. With such a rich supply of ammunition and a massacre of men and women with their hands and feet tied, the question remains, how have the Los Zetas become so powerful? Los Zetaââ¬â¢s was originally founded by a group of highly trained Mexican Army Special Forces deserters and has expanded to include corrupted former federal, state, and local police officers hired by Mexicoââ¬â¢s Gulf Cartel (Los Zetas, 2010, November 22). The group originally consisted of 31 members with the first leader, Lieutenant Arturo Guzman Decena using his Federal Judicial Police radio code to become identified as Z1. This code was given to high-ranking officers for the Commanding Federal Judicial Police Officers in Mexico. Zeta is also named for the letter in Spanish. Decena was born in 1976 and trained with an elite Mexican military group called Grupo Aeromovil de Fuerzas Especiales (GAFE) which were trained in counter- insurgency and locating and apprehending drug cartel members, with Decena came 30 other GAFE deserters. Decena was killed in 2002 and his second-in-command Z2 was captured in 2004 (Decena, 2010, November 27). The current leader is Z3 Heriberto Lazcano. Los Zetaââ¬â¢s was originally hired to track down and kill rival cartel members and provide protection for the Gulf Cartel. Their power has grown and their savagery has had no boundaries. In 2003 Los Zetas negotiated a pact with the Gulf Cartel and the Beltran ââ¬âLeyva Cartel to engage their own drug shipments (Los Zetas, 2010, November 22). Seven years later after the pact, Los Zetas have violently turned against their former partner, the Gulf Cartel, and have formed alliances with the Juarez Cartel, Tijuana Cartel and the Beltran- Leyva Cartel. The other major faction alignment includes the Gulf Cartel, Sinaloa Cartel, and La Familia Cartel. In response to the Los Zetaââ¬â¢s savagery the Sinaloa Cartel hired another armed enforcer gang, Los Negros, to fight back. Los Negros have also turned their back and become independent are gaining more control of regions. As with other terrorist organizations, such as al Qaeda, there are roots to the source of the evil. According to Brookes (2005), it is important to understand the many reasons for the terrorist phenomenon includes radical religious ideology, poor governance, a lack of economic opportunity, social alienation, demographic pressure, and political isolation (page 11). Although Los Zetaââ¬â¢s. Los Negros, or other Mexican Cartels have not been listed as terrorist organizations by the U. S. Department of State their actions are in compliance with the different definitions of terrorism. Narcoterrorist would describe what these Mexican Cartels are. The statutory definition used by National Counterterrorism Center NCTC states that terrorism is premeditated, politically motivated violence directed against non-combatants (Benjamin, D. 2010,August 5). According to Narcoterrorism (2010, December 6), former Peru President coined the term narcoterrorism when describing terrorist-type attacks against nationââ¬â¢s anti-narcotics policy. The term was originally understood to mean ââ¬Å"the attempts of narcotics traffickers to influence the policies of a government or a society through violence and intimidation and to hinder the enforcement of the law and the administration of justice by the systematic threat or use of such violence (Narcoterrorism). FARC, ELN, Hamas, Taliban, and AUC in Colombia, and PCP- SL in Peru are all known terrorist organizations that engage in drug trafficking activity to fund their operations and gain recruits and expertise. Describing the horrific killing and torturing tactics Los Zetas use against their countrymen, government, innocent men, women, and children could be best described as simply terrorist, the best term when describing them would be narcoterrorist. Their battle against their own and the United States is not deeply rooted to a religion or some other similar ideology known terrorist organizationââ¬â¢s base their practice on. These cartels are simply money hungry, power tripping, double crossing, unfaithful to any cause, and will burn their own to reach their desired level. The War on Drugs is not a new concept simply invented overnight by someone to calm people down or put the fear into those pushing and selling. According to Head (2011), there is a history dating back to the early 1900ââ¬â¢s when the Harrison Tax Act of 1914 was enforced to restrict the sale of heroin and cocaine. The Marihuana Tax Act of 1937 attempted to tax marijuana because it was an alleged ââ¬Å"getaway drugâ⬠for heroin uses and was popular among