Wednesday, July 31, 2019

Martin Luther King Letter from Jail Essay

Martin Luther king believes that the only way to wipe away the injustices experienced within Birmingham City was through holding peaceful negotiations in order to resolve the issues amicably. In the article, â€Å"Ways of Meeting Oppression† by Martin Luther King Jr, tries to bring out Injustices and Oppression, which have been prevalent issues within our society. He believed that black Americans could win equal rights by peaceful means such as peaceful boycotts and marches. He always reminded Americans that their nation’s principles were justice, freedom and equality. Luther King’s argument for non-violent protest against the greater good of human beings may be the disobedience by the authorities, but as Erich Fronmon states in his essay â€Å"Disobedience is a psychological and Moral Problem†, that any act of disobedience against any inhuman law state is morally correct and is for the betterment of the human kind. In his speech â€Å"I have a dream†, He says that his nation will rise up to the true meaning of its creed†¦that all men treated equally. He believed that his children will live to the expectation of his dreams and that equality, both the white people and the black people would exercise fairness and justice. In Martin Luther King message â€Å"Struggle for Equality† in 1963 , he shared his dream of equality with the white Americans , like many other black American he was not treated properly they were forced to use separate al black schools, restaurants and stores. They had different entrances for the black people and certain parts of the nation denied the right to vote. Thus, the placing of laws was for the arising conditions, People needed awareness of such needs. Peaceful negotiations and boycotts held by Martin Luther and his staff paved way for the rapidly gained equality in their rights. In the letter to Birmingham jail, racial and education segregation are undermining goals to the hate inflicted upon the African American community. In the speech at the Great March on Detroit in 23 June 1963, held in Washington, King expound upon making â€Å"the American Dream a reality†. Following the letter from Birmingham jail he said that,† the Negro is no longer willing to accept racial segregation in any of its dimensions.† He considered segregation as wrong because it was a system of adultery, perpetuated by illicit intercourse between injustice and immorality. Educational segregation was one of the key issues that affected not only societal segregation in general but also the lives of the lives of the many black Americans. Most black schools were n’t funded well and as result, there was poor education among the students. This finally translated into the black people acquiring the worst jobs hence unable to afford the decent housing acquired by the white Americans. He continued struggling against segregation and with his aim, he went to Alabama and Birmingham city to watch the injustice practiced there. In order to conclude the many civil rights protest boycotts and demonstrations, there was reinforcement on segregation issues to those aware of it. Eventually it leads to the abolishment of segregation as law and through time changing racist attitudes altogether (Mendoza). In conclusion, the unjust law not only has inflicted pain and anguish among the black Americans but also but compelled them to total misery. Racial discrimination, hatred and education segregation are spring folds of the injustice practiced.

Tuesday, July 30, 2019

A Desert Journey Kokology

A Desert Journey Waiting can be a special form of torture, worse than any momentary pain. The combination of frustration and boredom can send even the bravest heart into a state of panic. Our first journey will bring us face to face with the infinite. Take a moment to prepare yourself, and eternal desert†¦ 1. You are riding a camel across the vast and empty expanse of a seemingly endless dessert. You have ridden until you are near exhaustion. What words would you say to the camel that has carried you all the way? 2. Just at the point you thought you’d die of thirst, a beautiful oasis appears.But someone has arrived before you. Who is this other traveller? (Use the name of a person you know. ) 3. Time passes slowly in the desert, and it feels like an eternity before the lights of a town appear on the horizon. You have finally reached your destination. What are your feelings as you come to your journey’s end? 4. The time has come to part with the camel you have ridde n for so long. Just as you dismount, a new rider climbs into the saddle to take your place. Who is the new rider? (Name another person in your life. ) Key to a Desert JourneyThe desert and camel theme symbolizes the journey toward personal independence. Specifically, this scenario reveals your feelings about parting with a lover. Your answers show how you might react when the time comes to go your separate ways. 1. The words you spoke to the camel reveal what you might say to yourself when you realize love has been lost. Did you try words of encouragement like â€Å"We’ll make it through somehow! † Or was there a hint of despair — â€Å"We’re lost†¦ this is hopeless†¦ I think we’re going to die out here†? 2. In psychological terms, the oasis symbolizes the key to solving one’s problems.The person you encountered here could be someone who has helped or comforted you in the past or one you might turn to in times of need. 3. Th e town at journey’s end stands for the order restored to your emotions once you’ve recovered from your broken heart. Your feelings upon reaching the town are your true feeling about finally getting over a lost love. 4. The new rider is a person toward whom you feel a secret rivalry, jealousy, or resentment. Is the person you named a rival in love or maybe someone who once broke your heart?

Monday, July 29, 2019

International Business Analysis Project Research Paper

International Business Analysis Project - Research Paper Example According to Busfield (2006), the total worldwide sales of pharmaceutical products in the year 2003 amounted to $ 466 billion (10). It is necessary to note that the usage of prescription medicines globally is on the increase (Blume 1992). All the leading pharmaceutical multinationals, including Glaxo Smith Kline, have head offices in all advanced societies; and their worldwide presence is on the increase (Berg, 1997,). The challenges driving down revenues from the blockbuster strategy to 5% are recognized: declining R&D (Research and Development), rising expenditures of commercialization, augmenting payor influence and shorter exclusivity terms. The pharmaceutical industry has traditionally used the blockbuster approach to develop new drugs, despite numerous challenges of this approach (Williams et. al., 2008, p. 845). Using this approach, some prospective drugs may fail and when their costs are factored in, the actual cost of discovering, developing, and launching new drugs overly i ncreases (McKeown 1976). Publishing arm of a consultancy firm forms the basis of this report and audience are expert in the pharmaceutical field. Challenges of the model The model structure is provided in the diagram below revealing the requirements of the model. The challenges of the model are viewed as the enslaving factors in the pharmaceutical industry. ... vironment for pharma companies has transformed dramatically in the recent past; however, the founding model has not kept the pace thus posing challenges to emerging pharmaceutical companies. The declining research and development (R&D) productivity, increasing costs of commercialization, shorter exclusivity periods and augmenting payor influence have increased the mean expenditure per a successful introduction to $ 1.7 billion and decreased average expected profits on novel investment to the indefensible level of 5%. The challenges has presented predicaments that mergers created will not improve profitability. This forces pharmaceutical organizations to require fresh business models that fit the new environment. The model presents major challenges to all but the three largest organizations; GlaxoSmithKline PLC, Pfizer Inc., and Merck & Co. Inc. the choice is comparatively desolate: with little resources to drive primary care commodities and to venture in the arms race in sales & mark eting, and research and development project (R&D), they will probably be driven faster to replace their blockbuster-based models (Moncrieff 2002). Market worth is shifting previously to some smaller actors that have embraced new models. The effects of model dilapidation have been seen in many pharmaceutical organizations. According to Busfield (2006), pharmaceutical companies get most of their revenue from patented drugs, with most patients lasting for a period of up to 20 years. In 2003, for instance, The US pharmaceutical market, including of six of the peak 10 pharmaceutical corporations, accounted for ‘just under half of the world’s revenue, (Busfield 2006, p. 3).’ The other four companies were based in Europe. Despite the importance of this industry in the world, companies in

Sunday, July 28, 2019

Ethics in Criminal Justice Essay Example | Topics and Well Written Essays - 250 words - 2

Ethics in Criminal Justice - Essay Example More worrying than this is the social impact of such high imprisonment rates, on individuals and families. Some worrying trends are also reported, including the great variation in the imprisonment rates according to gender, ethnic origin, and state. Men are more than ten times more likely to be imprisoned than women, and African Amerian men most likely of all to be imprisoned. Additional costs such as the medical care and education costs of prisoners are growing fast. The report explains how changes in policy are causing this alarming growth and sets out many graphs and tables which give a breakdown of these costs between the different states. There is no clear recommendation at the end of the report, but the facts speak for themselves: this trend is in danger of running out of control, and there must be ways to ensure that the costs are kept within reason, and the system is applied more uniformly, and by implication more fairly, across different states. The report ends with a suggestion that it is time to look for new approaches such as reducing sentence lengths and pursuing other forms of crime prevention in order to halt this worrying

Saturday, July 27, 2019

Week 4 d1 Essay Example | Topics and Well Written Essays - 250 words - 1

Week 4 d1 - Essay Example The internet enables them to save on both their expenses, for example, telephone charges and time that place them at a position to be more productive (Mitchell, 2014). In addition, the use of internet has enhanced effective communication and sharing of information. Networking and chiefly provision of internet access allow sites to communicate with the people in a corporation in ways, which were not available before the development of technology. The effective communication has ultimately resulted in success of their organizations. The ease in sharing information via the organizations network has also contributed to the proper management of the institutions. Resource sharing is another major advantage. People from different organizations can share their ideology through both software and hardware resources which improve efficiency and facilitates collaboration among companies (Thomas OGuinn, 2011). One major disadvantage is the rise in data security problems. If the organizations networking information technologists fail to secure their network appropriately this may put the data at risk. The data is exposed to the potential complications linked to the unauthorized access, hackers and sabotage. Another disadvantage is undesirable sharing. With the good comes the bad; whereas networking enables the ease in sharing of relevant information, it at times enhance the sharing of data that is undesirable. The commonly shared problem is the viruses from different sites to the organizations network crashing it. The process of mitigation of such effects tends to be expensive and time- consuming (Charles,

Friday, July 26, 2019

Basic spanish project Essay Example | Topics and Well Written Essays - 1000 words

