Monday, September 30, 2019

Fire on Us from the Sky

Topic 1: War and Survival Question 1. Why did war come to Benson, Alepho and Benjamin's homeland? Who was fighting and why? How did the government and the rebel forces use propaganda (manipulating facts and media to achieve their goals) to further their position in the war? Why did war come to Benson, Alepho and Benjamin's homeland? In 1959, violence between the Tutsi and Hutu erupted. Hutus overthrew Tutsi rule, declared an independent republic and elected the first Hutu president, Greg wa Kayabanda. Mass killings of Tutsis occurred during the transition to Hutu rule.Who was fighting and why? The British colonists created a strict system of racial classification, the Tutsi were a superior group because they were more â€Å"white looking† The colonists believed that the Tutsi were natural rulers, so they put only Tutsis into positions of authority and discriminated against Hutus and Twa. The How did the government and the rebel forces use propaganda (manipulating facts and med ia to achieve their goals) to further their position in the war? They distributed lists of people who were to be targeted and killed.Messages of hate were broadcast over the radio, encouraging the killing of Tutsi and opponents to the Hutu regime. The messages portrayed Tutsis as evil cockroaches and rats. Question 2. What hardships did Benson, Alepho and Benjamin endure because of the war? What does the African proverb When two elephant’s fight, it is the grass that gets trampled mean to you? What hardships did Benson,Alepho, and Benjamin endure because of the War? Loosing their families, watching women get raped, their friends get killed, and just the overall affect that it causes to the brain.What does the African proverb When two elephant’s fight, it is the grass that gets trampled mean to you? It means to me that when two elephants or two powerful leaders fight, it injures the grass, or the middle and low class citizens. Question 3. What hardships did Benson, Alep ho and Benjamin want to keep going despite their horrible suffering, what coping techniques, personal attitudes, or strengths allowed each boy to survive? Which boy did you identify with most? why? Do you think you could have survived such ordeals The willingness to just survive and live, Maybe just get out of Africa maybe get a Visa to get to the United States.They tried to stick together as much as they could although they have been split up for a few years. They most likely figured that â€Å"hey i’ve made it this far, why quit† kind of attitude. I think I can relate to all of them because they are all related, I always know how my family thinks and acts in a certain situation. I do not think i would be able to survive because I do not know the land very well. And the fact that your best friend could be the one that ends up killing you. Question 1. What role did outside countries and organizations play in the war in Sudan?Should the U. S. or other countries have int ervened more or less? During the years leading up to the 1994 genocide in Rwanda, international human rights groups documented and reported numerous human rights violations in Rwanda to the United Nations. Although the international community knew about the extremely brutal attacks taking place, they chose not to intervene. Indeed, the UN withdrew most of its troops and officially limited the actions of the tiny force of 450 soldiers who stayed behind, The should have intervened way more, possibly saving thousands of lives.Question 2. How were the lost boys treated by the communities and individuals they encountered on their journey? Why did people behave the way they did? How would you have treated the lost boys? They were treated like outcasts. They acted the way they did because they didn't know what the difference between right and wrong at they time they did what they thought was right in their tradition and culture. I would have treated them as my own family knowing what I kno w know about what happened in Sudan. Question 3.What role did outside countries and organizations play in the lives of Benson, Alepho and Benjamin and other refugees? What was life like in the refugee camps? Is there an international responsibility to help refugees? They played a big role in their lives, especially when it comes to giving them a place to stay. Life was hard in the camps they had little responsibility. Question 4. How did Benson, Alepho and Benjamin come to the United States? How did the elders left in the refugee camp react? Do the boys have any special responsibility ince they gained asylum? Should the U. S have given them asylum? Should we give more people asylum? They got to the United States by plane. The elders acted very plain to them The had a responsibility of taking care of each other I think the U. S. should have given them a temporary 3 month asylum. The U. S. should offer more people asylums because many of these people have no family and have no place t hey can really go. Question 1. Despite their hardships, the Lost Boys were still very much children. How do you see them grow up through the book?Can you relate to any of their experiences growing up? Any of the games they play? How do they view and interact with the opposite sex? How do their attitudes about education relate to your own? They grow up by making more adult decisions I can relate to loosing a family member for a very long time. The view the women as regular woman. Like them, I take my education very seriously, but even though it is a privilege and not a right to go to school they most likely view it as a once in a lifetime opportunity.

Sunday, September 29, 2019

But These Things Also Essay

‘But these things also’ brings â€Å"to the centre of attention what has previously overlooked†, as Judy Kendall writes. Thomas explores his fascination with the unimportant in this poem and looks at the connection and merging together of Spring and Winter. Much like his other poetry, here, Thomas struggles to put his finger on precisely what he means. This is shown by his inability to separate and distinguish between the two seasons. The poem begins with the first two lines focussing on Spring, however, by following this with two lines focussing on Winter, Thomas explodes our first expectations of usual ‘spring poetry’ of bright and beautiful images. Instead, he catches the limbo between the two seasons and we are presented with the idea of the grass being ‘long dead’ and ‘greyer now’. This pessimistic tone is not what one usually connotes with springtime, but with the cold and bleak winter. By putting the images of the two seasons so close together in this stanza, Thomas reinforces his presentation of their connection. The last line of the stanza, ‘than all the winter it was’, changes the natural syntax of the words. The stress focuses of ‘it was’, emphasising what has past, which creates a sense of longing, introducing the idea that, like in ‘March’, Thomas is desperate to find ‘the key’ the last two lines of the first stanza finish with the words ‘now and ‘was’, bringing together images of the movement of time and emphasising the gap between the present and the past and importantly, Thomas’s focus on that gap. The second stanza uses inscape to look at things, which are seemingly unimportant. These things show the remains of winter, therefore connecting the seasons further. Once again, Thomas alters the syntax of the words to create a more beautified image.’ The word ‘bleached’ would usually have a much more negative connotation of fading and perhaps even the loss of hope, however By placing the word at the end of the first line and after the word ‘little’ he takes away the harshness of the sound and makes it more delicate and gentle. As well as this, Tomas’s use of enjambment stresses the soft ‘L’ sounds in ‘the shell of the little snail’, which further emphasises the smoothness of the words. Following this, the sexural pause halfway along the  second line, highlights the plosive sounds on the image of the ‘chip of flint’. This draws our attention to the minute details, which Thomas considers and accentuates the signs that spring is not quite here yet. By observing nature in this much detail, we see how valuable Thomas considers it to be, it creates a sense that although these things are small and often overlooked, they are significant. The final image in this stanza is of the ‘purest white’ bird dung. At first it appears odd to be beautifying such a thing as bird dung, but by following it with the words ‘purest white’, Thomas introduces an idea of innocence and positivity, as well as a contrast with the previous image of something ‘greyer now’. This brief glimmer of hope however, is shattered in the next stanza. In stanza three, the image of ‘white’ no longer has positive connotations, but it feels as if Thomas could be referring to the relationship between the colour white and death. This instantly darkens the tone and the notion of mistaking bird dung for violets presents the idea that Thomas is truly desperate for any indication of spring’s arrival. The following violent images of ‘winter’s ruins’ and ‘winter’s debts’ create an oppressive feeling which moves further from the previous idea of hope. Continuing the pattern of Thomas’s other poetry, the word ‘something’ appears ambiguous and vague, creating a sense that Thomas still isn’t quite clear on what it is we are paying ‘winter’s debts’ with. The final stanza of ‘But these things also’ begins to fill us with hope once more. The ‘chattering’ birds create a sense of rising morale and the idea of keeping their ‘spirits up’ sounds optimistic. Despite this, when we eventually think that Thomas is going to make a definitive statement, ‘spring’s here’ he reintroduces the feeling of ambiguity with the words ‘winter’s not gone’. This leaves the poem with a sense of not knowing and uncertainty. This reminds us of Thomas’s tendency to never give absolutes and that he likes balancing a positive idea with a negative. This paradox leaves us with the idea that the winter is preventing the spring from arriving. Throughout the poem, there is a regular rhythm, given by the Iambic  Tetrameter, which is occasionally shortened to show the indecisive and unclear seasons. There is never a climax during this poem due to it all being one long sentence. Robert’s talks about Thomas’s use of enjambment and fluidity, which gives a sense of him thinking and working through his thoughts.

