Wednesday, August 26, 2020

Arguing Abortion Essay

Fetus removal is a lawful and vital clinical strategy to have accessible in the United States. Regardless of otherworldly, passionate, or physical convictions, the fundamental truth of any privilege or law is that an individual is allowed to communicate their assessment and to battle for causes, if it doesn't hurt someone else. This idea could likewise be applied to the issue of fetus removal. In spite of the fact that some may contend that a lady who gets a fetus removal is, actually, hurting someone else, clinical examination still can't seem to characterize personhood as occurring in the â€Å"moment of conception.† Personhood (which is the thing that the idea would apply to) is characterized as occurring in the â€Å"moment of birth† (ProCon.org, 2012). In addition, it is bogus to contend â€Å"God† or confidence into any subject influencing human rights in light of the fact that not every person accepts something very similar and there is no confirmation that â€Å"God† exists. However, there are speculations dependent on logical exploration examining the formation of the universe that could recommend that an all inclusive brain must be the maker dependent on the exactness and situation of the systems. Be that as it may, there is no verification of this. There is a detachment of chapel and state to keep confidence and otherworldliness out of laws that oversee lives. The Bible is confidence, yet the Constitution is law. The Bible isn't the administering law of the United States. Subsequently, the contention that â€Å"God† says fetus removal isn't permitted is invalid. By chance, an examination article from ProCon.org gives data on the subject of premature birth, among numerous other dubious themes. The fundamental focal point of this site is to dissect basically a theme and give the great and the revolting perspectives. On the issue of fetus removal it offers a few star life contentions and ace decision contentions alongside video clasps and measurements to back up their proof. Another contention is that fetus removal goes straightforwardly against the expectations of the establishing fathers (as expressed in the Declaration of Independence). The contention utilizes the word â€Å"Creator†, in all likelihood showing a strict meaning. There are two interesting points in the counter of this contention. One, as recently expressed, religion should not be influencing the law of people since individuals are extraordinary, and in this nation are honored with the option to accept what they will. The second is that with everything comes change. The Declaration of Independence was composed a quite a while back and however it’s fundamental message comes through solid and still applies right up 'til today, it is critical to think about the development of society from that point forward. Thusly, in this general public there is erosion over numerous issues. Fetus removal is only one of them. There are a few contentions for and against premature birth. In view of the proof found through examination it has been resolved that premature birth is legitimate and vital for essential human rights. In the legal dispute Roe v. Swim, the 7â€2 Supreme Court choice that found a protected right to security that thus implied a pregnant lady was qualified for have a premature birth until the finish of the main trimester of pregnancy without impedance by any express (The Daily Beast, 2012). This case underpins the appropriate for ladies to have protection in their clinical undertakings just as permits ladies the chance to pick what they do with their body and it’s parts. References ProCon.org. (2012). Premature birth ProCon.org. Recovered from http://abortion.procon.org /#Background ProCon.org. (2012). Hypothetical specialists. Recovered from http://euthanasia.procon.org /believability ranking.php Sanger, L. (n.d.). Citizenium blog. Recovered from http://blog.citizendium.org/?p=383 The Daily Beast. (2012). Ineractive: perusers share their perspectives. Recovered from http:// www.thedailybeast.com/articles/2013/01/04/intelligent perusers share-their- sees on-and-anecdotes about-abortion.html