Basic spanish project - Essay Example Su duracià ³n es como las demà ¡s estaciones, 3 meses. Estos son junio, julio, y agosto. Me gusta ir a la playa y salir con mis amistades. En esos meses tambià ©n estoy de vacaciones de la escuela y me encanta. Topic: Write about your bedroom (or the room where you sleep). You may include the names of people you share it with (if anyone), descriptions of your furniture, decorations, sizes, colors, etc. (Assume you are a 16 year old boy and have a room to yourself) Mi cuarto de dormir es grande. Ahà ­ tengo mi espacio favorito. Duermo solo. El color del cuarto es azul royal y los muebles son de caoba. Tengo una cama, dos mesas de noche, dos là ¡mparas de noche, un mueble con gavetas, y un armario. Write a paragraph in Spanish that describes where you live. Use at least 5 sentences. Be sure to note what street you live on, and the locations of at least two of your friends in relation to you, your school, home, or other place you spend time at (like a library, shopping mall, park, etc.) Your paragraph needs to include the respective locations of next to, in front of, and near. (Again presume you are a 16 year old boy, two friends are Jake and Ahmed, he likes to go to the cinema and shopping Mall which are about 3km away) School is 5km away in an area called Saar. Vivo en la Ciudad de Nueva York, en la calle Chile. Mi amigo Jake y mi amigo Ahmed viven a dos cuadras de mi casa. Ellos viven al lado, son vecinos. Vamos mucho al parque que queda frente a mi casa. Despuà ©s del juego vamos a la bodega a tomar refrescos. La bodega esta cerca del parque. Nos gusta mucho esta actividad. Write a paragraph in Spanish of at least eight sentences that tell about your typical day. Use the vocabulary and verbs you have learned in Units 1-4 of this course. You may include activities you do with family and friends. (16 year old boy, talk about School until 2p.m, lunch, walk the dog, homework, go to Ahmed or Jake’s house to hang out and watch DVD’s, dinner at

Chronicity Essay Example | Topics and Well Written Essays - 250 words

Chronicity - Essay Example They are more likely to be trusted by patients because of their community and family-centered approach to care. Finally, I have learned from my readings that the current progress and gains made in medicine are a product of history, and that the past and traditional methods of medicine still have a place in contemporary practice when taken in their proper context and in caring for chronically ill patients. Life-limiting illnesses have a significant impact on patient, family, and the health system. On the patient, it can decrease his productivity, limit his activities of daily living, limit his mobility, and cause him feelings of depression. Among the family, it can cause them mental health issues like depression; it can also limit their own activities in terms of their employment and social life. It can also financially burden them. As for the health care system, life-limiting illnesses can also cause a huge financial burden on the government with more claims on Medicare and Medicaid. It can also limit the productivity of the government due to reduced productivity of workers. The above discussion implies how important it is for the government to establish a chronic care program which can address the health needs of these patients and minimize the impact of these life-limiting diseases on the patients, their families, and on the health system as a

Thursday, July 25, 2019

Housekeeping Essay Example | Topics and Well Written Essays - 5000 words

Housekeeping - Essay Example ablishments and organizations where there is a domestic steward; the housekeeper ought to consider themselves as the immediate representatives of their mistress. Good housekeeping entail a number of practical measures based on the common sense of the enterprise to undertake in order to improve their productivity, obtain savings in their costs as well as reducing the environmental impact of their operations. Good housekeeping needs to relate to voluntary actions that are aimed at rationalizing the utilization of raw materials, water and energy inputs. It also aims at reduction of the toxicity and volume of the wastes and the emission of harmful products, reusing and recycling maximum amounts of primary inputs and packaging of materials as well as the enhancing of conditions of working and occupational safety in the household. The paper analyses on the importance of the housekeeping manual and it is significant in enhancing the employees’ performance as well as the housekeeping department. It also describes Avenue hotel in Copenhagen one of the biggest hotels in Denmark. It seeks to provide areas of the manual delivery system needing improvement to enhance the hotel in achieving its target goals. Housekeeping entails the use and implementation of the housekeeping manual to enhance the effectiveness in the hotels operations. The major objective of housekeeping manual is enabled enterprises identify simple and practical, common sense measures of appropriate housekeeping that ought to be undertaken in reduction of the cost involved in the production as well as enhance the overall productivity and mitigate environmental impact. Good housekeeping practices ought to relate to a number of measures dealing with the prevention of the loss of materials, minimization of waste in the enterprise, conservation of energy as well as improving the operational and organizational procedures. The implementation of the housekeeping manual ensures that the practices are relatively easy

Wednesday, July 24, 2019

Why Failure is on the Path to Success Essay Example | Topics and Well Written Essays - 750 words

Why Failure is on the Path to Success - Essay Example But, what value is education if students are not fully prepared to go out into the world and discover a career that they can be successful at? The truth is that the option to fail students is an important part of a quality education system. Mary Sherry, in â€Å"In Praise of the F Word,† argues for the idea that students must be flunked if they are not up to standard. There are three reasons why the choice to fail a student must be present: the fear of failure, and competition, lead to a better quality student, education is worthless if a student does not develop sufficient career skills, and failure can sometimes be inevitable in order for a student to achieve success. The choice to fail students must be an option because the fear of failure, and competition, lead to a better quality student. The majority of students do not possess the ability to motivate themselves from within. There are of course the rare few who have the natural ability to always excel at any task that the y perform. If students are not given clear boundaries and expectations, then they are likely to meander without a goal or vision. If a student is not permitted to fail, then there is no incentive to excel. It is then good enough just to survive through school while not learning anything to a high degree. Almost every student would not voluntarily choose to fail, so if the option is presented to them, then they will certainly do everything to avoid it. Learning to compete and strive for excellence at all times is actually beneficial to a student because with enough guidance, they can motivate themselves enough to actually succeed. Just like in Communist countries, where everyone receives the same pay no matter the profession, there is no incentive to actually improve because it is possible to get by with just doing the bare minimum. Another reason why failure must be considered an option is because education is worthless if a student does not develop sufficient career skills. A few h undred years ago, the education institutions that are in place today were not yet founded. The majority of the population was uneducated, and thus could not rise in the economic ladder. When education began, the whole purpose was to equip people with skills that they could use to uplift themselves. If students do not possess the knowledge required after receiving an education, then their teachers, and the education system as a whole, have ultimately failed them. Not only that letting students pass who have not truly earned their qualifications not only deceives the student, but any employer that is considering hiring them. As Mary Sherry says in â€Å"In Praise of the F Word,† â€Å"passing students who have not mastered the work cheats them and the employers who expect graduates to have basic skills.† Finally, failure must be on the table because failure can sometimes be inevitable in order for a student to achieve success. There are some students who are naturally gi fted, and education is a breeze to them. That is all fine and good, and those students should be encouraged to go as far as they can. However, the vast majority of students do not know how to succeed because they are not naturally gifted. These students often fail simply because they are unsure of how to succeed. But, failing makes up a significant part of their education process because only once they fail do they realize what it takes to succeed. If failure is not an option, then they may appear to succeed, but will their appeared success help them at all? As Thomas Edison once said, failing is only finding one way that does not succeed. Once failures are eliminated, then success can be reached. Most people are afraid of failure, and rightly so, but

Tuesday, July 23, 2019

Is the U.S. government doing enough to make the american worker Essay

Is the U.S. government doing enough to make the american worker competitive - Essay Example The question is if America is doing enough to make its workers competitive? This literature will explore the capability of the human capital of the United States and to ascertain if governments have provided measures to make its labor capital competitive with the global market. It will also delve if it’s necessary to impose more tariffs to goods that cannot be competitively made in America. US Economy President Barack Obama assumed his political seat vowing economic reform and redistribution of wealth. Officials and constituents rigorously discussed the imperative of budget cuts, refocused on social services and in raising capital for investment to generate employment opportunities and for economic bilateral relations with emerging markets. This strategy was essential as home needed to be cared by administrators too after suffering debilitating economic setbacks due to offshore conflict situations and anti-terror drive (Nixon, 2011). True enough, taxation was levied for those within the affluent class of American society, e.g. luxury tax for jet and boat owners and financial analysts restudied how income taxes could add more for national revenue. Obama thereafter made a pronouncement to unleash American business ingenuity and improve its productivity to maximize the American economic dynamism by extolling 70 trade agreements sealed for 12 US states. ... The trade deal hopes to provide manufacturing job opportunities to 235,000 American citizens for agriculture development, gasification, railway construction and production of hybrid buses. Obama also opened business deals in South Korea that will help auger 70,000 American jobs and of the removal of 95% tariffs between this nations, albeit opposition of AFL-CIO, a labor federation, arguing that free trade and removal of tariffs is unprotective of US workers. This measure to improve US macro-economic relations was a positive response after an economic recession that has affected major industries of the country which cost the loss of $13 trillion in 2007 and loss of 208,000 jobs in the trucking industry (US Department of Labor, 2010). Both small and big firms were hit with similar net job losses (US Department of Labor, 2010). In another development, last February 2011, the US government closed doors for H-1B work visas, a 3-year employer sponsored visa for highly skilled foreign worke r, following Immigration Services announcement that statutory cap of 85,000. While the agency protects the interest of the country from being burdened of increasing populace of immigrants, this was however criticized by some economist as a policy which discouraged entry of foreign investors e.g. Microsoft opted to avail European market because it can allow to hiring of highly skilled employees from foreign countries (Nowrasteh, 2011). Nowrasteh (2011) proposed government to review and reconsider this opportunity since companies like Intel, Sanmina-SCI, Sun Microsystems, eBay, Yahoo and Google with high-skilled foreign workers made America a leader in

