Sunday, December 29, 2019

Drug Trafficking Organizations And Drugs - 1296 Words

Drug Trafficking Organizations â€Å"Imagine living in a place where you can kill anyone you wish and nothing happens except that they fall dead† (Morris 216). With drug trafficking organizations people in Mexico live in a world where this is part of their everyday lives. More than 16,600 deaths were attributed to drug trafficking in 2011 (Schedler 6). People live in a world like the Wild West where there seems to be no social control. This is a problem because innocent people are losing their lives over something that they can not control. Citizens throughout Mexico have learned to live with the consequences of organized crime caused by the Mexican drug cartels in their day to day lives. Drug Trafficking Organizations, otherwise called DTO, are organizations that engage in criminal activity revolving around the illegal drug trade. According to Andreas Schedler in his article, The Criminal Subversion of Mexican Democracy, this criminal activity includes the manufacturing of drugs all the way to the distribution of them all over the world (9). This is important because if it was not for drug trafficking and the crimes associated with it, there would not be as much violence in Mexican society. Furthermore, the process of manufacturing drugs likely involves many other illegal activities like the use of dangerous chemicals, access to firearms along with other dangerous weapons, and theft. There are many DTO’s in the country of Mexico. Some have been around for centuries, whileShow MoreRelatedThe Biggest Drug Trafficking Organization1570 Words   |  7 PagesLocated in Colombia, the city of Medellin was one of the biggest drug trafficking organizations in the world since the 1970’s. During the early 1970s the demand for cocaine spreads rapidly in the United States, the limited raw supplies produced in Colombia were build up with coca paste imported from Bolivia and Peru, refined in kitchen laboratories in Colombia, and smuggled into the United States. Medellà ­n criminal networks during the mid-1970s transform the cocaine transportation system from petiteRead MoreThe Cartel : A Powerful Drug Trafficking Organization1783 Words   |  8 Pagesacross state borders which violates states legal control of their borders which is drug smuggling. In the region of North America lies a state that faces struggles everyday with a organization called Sinaloa Cartel. They face battles against this organization for control of the drug market within the state. This cartel plays a huge role within the state by having a huge influence in power compared to other the organizations in the state. The Sinaloa cartel was founded in 1989 which have their base locationRead MoreThe Sinaloa Cartel Is The Premier Drug Trafficking Organization999 Words   |  4 PagesThe Sinaloa Cartel is the premier drug trafficking organization in Mexico. The cartel is based out of Sinaloa, Mexico. Unlike many of the Mexican cartels, the Sinaloa Cartel exports large quantities of multiple drugs into the United States. Pablo Escobar is considered one of the most notorious drug lords in history. Escobar’s cartel was only in charge of exporting cocaine into the United States. The Sinaloa Cartel exports cocaine, methamphetamines, and marijuana into the United States. The leaderRead MoreDrug Trafficking Essay1574 Words   |  7 PagesDrug trafficking has been a major issue not only in this country but across the world. Drug trafficking has a major foothold in South America, more specifically Mexico and Colum- bia. Both these countries have given birth to some of the most notorious â€Å"Cartels† the world has ever seen. From Pablo Escobar to Joaquin â€Å"El Chapo† Guzman, these are just some of the infa- mous men who have established drug trafficking into the multi-billion dollar business it has be- come today. â€Å"Drug Trafficking OrganizationsRead MoreThe Business Of Modern Day Slavery And Drug Trafficking1139 Words   |  5 PagesBusiness of Modern Day Slavery and Drug Trafficking There are approximately 3,287 men, women, and children stripped of their freedom daily. That is equivalent to 136 people per hour. Many are kidnapped from their families, sold by family members to pay off debts or exchanged for drugs. Human trafficking has become the second most profitable illegal business worldwide with the trafficking or smuggling of drugs being at the top of the list. Human smuggling and trafficking with its high demand from bothRead MoreDrug Trafficking877 Words   |  4 PagesDrug Trafficking in the United States Americans like to hide thoughts of the bad in society, one of these thoughts often hid or forget about is drug trafficking. Drug trafficking effects everyone from the one-percent down to the people of poverty. Billions of dollars of drugs are bought and sold, with billions more being spent to fight the trafficking of illicit drugs in the United State. With all the money spent to prevent drug trafficking Americans need to understand the harmful effects. Drug TraffickingRead MoreDrug Cartel : Drug Cartels1688 Words   |  7 PagesDrug Cartel in Mexico Drug cartels have been an issue for Mexico over a century now, according to Congressional Research Service. This issue had led to assassination against innocent people, many individuals have been threaten, murdered and even kidnapped. In the year of 1940, Mexico was