Saturday, September 28, 2019

Australia Essay Example | Topics and Well Written Essays - 250 words

Australia - Essay Example Australian government reforms introduced at various points in time has been also contributed to the economic development of this country. In addition sectors such as Mining sector have played a major role in ensuring a good economic growth in Australia. Australia GDP growth Australia gross domestic product rose by 2.6 percent in 2008. Export and the banking industries have also greatly contributed to the impressive economic growth. This paper therefore aims to make an analysis of the economic and cultural situation in Australia and examine the various factors that have contributed the positive growth in Australia. As already seen in paper one Australia is one of the world’s biggest markets and therefore entering Australia for investment requires a lot of hard-work. Before a company ventures into business in Australia it must first of all come up with clear and logical marketing objectives and strategies that will enable the company successfully venture into Australian market. As discussed in paper one new companies that want to enter into the Australian markets are likely to face a number of challenges that include competition from other companies producing similar products and the challenge of familiarizing their company to Australians and ensure that Australians are made aware of the company and its product before it is officially launched. In addition it should also be able to come up with strategies that it can employ to gain control of the product through exports and distribution. New companies must therefore anaylse their marketing objectives and strategies and ensure that measur es taken will enable them successfully enter in Australia as well as continue to remain in the Australian market. This paper will therefore explore the various strategies that the company will employ when venturing into business and come up with mechanisms it intends to use to overcome the possible challenges it is likely to face in order to successfully enter the

Friday, September 27, 2019

CAPM, ICAPM and Multifactor Models Essay Example | Topics and Well Written Essays - 1250 words

CAPM, ICAPM and Multifactor Models - Essay Example Later on research was conducted and the creators of CAPM theory related diversifiable which are unsystematic risks and non-diversifiable which are systematic risks for all the securities in the portfolio. Some management individuals conceived that CAPM is not genuine as it dominates participating management and investment study. Fabozzi and Markowitz (2002) state â€Å"even though the idea is not true it does not mean that the constructs introduced by the theory are not important. Constructs introduced in the development of theory include the notion of a market portfolio, systematic risk, diversifiable risks and beta.† CAPM helps to comprehend the fundamental risk-return trade-offs implied in all cases of financial determinations (Gitman, 2006). The international capital asset pricing model (ICAPM) takes into account countries as stock lists in world market is founded on capital asset pricing model. The difference in the methodical risks of countries results in the differences in excess returns. Previous experiential reports of international CAPM models did not find much proof to back up the model. The bond returns mirror alterations in the cost of bonds as well as coupons. Actually domestic regular risk can be branched out by investing internationally without paying off price in terms of lesser returns. With this viewpoint it is clear that the results got by ICAPM are so helpful to spread portfolio for international portfolio investors. If cross-sectional disparity in anticipated returns can be explicated by the ICAPM, the outcomes can be applied to assess capital market integration. The beginning point of ICAPM is that the construction of the theory of international finance for the most part reflects that of domestic financial theory (Adler and Dumas, 1983). Actually ICAPM normally takes into account the world market portfolio as an alternative to domestic market portfolio. Solnik (1974) also suggests that composite models

Thursday, September 26, 2019

THeater Assignment Example | Topics and Well Written Essays - 1250 words

THeater - Assignment Example Although it is not the purpose of this brief response to elaborate upon the ways in which a playwright or filmmaker can attempt to differentiate without deviating to greatly from the original inspiration, it must be understood that one of the more effective means that this can be accomplished is by subtly yet clearly differentiating the characters from the original in such a way as they provide a level of understanding and nuance as compared to the work to which they are referencing. Within this brief analysis, the author will consider the means by which two of the characters in Rough Magic are distinctly differentiated and represented in a unique way as compared to two of the characters within William Shakespeare’s The Tempest. Finally, at level of analysis will also be given with regards to whether or not this author believes that Rough Magic has the innate potential to be a great film. With regards to the first character which will be discussed, that of Prospero, Rough Magi c portrays him in an entirely different light than did William Shakespeare within The Tempest. Within Shakespeare’s play, Prospero is portrayed as a bellowing, drunken, and un-poetic brute. This of course as a unique dynamic Shakespeare’s play the fact that the other characters are invariably forced into action and reaction based on the bombastic and rather infantile choices and actions that Prospero makes. Without deviating too far from the Shakespearean interpretation of Prospero, Aguirre-Sacasa defines him in a more nuanced manner as individual caught between an ongoing family feud in which he must take an active part. Rather than setting Prospero apart as the embodiment and personification of evil, the playwright reveals a more postmodernist interpretation by which absolute good or bad is not laid squarely upon the character of Prospero (Rough Magic, pg 4). In such a way, the level of differentiation and the means by which absolute good and bad are determined withi n Aguirre-Sacasa’s play as compared to Shakespeare’s are definitively noted with regards to the totality of Prospero’s character. In much the same way, the character of the Ariel is differentiated from William Shakespeare’s character as well as. Whereas the Ariel of Shakespeare’s play is something of an ethereal demigod that is suffered the torture of imprisonment, the Ariel of Aguirre-Sacasa’s play takes upon many of the less than favorable qualities that are somewhat unexpected. It is the understanding of this particular author that the main reason for doing this was to create something of a differential regards the way in which Shakespeare presented the character as compared to the way it was presented within this particular flight. In short, the representation of Ariel within William Shakespeare’s The Tempest was the quintessential woman scorned. Although the same can be true with regards to Rough Magic, the key differential is th at the damsel in distress dynamic is far less evidenced (Rutter, 2003) Within such an understanding, Ariel are self comes represent a horrific and terrifying creature that is

Wednesday, September 25, 2019

Wellness,Fitness & longevity Assignment Example | Topics and Well Written Essays - 750 words

Wellness,Fitness & longevity - Assignment Example This, coupled with the fact that exercise helps one in maintaining proper body weight and thus avoid the diseases associated with obesity, makes it very easy to understand the importance of a physically active lifestyle. However, exercise is often confused with the term physical activity. One needs to understand that a difference in intensity is what distinguishes the two terms. While exercises are usually vigorous, physical exercises are rather moderate or less intense. An easy way to explain this would be to state the idea that moderate physical activities are the ones during which one can talk without losing their breath. For example, brisk walk and performing waltz are considered as moderate physical activities while in contrast, jogging and aerobics are typical kinds of vigorous exercise (Powers et al, 2003). The guidelines of the amount of physical activity needed by individuals differ with the age group. While children are advised a minimum of an hour long physical activities on a daily basis, young adults are expected to at least perform upto 150 minutes of moderate activities per week (Brown et al, 2010). The guidelines for older adults may go the same way as for the younger ones but their choice of the possible activities is limited due to the aging factor. The 150 minutes per week guideline, but with the activities spread throughout the week, is also advised for women during their pregnancy and postpartum period (Brown et al, 2010). These discussed guidelines were developed after an extensive analysis of scientific research was conducted by the concerned authorities. The purpose of developing them was to help people adopt a healthier lifestyle. Along with the guidelines, another set of comprehensive strategies and practices called the National Physical Activity Plan has also been developed (Brown, Heath & Martin, 2010). It has also helped set objectives related to health for a period of ten years; the most recent one was launched

Tuesday, September 24, 2019

Pick the film Gone Baby Gone or Sleepers. Judge (moral or immoral) the Essay

Pick the film Gone Baby Gone or Sleepers. Judge (moral or immoral) the main action (ONE single main action) of the film . Support your position by using Kant's moral philosophy - Essay Example Gone, Baby, Gone is a film directed by Ben Affleck which follows the case of a kidnapped girl, Amanda, whose family approaches the Boston-based private investigator, Patrick Kenzie, to follow up the case. Patrick, along with his partner, Angie Gennaro, discovers the perplexing and highly complex web of corruption as they go about investigating upon the case. As the case progresses along the length of the film, the lines between good and bad are nearly blurred due to interest and mysterious motives. Based on Kant’s moral philosophy, Amanda’s uncle was motivated by greed and a dishonest intention of freeing Amanda from her failing parents. Although the consequences would have been good for Amanda as well as her aunt, the action was immoral due to its immoral motives. As Patrick uncovers the corruption embedded in the case, it becomes clear that Amanda’s aunt and uncle are immoral. Their scheme to free Amanda from her neglectful parents would have had a good consequence as the girl would have escaped her parents’ neglect and would have come under the care of more responsible guardians. However, Kant’s theory of morality depends not on the consequence but on the motive which had undoubtedly been immoral and treacherous. Through a well-planned plot, her uncle was able to stage Amanda abduction and then approach Patrick for a fake investigation. Amanda’s uncle had been aiming to cleverly fool the investigators and obtain the traded drug money by involving many of the investigation police officials. In fact, man personnel from the police department had been involved including Captain Doyle who had hidden Amanda in his house along with his wife. The kidnap had been attempted with great planning and dishonest motive which in volved immense corruption from the reputed police department of Boston. Therefore, all the individuals involved in the staged kidnapping of Amanda had a bad motive for their immoral action. The

Monday, September 23, 2019

Asian Currency Crisis Research Paper Example | Topics and Well Written Essays - 500 words

Asian Currency Crisis - Research Paper Example Credit was made available from abroad cheaply and in large quantities because of the implicit government guarantees (Hale, 2011, pg. 2) The Asian Financial Crisis was also a set back from its artificial growth from the 1980’s until July of 1997 where its growth was fueled primarily by â€Å"hot money† that expects high profit on a short term. This â€Å"hot money† kept pouring in South East Asia (around half of all the investments that went in the developing countries) as a result of high interest rate which made investing in that part of the world attractive. As a result, asset prices rose with a Gross Domestic Product (GDP) registering from 8-12 %. While this was initially laudable, this was not sustained as real total factor productivity growth, or productivity output, especially in Thailand is not commensurate to its financial growth. Such, this continuous capital inflow into Thailand formed into a bubble fueled by â€Å"hot money† and not by total pro ductivity output. And as the bubble furtherly developed, it required more and more â€Å"hot money† needed to sustain it until it burst resulting to the Asian Financial Crisis of July, 1997.