Saturday, August 22, 2020

A Symbol of Strength and Courage

I happen to be the most youthful of the group. My kin frequently talk about what I call â€Å"the bygone days†, going Into express subtleties of their numerous youth stories of fun and tough situations blended. Their accounts were brimming with fun, fervor, and naughtiness. In every story one or a significant number of my kin's tales would incorporate the difficulty that they had gotten themselves Into, and afterward consistently recount my mother's reaction. Mother would offer you her input (as she remained with her hands on her hips, objecting at you) on whatever insane thought you had, however she would in every case despite everything go to our rescue.Now that I am a grown-up I see Just how bold my mother truly was. I TLD consistently accept that my mother was valiant. At the point when I was youthful, I despised her for a long time for the things that I needed to suffer as a youngster. I was unable to comprehend why certain choices concerning us were made. I said to mysel f when become a mother I will be unique, my kids will have alternatives, our life will be better. In any case, in when marriage should keep going forever, my mother with just a tenth grade instruction wound up bringing up her youngsters generally simplemindedly.My sisters and sibling would frequently portray how my dad's drinking influenced their lives when they were youthful. I was too youthful to even think about remembering those occasions however I was told how mother would rise promptly in the first part of the day and go Into the vegetable fields to work so as to put food on the table for her kids. Afterward, when I tagged along mother worked in the fish business. Everything was exceptionally work escalated work remaining on your feet throughout the day. Be that as it may, mother never whined. My preferred memory is the point at which I would return home from school and my mother would eat arranged and you strolled into a wide range of tasty scents originating from the kitchen .My mother never truly discussed that a great time, she Just gave her kids her adoration for them by guaranteeing we had what we required. What makes my mother incredible? I used to ask myself that exact same inquiry, however not any longer. Since I am a mother of two testing youngsters, I have a universe of regard and appreciation for my mother for the way that she raised my kin and me. The ethics, qualities, and conviction framework that are presently Ingrained In me; I can dare to dream and supplicate are instilled in my youngsters too. I frequently consider my holding and the exercises I gained from my mom.Growing up, in VA, was not the hail thing In ten world My Tie comprised AT Nanning garments on ten line, overflowing with wood for the oven, and siphoning water from the well to bring into the house. Regular doing likewise again and again, I loathed them to such an extent. I was vexed that we needed to live that way. It wasn't until years after the fact that I understood, that my mother was in that spot with us at all times every one of us that we could improve throughout everyday life. Every day I endeavors to improve in school.I additionally, understood that those tasks were making me liable and instructing me hard working attitudes even while I was youthful. I have ideally given to my youngsters my dedicated nature and instructed them obligation also. Mother went through every day of her life indicating people around her the amount she adored Christ. I considered my to be as an encouraging sign and support to me every day of my life. As I think back and reflect over my youth, we experienced some extremely difficult situations. In any case, I can say that my mother let her confidence manage her and keep her sure amidst terrible situations.I never observed y mother cry or get annoyed with the things that we experienced. I do recall her taking us to chapel and helping us to build up a relationship with Christ. I frequently recall times when my mother wou ld sit on the sofa in our front room and she would sing psalms. She didn't have the best voice on the planet yet it didn't make a difference. She would stay there for an hour and sing and record herself on her recording device. At that point she would playback her tunes and chime in. I never found the opportunity to tell my mother, how much that urges me even to this day.She showed me the best way to remain in a costive mood and not be overwhelmed by frustrating circumstances. Mindful, devoted, caring, understanding, submitted, and adoring my mother, not Muhammad All was the best. I'm just heartbroken that it took me such a long time in life to acknowledge it, on the grounds that once I did, there wasn't a lot of time left for me to go through with her. My mother went through her time on earth yielding for her kids and family. As I sat at her burial service and tuned in to all the awesome things individuals said about my mother, I can dare to dream and ask that one day those incredi ble words can be said about me.

Sunday, August 16, 2020

Grading THIS IS THE STORY OF A HAPPY MARRIAGE Essay by Essay