a big source of marijuana and heroin which created these big Drug trafficking organizations that still exist today for example; in Tijuana, MX â€Å"The Arellano Felix Organization†, Sinaloa, MX â€Å"Cartel Del Chapo†, â€Å"LosRead MoreThe Impact Of Drug Trafficking And Organized Crime1099 Words   |  5 PagesThe United States has a vast illegal drug market as well as high numbers of people indulging in organized crime. Drug law enforcement personnel face problems when protecting the United States borders to avoid any drug trafficking instances. Drug trafficking involves smuggling of illegal drugs producing states such as Mexico to the consumer markets in other regions within the United States Organized Crime, on the other hand, is the practice of the offense through threats or violence and aims to collectRead MoreThe International War On Drugs976 Words   |  4 Pagessimple: the international war on drugs has been all but successful. Regardless how overwhelming the combative forces against illegal drug trade may be, the combination of a non-authoritative state with powerful and wealthy organized crime syndicates result in overall weak state efficacy. This rise in drug trafficking, along with an increase in local drug production and consumption, is a major challenge in the pursuit of peace, stability and security. The current drug situations in Africa reveal theRead MoreDrug Trafficking1134 Words   |  5 PagesThe international drug trade from Latin American states is having an impact on a global scale. The trafficking of drugs along with corruptness and murder is an international conflict that is being fought daily. There are many aspects of the drug war from Mexico and other Latin American states which have effects on United States policy as well as policies from other countries that participate in the global suppression of illegal drugs. It can be hard to differentiate between conflict and issue

Friday, December 20, 2019

The Analysis Of Culture By Raymond Williams - 838 Words

Global films enable cultures from around the world a stage that they may represent their cultures and beliefs. Many directors embed messages within the film that could represent social issues, or share an identifiable theme. Global films encourage audience’s appreciation for other culture, and empathy; incorporating the message that although the cultures differ, they face similar dilemmas. This analysis will include focal points from the article, The Analysis of Culture written by Raymond Williams. Additionally, this analysis will explore two fundamental key points of interest. First, this analysis will examine how films achieve communicating social issues. Second, research the effects of films that address humanitarian issues. Finally, examine how diverse cultures utilize film to suggest their own local and global involvement from my own perspective as a student. Beginning with Williams, The Analysis of Culture, identifies three â€Å"general categories in the definition of culture† (Williams, 1961). First, is the ideal culture defined as the lives, work, and values of the culture. Second, is the documentary which is the actual evidence of the culture and, social descriptions of a particular way of life. Third, is the social definition of culture which defines traditions and language. Williams clarifies that culture is difficult to define and the above implies his thoughts attributing to the term. Although, many of the films viewed in COM 564 could easily align with allShow MoreRelatedThe And Dissemination Of Cultural Values, Ideologies, And Hierarchies832 Words   |  4 PagesThe analysis on the construction and dissemination of cultural values, ideologies, and hierarchies is as varied as the historian. Again semantics and semiotics, important issues to understand the full web of the â€Å"word-concept† culture, dominate much of the theory and practice. The most common debates are over naming eras and redefining terms like popular, cu lture, popular culture, etc. Despite the debate, the historiography maintains four important foci for the construction of cultural values: industrializationRead MoreArt as a Mirror of Society678 Words   |  3 Pagesshapes perceptions of visual cultures and visual communication. Art is therefore a reflection of a society influenced by ones own self concepts and experiences. – Differences + Value = Meaning society puts to define differences. Though Art is popular culture, John Stoy defines popular culture as an empty conceptual category, one that can be filled in a wide variety of often conflicting ways, depending on the context of use (Cultural Theory and Popular Culture Pg. 1. 