Saturday, February 29, 2020

A Virtual Battlefield

Cyber warfare is an oncoming threat that will result in devastation. Cyber weapons can seriously hurt a country, and cause chaos that will match Pearl Harbor. Picture this- the click of a mouse could disable air traffic control screens, explode fuel refineries, steal valuable information, derail trains, and fry power grids. All capabilities of a cyberattack. And the bad news is the United States is not as prepared as it should be (for this new kind of warfare), and it’s happening right now. I can’t believe that the United States’ cybersecurity isn’t faring that well. We have known of the threat for a long time, yet defensive measures haven’t been taken. We seriously need to end this threat-our whole nation is at risk. Of course, CYBERCOM is a good start, but there really should be more members, which would result in a larger task force, and a stronger cyber defense. Not all cyberweapons are on a nation crippling scale, however. There have been some attacks on Google and Western Energy Companies, and investigators believe China was the aggressor, and Google declared Cyber War on China. Don’t believe that Google, of all companies, got cyberattacked? Check out http://gpsanalysis.com/?p=41 But, of course, some nation-scale warfare has happened, to the United States, too! In April of 2009, cyber spies infiltrated the Pentagon’s Joint Strike Fighter Project, an approximate three-billion dollar project, and were able to escape with huge amounts of data that was related to the aircraft’s design. Again, officials point to China. Ok†¦maybe Google, but the Pentagon got cyberattacked? Check again! http://www.popsci.com/military-aviation-amp-space/article/2009-04/hackers-breach-joint-strike-fighter-program Although China seems to be the most active offensive cyber attacker, America isn’t just a passive victim. In 2010 Israel and the United States hatched the Stuxnet virus, which targeted Iran’s nuclear enrichment facilities and basically destroyed thousands of centrifuges that were used to purify Uranium. Another cyberweapon hatched by the United States was the Flame virus. This virus seeped through the computers of Iran’s high-ranking officials, and collect information. http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_malware/stuxnet/index.html Iran has been receiving some heat from the United States and Israel ever since they began their nuclear weapons program. Yet Iran has been on the offensive side too. A cyberattack shut down RasGas, a producer of liquid natural gas in Qatar, and destroyed valuable computer data at Saudi Aramco- the world’s most valuable company. US intelligence confirmed that the aggressor was Iran. Many more cyberattacks have happened around the world though. I’m not going to sit here typing every single cyberattack. Hopefully you get my main point- Cyber warfare is happening RIGHT NOW. Although cyber warfare can really only frustrate and confuse temporarily, a nation can not win a war if the other side has it. That is why not only offensive measures, but defensive measures, are important. Blocking a cyberweapon from destroying data could cost you the outcome of a war, and bring victory to your side. But cyber defense is hard. Now, the enemy is in virtual space and an attack could come from anywhere. How could we possible set a good defense for that? The United States is scrambling to get good new Cyber Warfare tasks. U.S. Cyber Command (CYBERCOM) is America’s Cyber offensive and Cyber defensive military command. CYBERCOM has many tasks that can detect and patch security holes as well as creating new network systems for the military’s computer systems. CYBERCOM engages in offensive warfare and work on cyber weapons that can be combined with Special Operations Missions, or airstrikes. This is the first step to the protection of our great nation, and will prevail over our enemies when it gets the support it needs. New warfare means new tactics. I think that education is really the best way to go with this oncoming threat. Educate the citizens through websites and other essays like this one, and they will respond. Some will understand computer code, some won’t. But that can change through education. Another advantage is that physical strength is no longer a requirement- and we can face this cyber security threat head-on, to protect our nation and its citizens. Again, cyber warfare is happening right now, and is a serious threat. We need to prepare for this new weapon, and prevent our nation from another Pearl Harbor.

Thursday, February 13, 2020

Criminology Theories. A glimpse into the future Case Study

Criminology Theories. A glimpse into the future - Case Study Example . However, because of the stigma attached to the primary deviance, these same people often consciously considered a form of secondary deviance behavior that reinforced the beliefs of the same mainstream society that shunned them in the first place. It is my contention that with smoking outlawed, that the people who had been addicted to the substance before it was made illegal would have continued to smoke, but the process would have involved a number of illegal activities and hidden behaviors given the social condemnation of the act. These would include behaviors such as growing tobacco plants, harvesting and selling the substances, much in the same way marijuana is being grown and distributed in society today. It is clear that the changes mentioned in this case scenario would impact the types of laws that are of importance to society. For example it would appear that traffic offences and deaths would be substantially reduced due to the changes in transportation, and that inner urban areas would become more crowded as people moved from high population areas such as Florida for example, inland to where they were less likely to be affected by flooding.

Saturday, February 1, 2020

Inclusive Education in Mainstream Politics Term Paper

Inclusive Education in Mainstream Politics - Term Paper Example The definite advancement of the movement on inclusive education is evidenced through declarations, gatherings, statements and various actions taken by governments across the world in the last century. The issue of inclusive education is characterized by deep-rooted conflicts, dilemmas, and contradictions. "Inclusive education should be seen as an attempted resolution of a dilemma that is fundamental to mass education systems: the dilemma of commonality and difference. Put simply, such systems have to offer something recognizably common - an 'education' - to learners who are recognizably similar, while at the same time acknowledging that those same learners differ from each other in important ways and therefore have to be offered different 'educations' (Dyson & Millward, 2000). It is now universally accepted by think groups and policymakers that children with a disability or learning difficulty will ultimately be a part of the mainstream, hence their participation in the mainstream is earlier the better and an early start in mainstream schools is the best preparation for an integrated life. Some of the major milestones in opinion building on bringing inclusive education in the mainstream of policymaking activities include The Universal Declaration of Human Rights ( UDHR, 1948 ), International Convention on the Elimination of All Forms of Racial Discrimination ( ICEARD, 1965), International Covenant on Civil and Political Rights ( ICCPR, 1966), International Covenant on Economic, Social and Cultural Rights ( ICESC, 1966), Convention on the Rights of the Child ( CRC, 1989) and Salamanca Declaration, 1994. The Salamanca Declaration under the overall framework of UNESCO has been particularly noteworthy and it is worthwhile looking at some the key declarations which are given below: Every child has a fundamental right to education and must be given the opportunity to achieve and maintain an acceptable level of learning. Every child has unique characteristics, interes ts, abilities and learning needs, education systems should be designed and educational programs implemented to take into account the wide diversity of these characteristics and needs,   Those with special education needs must have access to regular schools, which should accommodate them within a child-centered pedagogy capable of meeting these needs, Regular schools with this inclusive orientation are the most effective means of combating discriminatory attitudes, creating welcoming communities, building an inclusive society, and achieving education for all; moreover, they provide an effective education to the majority of children and improve the efficiency and ultimately the cost-effectiveness of the entire education system" The successive British establishments were seized with issues associated with the shift in economy from traditional to knowledge work, especially the Labour party when it regained power towards the end of the previous century. Peter Drucker said in 1980 that the center of gravity has sharply shifted from manual work to knowledge work in the world of work. The British leadership could see the need for a different focus in educational policy and its deployment.