Grading THIS IS THE STORY OF A HAPPY MARRIAGE Essay by Essay In the intro to her collection of essays, Ann Patchett tells us that for much of her career, she considered fiction her art. Meanwhile, the bulk of her nonfiction (shes written pieces for everything from Seventeen Magazine [MUST go through back issues, MUST] to the New York Times and everything in betweenHarpers, Vogue, WashPo, WSJ, Gourmet, Granta, yadda, yadda), all these essays, she considered to be her day job. Which may have been technically true, but this stance on her essays feels like Michelangelo saying, Oh, yeah, I did the Sistine Chapel for the cash, BUT HAVE YOU SEEN MY DAVID??? Patchetts essays are absolutely art, and reading them this past Christmas break was a treat and a half. After giving her essays short shrift for so long, one of her friends convinced Patchett to let said friend comb through her decades of work and put together a collection (thank you Ann Patchetts friend!). And this is why we have the prettiest girl at the collection-of-essays-dance,  This is the Story of a Happy Marriage. Its a little hard to grade these essays because Patchett is SUCH an A student. So Ill grade Patchett against herself. Its boring to grade her against everybody else, it would just be A+, A+++, A+++++timesinfinity+++. So sometimes Patchett gets Bs, even though shes basically the Einstein of personal essays. Go time? Go time! Nonfiction: An Introduction Awesome intro, its really fun hearing about Patchetts relationship to fiction vs. non-fiction and her Seventeen Magazine days A- How to Tell a Christmas Story- A sad and lovely tale about Patchetts sad and lovely relationship with Christmas. Not sure I would have put this as the first piece in collection, but, for obvious reasons such as having nothing to do with the publication of this book, I was not asked. B+ The Getaway Car: A Practical Memoir About Writing and Life NOW were cooking with gas. This is my, if you can believe it, THIRD time reading this piece (I own the Byliner version), and Im still not sick of the story of how Ann Patchetts life had to fall apart in order for her to write her first novel. Guest-starring Grace Paley and Cape Cod in the winter! A+ The Sacrament of Divorce The essay about Patchetts first husband. For such a seemingly quiet and calm prose stylist, she has such a dark and stormy past! A The Paris Match A fight over something stupid that takes place between Patchett and Current Husband. Its like three pages, and it says a LOT about long-term relationships and the power that our past has to affect our present. A- This Dogs Life About Patchett finding her dog soulmate. As sweet as it is short. She has some killer observations about woman and her best friend. A The Best Seat in the House-  Ann Patchett likes opera, she had some keen observations about the art form and its fans, no one gets divorced or ages or dies (my favorites in this collection), moving on. B+ My Road to Hell Was Paved- I LOVED this essay about Patchett taking a road trip through the Great Plains with her second husband while trying to decide whether or not to stay married, mostly because its such a dramatically fraught premise so well realized, but also because I took this exact same road trip and it was not NEARLY so dramatic and I cant help it, I like a heavy pinch of drama in my scrambled eggs. A Tennessee- Ann observes things about her home state, shes good at regional writing, next. B On Responsibility Patchetts grandma and dog are sick at the same time, there are parallels, it works. B+ The Wall- This is definitely one of my favorite essays in the collection. Anns dad is a retired LAPD cop, and Ann trains for the police exam to see if she can pass (shes musing about writing a book on the subject). So constantly entertaining and deeply original, and there is a very powerful emotional punch packed at end. Plus shes really competent at police stuff, which is AWESOME. A+ Fact Vs. Fiction A convocation address Ann delivered (a fun change of pace) about her deceased friend, a memoirist, and the story of the friendship between a memoirist and a novelist. A- My Life in Sales-  About book-touring. Basically, this is how it breaks down for me. All of Anns essays about divorcing and almost divorcing and having elderly friends and dog friends and dead friends get As and basically all of her essays about how hard it is to be a writer get Bs. EVEN THOUGH THEYRE GOOD, theyre just not as good. B The Love Between Two Women-  Patchetts memoir is chosen as a book all these college freshman at a school in South Carolina have to read, and then conservative, religious parents get mad. Its a good essay (if skewing ever so self-righteous), but, and this isnt really Patchetts fault, this is a story I read on Twitter every week and a half. The cities and books change, the sentiments remain the same, so even if when this essay was published it felt original, in the context of now, not so much anymore. B The Right to Read-  The speech Patchett delivered when she went to the college. Again, ever so slightly self-righteous, but some pretty awesome points, and I really like imagining her delivering this. B+ Do Not Disturb Gourmet paid for Patchett to hole up in a hotel in LA, okay. B- Introduction to The Best American Short Stories 2006 Ann makes good points about fiction- B Love Sustained Ann and her grandma, sob. A- The Bookstore Strikes Back Ann opens up Parnassus Books in Nashville when all the other independent bookstores close. I know I said I wasnt going to give Ann As for her essays about being a writer (Getaway Car excluded, thats more about being a waitress/divorcee/almost writer than an actual writer), but this is about her being a writer AND a bookseller, shout. A- This is the Story of a Happy Marriage-  Anns 11-year courtship with/eventual marriage to her husband. I cried all over my library copy. Perfection. A+ Dog Without End Ann saying goodbye to her dog of a million years, whom we first meet in This Dogs Life. Damn, Patchett is good at writing about divorce and dogs. A The Mercies Ann befriends the elderly nun who taught her how to read and write in grade school. This essay hurt so good I almost couldnt take it. A+ Anyone else read this collection? What was your rubric for reading? Did our grades line up? _________________________ Sign up for our newsletter to have the best of Book Riot delivered straight to your inbox every week. No spam. We promise. To keep up with Book Riot on a daily basis, follow us on Twitter, like us on Facebook, , and subscribe to the Book Riot podcast in iTunes or via RSS. So much bookish goodnessall day, every day. Sign up for True Story to receive nonfiction news, new releases, and must-read forthcoming titles. Thank you for signing up! Keep an eye on your inbox.