Mexican- American immigrants. President Eisenhower was considered the first president to literally call for a war on drugs and he stressed his determination by establishing mandatory minimum federal sentences for possession of marijuana, cocaine, and opiates. The increase in federal penalties was under the Narcotic Control Act of 1956. Today the war on drugs has made it difficult to determine what is legal and illegal. Depending on the drug and the wording of drug policy legislation, narcotics are illegal except when prescribed to a certain individual. In 1996 California legalized marijuana for medical use and both the Bush and Obama administration have arrested California medical marijuana distributors (Head). The current strategy for the War on Drugs as determined by President Obamaââ¬â¢s drug policy coordinator, which is end War on Drugs terminology and attempt to rebrand federal antidrug efforts as simple harm- reduction strategies (Head). Head also quoted ââ¬Å"you canââ¬â¢t declare war on inanimate objects, social phenomena, moods, or abstractionsââ¬â and itââ¬â¢s a rhetorical convention that has determined the way our country views drug policy enforcement (Head). If you canââ¬â¢t declare war on these inanimate objects, social phenomena, moods or abstractions, and you canââ¬â¢t declare war on a country without resources to fight a war, than how do you rid the world of narcoterrorist? Itââ¬â¢s simply not possible. Mexico has been the main foreign supplier of marijuana and methamphetamines to the U. S. Dr ug cartels have been illegally transporting an estimated 70 % of foreign narcotics such as cocaine, heroin, and other drugs into the United States and other countries but were not transporting in such violent methods as used today (Mexico Drug War, 2011, January 3). Mexican Drug War also states that Mexico only accounts for a small share of worldwide heroin production but is the major distributor of heroin introduced into the United States. The U. S. Department estimates 90% of the cocaine is mainly produced by Colombia but entered into the U. S. through Mexico. Mexico and the U. S. borders have been used since the mid- 1980ââ¬â¢s when Mexico had established organizations competent and reliable to transport Colombian cocaine. Mexican cartels were given 30 % to 50 % of the cocaine shipment which led the cartels to become traffickers and distributors. Although the first few decades after the development of the cartels was passive, since 2006 the Mexican Cartels have turned deadly battling for territory rights and turning on each other. According to Timeline of the Mexican Drug War (2010, December 18), the deployment of Mexican Army soldiers into Michoacan to end drug violence was regarded as the first major retaliation made against cartel violence in Mexico and was regarded as the starting point of the Mexican Drug War between the government and drug cartels. The war escalated with each increase in military troops making Los Zetaââ¬â¢s violence against Mexicans harsher and frequent. It was reported 150 Mexican soldiers and police officers were killed as opposed to the 500 cartel gunmen killed in 2006. Violence surged and by 2008 there was a record of 5, 630 death. The kidnapping, torture, and decapitation of seven off duty soldiers and one police commander were included in this death toll. In 2008 high ranking police officials and government officials were gunned down or executed. The decapitated heads of the off duty police officials were left in a shopping center to be found with a threatening note to the military. Their terrorism tactics have since left their marks to be remembered. With Los Zetas becoming more violent and demanding more plazaââ¬â¢s the need for outside and local forces free from corruption is highly in demand. Regardless of the attempts to weed out those with possible links to Los Zetas or any cartel will remain impossible to prevent the introduction of new and easily corrupted officials. This can be said for their recruitment of poor, military, law enforcement and government officials. According to Los Zetas, their main recruits are all corrupted ex- federal, state, and local police officers as well as the poor men and women and former Kaibiles from Guatemala. This group does recruit women to help run the organization. The Kaibilies are special operations force of the Guatemala military and specialize in jungle warfare tactics and counter- insurgency operations (Kaibilies, 2010 November 2). There is also hierarchy within the group, just like other organized crime organizations. According to Los Zetas there are five