Monday, July 22, 2019

Poetry Essay Essay Example for Free

Poetry Essay Essay Poetry is an imaginative awareness of experience expressed through meaning, sound, and rhythmic language choices so as to evoke an emotional response. Poetry has been known to employ meter and rhyme, but this is by no means necessary. Poetry is an ancient form that has gone through numerous and drastic reinvention over time. The very nature of poetry as an authentic and individual mode of expression makes it nearly impossible to define. Poetry is sometimes hard to understand but other times its as easy as one, two, and three. Sometimes people turn to poetry to vent their feelings, to tell their high school sweetheart they still love them, to get over grief and etc. Poetry can be inspirational and motivating. Poetry can be anything you want it to be. The plot of Watch by Frank Outlaw tells us that we should be careful about what we do and to choose wisely what we act on. One of the poetic devices in this poem is assonance. Assonance is the repetition of vowel sounds. The vowel sounds repeated in this poem are: A, E, I, O and U. Another poetic device found in this poem is imagery. Imagery is words or phrases that appeal to the senses. The poem is titled Watch, so I believe therefore, watch would be considered as imagery. This poem appeals to me because I agree that we should watch what we do, before we do that particular thing. The plot of The Greatest Artist by Udiah tells us that God is one of a kind and can create the most beautiful things in this world. It also tells us that only God can create the beautiful things on this Earth. The sky is Gods canvas to a beautiful masterpiece. It also states that whenever we are sad, he puts a smile across our face to let us know Hes there. One poetic device in this poem is rhyme. Rhyme is the similarity of ending sounds exsisting between two words. Some of the rhyming words are: compare and air, above and glove, fair and there. Another poetic device is metaphor. Metaphor is the comparison between two objects with the intent of giving clearer meaning to one of them. One of the metaphors in this poem is: God is the greatest artist. This poem appeals to me because I agree that God is the one and only who can create the most unique things and we always know hes watching us with open eyes. The plot of Before You by William Arthur Ward tells us that we should think before we do. It also tells us that we should learn from different situations. Another thing it teaches is that we should use patience before expressing our thoughts. One of the poetic devices in this poem is repetition. Repetition is the repeating of words or phrases. The repetition in this poem is before you. Another poetic device is assonance. Assonance is the repetition of vowel sounds. The vowel sounds repeated in this poem are: A, E, I, O and U. This poem appeals to me because I agree that we should think before we act. I dedicate this poetry book to my mom. I included certain poems because poetry has such a special meaning for a special person. She is a true genuine person with a great attitude towards life. Who expresses emotions profoundly through words. I included certain poems because of the motivation and inspiration they have. Im most inspired by Adele, Adele is a famous London singer, who expresses music through her heartfelt experiences.