Sunday, May 24, 2020

Essay on Fear Why Are We So Afraid - 545 Words

Being frightened is an experience you cant buy. We are a society that adores fear. We thrive off of it; creating horror movies, shows like Fear Factor, and the media in general are only a few examples. At the same time there are people who are afraid to leave their house and are possibly restricted to a single room. So what is fear? What is the purpose of being afraid? Why is it that some people will run and scream when they see a snake while others collect and breed them for their love of these majestic reptiles? Fear is a feeling we have all dealt with at one time or another. It is something that we first experience as children, and are conditioned to respond to in many different ways. In a controversial experiment in†¦show more content†¦Fear can also refer to general anxiety, as in Arachnophobia fear of spiders or Claustrophobia fear of closed in areas. These fears occur not automatically from a present or looming danger, but instead a perceived threat, which to some can be just as scary. As said in a German proverb, Fear makes the wolf bigger than he is. For most people fear is a horrible and sickening feeling, which it can sometimes be debilitating. Fear is what shows us how to be careful, because self-protection is primitive. Therefore, it is safe to suggest that we may be afraid to travel into an unlit cemetery for fear of being hurt by something unknown. What could this unknown factor be? A ghost? Perhaps, but these fears are unreasonable. Although this fear of ghosts and other things was established when we were young, the fear never goes away. For we fear being physically hurt in any manner. Fear is a natural thing; it is indeed what keeps us safe and secure. Fear is not a logical thought, but rather an irrational emotion. When a fear is not validated by the presence of actual danger or a threat, or by a realistic cause, and when it is also associated with a continuing evading of the circumstances, which lead to it, it is called a phobia. Phobias occur in several forms. A phobia is a recurring, impractical, paralyzing fear of a specificShow MoreRelatedTransformation Of The Novel The Ghost By Teal Swan920 Words   |  4 Pagestransformation in stories to scare people. Some examples are supernatural, the unknown, and death. Some people are also afraid of murders while some afraid of heights but enjoy scary movies. Someone can go from not liking to be scared to enjoy being scared; that is a form of transformation. A quote by Teal Swan explains what we are afraid of and why. â€Å"We do not fear the unknown. We fear what we think we know about the unknown†. Supernatural transformation is a very popular transformation used to scare peopleRead MoreFear in To Kill a Mockingbird by Harper Lee Essay1582 Words   |  7 PagesFear in To Kill a Mockingbird by Harper Lee Fear is an important force in the novel because it is the cause of most peoples action. The main theme in the book is a result of fear such as the Tom Robinson case and Boo Radley. Ignorance breeds fear which in turn breeds prejudice. Fear is infectious, and each character in the book is affected by other peoples fear. Hence, the people in Southern town are always afraid. Lee is able to explore fear in the novel most effectivelyRead MoreFear Is More Powerful Than Reason1251 Words   |  6 Pagesthat humans are naturally evil. We subconsciously surround ourselves with negativity and apply it into our daily lives. We lie to the people we are closest with and to the people we do not even know. Others take negativity further and commit atrocious acts like robbery and murder. Negativity is perpetual throughout politics as well, there is a continual sentiment of sexism and racism where all white male politicians are on the dominant side. Negative feelings like fear, hostility, and distress are alsoRead MoreDont Fear Change Essay examples1215 Words   |  5 PagesWhat are you afraid of? Many people are afraid of many things such as death, heights, bugs, or public speaking; but the fear of change ranks high in the list of things that trigger anxiety (Radwan). Is there a reasonable answer why people neglect change nowadays? In fact, there is more than one answer to this question. Change has become such an important aspect of our everyday life that it is impossible to ignore. When it comes to the idea of change, most people will readily agree that some individualsRead MoreTaking a Look at the Spiritual Warfare638 Words   |  3 Pageswarfare is not just to simply unknown. No. Spiritual warfare is a daily practice of those who believe in Jesus Christ as Lord and Savior. Ephesians 6: 12 For we wrestle not against flesh and blood, but against the rulers, against the authorities, against the powers of this dark world, against spiritual wickedness in high places. The enemy we face is not a man but a demon with all his minions. Who is actually the devil and his friends? They are a third of the angels with the boss named Lucifer whoRead MoreDeath Is The End Of Death1688 Words   |  7 PagesThere Is Nothing To Fear In Death. Everybody will die at some point. I know death is coming and there is nothing to fear about it because I believe that there is nothing about it on the other side to be afraid of. I was content, perfectly, to be precise before I was born and I believe it will be the same state even with death. In this essay, I will talk try to talk about why there is nothing to be afraid of in death. It is evident that death cannot be experienced, in the physical form. This is becauseRead MoreThe White Mans Fear Depicted in Cry, the Beloved Country by Alan Paton830 Words   |  4 Pagesuses a motif and symbolism to demonstrate the idea that bondage of both the natives and the Afrikaners is prolonged in South Africa because of the whites’ fear. In the middle of the passage, Paton uses the motif of fear to explain why the Afrikaners are afraid. Paton shows this message when he says, â€Å"[Salvation] lay far off because men were afraid of it†¦of [Kumalo], and his wife, and Msimangu, and the young demonstrator.† All the people listed are native Africans. All of them strive for a change toRead MorePsychology: Hylophobia or Nyctohylophobia Essay545 Words   |  3 PagesFear of forests is very common among all human beings not only in the past, but also nowadays. First of all, it is dangerous in dark forests because there might be very dangerous animals inside. For example, wild boars and bears always appear in the forest. Sometimes they are so strong that several hunters can’t take one down. It seems to be an impossible mission for a man to go into a huge forest alone without being armed. That is why people are afraid. Secondly, people still regard forests as aRead MoreAnalysis Of An Occurrence At Owl Cree k Bridge974 Words   |  4 Pageswith death. We can see this through the common ideology of death, how Peyton explains his surroundings, and the outcome Peyton imagines. Leading me to believe, Peyton Farquhar is in fact terrified of death. Throughout life we live with this mentality that we are invincible. Why we do this? We have a mind, we have a body, and we have a fear. Fear of no longer existing, and when we don’t exist, there is nothing to fear about, making death the conqueror of fears, the ultimate fear. Because, we will beRead More Importance of Fear in The Lord of the Flies Essay1167 Words   |  5 PagesImportance of Fear in The Lord of the Flies   Ã‚  Ã‚  Ã‚  Ã‚   The boys in the book, The Lord of the Flies, are controlled by their fear of the beast.   This fear is not of the beast itself, but of the unknown. It comes from not knowing whether or not a beast exists.    The children start as one united group.   They are a community in their own.   Slowly, rules started to get broken, individuals began to leave, and the group broke apart.   The one thing that causes this break-up is the beast. The