groups. The first group consisted of the Los Halcones (The Hawks) and they were responsible for monitoring the distribution zones. The second group is the Las Ventanas (The Windows) who are bike-riding mid- teens responsible for warning the presence of police and other suspicious individuals near small stores that sell drugs. The Los Manosos (The Tricky Ones) gathered the arms. Los Zetas employ prostitute women who are called Los Leopardos (Leapards). The Los Zetas also have the Direccion (Command) which consists of 20 communications experts who intercept phone calls, follow and identify suspicious automobiles and are also known to accomplish kidnappings and executions. All of these groups form the composition of Los Zetas (Los Zetas). Los Zetas can also be compared to al- Qaida, in that their myriads of extensive criminal activities. They kidnap, murder- for- hire, use extortion, money- launder, smuggle humans and are involved with oil siphoning. Like al Qaeda, they have adopted a cell- like structure to limit the information known about members within the organization. Los Zetaââ¬â¢s boldness and cells are spread globally and it has been reported that the FBI were warned that a Los Zetas cell in Texas would use full tactical response if they intervened on their operations. Los Zetas have been able to take over and lord over a great deal of territories by battling it out with their enemies. Los Zetas is mainly based in the border region of Nuevo Laredo and have established lookouts in airports, bus stations, and main roads. They are also along the Gulf Coast region, Tabasco, Yucatan, Quintana Roo, Chiaps, Pacific Coast states, including Guerror, Oaxaca, Michocan, and in Mexico City. Los Zetas hires Mexican gangs such as the Texas Syndicate and MS-13 to carry out their contract killings (Los Zetas). According to the NarcoGuerra Times the DEA officials in Canada, Italy, and Mexico had arrested 175 members of the Zetas who were connected with the Ndrangheta. Los Zetaââ¬â¢s has been operating in approximately 47 countries and have been said to have established connections with the Italian Calabrian mafia known as Ndrangheta (NarchGuerra Times, 2009, September 19). There is research showing the Zetas and Ndrangheta had been working together for more than two years, since Europe needed the cocaine. The main reason their connection is important is because Ndrangheta is considered a major transnational criminal organization dealing in nuclear waste. Their partnership has also allowed the Zetas to advance their money laundering, real estate and human trafficking into Europe (Narco Guerra Times). Forming alliances with foreign countries organized criminal divisions will only make it harder for the Mexican government fight their war against the cartels and for these countries to fight their wars on drugs. America has been battling with the war on drugs and so have other countriesââ¬â¢ making it harder to clean up the streets is becoming more impossible with each cell developed in other locations. Mexicoââ¬â¢s battle with corruption within all the levels of police departments and constant recruitments with gangs across the border and international waters has made it harder for Homeland Security to fight the battle. Mexicoââ¬â¢s war against the cartels seem to only be escalating the issue and although many of the main cartel members throughout the different territories have been brought to justice, it seems their war on that side of the border is not accomplishing much but more bled shed on both sides of the border. As one of the strongest and dominant countries, America could provide the assistance needed. Many may debate this or feel America has their hand in too many countries affairs but the fact remains the brutality and narcoterrorist tactics used by Los Zetas and other cartels will continue to increase. This is not saying President Calderon has rejected American help or has been using other security tactics to help prosecute criminals associated with known narcoterrorist organizations. According to Hansen (2008, November 20), Mexico has pursued different methods for security tactics including extraditing alleged criminals to the United States, including the head of the Gulf Cartel. They have also been actively attempting to dismantle illegal methamphetamine labs, cocaine shipments, and eradicate marijuana. This shows promise but only twenty six meth labs were dismantled between 2002 and 2007. President Calderon developed a 2008 constitutional reform that merged their Federal Preventive Police (PFP) and the Federal Agency of Investigation (AFI). The