1998) ProcessRead MoreLollapalooza and The Alternative Music Culture Essay2441 Words   |  10 Pagesconsuming. In 1991, Lollapalooza, a multi city touring festival in the United States, highlighting alternative culture changed how music was consumed from there on forward. With the popularity of the festival and the highlighting of the alternative culture it represented the music industry took note, not long after the festival and explosion of alternative music hit mainstream music culture. New bands like Nirvana, Pearl Jam, Alice in Chains, Soundgarden, Stone Temple Pilots and bands who had beenRead MoreCultural Theory And Popular Culture1578 Words   |  7 PagesPART TWO After reading chapters 1 through 4 of Cultural Theory and Popular Culture, my understanding of the core ideas presented by John Storey begin with his attempt to map â€Å"out the general conceptual landscape of popular culture† (Storey, pg. 1). He does this by breaking down the term â€Å"popular culture† with other surrounding key terms. I know that popular culture cannot be easily defined or explained, since it is â€Å"a melting pot of confused and contradictory meanings capable of misdirecting inquiryRead MoreHow Does The Media Portray Happiness?1197 Words   |  5 PagesReputation Institute found that 42% of how people feel about a company is based on their perceptions of the company’s social responsibility. The aim of this dissertation is†¦. I will explore societal marketing in relation to happiness. Consumer culture is like a treadmill; people are on a never ending journey or finding happiness. Literature Review Theories: Media effects theory, Functionalism, Symbolic Interactionism, Impression Management, social constructionism, Ritzer’s integration modelRead MoreAustralian Case Study in Corporate Governance – Hih Insurance4824 Words   |  20 Pageson 29 August 2001. To-date several HIH directors have been prosecuted for numerous offences under the Corporations Act 2001, the Insurance Act 1973 and the New South Wales (NSW) Crimes Act 1990. 3. KEY CORPORATE GOVERNANCE ISSUES Based on the analysis of the case, several key corporate governance issues identified in HIH case includes but not limited to the following:- (i) Discipline There was substantial degree of dishonesty, lack of integrity and failure in the senior management and theRead MoreLiterary Analysis - the Law of Life Essay1113 Words   |  5 PagesRunning head: LITERARY ANALYSIS Literary Analysis Sergio Scott Grand Canyon University ENG-353 American Literature II Susan Crannell September 28, 2011 Sergio Scott Susan Crannell ENG 353 September 29, 2011 Literary Analysis Naturalism was a literary movement that took place from the 1880s until the 1940s. It used realism as a mechanism to suggest that social conditions, heredity, and environment had a monumental impact in changing or defining human character. Naturalism exposesRead MoreWhat is Culture? Essay examples1828 Words   |  8 PagesThe first definition of ‘culture’ by Oxford’s Dictionary is ‘art, literature, music and other intellectual expressions of a particular society or time’ (â€Å"Culture,† Oxford’s Advanced Learner’s Dictionary of Current English). Anthropologist of culture, Raymond Williams argued that the term ‘culture’ was first used in reference to the cultivation of crops which was later associated in relation to the cultivation of the human mind, hence the expression ‘cultured/cultivated person’. The noun of processRead MoreThe Convergence Of Old Media With New Media1603 Words   |  7 PagesDysto pianism, Vincent Mosco s â€Å"Myth†, and the notion of Symptomatic technology. It is the intention of this paper to cover each topic in turn, using them to pick apart and examine the sample film. Johnny Mnemonic is the 1995 film adaptation of William Gibson s short story by the same title. The film takes place in the year 2021 and follows the main character â€Å"Johnny,† a Mnemonic carrier with a silicone implant in his head for storing data too sensitive to be sent via the Net, a virtual realityRead MoreReturn On Investment ( Roi )1502 Words   |  7 Pagesback as Biblical times when assessment of captured tribes worth was valued for the cost to keep the prisoner and how much gain they could provide if they were kept alive to work. Biblical methods were not specific as to the elements involved in the analysis but the elementary practice was an accounting of human assessment. Adam Smith, Economist from 1776, claimed that human capital was maintaining the individual through their education, study and /or apprenticeship that would produce a fixed cost

Thursday, December 12, 2019

Data Security Case Study of Snowdenia County Council

Question: Describe about the Data Security Case for Study of Snowdenia County Council. Answer: Introduction Today the people and organizations are living in an interconnected world and are producing a lot of data or information as a result of day to day transactions [9]. This data are very sensitive in nature and can be used against organizations as well as individuals. In present scenario, each and every industry or organization is threatened by intrusion or attacks to its database. This exposure of data due to the intrusion helps criminals to breach the privacy of an individual and can affect the business of an organization [7]. As an administrative governing body, the data in the databases of Snowdenia council is very much sensitive. Hence if this data is exposed publically it can create a huge massacre. This report focuses on different methods to secure the data from the different breach and intrusions that can affect Snowdenia county council such as ARP poisoning, intrusion through WiFi networks. Moreover, the report also comprises discussion about different techniques to secure the integrity, confidentiality and the availability of data. In addition to that, criticism about previous attacks, counter measures that may have prevented the attacks are also discussed in this report. (I) Securing Confidentiality, Integrity and the Availability of the Data for Council Information a. Confidentiality, Integrity and the Availability Confidentiality: The confidentiality of data is about