Wednesday, May 13, 2020

Legendary Detective Thomas Byrnes

Thomas Byrnes became one of the most famous crime fighters of the late 19th century by supervising the newly created detective division of the New York Police Department. Known for his relentless drive to innovate, Byrnes was widely credited for pioneering the use of modern police tools such as mugshots. Byrnes was also known to get very rough with criminals, and openly boasted of having invented a harsh interrogation technique he called the third degree. And though Byrnes was widely lauded at the time, some of his practices would be unacceptable in the modern era. After attaining widespread celebrity for his war on criminals, and becoming chief of the entire New York Police Department,  Byrnes came under suspicion during  corruption scandals of the 1890s. A famous reformer  brought in to clean up the department, future president Theodore Roosevelt, forced Byrnes to resign. It was never proven that Byrnes had been corrupt. But it was evident  that his friendships with some of the wealthiest New Yorkers helped him amass a large fortune while receiving a modest public salary. Despite ethical questions, there is no question Byrnes had an impact on the city. He was involved with solving major crimes for decades, and his police career aligned with historic events from the New York Draft Riots to well-publicized crimes of the Gilded Age. Early Life of Thomas Byrnes Byrnes was born in Ireland in 1842 and came to America with his family as an infant. Growing up in New York City, he received a very basic education, and at the outbreak of the Civil War he was working at a manual trade. He volunteered in the spring of 1861  to serve in a unit of Zouaves organized by Col. Elmer Ellsworth, who would become famous as the first great Union hero of the war. Byrnes served in the war for two years, and returned home to New York and joined the police force. As a rookie patrolman, Byrnes showed considerable bravery during the New York Draft Riots in July 1863. He reportedly saved the life of a superior officer, and recognition of his bravery  helped him rise in the ranks. Police Hero In 1870  Byrnes became  a captain of the police force and in that capacity he began  investigating noteworthy crimes. When the flamboyant Wall Street manipulator Jim Fisk was shot in January 1872, it was Byrnes who questioned both victim and assassin. The fatal shooting of Fisk was a front-page story in the New York Times on January 7, 1872, and Byrnes received prominent mention. Byrnes had gone to the hotel where Fisk lay wounded, and took a statement from him before he died. The Fisk case brought Byrnes into contact with an associate of Fisk, Jay Gould, who would become one of the richest men in America. Gould realized the value of having a good friend on the police force and he began feeding stock tips and other financial advice to Byrnes. The robbery of the Manhattan Savings Bank in 1878 attracted enormous interest, and Byrnes received nationwide attention when he solved the case. He developed a reputation for possessing great detective skill, and was placed in charge of the detective bureau of the New York Police Department. The Third Degree Byrnes became widely known as Inspector Byrnes, and was viewed as a legendary crime fighter. The writer Julian Hawthorne, the son of Nathaniel Hawthorne, published a series of novels billed as being From the Diary of Inspector Byrnes. In the public mind, the glamorized version of Byrnes took precedence over whatever the reality might be. While Byrnes did indeed solve many crimes, his techniques would certainly be considered highly questionable today. He regaled the public with tales of how he coerced criminals into confessing after he outwitted them. Yet theres little doubt that confessions were also extracted with beatings. Byrnes proudly took credit for an intense form of interrogation he termed the third degree. According to his account, he would confront the suspect with the details of his crime, and thereby trigger a mental breakdown and confession. In 1886 Byrnes published a book entitled Professional Criminals of America. In its pages, Byrnes detailed the careers of notable thieves and provided detailed descriptions of notorious crimes. While the book was ostensibly published to help fight crime, it also did much to bolster the reputation of Byrnes as Americas top cop. Downfall By the 1890s Byrnes was famous and considered a national hero. When the financier Russell Sage was attacked in a bizarre bombing in 1891, it was Byrnes who solved the case (after first taking the bombers severed head to be identified by the recuperating Sage). Press coverage of Byrnes was typically very positive, but trouble lay ahead. In 1894 the Lexow Commission, a New York State government committee, began investigating corruption in the New York Police Department. Byrnes, who had amassed a personal fortune of $350,000 while earning a police salary of $5,000 a year, was questioned aggressively about his wealth. He explained that friends on Wall Street, including Jay Gould, had been giving him stock tips for years. No evidence was ever made public proving Byrnes had broken the law, but his career came to an abrupt end in the spring of 1895. The new head of the board which oversaw the New York Police Department, future president Theodore Roosevelt, pushed Byrnes out of his job. Roosevelt personally disliked Byrnes, whom  he considered a braggart. Brynes opened a private detective agency which gained clients from Wall Street firms. He died of cancer on May 7, 1910. Obituaries in the New York City newspapers generally looked back nostalgically on his glory years of the 1870s and 1880s, when he dominated the police department and was widely admired as Inspector Byrnes.

Wednesday, May 6, 2020

Inrtoductiontolegal Research-Unit7.Doc Free Essays

Unit Seven Assignment John Mathis Kaplan University Professor Scripps April 16, 2013 Unit Seven Assignment John Mathis – Paralegal April 16, 2013 Mike Jones Town Manager Dear Mr. Jones, Regarding your town’s concern that the drinking water may contain too high of lead levels, please be advised that the federal law designed to make sure drinking water is safe is the Safe Drinking Water Act (1974) which enabled the Environmental Protection Agency to establish drinking water standards. The National Primary Drinking Water Regulations (NPDWR) for Lead and Copper, 40 CFR  §141 and 40 CFR  §142 which regulates lead in drinking water. We will write a custom essay sample on Inrtoductiontolegal Research-Unit7.Doc or any similar topic only for you Order Now The main parts of this regulation are Maximum Contaminant Levels (MCLs) as well as Maximum Contaminant Level Goals (MCLGs). A PDF file of the National Primary Drinking Water Regulations (NPDWR) for Lead and Copper, 40 CFR  §141 and 40 CFR  §142 may been downloaded or viewed at: http://www. gpo. gov/fdsys/pkg/FR-2013-02-13/pdf/2012-31205. pdf Today, the majority of the nation’s water systems comply with the National Primary Drinking Water Regulations (NPDWR) for Lead and Copper. The majority of systems that do not are small town systems in rural areas. The regulations are enforceable standards for public water systems. According to the E. P. A. public water systems â€Å"provide water for human consumption through pipes or other constructed conveyances to at least 15 service connections or serves an average of at least 25 people for at least 60 days a year. † Therefore, NPDWR applies to your towns water system serving a population of approximately 20,000. If you have any additional questions or concerns, please do not hesitate to contact me. Yours truly, John Mathis – Paralegal How to cite Inrtoductiontolegal Research-Unit7.Doc, Papers