AFI is similar to the FBI and gathers intelligence and the PFP is responsible for maintaining public order but does not have investigative abilities. President Calderon constitutional reforms of 2008 also called for reforms on criminal procedures. The reforms include oral trials with public proceedings, sentencing based on the evidence presented during trial, judges who are allowed to quickly rule on search warrant requests (Hansen). Their old ways used written trial procedures that could last for years. These efforts show some willingness to adopt new and effective methods using foreign help and using modern legal methods but it is still not enough. According to Hernandez (2010, February 25), the International Narcotics Control Board (INCB) based out of Vienna stated that Mexico, Brazil, and Argentina were sending out the wrong messages in their legislative and judicial developments that were aimed to decriminalize the possession of some drugs. With their declaration Mexico, Brazil, and Argentina rebutted and claimed that the INCB was overstepping their organizations mandated and were unwarranted intrusions in their countries sovereign decision-making and that the INCB has no jurisdiction over police changes made within sovereign nations. In 2009 Mexico decriminalized the possession of small amounts of marijuana, cocaine, heroin, and methamphetamine (Hernandez). Brazil replaced prison sentences with education and treatment for small-time drug offenders in 2006. In 2009 Argentinaââ¬â¢s Supreme Court declared punishment for possession of marijuana for personal use as unconstitutional. Argentina also called INCBââ¬â¢s arrogant for questioning the highest judicial authority of a sovereign state. Hernandez also stated that the INCB was deeply concerned with the United States moving towards legalizing or regularizing the use of marijuana for medical purposes may send the wrong message to other countries. The INCB had a legitimate concern for these countries actions of making it easier for criminals to pursue selling and people using marijuana and other drugs. In the United States inmates are allowed to pursue an education or gain their GED to help them gain employment when released but this does not prevent repeated offenders. Taking tough actions and measures is the only way to decrease crime and drug usage. Mexicoââ¬â¢s President taking two steps forward and then two steps back is only causing confusion for others to know what actions they need to take. The hard core facts that these Mexican narcoterrorist organizations were developed by corrupted ex military or law enforcement officials make it hard for the rest of the world to believe Mexico is competent to battle against the cartels or protect heir citizens from the unthinkable. With Mexicoââ¬â¢s incompetence comes inpatient Americansââ¬â¢ willing and ready to battle for their land. When the Arizona rancher was found dead on his land it was automatically assumed illegal immigrants had killed him. Arizona government officials quickly used his death as an example to push forwa rd their Senate Bill 1070. Now other states have developed similar versions for their own state immigration laws. The growing concern has somewhat shifted from illegal immigration, to how to battle Los Zetas and other cartels. Arizonaââ¬â¢s Bill may have opened peopleââ¬â¢s eyes to the growing problem of illegal immigrants advancing in the United States, but no one in their right mind could have ever imagined seeing those poor immigrants hog tied, gagged, and executed by Los Zetas; for trying to make it across the border. The American people donââ¬â¢t want the Mexicanââ¬â¢s killed, simply accounted for. When talking about Los Zetaââ¬â¢s and their narcoterrorist ways, it seems impossible not to think of them as terrorist in the same class as al Qaeda. They may not share the same fanatical ideology as al Qaeda but their terrorist tactics used against the Mexican and American people is on the same level. With the vast growth of their cells spreading globally and forming alliances with known organizations handling nuclear waste, the threat they pose to all those against them is even scarier than those threats by al Qaeda supporters living in the United States. Mexico has been using underground tunnels and smuggling drugs, humans, and weapons across both sides of the borders for decades. There have been reports that al Qaeda has helped train Los Zetas recruits with similar tactics. These Mexican military deserters have trained in the same American military installation, Fort Bragg, as known al Qaedan terrorist members