Sunday, September 22, 2019

God and Philosophy Essay Example for Free

God and Philosophy Essay Many philosophers will say that God plays an important role in a persons mental being. Others will argue that he doesnt and that we decide by our own mentality. The three thinkers that will be discussed in this paper made a large impact in the philosophical world with their theories and reasons. Descartes, Kant, and Hume are all important players in the world of philosophy, but according to other philosophers, so is God. Rene Descartes, a noted French philosopher, scientist, and mathematician, coined the Latin phrase Cogito ergo sum (I think, therefore I am). He refused to accept the scholastic and Aristotelian traditions that had dominated philosophical thought throughout the medieval period (www. iep. utm. edu). He frequently contrasted his views with those of his predecessors. In his theology, he insists on the absolute freedom of Gods act of creation. In 1641, he wrote Mediations on First Philosophy, which he employed a method called methodological skepticism; where he doubts any idea that can be doubted. God, in Descartes metaphysics, is the bridge from the subjective world of thought to the objective world of scientific truth. The mind, owing its existence to God, is innately programmed with certain ideas that correspond to reality; hence the importance, in Descartes system, of proving the existence of God, the perfect guarantor of our ideas, so that the mediator can move from isolated flashes of cognition to systematic knowledge of the nature of reality (Cottingham, 31). In Meditations, he mentions the idea of a benevolent God. Because God is benevolent, he can have some faith in the account of reality his senses provide with a working mind and sensory system and does not desire to deceive him; however, this is a continuous argument, as his very notion of a benevolent God from which he developed this argument is easily subject to the same kind of doubt as his perceptions (www. wikipedia. com). Descartes sought to retain the belief in the existence of innate ideas together with an acceptance of the values of data and ideas derived from an experience. Next up is Immanuel Kant, a German philosopher that held that there is an objective moral law. Most philosophers view morality very differently. Some think there is an objective moral law, but that it depends on Gods will. Others thought morality was to do with reason, but that the reasoning was all about how to promote some objective, like ones own happiness of welfare of society (Walker, 5). Kant rejected these ideas, because morality is depending on something outside itself- Gods will. Kant inquired whether it could be possible to ground synthetic ? a priori knowledge for a study of metaphysics, because most of the principles of metaphysics from Plato through Kants immediate predecessors made assertions about the world or about God or about the soul. Kants works of 1755 reveal more of his originality and his enduring themes. Universal Natural History, deriving the present state of the planets from postulated initial conditions by reiterated applications of the laws of Newtonian mechanics, manifests not only Kants commitment to those laws, for which he was subsequently to seek philosophical foundations, but also his commitment to thoroughly naturalistic explanations in science, in which God can be the initial source of natural laws but never intervenes within the sequence of physical causes. Kant still holds that the existence of God can be proved as a condition of the possibility of any reality. Finally, Kant further develops his argument that scientific explanation cannot allow divine intervention in the sequence of events, and that God must be seen only as the original ground of the laws of nature. The existence of God is therefore to Kant a necessary assumption for what he sees to be an objectively valid morality. Lastly, David Hume, British philosopher, is considered one of the most influential religious philosophers. Hume questioned the process of inductive thinking, which had been the hallmark of science. He criticized the standard proofs for Gods existence, traditional notions of Gods nature and divine governance, the connection between morality and religion, and the rationality of belief in miracles. He also advanced theories on the origin of popular religious beliefs, grounding such notions in human psychology rather than in rational argument or divine revelation. For Hume, all objects of human reason are divided into two kinds: Relations of Ideas and Matters of fact. All reasoning of matters of fact is founded on Cause and Effect. Cause and Effect play a big role in Humes philosophy. Hume wrote The Natural History of Religion in 1757. Its main theme is the causes and consequences of the religious development of mankind from polytheism to monotheism. Belief in a god or gods is not natural like belief in an external world, since there are races in which it is not to be found (Quinton, 52). Contrary to many critiques Hume does believe that there is a God, however he does not believe that God is all greatness like society commonly assumes and accepts. Hume argues that because one sees an effect that doesnt mean that we can automatically know or assume its cause. This argument can be used to explain the creation of the world. As influential as Hume was, he remains an academic skeptic, making the reasonable judgments of an ordinary life, regardless of lack of academic knowledge. God played an important role in every philosophers thinking. They either tried to provide proof that he does or does not exist, or tried to decipher why so many people followed a man whom they have never even met. Nevertheless, God played an important role in Kants, Descartes, and Humes philosophical thinking. Works Cited Burnham, Douglas and James Fieser. Rene Descartes (1596-1650). The Internet Encyclopedia of Philosophy. 2005. http://www. iep. utm. edu/d/descarte. htm. Cottingham, John. Descartes. New York, Rutledge: 1999. Quinton, Anthony. Hume. New York, Rutledge: 1999. Rene Descartes. http://en. wikipedia. org/wiki/Descartes. Walker, Ralph. Kant. New York, Rutledge: 1999.

Saturday, September 21, 2019

Reproductive System Essay Example for Free

Reproductive System Essay Discuss the purpose of the lesson. 2. Brainstorm with the class about body parts. 3. Use Reproductive System Visuals 1-6 to continue reviewing the male and female reproductive systems including the location and function of each part. . Lead the activity labeling parts of the reproductive system. 5. Assign homework. This lesson was most recently edited on March 23, 2011. Public Health – Seattle King County  ©1988; revised 2011 www. kingcounty. gov/health/flash Lesson 2 – Page 1 Family Life and Sexual Health, High School FLASH Materials Needed Student Materials †¢ Reproductive System Worksheets (1 copy per student) †¢ Individual Homework: Anatomy (1 copy per student) †¢ Family Homework: Talking about the Reproductive System (1 copy per student) Classroom Materials †¢ Reproductive System Visuals 1-6 (contained in this lesson also available online as a PowerPoint slide: www. ingcounty. gov/health/FLASH) †¢ Labeled body parts for classroom activity, one set per class †¢ Seven pairs of scissors Teacher Preparation Well in advance †¦ †¢ Review lecture notes due to the large number of terms and definitions. The day before the lesson †¦ †¢ Make copies of Materials Needed (see above) †¢ Prepare visuals for use on a SMART Board or projector. Note: When the lesson says â€Å"board,† use whatever is available in your classroom. Standards National Health Education Standard: †¢ Standard 3: Students will demonstrate the ability to access valid information, products and services to enhance health. Performance Indicator 3. 12. 4: Determine when professional health services may be required. Washington State Health Education Standard: †¢ Essential Academic Learning Requirement (EALR) 2: The student acquires the knowledge and skills necessary to maintain a healthy life: Recognizes dimensions of health, recognizes stages of growth and development, reduces health risks, and lives safely. Component 2. 2: Understands stages of growth and development. Grade Level Expectations (GLE) 2. 2. 1: Analyzes the physiological and psychological changes throughout the lifetime. Public Health – Seattle King County  ©1988; revised 2011 www. kingcounty. gov/health/flash Lesson 2 – Page 2 Family Life and Sexual Health, High School FLASH Activities NOTE: Instructions to you are in regular font. A suggested script is in italics. Feel free to modify the script to your style and your students’ needs. 1. Discuss the purpose of the lesson. Identify the lesson as, primarily, a review of information that many students learned in earlier grades. Explain that being well-grounded in knowledge about the reproductive system will help them make sense of discussions later in the unit about pregnancy, birth control, and sexually transmitted diseases. Also, if they have health problems in the future, knowing body parts helps them explain to a health provider what they think the problem may be. 2. Brainstorm with the class about body parts. Write on the board in three columns: Male / Female / Both. Ask students to name reproductive system body parts, both internal and external, in the three columns. Fill in from the Teacher Master List (below) the parts that students don’t mention. As you list the parts on the board, briefly define each body part, where it is in the body and what it does. 3. Use Reproductive System Visuals 1-6 to continue reviewing the male and female reproductive systems, including the location and function of each part. Use a document camera (or SMART Board, overhead projector, etc) to project the images on the board. Explain that the parts labeled as male, female, or both are for most people, but when people are intersex (i. e. , they have a disorder of sex development), there may be some differences †¦ differences that were present at birth. NOTE: Briefly review â€Å"what it does† (each part’s function, below) if students are unfamiliar with the physiology, as you point to the visuals. Please do not feel that you must convey every bit of information in the Teacher Background chart, below. Find more suggested language regarding the hymen and circumcision in Lesson 16, p 5. Teacher Background Male Part penis (made up of shaft, glans, and sometimes foreskin) foreskin †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ Public Health – Seattle King County What it Is / What it Does allows passage of urine and of semen provides sensation (has many nerve endings) the average penis measures 3-4† when its not erect (flaccid) and 5-7† when erect 1 protects the glans of the penis provides sensation males who’ve been circumcised don’t have one muscular sac which is shorter when cold, longer when warm holds testes controls temperature provides sensation ww. kingcounty. gov/health/flash scrotum  ©1988; revised 2011 Lesson 2 – Page 3 Family Life and Sexual Health, High School FLASH †¢ †¢ produce sperm and sex hormones (androgens, testosterone) each is made of 500-1,200 feet 2 of tightly coiled tubes allows maturation of sperm cell from a man (commonly called â€Å"sperm†) they car ry strings of genes (called â€Å"chromosomes†) or DNA instructions in case the sperm cell meets with an egg cell and fertilizes it. uspend the testis supply blood to the testis provide sensation carry sperm from the testis provides storage for sperm allow passage of sperm as big around as sewing thread they lead into the abdomen, where (behind the bladder) they widen into storage sacs contribute fructose (sugar) to semen for nourishing the sperm helps sperm live longer and travel better about a teaspoon full per ejaculation produces most of the fluid that makes up semen pair of glands produce fluid called pre-ejaculate or â€Å"pre-cum† that cleanses the urethra of acid (from urine) to protect the sperm estes (also called testicles) singular = testis epididymis (plural = epididymes) spermatazoan (plural = spermatozoa) †¢ †¢ †¢ †¢ †¢ †¢ †¢ spermatic cords vas deferens (plural = vasa deferentia †¦ also called sperm ducts) †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ seminal vesicles semen prostate gland Cowper’s glands (also called bulbourethral glands) Female Part uterus (made up of muscular walls, a lining called the endometrium, and a cervix. The uterus is also called â€Å"womb†) cervix What it Is / What it Does †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ ouses and protects embryo/fetus/baby allows nutrient ; waste exchange with placenta nourishes an embryo, before a placenta grows the bottom section of the uterus produces fluids to help sperm travel produces a mucous plug to keep germs out during pregnancy allows passage of sperm produces fluids to cleanse and lubricate itself and to help sperm travel allows passage of shed endometrium during menstruation allows passage of baby provides sensation (has many nerve endings especially in the outer third) a collapsed tube, like a deflated balloon www. ingcounty. gov/health/flash vagina Public Health – Seattle ; King County  ©1988; revised 2011 Lesson 2 – Page 4 Family Life and Sexual Health, High School FLASH †¢ †¢ †¢ †¢ †¢ †¢ 3† long when not aroused, 5-6† wh en aroused, 3 but very stretchy is the middle of female’s three openings membrane partly covering vaginal opening ome girls are born without a hymen may be stretched during sexual intercourse or by using a tampon or with fingers carry strings of genes called chromosomes which mix with chromosomes of sperm to direct fetal development if fertilized and implanted in the uterus they dissolve in the Fallopian tube after about 24 hours if not fertilized.