Monday, May 4, 2020

Threat Intelligence to Executive Samples †MyAssignmenthelp.com

Question: How to communicate Threat Intelligence to Executives? Answer: Threat intelligence communication is very key in ensuring that proper measures have been taken before attacks occur. Discovering threats is one thing and propagating the threat to the relevant executive for proper measures to be taken is totally a different thing. This involves making the threat actionable for the targeted business. The communication under discussion is vertical in most cases, whereby the issue is escalated to higher authorities up to the executives that make the necessary decisions. The most crucial thing in communicating the threat efficiently and effectively is to do a comprehensive analysis of the business under the risk. Analysis may involve a close scrutiny of the operations and transactions of the business both internally and externally. It evaluates the security measures and mitigations that the business has put in place to compact any potential threat. (Franolich, 2017 ) After an evaluation, any business executive desire a solution rather than a problem. Therefore, for a better communication of any threat, a breakdown of possible solutions must be outlined and suggested to counter attack the identified threat. A demonstration of the vulnerabilities and weak points that attackers can use to gain access to the system is a useful step to win executive trust in the intelligence that one is putting across. Moreover, a demonstration of the solution to combat the problem at hand should be suggested. By showing the executives the consequences attached to threats as well as explaining the solution towards it can convince them to take action to the identified threat. Cybercrime in social media grows at an alarming rate The number of social media platforms have increased at a very high speed considering the increase in innovations and inventions all over the world. These platforms host very many people that interconnect on a daily basis through messages, chats and mails. However, these networks many vulnerabilities and weakness that hackers can use to penetrate into and perform malicious operations. With the number increasing up to 70% increase in six months, recorded Cybercrime events are one click away on the internet. Malicious individuals take advantage of these social media platforms because they are free, easy-to-use, and offer a global reach (Bleau, 2016). They launch fake accounts and website of well-known domain names such as Google, Amazon, Alibaba, etc. to redirect online users to malicious web contents including pornographic sites. In the recent past, many fake accounts of popular individuals have attracted many unknowledgeable internet users to follow them which lead them to presumably official accounts contents. The increase has been majorly influenced by the need of the every device and every person on the whole globe to interconnect and share resources. Fundraising accounts that are created on social media platforms have been intercepted and the credit details altered to redirect the raise funds to anonymous personnel. The internet community are face with the challenge to innovate security mechanisms to identify and expose any Cybercrime attacks. Every online user has a responsibility to be vigilant and observe preventive measures that doesnt expose them or their data to hackers. Moreover, social media platforms have a role to enforce security procedures to protect their users data from being accessed by malicious individuals. Cyber Body Language Cyber Body Language or Digital Body Language is similar to facial expression or behavior a user makes when interacting in the cyber world. Cyber Body Language is best understood as Context-Awareness where a device or software is designed, primarily or partly, to analyze the behavior or pattern of the users and apply information gathered to automatically assert products, services, or other purposes such as security monitoring (ZUHRI, 2017). With the increasing number of internet users who spend a lot of time online, there has been a demand to understand and identify users by the websites they visit, the web applications they use, the posts and comments they make in social media platforms. The comprehensive ability of cyber body language involves first being aware of the context an online user is in. This involves understanding the provided device or the use application in order to gather and synthesize the context information. Gathering the users behavior online is achieved by having context awareness systems which analyze and record the users operations in that particular context. A successful context awareness system is achieved by scrutinizing the posts that users send to social media platforms including images and videos. Similarly, a series of comments and emotional emojis attaches a particular contextual event to a certain reaction by a certain user. However, understanding cyber body language by applying context awareness system has been subjected to the breach of users privacy. This is considered as collecting personal information without the consent of the users. The collected data on the other hand has been suspected to be sold out to organizations that advertise to users according to the intelligent statistics made by the context awareness systems Biometrics are the future of security Authentication is one of the core pillars of security enforcement. It describes the process of verifying that they are the one who they say they are. There are many implemented mechanisms to authenticate use to systems and applications. These procedures have proven to be inefficient to novices and vulnerable to malicious programs that brute force into the safeguarded application or register key logging activities to get personal information of users. The most common implemented authentication system is the username and password (UNP) model. This model registers a user to a system which in-turn logs in a user through matching username and password. Unfortunately, this model has forced online users to reuse their credentials which increase their vulnerability to malicious attacks. Two-factor authentication models have proven a more secure solution but has a drawback for its failure to provide a suitable user experience. The engagement of biometrics of voice recognition systems and fingerprint scans have provided a more secure solution to authentication problem which is less