have. The connection is too great and should not be ignored. Los Zetaââ¬â¢s is in a country that has a poor economy but extremely rich in the illegal drug trade. The promise of pay, respect, and fear is what appeals to those who join their ranks. This can be said for any organization. The Mexican government will not be able to use only their military forces to combat against these cartels. Los Zetas has proven they have no loyalty to any one organization but to themselves and their greed for territory and wealth has been fueling their fire. President Calderon should not wait for a full out battle to develop between the cartels and the cartels against the Mexican military. Zetas is growing rapidly and stronger with support and alliances from other countries. Instead President Calderon should call upon Mexicoââ¬â¢s allies for help battling them and cleaning up their streets. These cartels have gained their intelligence from working on the inside and gaining as much intelligence, expertise, and experience as possible. Their knowledge, tactics, and alliances will keep them thriving and defining who they are. It is up to the Mexican government to develop solutions to their economic crisis, drug laws, and protection of the people. Their military can only combat so long for so little pay and then they will turn to the darker side. If they paid their people enough salary there would be fewer traitors. Itââ¬â¢s like a mother developing rules for her children and expecting them to follow without having to actually enforce them. Countries have been known to break down barriers such as Germany. Countries have also sat by and watched a power hungry Jew hating man murder thousands of innocent people before calling in the big guns. Countries should not sit idly by and watch thousands of people get slaughtered because some men in uniform are greedy for territorial rights and making money by distributing, marketing, laundering drugs, humans, and weapons. There are American military installations located across Border States and if that is what it takes, so be it. References Arturo Guzman Decena. (2010, November 27). In Wikipedia, The Free Encyclopedia. Retrieved 20:30, January 2, 2010. From http://en. wikipedia. org/w/index. php? title=Arturo_Guzm%C3%A1n_Decenaoldid=399212394 Benjamin, D. (2010, August 5). Briefing on the release of country reports on terrorism for 2009. U. S. Department of State: Diplomacy in action Retrieved January 2, 2010 from http://www. state. gov/s/ct/rls/rm/2010/145734. htm Borderland Beat Reporter Overmex (2010, August 26). Zetas Massacre 72 Illegal Immigrants in San Fernando, Tamaulipas. Borderland Beat: reporting on the Mexican Cartel drug war. Retrieved December 2, 2010 from http://www. orderlandbeat. com/2010/08/zetas-massacre-72-illegal-immigrants-in .html Hansen, S. (2008, November 20). Mexicoââ¬â¢s Drug War. Council on Foreign Relations. Retrieved 2010, December 30 2010 from http://www. cfr. org/publications/13689/mexicos_drug_war. htm Head, T. (2011). History of the War on Drugs. About. com Civil Liberties. Retrieved 2011, December 2, 2010 from http://civilliberty. about. com/od/drugpolicy/tp/Wa r-on-Drugs-History. Hernandez, D. (2010, February 25). The International Narcotics Control Board criticizes several Latin American countries. La Plaza: News from Latin American and the Caribbean. Retrieved December 22, 2010 from http://latimesblogs. latimes. com/laplaza/2010/02/united-nations-latin-america-international-narcotics-control-board-incb-mexico-brazil-argentina. html Kaibilies. (2010, November 10). In Wikipedia, The Free Encyclopedia. Retrieved January 2, 2010 from http://en. wikipedia. org/w/index. php? title=Kaibilesoldid=395893797 Los Zetas. (2010, November 22). In Wikipedia, The Free Encyclopedia. Retrieved November 27, 2010 from http://en. wikipedia. rg/wiki/Los_Zetas NarcoGuerra Times (2009, September 19). Zetas/La Compania, Ndrangheta and the Nuclear Options. NarcoGuerra Times. Retrieved from http://narcoguerratimes. wordpress. com/2009/09/19/zetasla-compania-ndhrangeta-and-the-nuclear-options/ Narcoterrorism. (2010, December 6). In Wikipedia, The Free Encyclopedia. Retrieved January 2, 2010 from http://en. wikipedia. org/wiki/Narcoterrorism Timeline of the Mexican Drug War. (2010, December 18). In Wikipe dia, The Free Encyclopedia Retrieved January 2, 2010 from http://en. wikipedia. org/w/index. php? ttle=Timeline_of_the_Mexican_. How to cite Los Zetas, Papers
Thursday, December 5, 2019
Big Data Security Breaches