Friday, September 20, 2019

Effect of Globalisation on Poverty Alleviation

Effect of Globalisation on Poverty Alleviation Globalisation Boon or Bane The role of globalisation in alleviating poverty has been subject to intense and recurrent debate while the pro-globalisation (Globalism) movement propound that it has helped many countries such as India and China to reduce poverty[1] , the alter-globalist have denounced globalisation as an unfair development that has increased poverty and widen inequality between the rich and the poor. When we talk about globalisation we mean it is a process that is taking place where national economies, societies are being integrated into a global network of communication and trade. The integration of regional economies in the international economy is gradually being done through the liberalisation of trade, capital flows, migration and the spread of technology. The main drivers of globalisation are shown in the diagram below. Economic globalisation revolves mainly around the idea of liberalising trade and capital flows, this proposal is inspired from J.Williamson set of ten economic policies recommendations known as the Washington Consensus. Free trade refers to the removal of government erected barriers such as tariffs and quotas to facilitate trade which according to the theory of comparative advantage allows both the buyer and seller to make gains. The arguments in favour of trade liberalisation are that it spurs innovation which eventually benefits the consumer. In a situation where firms have to compete with local and foreign competitors innovating and producing at the lowest possible cost is a necessity if the firm wants to retain customers. When the government has protectionist tendencies i.e. close down or restrict access to the market it is clearly done at the expense of consumers who are charged higher price. A clear of example of protectionism in Russia is the increase in tariffs by 15% on car imports which is believed to be a strategy to weaken the demand for import cars and boost up the demand for Russian cars to help the local car industry which makes car of poorer quality hence the customer loose. In addition the Europe CAP spent a staggering â‚ ¬ 49.8 billion in subsidies to protect its agricultural sector which employs less than 5% of EU population which clearly shows an inefficient allocation of resources. Free trade can also increase a countrys output and stimulate economic growth for example in the aftermath of joining the NAFTA Mexico experienced a surge in its export by 12.5% from 1995-2000. Economic freedom is promoted with trade liberalisation because freer trade increases the consumer options and the positive outcome is that customer sovereignty triumphs. It is also propounded that free trade helps in propagating democratic values because in a country where there is no rule of law i.e. contracts cannot be enforced and investor protection is also poor this will deter foreign investors and hindering economic development. Freedom house state that the most economically open countries are three times more likely to enjoy full political and civil freedoms as those that are economically closed. Finally it is believed by many economists that slashing trade barriers would boost the world economy by $613 billion[2] equivalent to the Canadian economy. The case against trade liberalisation has enjoyed strong support among alter-globalist and some developing countries. According to globalists who are strongly supported by developed countries argue that protectionism is a squander of resources (subsidies) to protect unproductive firms which penalise the consumer with products that are expensive and of poorer quality. The economic justification for protectionism for many developing countries lies in the infant industry argument. It is a fact that countries like UK or USA did not flourish on the liberalisation policies that they now staunchly recommend to developing states in fact during the nascent stage of their respective industries both aggressively protected and subsidised them. The rationale for developing countries to protect their infant industry is that even if in the short run the government will have to help them with large amount of funds the benefits accruing to the economy in terms of employment; increase in exports will eventually outweigh the initial cost in the long run. Neutal and Heshmati (2006) stated that thoughcountries such as China, Thailand, and Vietnam may be premier globalisers and also enjoyed strong economic growth and poverty reduction they have liberalized imports very slowly and still have relatively restrictive trade barriers. Ironically while developed countries are in favor of freer trade they still heavily subsidise their agricultural sector and are able to sell the products at a lower price which causes the poor farmers in developing countries to suffer.In addition viewed from the perspective of poorer countries the idea that freer trade helps to disseminate democratic values is a myth it is acknowledged that corruption is rampant in most deprived nations consequently the entrance of powerful multinationals can amplify corruption with the capture of local politicians by lobby groups to swerve the law in their favour. For example freer trade between China and USA or EU has not been translated in the amelioration of China human rights record. Outsourcing production is also a major component of free trade when large MNEs outsource their production they can compromise more easily in developing nations on the labour and environmental standards by employing child labour[3] and by not complying with eco-friendly standards. The second aspect of economic globalisation is financial liberalisation which refers to the capital account and financial services liberalisation where government owned banks are privatised and the admission of the private sector in the financial market becomes less stringent. The benefits accruing to the economy with the liberalisation of capital flows is an efficient allocation of capital from developed to developing countries which increase availability of funds for investors to finance technological development and stimulate economic growth. Additionally financial liberalisation is perceived as a commitment to sound economic policies sound economic policies because a country with an open capital account is immediately rebuked by both domestic and foreign investors in the event of a decline in its policy environment hence the need for policymakers to implement sound policies. The adversaries of financial liberalisation argue that the recent series of financial crisis have occurred because of liberalisation consequently they argue for a non-liberalised economy, for instance Thailand an open economy experienced fast growth and also crisis while India a non-liberalised economy enjoyed slow but sure growth path[4]. Moreover financial liberalisation has failed most developing countries for instance Brazil and Chile had experienced appalling results with bank failures soon after deregulating their financial sector the reasons given are a fragile banking system coupled with a weak institutional environment where the rule of law is weak, corruption rampant and banking supervision failed. The link between globalisation and technology are unequivocal since without technological innovation globalisation would not have taken place. The internet or fax for instance has made it possible for people/companies to communicate in real time between countries the benefit is that this has significantly condensed time, remove the need for middle men in business transactions. Technology has also reduced asymmetric information by lowering the cost of information. Globalisation and technology has created new industries like the BPO which includes many business such as call-centers, web design, accounting services. Though alter globalist refute the possibility of technology of propagating democratic values in the world, globalism partisans are keen to stress on that internet has given people a platform to voice out their opinion for instance if a MNEs firm is outsourcing its production process in a developing nation where ILO[5] labour standards are not complied then the ILO can denoun ced this practice which would be tantamount to a massive pressure force causing MNEs to comply with the set standards. As Jimmy Carter eloquently said Globalization, as defined by rich people like us, is a very nice thing you are talking about the internet, cell phones and computers. This doesnt affect 2/3 of the people of the world. The digital divide between developed and developing states is evident it is known that technology innovation is important for growth, but since developed countries has a clear advantage in terms of RD capacity, supporting infrastructure and also the required literate workforce it is predominantly rich countries that are benefitting of advances in technologies. The argument of technology transfers that can eliminate the gulf in technology mismatch between rich and poor countries through FDI and trade has its limitations since the Intellectual Property Rights (IPRs) regime has various components which prohibit technology transfers. Additionally to discern why technology advancement has largely served developed countries interest we need to understand that in most developin g countries an overwhelming majority of the people make a living out of the primary sector hence FDI in the tertiary sector has not helped them. Though it is largely thought that developing countries have been the hardest hit by globalisation this is erroneous because in developed nations too there have been job losses. The recent phenomenon of off- shoring is a practice where goods/services that were earlier produced locally in developed countries are now shifted in developing states because of lower cost and then imported back in the developed country, this practice has caused massive redundancies in the manufacturing sector and causing discontent among the local population. Irrespective of ones view on globalisation it is a non-reversible process that has taken place as such it is in the interest of each country to take the best of this process. The hostility to globalisation in developing countries can be reduced if the policies benefit the majority and not the rich minority, for instance in India the population approved the gradual reform economic policies because the benefits has been felt in the countryside. For developed countries the loss of jobs in the manufacturing and even services sector due to off shoring since the in developing countries people are ready to work for a fraction of what the westerners earn. To mitigate the job losses economist argue that the government should devise apt policies to help the workforce retrain and the private sector must constantly innovate to retain their competitive edge. References Demirguc Kunt Financial liberalization and financial fragility Pg 2-4 Froning D. (2000) The Benefits of Free Trade: A Guide for Policymakers Griswold D. Does Trade Promote Democracy? Ha-Joon Chang. How the Economic and Intellectual Histories of Capitalism Have Been Re-Written to Justify Neo-Liberal Capitalism Neutal M and Heshmati A (2006) Globalisation, Inequality and Poverty Relationships: A cross country evidence Pg 4 Sharma B. India and China lift millions out of slums: UN Singh A. Capital account liberalization, free ling-term capital flows, financial crisis and economic development Pg 2 Ted Case Studies Nike Shoes and Child labour in Pakistan 10 benefits of the WTO trading system How to make technology transfer work for human development Pg3-4 Democracy and development are winners in the election S.Dhume http://en.rian.ru/russia/20090112/119431521.html http://www.ausaid.gov.au/keyaid/growth.cfm http://en.wikipedia.org/wiki/Infant_industry_argument http://www.abcarticledirectory.com/Article/Reaping-The-Benefits-Of-Globalization-And-Technology/81138 India and China have lifted 125 million people from slums for period 1995-2000 10 benefits of WTO See Nike Shoes and Child Labour in Pakistan Tornell (2006) International labour Organisation