vulnerable to hacks and more convenient to all levels of users. The implementable biometric authentication system is considerably simplified and highly accelerated to access systems with ease. Biometrics are arguably the future to securing any basic products in the future, whereby any personal information and credit card information will be linked to personnel biometrics to grant them access to social amenities. When these fields are mastered, biometric-powered multifactor authentication will finally unify the age-old opposing forces of convenience and security, and a brilliant and incredibly secure end-user experience will be established(Team2, Digital ID Biometrics are the key to marrying security and convenience, 2017). Integration Technologies promise a more reliable security Integrated technologies are a combination of two or more set of security models that rely each other in order to grant access to a certain facility or service. Over years, independent technologies have not been trusted in offering a safer security to access of services. When a single security model is compromised the whole system is compromised. Organizations have opted to secure their resources by implementing integrated technologies whereby a series of access codes is given to different people who have to authorize and authenticate the access to the system. An integration of cutting edge biometric recognition technology and key management systems is offering the very highest levels of security for organizations managing large number of priority keys (Team2, 2017). In addition to biometric recognition security access codes such as fingerprint scans or voice recognition systems, organizations have added a verification confirmation of personal identification numbers to grant access. It offers a more reliable security system because without correct series of security pass codes, one cannot be able to bypass the lock system. Moreover, more critical systems demand that more than one person is given a portion of the pass codes, which means that all the personnel having the keys have to authorize the access for a consistent, correct and complete access key. Other integrated technologies have deployed a system that notify the system administrator in case of any authentication attempt to the system. A history of all authenticated users is kept in order for tracking any unusual behavior or intrusion into the system during a particular session. Intrusion Detection Systems and Intrusion Prevention Systems are among these integrated technologies that detect any intrusion and prevent them accordingl Unique ways to protect yourself from DDoS attacks Distributed Denial of Service (DDoS) attacks have always been a problem over the years to organizations that have their presence on the internet. Many companies have been face with this viral attack, it has proved to be one of the worst pandemic to the cyber world. Many solutions have been presented but DDoS attacks are notoriously still increasing(Team2, 2017). A few ways to protect oneself from these attacks include: Implement Proxy Protection Proxy protection hides real time IP address from any malicious attacks by presenting an extra layer of security which DDoS attacks would crack before launching its attacks. Its not only a protection mechanism but also a performance enhancement protocol. Block spoofed IP Addresses It is recommended that once IP Addresses have been spoofed, one blocks them. Spoofed IP Addresses are vulnerable to potential future attacks. Allowing data packets from trust hosts is a sure way to ensure that malicious data does not corrupt the system. Monitor Traffic Levels Distributed Denial of Service attacks tend to send a lot of traffic to a targeted route in order to clog the network so as to prevent legitimate transmission of data to allowed channels. The network administrator has to install Traffic Monitoring system to detect any unusual traffic over the network and prevent it accordingly as well as sending alerts. Monitor interconnected devices DDoS attacks have been known to distribute easily from one device to another. A complex system with different interconnected devices is more vulnerable than an independent system. To prevent DDoS attacks from attacking an entire system, a routine monitoring of all interconnected devices is necessary to isolate any susceptible device. The hidden nature of The Dark Web The internet has presented the world with many positive good reasons for its existence but at the same time, it has presented us with a platform that it is frequently associated with financial fraud, file sharing and data breaches, including the sale of details from identity theft (Team2, 2017). It comprises of publicly accessible websites that are anonymously hidden on the internet by the use of encryption technologies. It is a place where criminals conduct their illegal business of selling drugs, weapons, exchange stolen goods and other unhuman activities. The data that hosts the contents of the dark web are stored in random encrypted computers interconnected all over the world that make it hard to unravel their source of information. File sharing has been at the fore front goal of the Dark web where leaked Government secrets are shared over the internet, credit card details of individuals that have been hacked are sold at fee in order to commit financial fraud. Illegal business agreements such as selling of narcotic drugs is highly conducted in the hoods, pornography and child pornography is promoted and done using the same platform. Individuals on the internet are encouraged to protect their data by following best security practices whenever they use the internet. Checking social media settings often is a good step to secure personal data as well not sharing critical information publicly is recommendable. Changing passwords regularly is also a good move to bar hackers from accessing unauthorized system. ATM Black Box Threatens Banking. ATM Black Box attack is whereby criminals identify access points in the physical architecture of the ATM that would grant them access to cables or ports allowing them to attach a laptop to the internal computer of the ATM (Warner, May 20, 2017). This attack has been witnessed in the recent past to target Automated Vending Machines by manipulating the vulnerabilities and weaknesses in the system architecture of the machines. The new attack has been influenced by the potential transmission of commands when accessing the interconnected