Question: Discuss about the Big Data Security Breaches. Answer: Introduction The year 2015 had been considered as the year of breaches. In 2015, there were numerous large organizations, such as, health-care organizations, financial organizations, higher educational institutes, federal markets, and even security industries, which had suffered a lot with data breaches. While the data breach barrage had proceeded, the solution providers for security breaches said that the awareness of customers about the security issues is required as well as investments are necessary for the data security technologies. The LastPass organization provides the easiest way for online account holders to secure their data accounts because the LastPass is the organization, which generates unique as well as strong security passwords or codes for millions of account holders, which is such a relief, but in September 2015, the password managing organization LastPass itself was smashed by cyber attackers, and the hackers had gained access to all the details of the users accounts (Bellovin, 2015). In September 2015, the password management firm LastPass had announced that the firm is suffering with computer security breach and became the victim of a big cyber-attack, due to which the firm is compromising with its secured data, such as, email addresses, authentication hashes, password reminders as well as with the servers of their users. The company LastPass had disclosed that the servers per user salts, which they are using is not enough to prevent dictionary brute and cyber force attacks. In September 2015, th e LastPass firm also had posted a blog, which indicated that the team of the LastPass has discovered as well as observed that some suspicious activities are happening on their entire network (Ducklin, 2017). During the investigation, the company has discovered that the email addresses of users accounts, authentication hashes, as well as their password reminders were compromised. Why and How It Occurred The firm LastPass had revealed that the cryptographic protection technique in which they use master passwords to protect their users online accounts include hashing as well as salting functions, which are designed to make the basic passwords, which are impossible for the hackers to crack (Paul, 2017). However, the accounts with very simple passwords and those online accounts which are reused by the users on some unauthenticated websites are not completely safe. Therefore, the delicate data of users via their email-ids can be hacked. There are a number of online account holders which are affected by this security breach. The severity of this cyber-attack is very high, which was first discovered in the year 2011. This breach had proved to be very bad for the users who had weak passwords, as it was easily guessed by the hackers. The LastPass in 2015 had disclosed that when they tried to reset their users passwords then they came to know that their entire security accounts have been hack ed. Possible Solutions The cyber-attacks or digital assaults are always developing, so the security experts must remain working in their labs and preparing new plans to keep all such breaches under control. The experts believe that a new technique named as encryption will deflect hackers and cyber attackers by serving fake information for each inaccurate guess for the passwords (Dutt, Kaur, 2013). This kind of approach slows down the activities of the attackers or cyber hackers, as well as conceivably covers the right passwords in a stack of false ones. One other emerging method is there to overcome such cyber-attacks like the LastPass had faced is quantum key dispersion, which shares the passwords integrated in photons over the fiber optic, that may have the viability now as well as for many years in the future also. The LastPass must enable a multi-figure authentication to secure their users accounts. This step is the most essential step which LastPass can take in case they havent already used it. Even in case of the worst cyber-attacks occurring in the organizations like if the hackers get master passwords of customers, then they still require the authentication code so that they can get access to the users of online accounts. If the firm has complete two-factor authentication, then hackers will not be able to access any account. The multi-factor authentication technique is essential for the LastPass and it is also useful for many websites, such as, social networking sites and email account websites. The cryptology technique is the best practice to protect and secure the communication of users in the existence of any third party called adversaries. Usually, cryptography is all about