Malaysian Film Industry Construct Malaysian Identity Cultural Studies Essay

Malaysian Film Industry Construct Malaysian Identity Cultural Studies Essay Malaysia is a Multiple ethic country, but the interesting situation is , the race that dominant the country are all imigrant, the malay was come from the Javanese. The Chinese is come from China and Indian people come from India. but nowadays they all citizen of the country, with these alieness history, how should Malaysian define their national identity? We have just celebrated the 25th anniversary of our independence. During this quarter ccentury we have reached a level of achievement which we can be proud of. We have succeeded in laying a strong foundation for the evolvement o f One citizenry, One language and One culture. It is on this foundation that we build a greater Malaysia.'(Malaysia : Crisis of Identity p8) What Malaysia needs are moderates of ends and not moderates of means who are eventually wMalaysia, an Indian Malaysia, a Malay Malaysia but a Malaysian Malaysia where the different races, languages, religions and cultures can flourish in Malaysia.'(p3) The first quote was adderssed by the BN Gorvenment after they win the election in 1982, at that days the gorvernment suggested the idea of Assimilation: A + B + C = A, where A, B, and C represent different social groups and A represents the dominant group. The subordination of minority cultures into a dominant culture.This approach may be likned to what some have called forced assimilation ((Alison Gibson. 1984. p 105) (National culture and democracy , Kua kia soon, p133) . The second quote was the respond from the people, espeacially the Chinese which represent the idea of Pluralism: A + B + C = A + B + C, where A, B, and C represent different social groups that over time maintain their unique identities. Cultural pluralism is fre-quently seen as a peaceful coexistence between groups. All cultures are to be allowed to exist separately and equally, harmonious or not. The harmonious version has been termedunity in diversity. (Alison Gibson. 1984. p 105) (National culture and democracy , Kua kia soon, p133). You can image when this two idea bump together, how much chaos it will make. The Malaysian have stay in this juncture for over 50 years, it is necessary to identify briefly the advocacy of various positions on National identity. First, i will discuss about what is National Identity, And then i will explore how the Malaysias film industry construt the image of Malaysians National Identity, And how the image change through the decade. What is National Identity. National identity is a complex idea, National identity erase difference by imposing a set of attributes on all menbers of the nation and unwilling ness to accept all these attributes threatens identity and therefore threatens expulsion from that community.(p62) The idea of erase all the difference doesnt mean to erase other culture, but erase any other identity that create by any individual group in the country because these are a power that will cause expulsion . National identity is one idea that can accept by all the individual group, and gather them in to one voice. National identity is only one of the many social identities available for citizens of multicultural countries such as Malaysia.National identity has a central role in promoting peaceful ethnic relations. (Malini ratnasigam, p3) In the book Ethnic relation and Nation Building Malini Ratnasingam claim that the national identity is the best form of identity should adapt by the Malaysian, beacause the other social identity content too much category that will tear the Malaysian into many individual pieces, but national identity will work well for the Malaysian, Because nation are crossed by those differences , a force of unite, a sense of belonging and nationess. So now we understand what is national identity. But now the question is who should decide what is our identity? At the begining of this dissertation, there are the arguement about chosing which idea shall we adapt, Assimilation or Pluralism? The nation is imagined because the members of even the smallest nation will never know most of their fellow-members, meet them, or even hear of them, yet in the minds of each lives the image of their communion. (Benedict Anderson, p60) From the quote Benedict Anderson belieave that the nation is about all the member, even the smallest nation. National identity is a image that can imagined by every single nation. But In the book Cultural Contestatation author Zawahi Ibrahim disagree with andersons concept and suggested that the identity formation takes place within what he would call a two social reality which are authority-defined social reality, one which is authoritatively defined by people who are part of the dominant power structure. The second is everyday-defined social reality, one which is experienced by people in the course of thier everday life. These two social realities exist side by side at any given time. (Zawahi Ibrahim, 1998 ,pg18) The identity is a negotiation between these two social reality. How Malaysia film Indutry construt Malaysians National identity The Malaysian film indutry was founded on Chinese money,Indian imagination and Malay labour(Hamzah hussin,1994 ,p105) Although outside the screen, there are wonderful mullti cross ethnic relation on the movie production, but almost all the film are Malay movies. The only thing that really can consider as multi racial is the Old malay movie industry have strong influnce from indian bollywood style beacuse of the director, but very less of them had really mention about the multi ethnicity or religious relation. I chose to call this book 120 malay movie, because more than half of the movies were made before Malaysia was even created.(Plus they were made in Singapore) So what they have common were the languague and ethnic milieu they showcased. (120Malay movie , p26) The autor of 120 Malay Movie clearly state that the early film industry in Malaysia cant even consider Malaysias movie, It is only presented the early life of Malay in Malaysia, it maybe a very well materials for the Malaysias Malay identity, but obviously not suite the idea of National identity. But now it raise a question ,if the national indentity include everything, dont the Malay culture also part of the national identity? Yes, but now we talking about how the film industry help construt the national identity, at the old time, the Malay film are totally dominanted the film industry, which give an idea of the impression of the nation have owned by Malay, In the film Tajul Ashikin (see figure 1) there was a scene where two men try to peddle thier wares, but thier voices are drowned out by a newly arrived Chinese team that is offering dental services. This shows the Malay fear of being displaced in their own land by new arrivals who seem to be much better at buiness. (p25,120Malay Movie) Figure 1 Tajul Ashikin by M Amin But at that time, the stark economic disparity between Malay peasants and Chinese merchants didnt seem to have undue political repercussions because the populationwas sparse and times were good (120 Malay p269). So the movie show the worry of the Malay sovereignty instead of promoting peaceful ethnic relations. With this idea, it help to destroy the national identity instead of construt it. But still there is some exception.There is still some other racial tension pop up in these movie. On the film Mahsuri which release in 1959 (see fiugre 2), there was a part about a merciless indian teasing by the Malays about his skin colour. (p165) The plot is meant to be funny, in fact, it was directed by an Indian. Ethnic conflict often appear in Malaysian daily life, we can not avoid it, but we can face it with great attitude. This plot showed an attitude to face the difference between every ethnic, just laugh at it. Figure 2 Mahsuri by BM Rao The next film that have the multi ethnicity it is Ali Baba Pucang Lapok directed by Malaysian silver-screen legend P. Ramlee at 1960, P.Ramlee are one of the minority inside that can create the sense of Malaysianness in the movie in the decade. The movie itself are deliberate mish-mash of culture, inside the movie you can see different kind of culture image. But the most surprise scene will be when the Chinese trader being asked how long he have lived in the area, he answer that he have lived here for 80years, he not only counted his own 50 years age, but add up his father.(see figure 3) Figure 3 The Chinese trader said that his father lived there 30 years before he borned. This blurs the line between immigrant and native and it is precisely this blurring that must continue untill all Malaysian feel they have the same stake in the nation. (p26, 120 Malay Movie) It is hardly seen a movie have such multi culture in Malay old film. The national identity is to create a sense of nation, it only can be done when the have the idea that the land doesnt owned by anyone, but they were all born equal in this place. This movie successfully deliver the message. and helped construct the sense of nation, althought it is only one short scene, but it is still a big step for the Malaysias industry at the decade. Another film also directed by P.Ramlee Sesudah Sebuh (see figure 4), The most multi cultural cast we have ever seen. said the Author of 120 Malay Movie Amir Muhammad. The Main cast include the 3 main race of Malaysian, Melayu, Cina and indian. And a conversation in the movie, create am ideal racial integration, In a bookshop by a customer to the owner :Even though youre Malay and im Chinese, we are both Malaysians. And Malaysians have a duty to help each other. The Idea cant be more clear, its simple and directly pointing the ideal without any decoration. Figure 4- Sesudah Sebuh directed by P.Ramlee Although there are some more film that really promotiong the ideal natiaonal identity for Malaysian, but these number are still only a drop in the bucket. There are still mile a part to fill the whole bucket. But atleast we can see the root of the idea of national identity growing inside. When it come to 1970s, the idea of multic ethic face a challenge. The 513 incident had drag the ethic relation into crisis situation. The racial riots led to a declaration of a state of national emergency. The riot ignited the capital Kuala Lumpur and the surrounding area of Selangor, Malay mobs, wearing white headbands signifying an alliance with death, and brandishing swords and daggers, surged into Chinese areas in the capital, burning, looting and killing. In retaliation, Chinese, sometimes aided by Indians, armed themselves with pistols and shotguns and struck at Malay kampongs (villages). Huge pillars of smoke rose skyward as houses, shops and autos burned.( http://www.time.com/time/magazine/article/0,9171,900859,00.html) Tunku Abdul Rahmans multiracial style of government was successful until serious and widespread anti-Chinese riots broke out in May 1969. These riots followed a fall in support for the United Malays National Organization (UMNO) in the federal election and were indicative of Malay resentment of the economic success of the Chinese business community. (http://www.city.com.my/malaysia-history.htm) After the incident, the gorvernment came up a serial of policy that surpress the other ethnic, in order to restructure Malaysian society. The UMNO-dominated states aggressive attempt to conflate the nations linguistic identity with Malays status as the sole nationaal and official language threatened the constitutionally sanctioned freeedom to use thier mother tongue.'(Milthiethnic, pg220) The pro-Malay policy. The most significant result of the events of May 1969 was an attempt, announced in the five-year plan (1971-75), to restructure Malaysian society. The aim was to raise the percentage of ethnic-Malay-owned businesses from 4% to 30% by 1990, and to extend the use of pro-Malay (bumiputra) affirmative-action quota systems for university entrance and company employment. Economic expansion, it was hoped, would greatly ease this redistributive process and at the same time offer the opportunity to eliminate poverty among all Malaysians. (http://www.city.com.my/malaysia-history.htm) The National Cultural Policy(NCP) was formulated at a congress held at the University of Malaya in August 1971, and the announced Policy consisted of three main principles. The national culture of Malaysia must be based on the cultures of the people indigenous to the region; Elements from other cultures,which are suitable and reasonable may be incorporated into the natioonal culture; and Islam will be an important element in the national culture. (Mohad Talib Osman, pg95 ) All of these policy indirectly influence the relation between ethnic, all the unequal act make the ethnic hatred grown day by day. Causing the idea of national identity start changging. The change of the society have brought into the film industry , the multi ethnic that rarely seen from the film before 1970s completely obliterate after these policy untill recent years. Before then we have Malay culture dominant film industry. The segregate can also see from the statistics that correlate cinema atendance by ethnic groupwith the national or language origin of the film being viewed. (see figure 5) LanguageEthinic Malay Chinese Indian/Other Malay 23% 0% 1% Chinese 7% 81% 0% Indian 34% 1% 83% English 35% 18% 16% Figure 5 Language distribution of cinema attendance by ethinic group (1979) The quetion of the cultural identity of Malaysian film is a constant issue, even for the least culturally minded film producer, since it is related to the need to attract a broad-spectrum audience.It is still the case that more than 90% of audience for Malaysian films is Malay (Malaysia Cinema Asian film, pg154) From the statistic we can see that Bahasa Melayu cinema is a weak cultural force, despite the Malays being the most powerful political force in the counry. At that time, The chinese usually watch the Hongkong or Taiwanese films ; or the second choice will be the English Language film, but not Bahasa Malayu film. The same situation