Beruflich Dokumente
Kultur Dokumente
In this age where the use of computers and networks related to them has become
commonplace, there has developed problems concerning cyber security. Cyber
security is an important factor to be considered if one is to be able to protect
oneself from malicious people and software from the internet. Most of the threats to
computer networks come from the internet and these are often intentional, having
been developed by people with malicious intent. Cyber security is, therefore, an
attempt by individuals to protect their personal information and other digital assets
from attacks from the internet.
Cyber security involves various steps the most important of these being an
individuals understanding of the different forms of attacks that they are likely to
encounter. Once one has knowledge of this, then it is his or her responsibility to
ensure that they have put in place the best security system they can get their
hands on. There exist different types of threats and these can be considered to be
of varying levels and risks to an individuals personal information in their
computers. The higher the possibility of an attack, the more advanced the security
system that is to be put in place to ensure that the threat is minimized.
Cyber security involves dealing with threats that range from malicious codes, which
are known as malware and spyware, to computer viruses. Some of these viruses are
so serious that they have the ability to erase entire operating systems of
computers. These viruses also enable hackers to have access to all the data stored
in the infected computers, ensuring that they have access to information, which can
be used for personal gain.
It is, therefore, necessary for individuals to avoid such intrusion into their computer
systems by having the best cyber security systems. These involve the acquisition of
antivirus software that is reliable as well as frequently checking this software to
ensure that they are preventing attacks. The software has to be frequently updated
so that there is an assurance that it is working at its full capacity, hence additional
security against attack. It is important to ensure that individuals are conscious of
their cyber security because it is not known when a threat is likely to be
encountered.
The importance of cyber security in modern Internet age
The internet has become the integral part of todays generation of people; from
communicating through instant messages and emails to banking, travelling,
studying and shopping, internet has touched every aspect of life. With the growing
use of the internet by people, protecting important information has become a
necessity. A computer that is not having appropriate security controls can be
infected with malicious logic and thus any type of information can be accessed in
moments. Number of infected Web Pages and malicious websites can be seen every
day that infects the computer and allow hackers to gain illegal access to other
computer systems.
Hacking of important data, network outages, computer viruses and other cyber
related threats affect our lives that range from minor inconvenience to serious
incidents. Cyber threats can be caused due to negligence and vulnerabilities, or
unintentional accidents. Nevertheless, they can also be planned or intentional, like
hacking or access by unauthorized users. The main objectives of such type of
system attackers or hackers are to steal confidential information, to make illegal
monetary transactions, to destroy or to change data and the like. System attackers
can be terrorists, crackers or recreational hackers. They have a variety of tools that
can harm or infect the computer; usually they use malicious logic or virus to gain
unauthorized access to a computer. Opening email attachments that carry the virus,
clicking malicious links or websites or unintentionally downloading a dangerous
program are common ways through which a computer can be infected and data can
be stolen.
As the number of data networks, digital applications, as well as internet and mobile
users are growing, so do the chances of cyber exploitation and cyber crimes. Even a
small mistake in securing data or bad social networking can prove to be extremely
dangerous. If accounts are not properly secured, it makes easier for hackers or
unauthorized users to spread viruses or social engineered attacks that are designed
to steal data and even money. Such types of issues highlight the need for cyber
security as an essential approach in protecting and preventing data from being used
inappropriately.
In todays dynamic environment, cyber security has become vital for individuals and
families, as well as organizations (such as military, government, business houses,
educational and financial institutions, corporations and others) that collect and store
Cyber security is equally important for local, state, and central government as these
organizations maintain a huge amount of confidential data and records concerning
the country and its citizens. Yet several government organizations face difficulty in
protecting data because of inadequate secured infrastructure, limited funding and
lack of security awareness. Stealing of confidential data or sensitive information,
digital by terrorists from government organizations, as well as digital spying can
lead to serious threats on a country. For this reason, cyber security is of paramount
importance for government organizations also and is a vital asset to the nation
The increasing use of the internet and social media has made cyber security even
more important that it was before. Growing cyber threats such as data theft,
phishing scams and other cyber vulnerabilities demand that users should remain
vigilant about protecting data. It is essential to understand the varied type of risks
and vulnerabilities that exists in the Internet world. For every user, it is important to
think before connecting to someone using online medium. Users should also think
prior to sharing any information with other users through the internet.
(h) Make sure web servers running your public site are phYSically separate and individually
protected from your internal corporate network.
(i) Protect your database. If your website serves up dynamic content from a database, consider
putting that database behind a second interface on your firewell, with tighter access rules than the
interface to your server.
j) Back up your website after every update, so you can re-lauch it immediately in case of a malacious
defacement.
Besides awareness and any matter should be reported immediately to the police, it is also important
that the user must try and save any electronic information trail on their computers.
(b) Both Technology and Computer Trainings : Police must introduce compulsory computer training
to all its officers involved in detection, investigation and prevention of cyber crimes. Such training
should include both computer and technological trainings. In the lack of appropriate, technological
and computer trainings police personnel may commit serious error in the course of their duty. For
example, Mumbai Police once raided a house for alleged cyber crime but seized only monitor and
not the CPU (Central Processing Unit). The police officers, therefore, must have the adequate
technical knowledge. All persons involved in both prosecution and judicial duties must have
adequate technical knowledge to be able to perform the work of prosecution and adjudication
properly.