protecting the data from unauthorized or outside the council access. The data at Snowdenia county council has its own value due to its sensitiveness (like tender information, budgets). Since counties are elected governing bodies of an area. Therefore database or workstations may consist of some data that is not intended to expose publically [8]. Therefore, to protect the government documents or tender information, it is important to ensure the confidentiality of data at Snowdenia county council. Several measures can be adopted to do this such as Encryption: The encryption of data helps to ensures that only desired people or authority can read or decrypt the information. In order to ensure confidentiality of data the encryption is widely used in the different organizations [5]. Different security protocols like the SSL/TLS are used by the organizations like Snowdenia council, to ensure the secure exchange of data over internet channel. Other methods like, enforcing file permissions and restricting access to the database can also help in ensuring the confidentiality of data at Snowdenia county council [4]. Integrity: Reliable access to data is essential for most of the applications. If a minor change is neglected in early stages then it can cause loss of huge amount of data in the future [3]. This loss of data affected badly on the performance of the council. The integrity of data is about protecting the data from unauthorized modification or alteration of data from inside or outside of the organization. The integrity of data is important for the proper use of it in different applications. Since, data is valuable to an individual or organization if and only if it is correct [10]. In order to ensure integrity of the data the cryptography plays a very vital role. Other methods like hashing are also used to ensure integrity by comparing the hash code of send and the received message. More significantly the use of GPG to digitally sign data helps in the prevention of unwanted and unauthorized data alterations in database. Moreover, it has to be ensured that data at the organization are cor rectly valued like the configuration of the log files have to be perfect [9]. In addition to that, checking of the integrity of data at different granularity levels is also helpful. Availability: Availability of data refers to protection of data and related systems from unauthorized interference [12]. Ensuring availability of data is all about ensuring timely and reliable access to data and to related systems by the authorized users [3]. Being a governing body it is important that only authorized people of Snowdenia council can access its database. There are two main components that are helpful in ensuring the availability of data to its users. First, rules for the systems related to data. These are ensuring the system that operates on data to deliver data whenever it is needed, and the second one is back up of data to ensure the availability of data in case of system failure or loss of data [5]. For systems, its important to know the users, who need to know a particular data and provide it to them. This process is important to make the data available, since each and every user does need all the available organizational data. b. Policies and procedures used to underpin the security aware operations The following policies and procedures can help in ensuring the security aware operations on the organizational and personal data of the Snowdenia county council 1) In its whole lifecycle, all the organizational data shall be protected in a way that is considered reasonable and appropriate [7]. Also the appropriate level of sensitivity and value should be given to organizational data. 2) Any Information System that is used for storing, processing or transmitting the data shall be secured in a manner that is reasonable and appropriate for security of the data. 3) Individuals who have authority to access organizational data should stick to their appropriate roles and responsibilities. 4) In order to save the data from internal intrusions, it is important to encrypt all the disk data as well as email lists in any system [12]. 5) Use of the SSL (Secured socket layer) in the data collection process also helps in preventing the intrusion or breach to the database. (II) Criticism of the Previous Hacking Problem The hacking of the data base includes, use of the ARP poisoning, password cracking and access via internet Wi-Fi facility. a. ARP poisoning ARP poisoning Attack: This attacks work on establishing connections between the attacker and victim machines [1]. This attack depends on the network messages between them. In this type ofattacks, a malicious actor sends falsifiedAddress Resolution Protocol (ARP) messages over a LAN. This helps in the linking of an attacker's computers physical address (MAC address) with the IP address of a legitimate computer or server on the network of Snowdenia council [2].The main aim of these attacks is to redirect the internet traffic to the attackers machine from councils workstations. Mitigation of ARP attacks: In order to protect its computer network the council may have used the ArpON. This is a portable handler daemon and secures the ARP protocol from any kind of spoofing [8]. Moreover use of the dynamic ARP inspection is also helpful in defending this type of attacks. b. Password cracking Password Cracking: The password