happen with the Indian autience. cinema is probably the most raciallly segregated activity in the country today'(Mansor bin Puteh, 1990, pg154) On top we discuss about crisis of ethnic realation that cause restrict the multi ethnic movie culture. In 1981, the idea of Malay sovereignty that set by the gorvernment start to invade the movie industry. National Film Development Corporation (FINAS) was established in 1981 to encourage the development of the local industry. ensure that a sizeable portion of the total volume of buimess done in the production, distribution and exhibition sectors would be handled by Malays'(Baharudin Latif, 1981, pg150) Control and restrict from the gorvernment have caused the other ethnic have lower chance to make their own movie, and also restricted the creativity of theme or topic. All of these restriction had bring the Malaysia film industry far away from their Golden age in 1950s -1960s. Film are censored or banned if it oppose government polucy or encourage anti-gorvernment feeling; glorify communism and socialism; glorify any particular race while denigrating others; gloriy crime and immorality; deal with sadism, cruelty and excessive violence; insult public dignity ; and show behavior not acceptable to Malaysian society (Mohd Hamdan Bin Haji Adnan, 1991) These policy had make the Malaysian confuse and question about thier naional identity, the policy have succesfully incite the desire of Malay that persuit for Malay sovereignty, the other ethnic like chinese and indian felt betray by the country, when there is no nation pride in them, the National identity become dominant by the Malay, and become the image that shown by the Movie industry, but it is not the image that the nation share along, from (figure 5) we can see the local Malay film have not accepted by the other ethnic. so it is not a National identity of that decade, the film on that decade have lose the concept of being a National cinema. The cinema is then a mean of speaking the nation in all its constructed uniqueness. The connection between speaking the nation and selling the nation become all the more invitable when the rhetoric of both nationlism and marketing emphasize qualities of uniqueness, distinctiveness and patriotism. The term representing the nation there fore accuires and ecmonomic as well as an analytical and cultural objective it is not just how a cinema represents the nation, but also how successfully it does so. (Malaysia Cinema , pg 107) New Malaysian Film The decade of Malaysian film might look like a decade that have controled by Malay, and their the relation with other ethnic race doesnt seem well. Althought the realation between the different ethnic group are peaceful in decade before 1960s, but the policy in 1970s created an long fight between ethnic group. Race has always been an issue in my country, even before independence but never has it been as serious and divisive as it is today.Almost every issue is seen from the perspectivve of race to the point where it is impossible to obtain a consensus of public opinion on any issue'(Kee Thuan Che,1993,p57) But where there is pressure, where there is resistance. The serious situation also created a trend, Never has it been as desire as today, people pursuit for the unity of the Nation. In the book Found in Malaysia have interviewed 54 influential Public figure who have different race, religion, culture, gender, sexual,genarational and political. But when it come to the question: Describe what kind of Malaysia you whould like for yourself and future generation? They all gave a same answer in many different way, but in the end, the main idea is the same. All of us regardless of racial/ethnic, regious, class and linguistic backgrounds, share one thing in common : we are all Malaysian citizens and we call this country our home and care for its future. We dream of future Malaysia that is equal to all, but takes into acount ourparticular wants, needs and aspirations and at the same time, is able to cater to the needs of others according to an inclusive logic of equal representation and equal right.(Azizi Khan, 2004, pg475) The idea become a trend, and start to appear in the recent ten years. Beacuse the inrternet have start to cover all the new genaration daily life. Internet is one of the most powerful sources in human history, the information can share in rapid speed, milllion of personal narratives or popular forms of expression which help construt the everyday-defined social reality was shared everyday. Causing the Balance between the authority-defined social reality and everyday-defined social reality started to change. So we will start from Malaysia Independence Film Industry, which have well used the internet as a state for them to spread thier idea and story . The first example for indipendence film is the Project 15 Malaysia . 15Malaysia is a short film project. It consists of 15 short films made by 15 Malaysian filmmakers. These films not only deal with socio-political issues in Malaysia, they also feature some of the best-known faces in the country, including actors, musicians and top political leaders. You may think of them as funky little films made by 15 Malaysian voices for the people of Malaysia. ( http://15malaysia.com/) From the project name we can know that this film is dedicate to show 15 kind of story that happened in Malaysia. I going to take a few of them into discusstion. First i will start with the personal narrative story. House is a story about an indian family forced by the capitalist to give up their house for development, and also show the feeling of the indian kid(Rama) toward the house is more then a house, but a family.(see figure 6) The story attempt to explore the story inside the slums usually the indian race who have many family suffer with these problem in order to let the audience understand the country more. Figure 6 Rama express his feeling about the house. We will strat from Yasmin Ahmadm (see figure 6), Malaysias famous film director, writter and scriptwriter, in Malaysia, most of the ethnic used to avoid each other but inevitably bump together, no one can avoid, because this is just what live in Malaysia are look like, And most of her film are challenging the moment when different ethnic bump together, she narrate the spark of the moment and turn in into a moving picture. When most of the popular cultures movie deliberately avoid the ethnic conflict, her films break the boundary between ethnic and religion. She focus on emotion and the relationship between people, narate and present the story in a human perspective, not in Malay, Chinese or Indian, but back to the origin human emotion. It makes the audience to rethink about politic, religion and social issues in indirectly ways. The more we understand each other, the less we affraid. She is an ambassador of unity. An individual with amazing foresight who; work has bridged all the races in the country. Great loss to the nation and the creative world.'( Chandran Ravi. http://entertainment.malaysia.msn.com/photos/photos.aspx?cp-documentid=5080081page=13) Figure 6 Yasmin Ahmad Yasmin Ahmad first movie Sepet(see figure 7) is a story about a Chinese boy fall in love with a Malay girl. This might look normal in foreign country, but the relation between Chinese and Malay is not simple. Figure 7 Sepet The relation between Chinese and Malay always been complicate, that hatred between both of this race happen before incident 513, when in World war 2, the Japan invade and ruled this country for over 3 years. on that period, the Japanese surpress the Chinese but treated the Malay friendly and even form a Malay army to defence againts the communist, but who is communist? At that time many Chinese were the communist, the root of hate were start from here, and Malays fear of get replace by the Chinese in the econimic, then is the 513 incident, the unequal policy, Chinese fear of forced to join muslim if married a muslim and etc. All of these caused the relation between this two race are always controvertial. In the movie Sepet that is a scene the Protagonists(Jason) friend try to persuade Jason the relation between him and Heroine(Orked) is forbiden. Which clearly potrait the mind set of Chinese about the relationship of the interacial couple. (See figure 8 ). Figure 8 Keong (left) advices Jason not to get involved in relationship with Malay girls. Yasmin Ahmad used the traditional perception of Malaysians and confronted it in her movie. It cant be denied that she used a very creative way to show the relationship between history culture and innocent love. Malay films seldom touch on taboo topics like alcohol, dog, prostitution, suicide, etc. Many of the Malay films only showed the good side. Much of the time, they are hindered by those issues. But Yasmin Ahmad used reverse psychology to bring out the negative issues, because there are many grey areas to investigate in Malaysian culture. The following are some of the taboos in Malay tradition that is shown in the movie Muallaf (2007). A Muslim woman who despaired on her marriage ended up taking her own life by suicide. Young Malays play and get drunk in a snooker room. An Islam teacher touched a dog on his way to mosque. A sincere Malay Muslim girl works in a pub at night. These issues are a challenge to the traditional Malay society. However, the tasks that she undertakes must be lawful from the point of view of Islam. She must not work as a dancer, a model, a barmaid, a waitress, a film actress, a musician, or a prostitute to sell her femininity in order to make money, even with the consent of her husband. (A. Rahman I. Doi, 1990:147). Yasmin Ahmads movies use the sensitive issues faced by Malays as a discussion. Talking about sensitive issues is very challenging, especially on ethnicity. But it depends on how the director presented it. How much can the audience accept it, based on the issues? Yasmin Ahmand film has a power of introspection, Yasmin Ahmad film dig into the confilct between ethnic group instead of try to avoild these sensitive issue like other, Yasmin Ahmad bring the conflict right into audience eye without beautify it, only with the simplest emotion of human being, a way that lead us to undestand empathy. Only when Malaysian strong enough to really face themselves, then we can form our Identity Honestly. The next case will be opposite of Yasmin Ahmad film.Yasmin Ahmad film represent the reality side of ethnic conflict, now we are going to see the Malaysian utopia. Nasi Lemak 2.0(see figure 9) is directed by a controversial public figure Namewee, who have temper the national anthem and content with rasict, critic to gorvenment and religion in 2007. The song Negarakuku drag the attention of public, Public reaction towards the song is split, Immediate reactions in the form of YouTube comments range from being critical, in fair agreement, support, attacks and threats towards Wee. He became One of the most haterd public figure by the Malay ethnic at that time. Figure 8 Nasi Lemak 2.0 Nasi Lemak2.0 is the first Malaysian film that did not target one of the three population groups as its audience. And succesfully hit 7million ringgit gross. The movie is have many plot that content the relation between the different ethnic for example: the bright non-Muslim students unable to enroll into universities, authorities bias in favour of Malays, Chinese educated citizens speak poor English, immigrants issues, Hang Tuahs unsolved identity mystery, English educated Chinese lack of confidence in speaking Chinese language, Kuala Lumpur a busy and unsettling city, some non-Chinese could speak better Chinese, mix of Indian and chinese song, and culture of Baba and Nyonya. Different with Yasmin Ahmad film, althought in Nasi Lemak2.0 there is still some ethnic conflict, but most of the time, it show a utopia of how Malaysia ethnic group interact with each other, and create a whole new kind of culture. The song Curry Neh (see figure 9 ) in the movie, mixed the chinese and indian culture, There is more example like, the Malay chef teaching chinese matial art Taichi at the park (see figure 10) or the chinese tradition song sing with english lyric(figure 11). Attempt to question why cant a specific ethnic learn the culture of other ethnic. Figure 9 Curry Neh Figure 10 Malay teaching Taichi Figure 11 Tradition Chinese song sing with English Lyric The film was success because the intereact of different ethnic causing resonance among the Malaysian, the way of acting and some humour about the Malaysias gorvernment or stereotyping of ethnic is what Malaysia face in daily life. The second film of Namewee is Hantu gangster (see figure 12). The film continue the style of Nasi Lemak 2.0. Hantu gangster attempt to send the message of Nation unity before 1970s, and question about why todays ethnic relation become worst. The film style is same with Nasi Lemak2.0 The idea is the same but only the story had change, there are many ethnic intereact like Chinese only understand Malay when it speak in chinese accent, a Taoist priest that know different religion style of exorcism, a parody of the 513 incident, and a Indian Party song with Malay, Mandarin, Hokkien, Tamil lyric, etc. These ethnic mixture is what Malaysian Interested, although reality might not be the same, but from the sucess of these film we can see the future that Malaysian persuit, the future that Malaysian image. Figure 12 Hantu Gangster 2012 Conclusion Malaysia is a young country, there is many thing we have to experience to understand what are we today, what will be out future. Today Malaysia is in a turning point, where the politic have a new Atmosphere which will directly influence the authority-definedsocial reality. And the development of internet, liberty of speech help people to understand their capability, have the way to stand up and express thier emotion and their story, i believe in the future, when the authority-defined and the everyday-defined have found a way to line up, Malaysian will no longer quetion their identiry. References: http://www.english.emory.edu/Bahri/Anderson.html (benicdic anderson)