Thursday, September 19, 2019

America’s Doomed Invasion of the Bay of Pigs by Jim Rasenberger Essay

Plan of Investigation This investigation seeks to assess the level of impact that the failure of the American backed invasion force at the Bay of Pigs in 1961 had on the Kennedy administration’s relations with Cuba. This investigation will evaluate the statements and opinions about Cuba made by John F. Kennedy during his campaign and before the failure of the Bay of Pigs invasion with Kennedy’s actions taken and decisions made regarding Cuba after the Bay of Pigs invasion to determine the degree of influence this event on American foreign policy with Cuba. A variety of sources are used; primarily, Robert Kennedy: The Unpublished Recollections of the Kennedy Years by Robert F. Kennedy and The Brilliant Disaster: JFK, Castro, and America’s Doomed Invasion of the Bay of Pigs by Jim Rasenberger, which will be evaluated on the basis of origin, value, purpose, and limitation. WORD COUNT: 141 Summary of Evidence ï€ « Campaign Foreign Policy Platform During Kennedy’s campaign, his ideas on foreign policy were criticized by both liberals and conservatives because of the contradictory nature of his platform. While Kennedy was calling for an increase in defense spending, against the advice of current president and former general Dwight D. Eisenhower, he also encouraged third-world neutralism. As a response to allegations that this neutralism made him weak on communism, Kennedy denounced the current Republican administration’s lack of response to Fidel Castro’s coup d’à ©tat and committed to a hard line stance on Cuba’s new communist regime. Kennedy used his hard line stance to attack Republican challenger and Vice President at the time Richard Nixon, who could not reveal the Eisenhower administration’s current preparation for a covert military... ...Sources Combs, Jerald A. The History of American Foreign Policy From 1895. Armonk, New York: M.E. Sharpe, Inc, 2012. Dallek, Robert. Camelot's Court: Inside the Kennedy White House. New York, New York: HarperCollins Publishers, 2013. Daugherty, William J. Executive Secrets: Covert Action & The Presidency. Lexington, Kentucky: The University Press of Kentucky, 2004. Fisanick, Christina, ed. The Bay of Pigs. Farmington Hills, Michigan: Greenhaven Press, 2004. Gutham, Edwin O, and Jeffery Shulman, ed. Robert Kennedy In His Own Words. New York, New York: Bantam Books, 1988. Jones, Howard. The Bay of Pigs. New York, New York: Oxford University Press, 2008. Patterson, Thomas G., ed. Kennedy's Quest For Victory: American Foreign Policy 1961-1963. New York, New York: Oxford University Press, 1989. Rasenberger, Jim. The Brilliant Disaster. New York, New York: Scribner, 2011.

Wednesday, September 18, 2019

Manager Interview Essay -- Effective Management Styles

I chose to interview Regina Geis, who holds the administrative role as acting supervisor for the County Mental Health adult day program, which provides services for individuals with intellectual disabilities. Ms. Geis has held this position for 15 months. This is her first managerial position within a human service agency. Her style of management has changed over this short period of time. She feels that she is now more direct with her direction with staff. She stated, â€Å"Maybe now I come across as a little bit cold. But I have learned that I now have to use the least amount of words to get my point across.† Ms. Geis feels that to be an effective leader one must demonstrate with a high level of confidence, â€Å"even if I’m unsure of myself, I have to be ready to stand by my decision and carry it out.† Although, she also stated a competent supervisor must also be able to accept when they are wrong. Ms. Geis provides supervision for 15 direct care workers in the programs and finds â€Å"That’s a lot of different viewpoints and perspectives to sort through.† Therefore, she finds difficult people are not easy to work with. From an administrate role, she states, â€Å"You can not let it consumes you and affect you negatively.† Ms. Geis feels that to be an effective manager when working with complex individuals one must learn how to use their strengths and adapt the work environment. â€Å"You find what they are really good at and place them in the best role that uses their strong points.† In the beginning, Ms. Geis would quietly sit quietly during entire managerial team meetings, but now she is more confident in her abilities, position, and will speak up. â€Å"Now I give my opinion or raise questions to ask. Sometimes, I may raise a concern that gives ... ... me to strengthen these weaknesses, I will seek training online, at the local community college, and at workshops. Works Cited Edmondson, J. (2009). Let's be clear: How to manage communication styles. American Society for Training & Development, Inc., 63(9), 30-31. Retrieved from http"//go.galegroup.com/ps/i.do?id=GALE|A212767598&v=2.1&=novaseu_main&it=r&p=ITOF&sw=w&asid=0abb8dfff77dba5f747cb1b4c13a9d9f Grant, A., & Taylor, A. (2014). Communication essentials for female executives to develop leadership presence: getting beyond the barriers of understating accomplishment. Business Horizons, 7, 73-83. doi: 10.1016/j.busher.2013.09.003 Groves, K., & Vance, C. (2009). Examining managerial thinking style, eq, and organizational commitment. Journal of Managerial Issues, XXI(7), 344-366. Geis, R. (2015, march 30). Interview by Student Name [Personal Interview].