cracking can be done in different ways. Some of them are defrauding, user analysis, algorithm analysis etc [11]. For the Snowdenia council mainly the defrauding and algorithm analysis are used to crack the user passwords. In case of defrauding, attacker mails or calls the target and pretends to be a security expert to gain passwords. In case of user analysis, attacker tries to analyze online behavior of target to guess and gain the password of its victim. Mitigation from Password cracking attacks: In order to protect the network from password cracking it is important to educate the users of work stations at council [8]. Use of dynamic passwords is also helpful in this scenario. This technique is about the using a onetime password for users to use their workstations. c. Access via internet Wi-Fi Access via internet Wi-Fi: Even though Wi-Fi networks are easily accessible but at the same time this networks are not safe always. In case of Snowdenia county council the attacker infiltrated the less secured wireless network to steal the data from its database [6]. As a result of using the unsecured wireless network at the Snowdenia county council, the attackers breached its data base using it. Mitigation: The mitigation of the risks related to unsecured wireless networks like , Wi-Fi networks can be done using different techniques [2]. The attacks mainly exploited WPS vulnerabilities of wireless network of Snowdenia council. Therefore the network should be encrypted so that it cannot be penetrated easily by attackers. Moreover by disabling remote access from different connected devices also helps in securing the whole network of Snowdenia county council [1]. Moreover it is suggested that to use a firewall so that, incoming and outgoing data packets can be checked and the suspicious packets can be dropped at the edge of its network. (III) Details of the Auditing Approach to Demonstrate Better Compliance In order to demonstrate better compliance with data protection legislation some of the following approaches can be taken. These approaches includes the following, Appointing someone in the council, who is responsible for compliance The person should familiarize staffs and the leaders of the organization with the Acts, guidance and relevant case laws [2]. The appointed person should audit the daily use of personal data at the organization and check its compliance. More over it is important for council to process the data fairly and lawfully. Other considerations like storing adequate and relevant personal data [4]. In addition to that, data should not be stored for longer periods than its requirement. Conclusion The data breach at the Snowdenia county council caused it a loss of huge amount of organizational as well as personal data stored at the database of it. Therefore the mitigation processes like, use of dynamic passwords, securing wireless networks by preventing remote access, use of ArpON to protect the organizational network of Snowdenia council from ARP poisoning attacks. Moreover, to secure the network and to show the better compliance with the data protection legislation the council should appointed security personnel, who will ensure data audit process inside the organization. All this methods can help the Snowdenia council to protect its database from the further breaches. References [1]D. Srinath, S. S.Panimalar, A. Simla and J. J.Deepa, "Detection and Prevention of ARP spoofing using Centralized Server",International Journal of Computer Applications, vol. 113, no. 19, pp. 26-30, 2015. [2]A. M., W. S.Elkilani and K. M.Amin, "An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries",International Journal of Advanced Computer Science and Applications, vol. 5, no. 1, 2014. [3]S. Nam, S. Jurayev, S. Kim, K. Choi and G. Choi, "Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN",EURASIP J Wirel Commun Netw, vol. 2012, no. 1, p. 89, 2012. [4]H. Ma, H. Ding, Y. Yang, Z. Mi, J. Yang and Z. Xiong, "Bayes-based ARP attack detection algorithm for cloud centers",Tinshhua Sci. Technol., vol. 21, no. 1, pp. 17-28, 2016. [5]M. Ko, S. Oh and K. Lee, "Advanced protocol against MITM attacks in Industrial Control System",Journal of the Korea Institute of Information Security and Cryptology, vol. 25, no. 6, pp. 1455-1463, 2015. [6]U. Gupta, "Survey on Security Issues in File Management in Cloud Computing Environment",International Journal of Computer Applications, vol. 120, no. 5, pp. 22-24, 2015. [7]M. AlZain, B. Soh and E. Pardede, "A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds",JSW, vol. 8, no. 5, 2013. [8]W. Ren, J. Lin, Q. Cao and Y. Ren, "LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing",IJES, vol. 8, no. 23, p. 266, 2016. [9]J. Singh, J. Powles, T. Pasquier and J. Bacon, "Data Flow Management and Compliance in Cloud Computing",IEEE Cloud Comput., vol. 2, no. 4, pp. 24-32, 2015. [10]S. Romanosky, D. Hoffman and A. Acquisti, "Empirical Analysis of Data Breach Litigation",Journal of Empirical Legal Studies, vol. 11, no. 1, pp. 74-104, 2014. [11]D. Gray and J. Ladig, "The Implementation of EMV Chip Card Technology to Improve Cyber Security Accelerates in the U.S. Following Target Corporation's Data Breach",IJBA, vol. 6, no. 2, 2015. [12]C. Huth, D. Chadwick, W. Claycomb and I. You, "Guest editorial: A brief overview of data leakage and insider threats",Information Systems Frontiers, vol. 15, no. 1, pp. 1-4, 2013.