Sunday, July 21, 2019

Researching The Computer Forensics Investigation Plan

Researching The Computer Forensics Investigation Plan The purpose of this paper is to review the basic methodologies and the appropriate processes that a computer forensic investigator goes through in conducting an investigation. It will give an idea to the reader about the planning and organization of an investigator who is involved in a computer related crime, the ways in which he will conduct the investigation such as basic preparation, use of the required tools and techniques, acquisition and analysis of the data, role in giving testimony, use of forensic laboratories or the guidance of all the staff working under the main investigator and even planning network forensics all of which are related to his work. The Computer Forensics Investigation Plan A computer forensic investigates data that can be retrieved form storage media of a computer such as a hard disk, it is also considered that to be a successful computer forensic the knowledge of many different platforms to perform computing is a must, for our case we will consider you as the chief forensic investigator in the state of Virginia, as a part of private enterprise you are assigned the role of planning the computer investigation of a suspected criminal activity, we will see from your perspective how you should conduct all the necessary procedures. We dont just need science; we need good science (Evans, 2004) Always analyze major issues in preparing for an investigation. The crime scene is considered to be a very sensitive place in terms of collecting proofs and evidences which are in many cases very vulnerable and can be very easily be manipulated so special attention is needed in every aspect of recovery methods in order to gain as much as possible. Before arriving at the scene of crime, it is mandatory that you should always take a systematic approach in problem solving like making an initial assessment about the case then determining a preliminary approach to the case, after that, create a detailed checklist of the objectivity of the case, analyze the resources needed, identify all the risks and try the very best to minimize them, also outline all the details known about the case until then in a systematic manner such as the situation in which you will be arriving, the nature and specifics of the case, the type of computer forensic tools which will be needed at the case and to check on the specific operating systems in disposal which assist in the forensics investigation process. Once at the crime scene, try to gather evidence to prove that the suspect violated the company policy or committed a crime, since this is a private sector investigation it includes corporate businesses, other agencies of government are not involved such as law enforcement. The law enforcement agencies act according to the federal freedom of information act or laws of similar descent according to their territory in all process. Investigating and taking control of the computer incident scene in the corporate environment is considered to be much easier than in the criminal environment because the incident scene is often the workplace, these workplaces have databases of computer hardware and software which can also be analyzed, proper tools can be adopted to analyze a policy violation if any. Many companies either state their policy right away or show some warning, some apply both whose purpose is to tell that they hold the complete right to inspect the computing assets of their respective subjects at will, in addition to that every company must describe when an investigation can be initiated and allow the corporate investigators to know that under what circumstances they can examine the computer of an employee, if the investigator finds about the wrongdoing of the employee then the company can file a criminal complaint against him. If any evidence is discovered of a crime during the investigation then the management must be informed of the incident, checking the incident itself that it meets the elements of criminal law, work with the corporate attorney and also to see that you dont violate any other constitutional law in all the procedure. Preparing for a computer seizure for search operation is one of the most important point in conducting computing investigation. In order to do this, some answers from the victim and an informant may be needed, informant can be a detective for the case, a witness, a manager or any coworker to the specific person of interest. If you can identify the computing system, then estimate things such as how many computer systems to process and size of drive on the computer of the suspect, also determine which operating systems and hardware are involved. Determining location of the evidence and the cases type is very crucial, it allows to determine if computers can be removed. If the removal of the computers will cause harm to the company then it should not be done in the interest of the company, problems in investigation may arise if the files are most probably hidden, encrypted or stored in some offsite, if the computers are not allowed to be taken for investigation then the investigator must determine the resources to acquire digital evidence and the proper tools which will be needed to make data acquisition faster. Also determine who is in charge of the respective systems (in corporate environment, usually one persons assistance from the company is required in this regard). Always keep some specialists who work on many different types of operating systems, servers or databases and properly educate those specialists in investigative techniques. Once arrived, securing the crime scene or the specific computer is the foremost priority of the investigation team, the purpose is to preserve the evidence and keep the acquired information confidential. The investigative team should define a secure perimeter using a special type of yellow barrier tape, it should also have the legal authority to keep the unnecessary people out but do not fail to comply the other law enforcers or obstruct justice in any manner possible. Only professional task force should handle the crime scene for evidence as any non professional law enforcer can manipulate or even destroy the vital piece of evidence which may be very crucial in the overall scenario. Remember that corporate investigators does not seize evidence very often, more brief guidelines for processing an incident or crime scene goes as follows, keeping a journal to document the activities, securing the scene in the sense of being professional and courteous with onlookers, removing all those personnel who are not associated with investigation, taking all the proper and necessary recordings in video of the area surrounding the computer, at the same time paying attention to all the major and minor details. Sketching the incident of the crime scene and checking the computers as soon as possible. While at the crime scene, dont ever cut the electrical power to a running system by pulling the plug unless it is an older Windows or DOS system (which in these days are very rarely found anywhere), instead apply a live acquisition by the proper acquisition methods if possible, when shutting down computers with Operating Systems such as Windows XP or later version of it or Linux/Unix then always remember to perform a normal shutdown of the system, this helps to prevent log files. Try the very best to save the data from the current applications as much safe as possible, properly record all active windows or other shell sessions, and photograph the scene. Also make notes of everything that is done even when copying the data from a live computer of a suspect, save open files to external storage medium such as a hard drive or on a network share (if somehow the saving mentioned is causing problems then save with some new titles), then close applications and shut down the computer. Further guidelines include on bagging and tagging the evidence which is done as follows, first assign a person to collect (and log) the evidence, then tag all the evidence which is collected with the present date/time, serial number or other features. Always keep two separate and different logs of evidence collected an keep control of the evidence at the crime scene. Always look for information related to the investigation such as passwords, PINs, passphrases, bank accounts and so on. Look at papers in places such as the drawers or even try to search the garbage can. Collect all the related documents and media which is associated with investigation such as manuals or software/hardware. Using a technical advisor of high degree experience and knowledge is a must, technical advisor can help to list the tools which are required to make progress at the crime scene, it is the person which can guide the investigation team about where to locate data and help the team in extracting the log records or other evidence form large servers. The advisor can also create or help to make a search warrant by finding what is needed by the investigators for the warrant. More brief responsibilities of the technical advisor includes to know the aspects of the seized systems, to direct the main investigator on handling sensitive material, helping in securing the crime scene, helping to plan the strategy for search and seizure (documenting it), document all the activities and helping in conducting the search and seizure. Documenting all the evidence in the lab is also a necessary process, which involves in recording the activities and findings as the investigators work; this can be done by maintaining a journal to record the steps taken as the investigator process evidence. The main objective is to produce the same results when the main investigator or any other repeat the steps that were taken to collect evidence, a journal serves as reference that documents all the methods that have been used to process evidence. For proper documenting the evidence, always create and use an evidence custody form, which serves the following functions such as identify who has handled the evidence and identify the evidence itself, properly listing all time and date of the handling of the evidence. Other information can also be added to the form such as specific section listing and hash values, try to include any other detailed information that might need for reference. Evidence forms or labels are present in the evidence bags that can be used to document the evidence. Forensic Tools Always prepare the tools using information from incidents and crime scenes, the initial response field kit should be light in weight and easy to transport form one place to another. An addition to the initial kit is the extensive response field kit which must include all the necessary tools. The items in an initial response field kit may include one digital camera or 35mm camera with film and flash, one flashlight, one laptop computer, one large capacity drive, one IDE ribbon cable (ATA-33 or ATA-100), one SATA cable, one forensic boot media containing the preferred utility, one FireWire or USB dual wire protect external bay, ten evidence log forms, one notebook or dictation recorder, ten computer evidence bags (antistatic bags), twenty evidence labels, twenty tape and tags, one permanent ink marker, ten external USB devices such as a thumb drive or a larger portable hard drive.(cited in Nelson, Phillips Stewart , 2004) Tools in an extensive response field kit may include varieties of technical manuals ranging from operating systems references to forensic analysis guides, one initial response field kit, one portable PC with SCSI card for DLT tape drive or suspects SCSI drive, two electrical power strips, one additional hand tools including bolt cutters, pry bar and hacksaw, one pair of leather gloves and disposable latex gloves (assorted sizes), one hand truck and luggage cart, ten large garbage bags and large cardboard boxes with packaging tape, one rubber bands of assorted sizes, one magnifying glass, one ream of print paper, one small brush of cleaning dust fro suspects interior CPU cabinet, ten USB thumb drives of varying sizes, two external hard drives (200 GB or larger) with power cables, assorted converter cables and five additional assorted hard drives for data acquisition. When choosing an appropriate tool, the investigator must be sure that the tool is properly functioning, and that the right person handles it during the investigation. In order to prepare the investigators team, investigator must review all the facts, plans and objectives with the entire team assembled, the main objectives of the scene processing should be to collect evidence and secure it. The speed of the response from the team is very crucial as it can cause evidence such as digital evidence to be lost. Laboratory A computer forensics lab is a place where computer forensics conduct investigation, store evidence and house the necessary equipment, hardware and software. A typical lab manager duties involve many tasks such as proper management for case study, helping to provide reasonable consensus for effective decisions, keep everyone up to date with proper ethics and any modifications if made, keeping a financial account and proper check and balance of the entire facility, keeping it updated according to latest trends in technology and promoting the required quality assurance, appoint a schedule that suits everyone, estimating the potential of investigators and assessing their requirements, proper estimation of results ( preliminary or final) or when they are expected, strictly manage all lab policies and keep an overall look on the safety and security of the entire facility. The staff members have duties which include knowledge and training of equipments relating to computer systems such as O perating systems and their file types, software and hardware. Other staff duties include knowledge and training of technical skills, investigative skills, deductive reasoning. Planning lab budget involves making proper divisions in costs on all bases from daily to annual expenses, gathering the available data of the past expenses and use it to predict or prepare for any future costs. The main expense for a lab comes from the trained personnel or the equipment they use such as hardware or software devices in their disposal. Always estimate the number of computer cases the lab expects to cover, always being notified about the advancements in technology in the respective field, try to make assessment about the computer related crimes ( their kinds), and use this information to plan ahead lab requirements and costs. While making good computer technology available is important, the costs and benefits of upgrading all computers to state of the art must be weighed. (cited in schwabe, 2001) Check statistics from the Uniform Crime Report, identify the specific software used to commit crimes. If youre setting a lab for any private corporation, remember to check the inventory of computing such as software or hardware, previous reported problems and the ongoing and future advancements in related computer technology. Managing time is also a major concern when choosing on the computing equipment for the purchase. Most of the investigation is conducted in the lab, so it should be secure as evidence may is very crucial and cannot afforded to be lost, manipulated, damaged, destroyed or corrupted. Always put emphasis in providing a secure and safe environment, keep proper inventory control of the assets (inform in advance if more supplies are needed). A safe and secure facility should always preserve the evidence data and keep it as it is, the minimum requirements for a secure facility are a medium or small sized room with true walls form the floor to ceiling, proper locking mech anism provided with the door access, secure container and log for visitors. Almost all of the workers in the facility should be given the same level of access. Always brief the staff about the security policy, it is a must. The evidence lockers used in the lab must be kept secure enough such that any unauthorized person may not access it at all, some recommendations for securing storage containers include locating the containers in a properly defined restricted area, limiting people who will have the access to the storage containers, keeping a record on the authority of everyone who has access to the containers and keeping the containers locked when not in use. If a combination of locking system is used, then provide equal measure of security for both the contents of the container and the combination, always destroy the combinations that were previously held when setting up new combinations, only those persons who have the proper authority should be allowed to change the lock combinations, try to change the combination every three or six months or whenever required. When using a key padlock, authorize a personnel as the main key custodian, keep duplicate keys and print sequential numbers on all of them, keep a registry which has a record of keys that are assigned to the authorized personnel, conduct audits on weekly or monthly basis, try to place keys in a secure container after taking an inventory of keys, keep the level of security the same for all the keys and evidence containers, replace the old locks and keys on an annual basis and dont use a master key for several locks. Containers should be strong, safe and as much indestructible as possible with external padlock system and a cabinet inside, try to get a media safe if possible (to protect evidence form damage), keep an evidence storage room (if possible) in lab and keep a well organized evidence log which is used to keep update on all the occasions when the container of the evidence is opened or closed. Always maintain a security policy and enforce it (log signing in for visitors in a way that those personnel are considered to be visitors who are not assigned to lab, these visitors should always be escorted in all times), using indicators (visible and/or audible) is also a necessity inside lab premises, install an intrusion alarm system and hire a guard force for your lab. In civil litigation, investigator may return the evidence after using it (when issued a discovery order),if the investigator cannot retain the evidence then make sure it make the correct type of copy( copy in cases of data from disks or other hard drives, logical or bit stream), ask the supervisor or your client attorney on the requirements, you should usually only have one chance, create a duplicate copy of the evidence file, make minimum two images of evidence(digital) using separate methods, try to copy the host protected part of a disk, size is the biggest concern ( such as in raid redundant array of independent disks) systems which have terabytes of data), Some investigation needs to be conducted in the laboratory because of the proper tools and technicians available there who know how to deal with the evidence correctly without tampering it, Investigator might need to have the proper permission of the authority in charge if it wants the system moved to the laboratory, when permission provided, the investigator have a given time frame in which it must perform its task and then deliver the system back to where it came from. Log files Log files are those which lists all the actions that have happened, such as in Web servers which maintain log files to list every request made to the main Web server, using the log file analysis tools, the user can gave a very good assessment of where the visitors came from or how often they return or even how they go through a site, in addition to log files there are cookies, when used, they enable the Webmasters to log far more detailed information about the user on how it is accessing a site. Logs are also considered to be an independent, machine-generated record of what happened within a network for both system and user activity. When set up properly, and with the appropriate due care, logs can provide an immutable fingerprint of system and user activity. In many cases, the logs tell a story as to what really happened in an incident. They can tell you what systems were involved; how the systems and people behaved; what information was accessed; who accessed it; and precisely when these activities took place. (Cited in Musthaler, 2010) Given the overview of logs on what they can provide, the regulations such as the PCI DSS (payment card industry DSS), the FRCP (civil procedures federal rules), the HIPAA (which is an act regarding the health insurance) and many other regulations, all consider logs and log management to be the very basic and essential necessity for proper and efficient data management. Logs can be used to capture many vital sources of information which beside protecting the core data can also help in supporting forensic analysis and incident response if a data breach has occurred or other forms of electronic crime, such as fraud. The overall log monitoring can be hurdled because of the extremely large amount of fair data capture and the unwillingness, lack of will or errors in properly managing, analyze and correlating that data. The overall conclusion (in mismanagement) can cost hugely as if some suspicious activity or breach really happens, then a lot of time ( possibly many months ) may require to detect the fault, there is even no guarantee if the fault will be detected. In order to have logs admissible in court as evidence of a crime, an organization must prepare and execute due care with the log data. Log data must be viewed and treated like a primary evidence source. Here are some best practices that can help ensure log data and log management practices properly support forensic investigations. Have a clear corporate policy for managing logs across the entire organization. Document what is being logged and why, as well as how the log data is captured, stored and analyzed. Ensure that 100% of log-able devices and applications are captured and the data is unfiltered. Have centralized storage and retention of all logs, with everything in one place and in one format. Ensure the time synchronization of logs to facilitate correlating the data and retrieving data over specific timeframes. Ensure the separation of duties over logs and log management systems to protect from potential internal threats such as a super user or administrator turning off or modifying logs to conceal illicit activity. Always maintain backup copies of logs. Have a defined retention policy that specifies the rete ntion period across the organization for all log data. Organizations should work with legal counsel to determine the best time frames and have log data incorporated into an overall data retention policy. Have a defined procedure to follow after an incident. Test the incident response plan, including the retrieval of backup log data from offsite storage. (Musthaler, 2010) Further quotes form Brian Musthaler include, If an incident or data breach is suspected, there are several steps to take right away: Increase the logging capability to the maximum and consider adding a network sniffer to capture additional detail from network traffic. In an incident, its better to have more data rather than less. Freeze the rotation or destruction of existing logs to prevent the loss of potential evidence. Get backup copies of the logs and make sure they are secure. Deploy a qualified investigations team to determine the situation. (Musthaler, 2010) With the appropriate care, logs can provide solid forensic evidence when and if it is needed, as far as the job of a computer forensic investigator is concerned, his log begins when he starts an investigation, logs can be made of many things such as events, system security, firewall, audit, access and so on. (cited in PFI, 2010) Equipment can be recorded in the log by many ways, audio logs can be made which can store audio files, picture logs can be made which can store digital pictures taken during an investigation. Equipments are recorded according to the type of its contents with the appropriate tools. The final log is stored at the very end after possibly remodifying or revising previous logs. Data acquisition For the process of acquiring data in an investigation, we will consider following techniques, There are two types of data acquisition, static acquisition and live acquisition which basically involves the following four type of acquisition techniques, bit-stream disk-to-disk, bit-stream disk-to-image file, sparse and Logical. Bit-stream disk-to-image file is the most common method, it makes many copies and all of the copies made are replications of the original drive bit-by bit, similar type of process is happening in everyday scenario concerning a common personal computer, when we copy and paste files from one place to another or when we make multiple copies of a data file then the exact copy of the original data file is made available in many places. It is very simple, easy and with very nominal training can be performed on the target system therefore it is the most preferred method as well. The tools used in it are EnCase, ProDiscoer, FTK, SMART. Disk-to-disk method (bit-stream) is applied in the case of disk-to-image copy being impossible mainly due to hardware or software errors or incompatibilities, this problem comes when at most of the time dealing with very old drives. It adjusts target disks geometry to match the drive of the suspect (geometry of track configuration), tools used in this form are SafeBack, EnCase, , and Snap Copy. Logical acquisition and Sparse acquisition are used when the total time of the investigator is very short and the target disk is very large. This type of acquisition only searches and retrieves the selected file which is of particular interest, comparing this to Sparse acquisition which deals with data collection but again the data collected is very nominal. Data analysis Data analysis(for a computer forensic investigator) includes mostly examining digital evidence which depends on the following main factors, the nature of the case, the amount of data to process, the search warrants and court orders and the company policies. Scope creep happens when investigation expands beyond the original description which should be avoided in all cases. Few basic principles apply to about the entire computer forensics cases such as the approach taken depends largely on the specific type of case being investigated. Basic steps for all computer forensics investigations for analysis include the following points such as for target drives, using only recently wiped media that have been reformatted and inspected for computer viruses, noting the condition of the computer when seized, removing the original drive from the computer to check date and time values in the systems CMOS, record how to acquire data from the suspects drive, process the data methodically and logically, listing all folders and files on the image or drive Also try to examine the contents of all data files in all folders starting at the root directory of the volume partition, try to recover all the file contents that are password-protected and can be related to the investigation, identifying the function of every executable file that does not match known hash values and maintain control of all evidence and findings and also document everything as being progressed through the examination. Refining and modifying the investigation plan includes determining the scope of the investigation and what the case requires, determining if all the information should be collected and what to do in case of scope creep. The main aim should be to start with a plan but remain flexible in the face of new evidence. Data can be analyzed using many tools from the forensic toolkit such as supported file systems (FAT12/16/32, NTFS, Ext2fs, and Ext3fs). FTK can a very powerful tool that can analyze data from several sources including image files from other vendors, it produces a case long file. FTK also analyzes compressed files, reports can also be generated in it using bookmarks. Other analyze tools include searching for keywords (indexed search, live search or using advanced searching techniques such as stemming). In order to identify different types of data such as images, email and so on, the investigator should examine the data format and then according to that format, it should deal with the file with the appropriate tool. Working with law enforcement The status of individuals under law is no longer in doubt: individuals are subjects of law and as such are accorded rights. Yet rights are illusory without the procedural capability to enforce them. They are no more than high-minded principles if individuals whose rights have been violated have no avenue for complaint and relief. (Cited in Pasqualucci, 2003) There are basically two types of computer investigations, public and private(corporate), the public investigations involve government agencies responsible for criminal investigation and prosecution, the organizations involved must observe legal guidelines provided to them by the authority, other legal rights such as law of search and seizure helps in protecting rights of all people including suspects. Of the everyday problems of the criminal justice system itself, certainly the most delicate and probably the most difficult concern the proper ways of dealing individually with individuals.(Cited in Winslow, 1968) Investigator working with the law enforcement must always abide by the federal and constitutional laws in conducting and performing entire process of investigation. Criminal cases at law enforcement goes through three main steps, first the victim (any individual or company) will contact the law enforcement agency by making a complaint, then acting on behalf of that complaint, the investigator will be assigned by the government authority to conduct a balanced and proper investigation and will be asked to present all the findings directly to the law agency, the investigator will interview the complaint and will write a report about the crime, police blotter may provide a record of clues to crimes that have been committed previously (related to the ongoing investigation). The investigator collect, delegate and process the information related to the complaint. As the investigator build a case, the information is turned over to the prosecutor. An affidavit is a sworn statement of support of facts about evidence of a crime which is submitted to a judge to request a search warrant; the judge must approve and sign a search warrant before it can be used to collect evidence. The chain of custody is the route the evidence takes from the time investigator finds it until the case is closed or goes to court, throughout the case, the evidence is confiscated by the investigator who has the proper right under the law to maintain and keep the evidence immutable. Other concerns which need to be addressed when bringing law enforcement to the scene is that the officers should follow proper procedure when acquiring the evidence such as in digital evidence which can be easily altered by an overeager investigator, special concerns should be given to the information on storage media such as hard disks which are password protected. Network forensics Network forensics is the job of finding the information about how a perpetrator or an attacker gained access to a network, it involves systematic tracking of incoming and outgoing traffic to find out how an attack was carried out or how an event occurred on a network, the forensic expert should be very well experienced and be familiar with many previously related cases of network because the intruders which the network forensic searches for always leave some sort of trail behind, this trail