Tuesday, September 17, 2019

Attacking Wifi Nets with Traffic Injection

I am very much thankful to him. I benefited a lot discussing with him. I am also thankful to my parents who encouraged me and provided such a motivation, so I became able to perform this. I am also thankful to all my friends and those who helped me directly or indirectly in completion of my project. CONTENTS †¢Introduction †¢Crime Definition †¢Laws that have been violated †¢Possible Punishments (IT ACT + INTERNATIONAL LAWS) †¢Unlawful Losses and Gains †¢Working of Attacks †¢Description of Tools INTRODUCTION This term paper is based on â€Å"attacking wifi nets with traffic injection† also nown as packet injection which simply means the hacking of wireless networks with different techniques to send extra amount of traffic (packets, frames, duplicate copies) on a network by which a hacker can able to access the information and identity that a client is using. Some techniques are wireless network sniffing, DOS (denial of service attack), Man in the middle attack etc. Attacks on wireless LANs (WLAN’s) and wireless-enabled laptops are a quick and easy way for hackers to steal data and enter the corporate network.Many types of tools are used to perform hacking. Some of them are named as aircrack-ng, airjack etc. thts paper will later give brief information on tools used , working of tools ,losses and gains with hacking etc. These type of attacks are known as INTEGRITY attacks. Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate. We already know 802. 11 networks are weak.Open networks are prone to any well-known LAN perimeter attack WEP is vulnerable. Traffic injection has changed things like †¢Increased DoS (denial of service) capabilities †¢Dramatically decreased WEP cracking achievement time †¢Allows traf fic tampering †¢Allows stations attacks CRIME DEFINITION Cyber Crime –A crime where the computer is used as a tool or target. Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet.For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. Hacking – Traffic injection attacks comes under hacking. It is defined as whomever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking.Hacking may also occur when a person willfully, knowingly, and withou t authorization or without reasonable grounds to believe that he or she has such authorization, destroys data, computer programs, or supporting documentation residing or existing internal or external to a computer, computer system, or computer network. Besides the destruction of such data, hacking may also be defined to include the disclosure, use or taking of the data commits an offense against intellectual property.This paper is a survey of wireless attack tools focusing on 802. 11 and Bluetooth. It includes attack tools for three major categories: confidentiality, integrity, and availability. Confidentiality attack tools focus on the content of the data and are best known for encryption cracking. Integrity attacks tools focus on the data in transmission and include frame insertion, man in the middle, and replay attacks. Finally, availability attack tools focus on Denial of Service (DoS) attacks. Law That Have Been ViolatedThe laws that have been violated are section 43,65 and 66 of IT ACT 2000. Section 43 of IT ACT 2000, defines as If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network, — (a) Accesses or secures access to such computer, computer system or computer Network; (b) Downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium; c) Introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; (d) Damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programs residing in such computer, computer system or computer network; (e) Disrupts or causes disruption of any computer, computer system or computer network; (f) Denies or causes the denial of access to any person authorized to acces s any computer, computer system or computer network by any means; g) Provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made there under; (h) Charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, Section 65 of IT ACT 2000, defines as, Tampering with computer source documentsWhoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programs, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. Section 66 of IT A CT 2000, defines as, (1) Whoever with the intent to cause or knowing that he is likely to cause rongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. POSSIBLE PUNISHMENTS (IT ACT + International laws) Cyber crime is a type of crime that not only destroys the security system of a country but also its financial system. One supporter of legislation against cyber crime, Rep.Lamar Smith (R-Texas), stated, â€Å"Our mouse can be just as dangerous as a bullet or a bomb. † Cyber attackers should be penalized and punished severely and most cyber crimes have penalties reflecting the severity of the crime committed. Although in the past many laws against cyber crimes were ins ufficient, law enforcement agencies and governments have recently proposed many innovative plans for fighting cyber crimes. Punishment Cybercrime must be dealt with very seriously because it causes a lot of damage to businesses and the actual punishment should depend on the type of fraud used.The penalty for illegally accessing a computer system ranges from 6 months to 5 years. The penalty for the unofficial modification on a computer ranges from 5 to 10 years. Other penalties are listed below: Telecommunication service theft: The theft of telecommunication services is a very common theft and is punished with a heavy fine and imprisonment. Communications intercept crime: This is a Class-D crime which is followed by a severe punishment of 1 to 5 years of imprisonment with a fine.Other cyber crimes like telecommunication piracy, offensive material dissemination, and other cyber frauds also belong to this category. Information Technology Act-2000: According to this act, different penal ties are available for different crimes. Some of the penalties are as follows: Computer source document tampering: The person who changes the source code on the website or any computer program will get a punishment up to 3 years of imprisonment or fine. Computer hacking: The individual who hacks the computer or computer devices will get an imprisonment up to 3 years or a fine.Government protected system: An act of trying to gain access to a system which is a protected system by the government, will result in imprisonment for 10 years and a heavy fine. The introduction of such penalties have lead to a drastic reduction in the cyber crime rates as more and more criminals are becoming aware of the penalties related to them. Spreading the word about the penalties of cyber crime can serve as a deterrent against such crime. Penalties relating to cyber crime will vary depending on the country and legislation in place. Punishments according to IT ACT 2000The person who commits the crime sha ll be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected according to section 43 of IT ACT. The person who commits the crime shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both according to section 65 of IT ACT. Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both according to section 66 of IT ACT 2000 INTERNATIONAL LAWS In USA section 18 U. S. C.  § 1030 A) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection (a)(1) of this section which does not occur after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than twenty years, or both, in the case of an offense under subs ection (a)(1) of this section which occurs after a conviction for another offense under this section, or an attempt to commit an offense punishable under this subparagraph; In CanadaThe person who commits the crime is guilty of an indictable offence and liable to imprisonment for a term not exceeding ten years, or is guilty of an offence punishable on summary conviction. UNLAWFUL LOSSES AND GAINS Losses due to hacking Hackers targeted major companies including Sony, RSA Security, and Citigroup, but also governmental websites and smaller firms. Many companies could have prevented the attacks. Because of their vulnerabilities, they not only lost money, but also risked losing clients, prestige and market share. Multitudes of people were affected by their security breaches Recent reports showed hackers earned $12. billion in 2011, mainly by spamming, phishing, and online frauds. Some companies have made their financial losses public, while others chose not to disclose them. Here’ s a top 5 of the declared losses caused by hackings from last year until present. Undeclared losses may even exceed these ones. 1. $171 million – Sony Hacked in April to June 2011, Sony is by far the most famous recent security attack. After its Playstation network was shut down by LulzSec, Sony reportedly lost almost $171 million. The hack affected 77 million accounts and is still considered the worst gaming community data breach ever.Attackers stole valuable information: full names, logins, passwords, e-mails, home addresses, purchase history, and credit card numbers. 2. $2. 7 million – Citigroup Hacked in June 2011, Citigroup was not a difficult target for hackers. They exploited a basic online vulnerability and stole account information from 200,000 clients. Because of the hacking, Citigroup said it lost $2. 7 million. Just a few months before the attack, the company was affected by another security breach. It started at Epsilon, an email marketing provider for 2,5 00 large companies including Citigroup.Specialists estimated that the Epsilon breach affected millions of people and produced an overall $4 billion loss. 3. $2 million – Stratfor Last Christmas wasn’t so joyful for Stratfor Global Intelligence. Anonymous members hacked the US research group and published confidential information from 4,000 clients, threatening they could also give details about 90,000 credit card accounts. The hackers stated that Stratfor was â€Å"clueless†¦when it comes to database security†. According to the criminal complaint, the hack cost Stratfor $2 million. 4. $2 million – AT&T The US carrier was hacked last year, but said no account information was exposed.They said they warned one million customers about the security breach. Money stolen from the hacked business accounts was used by a group related to Al Qaeda to fund terrorist attacks in Asia. According to reports, refunding costumers cost AT&T almost $2 million. 5 . $1 million – Fidelity Investments, Scottrade, E*Trade, Charles Schwab The most recent declared losses were in a brokerage scam. A Russian national was charged in the US with $1. 4 million in computer and hacking crimes. $1 million was stolen from stock brokerages Fidelity Investments, Scottrade, E*Trade, and Charles Schwab.The rest of the money was taken from fraudulent tax refunds, with the stolen identities of more than 300 people. Gains To Hackers * To use your computer: * as an Internet Relay Chat (IRC) server – hackers wouldn't want to discuss openly about their activities on their ‘own' servers * as Storage for Illicit Material (ex. pirated software, pirated music, pornography, hacking tools etc) * as part of a DDoS Attack – where many computers are controlled by hackers in an attempt to cause resource starvation on a victim's computers or networks * To steal services and/or valuable files For thrill and excitement * To get even – maybe an I T staff who was terminated, or other parties you've ‘wronged' * As a publicity stunt – an example of which was reported in 1998 by Jim Hu in MTV â€Å"hack† backfires * Knowledge/Experiment/Ethical – some hackers probe a computer system to find its security vulnerabilities and then inform the system administrator to help improve their security * Another possible reason is that the hackers might suffer from a disease called Asperger syndrome (AS).They are people who are very good with numbers and at focusing on a problem for a very long period of time, but are not good in social relationships. How AS can possibly be linked to hacking behavior was discussed more thoroughly by M. J. Zuckerman in his ‘USA Today' article, What fuels the mind of a hacker? * Curiosity * To spy on friends, family members or even business rivals * Prestige – bragging rights in their social circle (particularly if they've hacked high-profile sites or systems) * Intellec tual Challenge Money – although most hackers are not motivated by financial gain; many professional criminals make money by using hacking techniques either to * set up fake e-commerce sites to collect credit card details * gain entry to servers that contain credit cards details * engage in other forms of credit card fraud WORKING OF ATTACKS Before studying about how traffic injection attacks works there are some basic terms we shoud have to know WEP Wired Equivalent Privacy (WEP) is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP.The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm. The shared-secret key is either 40 or 104 bits long. The key is chosen by the syste m administrator. This key must be shared among all the stations and the AP using mechanisms that are not specified in the IEEE 802. 