constructing as well as analyzing protocols, which help to prevent users accounts from third parties (Bhandari, 2016). To protect the online accounts of the LastPass customers is necessary so that their private messages cannot be read by the public. The cryptography provides various characteristics in the information security, for instance, data confidentiality, integrity and authentication. Premera BlueCross BlueShield The Premera BlueCross BlueShield is one of the biggest health insurance organizations in Boston. In 2015, numerous data breaches had hit several health insurance organizations and Premera is one of them, the company was smashed by a mega security breach. The health insurance company, the Premera BlueCross BlueShield in December had revealed that they discovered a data breach that had affected almost 11.2 million endorser, and a few individuals who work with the organization. In this data breach, the data of subscribers, such as, their names, bank details, security numbers, birth dates and some other delicate information were compromised. According to some news posted by the CEO of the firm, they had claimed that the health insurers IT systems are vulnerable to overcome the possible attacks but still they faced such issue (Tankard, 2012). The Premera organization did not disclose to its customers that their data has been hacked for the first six months when the cyber-attack has occurr ed to them, therefore, several customers filed lawsuits against them. Numerous lawsuits that were registered against the Premera organization are for being delinquent, breached its promise to customers, profaning of the Washington Clients Protection Act and the failure to discover the breach timely. Some threat related blogs indicated that the domain of the Premera website might have been portrayed to the Healthcare supplier, where the hackers utilized the identical characters replacement method and replaced the characters, like m to n, inside a fake domain. However, the Premera organization did not accumulate or store the credit card data of users, hence, the credit card details were not affected by this attack. Affected and How This cyber-hack enables DNS inquiry logging to recognize the hostname query for known malevolent C2 domains. Identify irregular string entropy, obscure endorsements, files name and so on. Monitor for excessively short endorsements, authentications with missing data, and so on. Disclose and impart information ruptures in a convenient way. The Premera had revealed that about 11 million individuals were affected by this data breach, from which 4.1 million customers belonged to other departments of Blue Cross Premera plans. In 2015, when the attack was first occurred, the organization did not have proper information on how much data breach had impacted their customers, but they were sure that it definitely affected the members from Washington and also from Alaska during that time-period. Since the underlying notice, the CareFirst had been working with Premera to audit and check the quantity of present and previous CareFirst individuals, who were possibly influenced, and also the type of members whose data was accessed throughout the assault (Rubenfire, Conn, 2015). The examination had confirmed that the assailants may have increased unapproved access to data, including name, address, date of birth, Social Security Numbers (SSNs), part ID numbers, claims data and clinical data. Attack carried out The Premera's examination verified that the assailants may have increased unapproved access to data that could incorporate names, birth details, locations, phone numbers, email addresses, Social numbers, recognizable proof numbers, financial balance data, and cases data, including clinical data of Premera subscribers. As of now, there is no sign that the information is expelled from the framework or has been utilized inappropriately (Kolbasuk, 2017). The Premera Blue Cross (Premera), which works in Washington and Alaska, had declared that the digital assailants has executed a refined assault to increase the unapproved access to its Information Technology (IT) frameworks. The Premera is working intimately with Mandiant, one of the world's driving digital security firms, and the FBI to research the assault. To date, specialists have verified that the aggressors may have increased unapproved access to individuals' data, which could incorporate part name, date of birth, email address, re sidential address, telephone number, social number, part distinguishing proof number and claims data, including clinical data. The Skyline BCBSNJ is a