wires to the core operating system. After access to the interconnected wires, a laptop is usually attached and which in turn issue commands to the ATM resulting to the payout and manipulative actions to the cash system in the machine. The technique of causing an ATM machine to dump all of its cash is called "Jackpotting." This mechanism is majorly done after the hackers access to the system through supervisor mode of safe mode. These modes grant the hacker access to issue commands that dump all the cash from the ATM machine physically or send them to other distributive channels. The concern rather has not been to the ATM Computer but the cables that connect to the dispenser. This therefore allows the connected laptops malicious program to run commands to the dispenser that execute commands from the ATM machine, thus giving orders to dispense bills or cash out the machine. Mitigation guidelines have been provided by Expert Group on ATM Fraud (EGAF) to combat ATM attacks. These procedures outlines measures to conduct Threats Assessment to all possible ATM attacks. Replacement Touchscreen can hack a Phone. The rise of mobile smart phones all over the globe has given hackers a new platform to target data and programs through mobile phones. Replacement Touchscreen is one of the upcoming hardware implant that hackers use to launch malicious programs to phones by embedding malware programs in the replaced screens (Schneier, 2017). This attack has been influenced by the high number of screen breakages that require replacement at one point in time. By manipulating this possible vulnerability, hackers can install malicious apps, record the key logs of keyboard inputs and send them remotely. The programs can record passwords and personal identification numbers of financial applications, take pictures and videos of the surrounding environment through the screen and in turn email them to the attacker. Unlike most of the attacks, replacement of touchscreen attack is not easily identified by the owner of the phone, which leaves them unaware of any suspicious behavior of the phones operations. The malware can run manipulative programs to the phones operating system to alter the normal functionalities of the installed programs, change passwords and perform unauthorized actions to social media platforms. It is upon people owning smart phones to be vigilant to any hardware modification of their phones once they are repaired. It is therefore recommended to ensure that any hardware implants to smartphones is conducted by the phones manufacturer with official branded parts, rather than street persons who may put phones to possible vulnerabilities that may cause more harm than rectification. Say No to Cyberbullying Cyberbullying is whereby on internet user abuses, bullies, intimidates, despises or look down upon another user through the use of text messages sent via mobile phones online. Cyberbullying has been experienced by children worldwide, which is facilitated by the raise of many different social media networks, children have access to other interconnected users online. Many victimized children have been affected negatively by this cybercrime attack which leads them to conduct activities against their will or depict unusual behavior to other children. Research has it that 90% of the children experiencing cyberbullying never tell an adult. According to the American Academy of Pediatrics Clinical Report, being the victim of school bullying or cyberbullying is associated with substantial distress, resulting in lower school performance and school attachment(Markozashvili, 2017 ). This attacks effects are detrimental to children both mental, physical and social lives. Many campaigns have been launched to raise awareness of the cyberbullying consequences to children. Although many countries have laws prohibiting harassment and stalking, they have fallen short of addressing cyber bullying. Technology and Telecommunication companies should enforce appropriate security measures regarding children using services online. Procedures and guidelines should be documented in Policy Acts to ensure that any online service provider to children adhere to the provided acts. It is therefore a collective responsibility of the entire society to take arms to combat this attack by prohibiting cyberbullying in all sides. The increasing numbers of this attack online poses a great danger to the coming generation, a generation that will have a domino effect to other generations to come. The effects of this attack References Schneier, B. (2017). Hacking a Phone Through a Replacement Touchscreen - Schneier on Security. com. Retrieved 7 September 2017, from https://www.schneier.com/blog/archives/2017/08/hacking_a_phone.html Franolich, J. (2017). SANS Digital Forensics and Incident Response Blog | Three Steps to Communicate Threat Intelligence to Executives. | SANS Institute. Digital-forensics.sans.org. Retrieved 7 September 2017, from https://digital-forensics.sans.org/blog/2017/05/22/three-steps-to-communicate-threat-intelligence-to-executives Markozashvili, D. (2017). Campaign Art: Raise your voice against cyberbullying. People, Spaces, Deliberation. Retrieved 7 September 2017, from https://blogs.worldbank.org/publicsphere/campaign-art-raise-your-voice-against-cyberbullying Bleau, H. (2016). Cybercrime in Social Media Grows 70% in Six Months. com. Retrieved 7 September 2017, from https://www.rsa.com/en-us/blog/2016-12/cybercrime-social-media-grows-70-six-months Team2, D. (2017). Cyber Body Language. com. Retrieved 7 September 2017, from https://digitalforensicsmagazine.com/blogs/?p=2200 Warner, G. (2017). Europol Announces 27 ATM Black Box arrests. blogspot.co.ke. Retrieved 7 September 2017, from https://garwarner.blogspot.co.ke/2017/05/europol-announces-27-atm-black-box.html Team2, D. (2017). Digital ID Biometrics are the key to marrying security and convenience. com. Retrieved 7 September 2017, from https://digitalforensicsmagazine.com/blogs/?p=2111 Team2, D. (2017). Integrated Technologies are the Key. com. Retrieved 7 September 2017, from https://digitalforensicsmagazine.com/blogs/?p=1972 Team2, D. (2017). DDoS Protection: 14 Unique Ways to Protect Yourself from DDoS Attacks. com. Retrieved 7 September 2017, from https://digitalforensicsmagazine.com/blogs/?p=1903 Team2, D. (2017). The Dark Web explained what does it mean for online security?. com. Retrieved 7 September 2017, from https://digitalforensicsmagazine.com/blogs/?p=1893