11. FRAMES Both the station and AP radiate and gather 802. 1 frames as needed. The format of frames is illustrated below. Most of the frames contain IP packets. The other frames are for the management and control of the wireless connection. There are three classes of frames. The management frames establish and maintain communications. These are of Association request, Association response, Reassociation request, Reassociation response, Probe request, Probe response, Beacon, Announcement traffic indication message, Disassociation, Authentication, Deauthentication types. The SSID is part of several of the management frames.Management messages are always sent in the clear, even when link encryption (WEP or WPA) is used, so the SSID is visible to anyone who can intercept these frames. Authentication Authentication is the process of proving identity of a sta tion to another station or AP. In the open system authentication, all stations are authenticated without any checking. A station A sends an Authentication management frame that contains the identity of A, to station B. Station B replies with a frame that indicates recognition, addressed to A. In the closed network architecture, the stations must know the SSID of the AP in order to connect to the AP.The shared key authentication uses a standard challenge and response along with a shared secret key. Traffic injection quick HOWTO †¢1 Insert adapter †¢2 Load driver and activate adapter †¢3 Set driver into monitor mode (real 802. 11 mode) †¢4 Set appropriate channel †¢5 Open PF PACKET/RAW socket on interface (Linux only) †¢6 Use your socket and play †¢ Still, you need a 802. 11 stack over your socket and/or good libs †¢ and tools so you can communicate WORKING – This phase of term paper describes the working of attack by using one tool calle d INJECTION WIZARDInjection Wizard is an application for injecting traffic into WEP-protected Wi-Fi networks, like aireplay-ng, but it's much more easy to use and it can work with worse conditions (for example, more interferences, weaker transmitted/received signals, more restricted access points, etc). The higher the traffic of the network, the earlier we will be able to crack a WEP key with tools like aircrack-ng, airsnort, dwepcrack, weplab, WEPAttack, WEPCrack, etc. However, injecting traffic is not easy because you must build or capture a frame that causes a response frame in any other station (that is, a wireless node).This application carries out automatically all the needed actions to build a frame that causes a response in other station. These actions can be summarized in the following sequence of steps: 1. The application scans Wi-Fi networks and shows a list of WEP-protected networks, then it allows the user to select one of them. 2. It joins the selected network and moni tors that network in order to find a data frame. 3. It tries to extract a keystream prefix from the captured frame and then it tries to extend the keystream up to 40 bytes by means of the W.A. Arbaugh's inductive chosen plaintext attack. 4. It tries to find a host (for example, a connected computer, a network device, etc), which has an IP address belonging to a predefined range, by injecting forged ARP packets. 5. After finding an active host, it injects ARP packets targeted at that host. Some of the benefits of this application are easiness of use (due to its graphical interface, automatic operation, etc) androbustness (detection/management of network disconnections, repetition of failed actions, etc).Moreover, the Arbaugh's inductive attack can be performed by any Wi-Fi interface supporting injection in monitor mode, because the interface driver doesn't need any additional patch as it's usual to happen with the Bittau's fragmentation attack. Besides its higher applicability, this attack is generally more reliable than Chop-Chop attack for recovering a keystream of a given size, because it doesn't have to inject any frame larger than needed. This application is distributed under the terms of the GNU General Public License version 2 (read the license. tm file for more details) and comes with absolutely no warranty. The author assumes no responsibility derived from the use or the distribution of this program. The copyright of this application is owned by Fernando Pablo Romero Navarro (May 2010). Injection Wizard has made use of (with convenient modifications) the following free software applications: * scapy (version 2. 0. 1), distributed under the license: GNU GPL version 2. Copyright: Philippe Biondi,2009 (http://www. secdev. org/projects/scapy). * python-wifi (version 0. 3. 1), distributed under the license: GNU LGPL version 2. 1.Copyright: Roman Joost, 2004-2008 Software Requirements For the client application (graphical interface): †¢Any system with a recent Java virtual machine: JRE version 1. 6 or later. For the server application: * A Linux box with a recent kernel, so it should support Wireless Extensions version 22 or later (since kernel version 2. 6. 21) and the mac80211 stack for Wi-Fi interfaces (since kernel version 2. 6. 24, it is supported by many Wi-Fi adapter drivers). * A Wi-Fi network interface driver supporting injection in monitor mode (sometimes it's required to patch the driver for supporting this feature). The iw system command, if it's not provided by your Linux distribution you can get it by installing the aircrack-ng package or by compiling the source code that can be downloaded from: http://wireless. kernel. org/download/iw. * A Python interpreter with version 2. 5, later versions might also work. Instructions 1. Uncompress the injwiz. zip file. 2. Copy the client directory on a system with a Java virtual machine accessible from the command path (for example, launch a shell, enter the client directory, ex ecute the command: java -version and check the command outputs the JRE version number). .Copy the server directory on a Linux box. If the client and server directories weren't copied on the same machine, you should edit the runserver. sh script (in the server directory) and replace the IP address: 127. 0. 0. 1 with the IP address of the Linux box's network interface that is attached to the same network that the client machine (i. e. the computer that hosts the clientdirectory). 4. Enter the server directory and run the script: . /runserver. sh (the Python interpreter should be accessible from the command path. You can check this by running: ython -V from the command line and verifying that the interpreter version is showed). 5. On the client machine, enter the client directory and run either the script: . /runclient. sh (for Linux or Unix-like operating systems providing a shell compatible with the Bourne shell and whose path for the executable file is: /bin/sh) orrunclient. bat (fo r Windows). DESCRIPTION OF TOOLS The tools used for packet injection purposes are divided into two categories Hardware and software 1. Software Serious hackers usually use Linux-based open source penetration test tools from which to launch their attacks.This section details some of the more popular tools that can be used to search out and hack wifi networks. †¢Aircrack-ng: This suite of tools includes 802. 11 WEP and WPA-PSK key cracking programs that can capture wireless packets and recover keys once enough information been captured. Aircrack-ng supports newer techniques that make WEP cracking much faster. This software has been downloaded over 20,000 times. †¢Airjack: An 802. 11 packet injection tool, Airjack was originally used as a development tool to capture and inject or replay packets.In particular, Airjack can be used to inject forged deauthentication packets, a fundamental technique used in many denial-of-service and Man-in-the-Middle attacks. Repeatedly injecting deauthentication packets into a network wreaks havoc on the connections between wireless clients and access points. †¢AirSnort: AirSnort is wireless LAN (CLAN) tool which recovers WEP encryption keys. AirSnort works by passively monitoring transmissions, and then computing the encryption key when enough packets have been gathered.After that point, all data sent over the network can be decrypted into plain text using the cracked WEP key. †¢Cain ;amp; Able: This is a multi-purpose tool that can intercept network traffic, using information contained in those packets to crack encrypted passwords using dictionary, brute-force and cryptanalysis attack methods, record VoIP conversations, recover wireless network keys, and analyze routing protocols. Its main purpose is the simplified recovery of passwords and credentials. This software has been downloaded over 400,000 times. CommView for WiFi: This commercial product is designed for capturing and analyzing wifi network packets. C ommView for WiFi uses a wireless adapter to capture, decode, and analyze packets sent over a single channel. It allows hackers to view the list of network connections and vital IP statistics and examine individual packets. †¢ElcomSoft Wireless Security Auditor: This is an all-in-one cracking solution that automatically locates wireless networks, intercepts data packets, and uses cryptanalysis techniques to crack WPA/WPA2 PSKs.This software displays all available wireless networks, identified by channel number, AP MAC address, SSID, speed, load, and encryption parameters. While these capabilities can be found in open source tools, ElcomSoft provides a more polished product for professional use by wireless security auditors. †¢Ettercap: Ettercap can be used to perform man-in-the-middle attacks, sniff live connections, and filter intercepted packets on the fly. It includes many features for network and host analysis. This shareware has been downloaded nearly 800,000 times. Fi resheep: This is a plug-in to the Firefox browser that allows the hacker to capture SSL session cookies sent over any unencrypted network (like an open wifi network) and use them to possibly steal their owner’s identities. It is extremely common for websites to protect user passwords by encrypting the initial login with SSL, but then never encrypt anything else sent after login, which leaves the cookie (and the user) vulnerable to â€Å"sidejacking.† When a hacker uses Firesheep to grab these cookies, he may then use the SSL-authenticated session to access the user’s account. Hotspotter: Like KARMA, Hotspotter is another wireless attack tool that mimics any access point being searched for by nearby clients, and then dupes users into connecting to it instead. †¢IKECrack: This is an open source IPsec VPN authentication cracking tool which uses brute force attack methods to analyze captured Internet Key Exchange (IKE) packets to find valid VPN user identity an d secret key combinations. Once cracked, these credentials can be used to gain unauthorized access to an IPsec VPN. KARMA: This evil twin attack listens to nearby wireless clients to determine the name of the network they are searching for and then pretends to be that access point. Once a victim connects to a KARMA evil twin, this tool can be used to redirect web, FTP, and email requests to phone sites in order to steal logins and passwords. †¢Kismet: Kismet takes an intrusion detection approach to wireless security, and can be used to detect and analyze access points within radio range of the computer on which it is installed.This software reports SSIDs (Service Set Identifiers – used to distinguish one wireless network from another) advertised by nearby access points, whether or not the access point is using WEP, and the range of IP addresses being used by connected clients. †¢NetStumbler: This tool turns any WiFi-enabled Windows laptop into an 802. 11 network det ector. NetStumbler and dozens of similar â€Å"war driving† programs can be used with other attack tools to find and hack into discovered wifi networks. †¢WireShark: WireShark is a freeware LAN analyzer that can be used to passively capture 802. 11 packets being transmitted over a wifi network.This software has been downloaded millions of times. 2. Hardware †¢For hackers that prefer a turn-key package, there are also hardware wireless hacking tools available. We’ve highlighted one called WiFi Pineapple. It’s a simple, small, portable device that can be carried into any hotspot and used to attract any laptop trying to find a wifi access point. The Pineapple uses a technique called an Evil Twin attack. Hackers have used tools like KARMA to do the same thing for years, but with Pineapple, now you can buy a piece of hardware for only $100 that allows you to become a hacker without downloading or installing any software. Here’s what their website say s: â€Å"Of course all of the Internet traffic flowing through the pineapple such as e-mail, instant messages and browser sessions are easily viewed or even modified by the pineapple holder. †REFERENCES http://www. cse. wustl. edu/~jain//cse571-07/ftp/wireless_hacking/index. html http://www. cs. wright. edu/~pmateti/InternetSecurity/Lectures/WirelessHacks/Mateti-WirelessHacks. htm#_Toc77524642 http://www. webopedia. com/TERM/C/cyber_crime. html http://www. wi-fiplanet. com/tutorials/article. php/3568066 file:///C:/Users/jsk/Desktop/Wireless%20Hackers%20101. htm