different and particular organization from Premera ("Premera Blue Cross Breach Exposes Financial, Medical Records Krebs on Security", 2017). Notwithstanding, a few horizons, BCBSNJ individuals who have gained access to social insurance in Premera's administration regions may have had their data stored in the Premera's information frameworks (Mcpherson, 2004). Prevent the attack The Premera Massachusetts considers security as an important parameter, which is the reason they took several steps to ensure individuals' protection as well as the protection of their data (Kim, 2016). The Premera has consent to stringent principles, including the state and government prerequisites. The Premera has started exhaustive security program addresses and security risks from various points of view, such as: Dedicated security plans Security oversight as well as governance program Various vendor risk appraisals Safety risk assurance The Data encryption is also one of the unique methodology that works with scrambling of data so that the data is unreadable by every unintended parties. Cryptography technique Triple DES was planned to renew the primary Data Cryptography Standard Algorithm, which cyber hackers finally erudite to defeat with relative ease (Greenberg, 2015). The Blowfish is also one of the algorithm designed to secure data and it also helped Premera to secure their data and protect themselves from any type of security breach. Conclusion This study concludes that both of the organizations should utilize good as well as cryptic passwords to secure their users or customers accounts to prevent it from the cyber-attackers and make it difficult for the hackers to crack the passwords. The management team of both the organizations can prepare a well-defined structure as well as execute some strategies to enhance their security systems to maintain the data integrity, availability and confidentiality. Bibliography Bellovin, S. (2015).Password Manager LastPass Warns of Breach Krebs on Security.Krebsonsecurity.com. Retrieved 7 April 2017, from https://krebsonsecurity.com/2015/06/password-manager-lastpass-warns-of-breach/ Bhandari, S. (2016). A New Era of Cryptography : Quantum Cryptography.International Journal On Cryptography And Information Security,6(3/4), 31-37. Chakraborty, H., Axon, R., Brittingham, J., Lyons, G., Cole, L., Turley, C. (2016). Differences in Hospital Readmission Risk across All Payer Groups in South Carolina.Health Services Research. Ducklin, P. (2017).Bad news! LastPass breached. Good news! You should be OK.Naked Security. Retrieved 7 April 2017, from https://nakedsecurity.sophos.com/2015/06/16/bad-news-lastpass-breached-good-news-you-should-be-ok/ Dutt, V., Kaur, A. (2013). Cyber security: testing the effects of attack strategy, similarity, and experience on cyber attack detection.International Journal Of Trust Management In Computing And Communications,1(3/4), 261. GREENBERG, A. (2015).Cite a Website - Cite This For Me.Wired.com. Retrieved 7 April 2017, from https://www.wired.com/2015/06/hack-brief-password-manager-lastpass-got-breached-hard/ Kim, K. (2016). Cryptography: A New Open Access Journal.Cryptography,1(1), 1. Kolbasuk, M. (2017).CareFirst BlueCross BlueShield Hacked.Databreachtoday.com. Retrieved 7 April 2017, from https://www.databreachtoday.com/carefirst-bluecross-blueshield-hacked-a-8248 Mcpherson, B. (2004). The Failed Conversion of CareFirst BlueCross BlueShield to For-Profit Status: Part 1, the Whole Story.INQUIRY: The Journal Of Health Care Organization, Provision, And Financing,41(3), 245-254. Paul, I. (2017).The LastPass security breach: What you need to know, do, and watch out for.PCWorld. Retrieved 7 April 2017, from https://www.pcworld.com/article/2936621/the-lastpass-security-breach-what-you-need-to-know-do-and-watch-out-for.html Premera Blue Cross Breach Exposes Financial, Medical Records Krebs on Security. (2017).Krebsonsecurity.com. Retrieved 7 April 2017, from https://krebsonsecurity.com/2015/03/premera-blue-cross-breach-exposes-financial-medical-records/ Rubenfire, A., Conn, J. (2015).Cyberattack exposes data of 11 million Premera Blue Cross members.Modern Healthcare. Retrieved 7 April 2017, from https://www.modernhealthcare.com/article/20150317/NEWS/150319904 SHAHANI, A. (2015).Premera Blue Cross Cyberattack Exposed Millions Of Customer Records.NPR.org. Retrieved 7 April 2017, from https://www.npr.org/sections/alltechconsidered/2015/03/18/393868160/premera-blue-cross-cyberattack-exposed-millions-of-customer-records Tankard, C. (2012). Big data security.Network Security,2012(7), 5-8.
Subscribe to:
Posts (Atom)