Saturday, July 20, 2019

Real Estate Accounting: New Regulations Essay -- The Financial Crisis

The level of agony for individuals and businesses continues to rise as they experience losses in the value of their real estate holdings. In some circumstances, the fair market value of their property has fallen below the loan or mortgage amount. As a result, many debtors decide to walk away from the loan, resulting in repossession of the property by the lender. As shown in Appendix A the default rates continue to rise (United States), affecting accounting issues such as, revenue recognition, measurement, fair value, and impairment. The reporting of long-term debt is one of the most controversial areas in financial reporting† (Kieso, 709). This is because long-term debt such as, loans for real estate investments, has a significant impact on a company’s cash flows. A company’s cash flows are affected by long-term debt as gains and losses are reported through an equity account, such as â€Å"Other Comprehensive Income† (Investments). Cash flows are also impacted by reporting the permanent impairment of an asset as a realized loss through earnings and regulatory capital. Individuals and institutions involved in the current credit crisis include: the United States Congress, the Federal Reserve Board, Fannie Mae, Freddie Mac, the Department of Housing and Urban Development (HUD), the Securities and Exchange Commission (SEC), credit agencies, banks, mortgage brokers and consumers (Carey, 2). The Financial Accounting Standards Board (FASB) is focusing on the uprising problems in dealing with the reporting of real estate holdings. Within the housing market, a home buyer (debtor) must go first to a financial institution or mortgage broker (originator) who will approve and make mortgage loans. Next, the originator may choose to s... ...d a company’s continuing involvement in transferred financial assets. Also, Statement 167 requires companies to provide additional disclosures concerning involvement interest entities, allowing significant changes in risk exposure to be reported. The new accounting rules will regulate the real estate market. However, the adjustments to business practices and the respected capital levels will prevail over time. The accounting issues resolving the real estate market will always exist. Accounting regulations are constantly updated to accommodate with the constant change in the economy. FASB along with the SEC will provide updated accounting rules that will affect the lender and the debtor. Whether the new regulations in accounting issues are treated fairly among all parties that are involved; they will have to be carried out in all interrelated transactions.