Monday, September 16, 2019

Charlie Chaplin’s “The Kid” and Rowan Atkinson’s “Mr. Bean” Essay

The most apparent similarity between these two films is that both films revolve around the daily lives of the main characters. The main characters, Charlie and Mr. bean, in The Kid and Mr. Bean – The Ultimate Disaster Movie respectively, both have child-like qualities, and the tendency to be rather mischievous. Mr. Bean is naive and self-centered, sometimes to the extent of becoming somewhat mean. Despite his considerable age, he still sleeps cuddled up with his teddy bear. Nothing is sacred to him, and he plays his games with an earnest sheepishness. His childish directness and honesty, while offensive at times, are his sharpest weapons. The little adventures he gets into usually revolve around the foibles of British life and the comedy of embarrassment. He is practically friend-less (save for his teddy bear), and is an outcast, just like Charlie, the main character of The Kid. Charlie is a tramp living in the slumps of South London who, while walking around one day, stumbles upon a crying baby that had been abandoned on a heap of garbage. Instead of ignoring the desperate cries of the infant or throwing it into the nearest sewer, he displays the more compassionate side of human nature by taking the baby with him and caring for it like a father. When the child is taken is away from him, he naturally gets very upset, and with a child-like recklessness, embarks on a journey to get him back, a process which includes pursuing the orphanage van over rooftops to descend into the back of the truck, then dispatching the official who had taken the child away. These two characters are also similar in their disregard for established values and the possible consequences of their actions. Their quaintness manifests itself in the unconventional way in which they analyze and then  try to make the best out of whatever situation they find themselves in, clearing obstacles and solving problems that come, â€Å"their way†, with a have a never-say-die attitude in their attempts to somehow belong to the society. Both films, being formalistic, reflect the condition of the society at the particular point of time it was made; these â€Å"raw materials† have been slightly distorted, with symbolism and visual exaggeration being used to bring out the core messages their creators aimed to convey to the viewers, while giving the films a comic effect. As Mr. Bean – The Ultimate Disaster Movie was a more recent film – The Kid was made several decades prior to it; the technology available to the creators of each film differed greatly. At the time of The Kid’s production, a thing such as colour television was not heard of and sound had not yet been introduced into the production of films; The Kid was a silent, black-and-white film while Mr. Bean – The Ultimate Disaster Movie was one with colour, sound, and certain special effects such as having its main character, Mr. Bean, falling from the sky as the credits rolled. It would be impossible to create such effects in Charlie Chaplin’s time. Also due to the different eras in which these films were made, the scenario of each plot also differed. In the case of The Kid, it was a film made in the era of the Great Depression and the aftermath of World War 1, and with the twin themes of emotional loss and homelessness being haunting motifs in its plot, it is a poignant social commentary – of the displaced refugee children of World War 1, and for the persons grieving for loved ones whose lives were sacrificed in that war. The opening title, â€Å"A comedy with a smile–and perhaps a tear†, sums it up. This film addressed social and political issues of the day, and that was an admirable feat in itself considering the fact that this film did not have the advantage of synchronized sound for dialogue nor colour for its images. Mr. Bean – The Ultimate Disaster Movie, on the other hand, has its plot based on a much lighter theme. It generally pokes harmless fun at the ‘rigid’ and ‘uptight’ stereotype we have of Englishmen by first depicting a typical Englishman, Mr. Bean himself, in a typically ‘English’ environment, then later putting  him in an ‘international’ environment. Being release in 1997 it is a light-hearted satire of how the more conservative English society reacts to and attempt to adapt to rapidly changing international standards and the shifts in power. The main difference of these two movies is that The Kid aims to bring some cheer to its audiences’ hearts by showing how joy can still be found in the gloomiest conditions (as depicted in the daily lives of Charlie and the child he has adopted) and also to reflect the state of the society while Mr. Bean – The Ultimate Disaster Movie seeks to bring some comic relief into the highly stressful lifestyle of the modern-day individual, by actually letting them laugh at a highly exaggerated, and therefore comic, version of ‘themselves’. As mentioned earlier, the era in which Charlie Chaplin’s The Kid was made did not allow for colour or sound to be incorporated into its production. Being disadvantaged in this area, the actors in the film had to make up for it by emphasizing on facial expressions and body movements, in order to express thoughts and emotions, and also to portray certain unique mannerisms and character traits of the various characters in the story. Modern-day audiences who are unaccustomed to this form of acting might feel uncomfortable viewing films from the silent era, because the actors may seem to them, to be over-acting to an outrageous degree. However, it is also due to the same reason as to why silent movies tend to be more popular than modern-day comedy as overacting is a natural form of comedy. One example would be the fight scene in which Charlie defends the child from the Bully. The moves require both grace and precise comic-timing; Chaplin’s talent was apparent in this scene as he manages to make even a brawl seem funny without the use of colour, sound or special effects. Title were also edited to clarify the on-screen situation to the viewers or add critical dialogue when there was an absolute need to. As for Mr. Bean – The Ultimate Disaster Movie, dialogue is being kept to a minimum. The creators of this movie probably wanted the focus of the viewers’ attention to be Mr. Bean’s immature, self-centered, and sometimes  outright mean persona and how these character traits of his actively contribute to the various sticky situations he often finds himself in. The dialogue in this film is mainly used to depict his mood or immediate response to certain occurrences, and from that, the viewers form a deeper impression of his character. Dialogue is seldom used to make known to the audience the plans the characters has in mind to tackle his problems. Mr. Bean almost always executes his impractical ideas and solutions immediately after he is faced with the problem. This deliberate lack of dialogue somehow suggests the unwillingness to share ideas, the impulsiveness to carry out ideas without consultation, and the complete disregard for the welfare and feelings of others that will be affected by his actions. Suitable sound effects were used to further enhance the various moods of the scenes and these sounds also give viewers a clue of the magnitude and severity of the situation Mr. Bean has once again landed himself in. Both films make use of physical comedy extensively to bring out the comic aspects of their respective characters. The signature â€Å"French-kick† displayed by Charlie when he was with the child was one example. Throughout the movie The Kid, this â€Å"French-kick† motion of Charlie’s is being executed frequently; other actions of this sort are often employed to enhance the overall comic aspect of the movie. In Mr. Bean – The Ultimate Disaster Movie, the use of physical comedy was also evident throughout the entire show, with Mr. Bean trying to resolve his perpetually unceasing string of problems with a clumsy and impractical style of doing so, a style that is typically his. The characters in The Kid had to endure poverty, homelessness, and extreme loneliness; they are exposed to the harsher aspect of life. Mr. Bean, however, had a job and a decent place to live in; the only unhappy moments he ever experiences are when his plans backfire. These moments of unhappiness are very short-lived. Therefore the characters in Chaplin’s film definitely possessed more emotional depth than those in Rowan Atkinson’s movie. Bibliography *http://www.dvdreview.com/fullreviews/bean.shtml *http://www.american.edu/academic.depts/soc/run.html *http://indigo.ie/~obrienh/bean.htm *http://www.american.edu/academic.depts/soc/kid.html *http://www.wikipedia.org/wiki/1921_in_film *http://wso.williams.edu/~dgerstei/chaplin/charlie-the-kid.html *http://math.gc.cuny.edu/Charlie_Chaplin_bio.html *http://www.gltech.org/Death%20of%20a%20Salesman/Dramatic%20Terms.htm *http://www.tvguide.com/movies/database/ShowMovie.asp?MI=38984 *http://www.moviesunlimited.com/musite/product.asp?sku=043041 *http://www.wikipedia.org/wiki/Silent_film *http://guweb2.gonzaga.edu/faculty/wheeler/lit_terms_Q-Z.html#lit.terms.S.Anchor *http://www.epinions.com/content_29557624452 *http://www.historychannel.com/cgi-bin/frameit.cgi?p=http%3A//www.historychann

Sunday, September 15, 2019

The Firestone Tire Controversy

In May 2000, the National Highway Traffic Safety Administration (NHTSA) in the United States issued a letter to the Ford Motor Co. and Firestone Inc. asking for information about the high incidence of tire failures on the Ford Explorer Sport Utility Vehicles (SUVs). During July, Ford analyzed the data on tire failures. The analysis revealed that Firestone Radial 15 inch ATX and ATX II tires produced in North America and Wilderness AT tires produced at Decatur, Illinois Plant had very high failure rates with the treads peeling off.When the tires failed, the vehicle often rolled over and killed the occupants. Firestone amid concerns over tread separation, accidents, injury and death announced a voluntary recall of all Radial ATX and ATX II and Wilderness AT tires. Around 6. 5 million tires were recalled. These tires were original equipment on certain Ford Explorer SUVs, Mercury Mountaineer, Ford Ranger pick up trucks and Mazda Navajo and B-series pick up trucks. The Firestone tire reca ll was perhaps the biggest auto safety crisis in the US history.NHTSA put the death figure in February 2001 at 174 which has risen from 101 deaths reported in September 2000. However, analysts felt that there were as many as 250 deaths and more than 3000 injuries associated with the defective tires. Most of the deaths occurred in accidents involving the Ford Explorer and the victims and their families filed hundreds of lawsuits. In May 2001, Firestone announced that it was severing its ties with Ford and alleged that the problems in the Ford Explorer caused 174 deaths.Firestone alleged that Ford was trying to divert attention from the problems with Explorer. Ford and Firestone seemed to have known about the flaws in the tires for almost a year prior to the recall but it wasn't until NHTSA launched a preliminary investigation that Firestone announced a voluntary recall. Questions were raised about how Ford and Firestone responded to the first evidence of tire problems. Ford officials said that the issue first surfaced in Saudi Arabia, where drivers were prone to deflate their tires for better traction while driving in the desert sand.When they returned to hard pavement, they failed to reinflate the tires and the combination of low pressure and extreme climate led to tire disintegration. Ford replaced the tires on some 45,000 vehicles in the Middle East and in several other countries with extreme temperatures. NHTSA officials felt that Explorers were too heavy for the 15-inch tires. However, there was no definitive evidence to indicate that Ford's design specification for Explorer's tires was to blame.A lawyer representing some of the victims said, â€Å"There are a lot of smoke and mirrors going on, Ford can say it's Firestone's fault, and Firestone can say it's Ford's fault. â€Å"5 John Lampe, Executive vice president, Firestone, said that Firestone would replace any tires found to be unsafe. Susan Sizemore, public relations manager at Bridgestone's US head quarters in Nashville said, â€Å"This is not a recall. It's a customer satisfaction initiative. If necessary, we are replacing those tires with either our tires or a competitor's. Firestone alleged that Ford Explorer without Firestone tires were still experiencing rollover problems. Officials conceded that some of the Firestone tires involved in the recall were apparently world class tires and did not appear to have safety problems but said the tires needed to be included in the recall because of loss of customer confidence in the Firestone tires. The committee investigating the case after hearing from both sides said that there was a need for further analysis by an independent source such as NHTSA about both the Explorer and the tires.In 2001, Firestone announced that it would shut down one of its US plants, which could be its Decatur, Illinois, plant by no later than December 31, 2001. This would eliminate some 1, 500 jobs. Bridgestone recorded a net loss of $ 250. 3 million for the first half of 2001 because of the tire recall. In the first half of 2000, Bridgestone recorded a net profit of 18. 90 billion yen. An extraordinary loss of $ 570 million taken by Firestone in June 2001 to pay lawsuits and clear up other costs related to the tire recall was the main reason behind the loss.Company sourced said that they would try to revive their North American operations by shifting focus to the Bridgestone brand. Shigeo Watanabe, president of Bridgestone said, â€Å"I don't think the Firestone brand will disappear, but the Bridgestone brand will grow. † The recall of 6. 5 million Firestone tires on the Ford Explorer in August 2000 cost Ford about $ 500 million. Explorer sales had plunged 21% in 2001. The company's earnings were expected to sink by 65% in 2001. Ford's share of the US automobile market had fallen by 1. 7 percentage points in 2001 to 23. 1%.Officials at Ford felt that the future of Ford (Explorer) would depend on how customers responded to F ord's reaction to the crisis. One official said, â€Å"My message to consumers is, if you don't think we have behaved in the way the world's leading consumer company should behave, then tell us, because we want to earn that loyalty and respect. â€Å"7 Commenting on Ford's future relationship with Firestone, that official said, â€Å"Given the importance of the relationship between tires and vehicle safety, and the importance of brand perception, how can you put Firestone tires on the new Explorer that comes out next year? â€Å"