Friday, July 19, 2019

Homer :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  In Homer’s epic, The Odyssey, women play an integral role in the life of Odysseus, the story’s protagonist. Odysseus is forced to leave the comforts of Ithaca because of a woman, Helen, and he longs to return to his home largely for a woman, his wife Penelope. Throughout his journey, however, it is Circe who has a heavy influence on Odysseus because she is a major distraction and thus an obstacle for the renowned hero. Indeed, Circe’s comeliness coupled with her sorcery, and her kindness along with lavish hospitality all distract Odysseus and impede him from swiftly returning home.   Ã‚  Ã‚  Ã‚  Ã‚  With her otherworldly beauty and enchantments, Circe is a distraction for Odysseus and therefore an obstacle on his road to Ithaca. With her sensuality and magic potions, Circe is able to get that which she desires from men. After Odysseus, guided and forewarned by Hermes, drinks Circe’s potion and is not bewitched, Circe is â€Å"amazed† for â€Å"no other man has ever resisted† her magic (X, 348-350). Although Circe is probably used to fulfilling her sexual desires with men she has enchanted, she nevertheless tries to go to bed with Odysseus. She tells him, â€Å"Climb into my bed and tangle in love there, so we may come to trust each other† (X, 356-357). Odysseus tries to resist the charming goddess and tells her that she must promise no more â€Å"trouble† for him, but as soon as she does that which he asks he â€Å"[climbs] into Circe’s beautiful bed† (X, 366-369). After ten years of fighting, Odyssey has grown quite lonely. He has been away from Penelope, his wife and the only other woman who most likely fulfilled his needs and desires, and Circe is putting forth very tempting offers. Although her potion did not have an effect on him, Circe’s physical beauty definitely appealed to Odysseus; otherwise, he would have cunningly found something to do other than engaging in an intimate act with Circe. The goddess-nymph has many a trick up her sleeve, and she could have also found another way to get Odysseus to go to bed with her. She had no need to do such a thing because Odysseus was in a vulnerable state. Months at sea and at war can be quite trying on anyone, so Odysseus was susceptible to falling for someone--especially someone as seductive as Circe. With physical beauty and magical powers, Circe distracts Odysseus and hampers his return to Ithaca.

Microraptor Gui: The Dinosaur with Four Wings :: Anthropology Essays Paleontology Papers

Microraptor Gui: The Dinosaur with Four Wings Knowing that pterodactyls belong to a separate group of reptiles than dinosaurs, the thought of a dinosaur with wings may seem somewhat strange. But a fairly recent archeological find adds an extra detail to make this idea truly bizarre: a dinosaur with four wings. Microraptor gui, discovered by Xing Xu and colleagues, is believed to be a kind of missing link between strictly ground-dwelling dinosaurs and birds, namely Archaeopteryx, the earliest known creature to be considered a bird. While there can be no debate over the discovery itself, the implications made from its discovery haven’t been entirely accepted, with many arguing them altogether. Besides being an oddity, what makes this particular find so significant? What are these implications that have riled some scientists up, and what is it that these experts argue? Before any sort of discussion on the debate of what M. gui implies, however, the details of this odd reptile’s discovered fossils should be given. Through past research and findings, the leading theory on the origin of birds traces them back to dinosaurs, more specifically a type of bipedal dinosaur called theropods. Within this group of mostly carnivorous dinosaurs are the dromaeosaurids, and they specifically are believed to be the closest dinosaur ancestors of birds. The discovered fossils of the dramaeosaurid M. gui form of a nearly complete skeleton, and it’s been compared with a similar, previously discovered Microraptor skeleton. The place of M. gui’s discovery was Dapingfang, Chaoyang County in western Liaoning, China, also known as the Jiufotang Formation_. Xu and colleagues declare the fossils to be dated from the early Cretaceous period (about 124 - 128 million years ago_)_ through others’ radiometric dating and biostratagraphical correlations of that region_. Interestingly, the closest ancestors of many of the dinosaurs found within this area of China are believed to have lived not during the early Cretaceous, but the late Jurassic_. Paleogeographers have theorized that this area was thoroughly isolated during the very late Jurassic and into the early Cretaceous_. With paleontologists theorizing that Archaeopteryx came into existence 25 million years before the dated existence of these M. gui fossils_, M. gui i s still believed to be a basal dromaeosaurid, meaning that it’s one of the earliest of this type of theropod, maintaining that these fossils are of an ancestor to Archaeopteryx and all birds.

Thursday, July 18, 2019

Causes of Ww1

Causes of World War 1 In 1914, a conflict arose in Europe that started what is now called World War 1 (WW1). This war did not just spring up out of nowhere there many causes involved that started this vast conflict. The immediate cause of WW1 was the assassination of the Archduke Franz Ferdinand who was killed in the Bosnian capital Sarajevo (Mulligan). The main cause of WW1 is M. A. I. N which represents militarism, alliance systems, imperialism, and nationalism (Danzer 579). And a contributing factor of WW1 is escalating tension in the Balkan region.Because of the assassination, M. A. I. N, and tension in the Balkan Peninsula the conflict known as WW1 began. Often the immediate cause for some event is what happened right before that event occurred in this case the assassination of the Archduke Franz Ferdinand was the immediate cause. In June 1914 the Austrian Archduke Franz Ferdinand was visiting the Bosnian capital, Sarajevo, when he was shot (Mulligan). The Archduke Franz Ferdina nd was killed by a Serbian named Gavrilo Princip who was associated with a group known as the Black Hand, which promoted Serbian nationalism.Right after the assassination Austria-Hungary and Serbia were in a diplomatic crisis with each other. On July 28 1914, Austria-Hungary declared war on Serbia thinking it would only be a short war (Danzer 580). But they had actually started what is now called the First World War. Although the assassination was the spark that started the war it was not the main reason for the war. The main cause for the start of WW1 was M. A. I. N which stands for militarism, alliance systems, imperialism, and nationalism (Danzer 579). All of these are long term causes eventually led to the start of the war.Militarism played a very important part in starting WW1; almost every country was bulking up their armies. Even Germany found that they were competing with Britain for who had a better navy. Germany didn’t have much of a Navy until Wilhelm II, Germanyâ €™s Kaiser, decided to become a major sea power (Danzer 579). Because most powerful countries had their fair share of colonies around the world they felt the need to be able to protect these territories with their armies. Tension rose as nations assembled bigger and bigger armies. Prior to the war many countries had alliance systems with other ountries in case they ever went into a conflict with another nation. These alliances were simple if one country were to go to war their allies would come to reinforce them. So when the War did break out country after country got dragged into a battle they are forced to fight. For many centuries, European nations had been building empires, slowly expanding their political control across the globe. Colonies supply European nations with materials and provide markets for manufactured goods (Danzer 579). This is why Germany, France, and Britain compete for colonies creating tension between them even before the war.Nationalism played an importan t role for the start of the war because the people of each country felt an intense loyalty to that country. It was because of nationalism that Princip assassinated the Austrian Archduke. These four causes are the main reason why the First World War started in the first place. The contributing factor for the start of WW1 was the rising tension in the Balkan Peninsula. The Balkan Peninsula at the time consisted of the countries Greece, Albania, Serbia, Bulgaria, Romania, Montenegro and Turkey (Mulligan).The Balkan Peninsula was also known as â€Å"the powder keg of Europe† because of the building tension which was ready to explode at any moment (Danzer 580). The reason for all the tension in this region is mostly because of the interest from major European powers. The Balkan Peninsula was of major significance to these European powers due to its territorial and economic advantages. Examples of these interests are Russia wanting access to the Mediterranean Sea. Another is that G ermany wanted a rail link to the Ottoman Empire, Germany’s Ally, which cut right through the Balkan Peninsula (Danzer 580).Naturally the Balkan people didn’t wish to be ruled by any authority besides themselves so they had dislike towards big European nations (Mulligan). Because of growing nationalism among the Balkan people many countries were striving to be independent. Austria-Hungary, who taken control of Bosnia in 1878, realized this when it seemed Serbia was subverting it’s rule over Bosnia (Danzer 580). With all this tension the â€Å"powder keg† was ready to ignite which is what happened in 1914. WW1 started for three reasons because of the assassination, M. A. I.N, and tension in the Balkan Peninsula. Even if the assassination of the Austrian Archduke did not happen the war may have still began because of M. A. I. N. The tension caused by M. A. I. N would eventually lead to an event similar to the assassination and have an equal effect as well. T o avoid repeating this terrible war it is important that WW1 is to be remembered as a valuable piece of history considering history was repeated already when World War 2 started. WW1 was the biggest war that anyone had ever witnessed in that time and it will always be remembered.