(c) Ability to Preserve Evidence and Present it Before the Courts: The task of collection of evidence
in the paperless transaction of cyber world have become a challenging job. It differs from the
traditional forms of evidences. It is, therefore, now essential that the legal system of present day
must change so that the investigators may be able to search, collect, maintain, preserve and present
it before the courts in a fair and proper manner. It is necessary because only well skilled personnel
can handle computer datas so that there may not be the risk of damaging or modifying the original
data.
(d) Involvement of the International Nature of Problem: In order to deal with cyber crimes, the
investigation must be able to understand and deal with international issues, including extradition,
mutual assistance, concerned laws, etc. Due to the global nature of cyber crimes, the investigators
are required to have fair knowledge of laws of evidence, criminal procedure and data protection of
other legal, jurisdiction while pursuing international investigation regarding cyber crimes.
(e) Rights and Priviledges of Involved Parties: UN further envisages that there should be training
programmes for the personnels involved in the cyber crimes' investigation and adjudication so that
they may be aware towards the rights and the priviledges involved in the cyber crimes. UN also
desires that the Criminal Justice Administration also must be sensitive towards this problem. This is
necessary because the credibility of the enforcement agencies involved in various jurisdiction
depends upon their equitable application of law. If aspect of human rights and privileges are taken
into consideration, this gesture will help in winning confidence of the people in general in the
administration and as a result the victims and others coming into the knowledge of cyber crimes shall
come fonvard with information and cooperation.
Some private organisations and universities have also come forward for strengthening international
cooperation for the sake of checking cyber crimes. Stanford University, for example, has organised a
conference on International cooperation to fight against terrorism and cyber crimes in December,
1999 and resolution was introduced in August, 2000.3 The international organisations, such as
Interpol, are also making efforts in the field. Interpol organised first training camp to train
investigators of cyber crimes in 1981. Thereafter several seminars were organised in different parts
of the world.
the children undergoing treatment here, "They are suffering from depression, nervousness, fear and
unwillingness to interact with others, panic and agitation. They also have sleep disorders, the shakes
and numbness in their hands." Further says, "All the children here have left school because they are
playing games or in chat rooms every day. "5
Popular computer games for children having hidden sex trips are also producing adverse effects on
their mind. For example, the latest version of a popular game called 'The Grand Theft Auto (GTA)'
looks like any other action packed 3D animation fare in which the player goes on a mission down city
lanes. The innocent user will play within the apparent boundaries of an imaginary city, modelled after
Los Angles. But many young users all over the world, including India, are downloading a free patch
(a set of software codes, usually created by a hacker) from the internet that suddenly gives access to
hidden alley. Dr. Harish Shetty, a noted psychiatrist, says, "Parents do not know much about the
games that their children are playing. In fact, some parents gift such games. All that parents see on
the children's computer monitor are stars, rockets and the moon. With a mouse click the children
hide what they do not want the parents to see. I would advise the parents to trust their kids but keep
their eye open."6
Although some games with explicit sexual content are clearly labelled" A", the games like the Grand
Theft Auto does not come with such a warning, obviously because the creators intended to hide the
sexual content.
The time has how come when the children and even adults should be given lessons about
acceptable online behaviour so that internet may remain a safe and useful medium. There is also
need to educate the people on the danger being posed by cyber crimes and how the people can
reduce the dangers of cyber crimes. Thus, there is need to introduce safety measures in the
curriculum of universities and colleges.
(a) They should not give any kind of personal information. Such as residential address, school's
home, telephone number, etc., in chat room or bulletin board.
(b) One should not leave photographs on websites.
(c) Children should not be allowed to face-to-face meeting with other computer users without
guardian's permission.
(d) Guardians should keep an eye on the children's companions.
(e) Children should be encouraged to inform parents about any message received by them.
(f) Children should be asked not to respond to message which are obscene, suggestive, belligerent,
threating.
(g) Computer should not be kept in children's bedroom and the online use of computer by them
should be monitored.
(h) Guardians should know the online friends on their children as they know about their other friends.
(i) Parents should permit limited use of internet to their children.
There are many websites which provide appropriate guidelines for the parents and make available
necessary software programmes for checking the children's access to improper materials. The
school teachers and libraries may also provide appropriate guidance to the children.
100. The BPO wanted to sack them but the duo, in turn, accused the company of violation of their
right to privacy. The company refrained from taking any action.
The IT Act bans dissemination of obsence images and makes such action punishable by up to five
years. It is cognisable but its implementation is far from satisfactory. For instance, Mallika Sherawat's
lawyer has sought a police investigation into MMS under the IT Act. But police demanded the copy of
MMS clip to proceed with. Police finds it difficult to establish the source and hence chance of
conviction are hard to come by.
The number of MMS messages are now increasing very rapidly. Last new year's night, 60 million
MMS greetings were passed. A billion message are sent every month.9 At an average rate of one
rupee per message, it is a considerable sum of earnings. Service providers are also planting porn
messages. Now nearly 57 million persons have cell phones that allows MMS. That's why the issue of
MMS pornography is increasing at alarming extent.
13.9. Conclusion
The awareness and capacity building among cyber people and law enforcing agencies should be
given the top priority. The role of parents and teachers in molding the cyber behaviour of future
generation should also be given adequate priority. Strict enforcement of cyber regulations should be
ensured at all levels. The major focus should be given to the international efforts of mutual
cooperation.
There are many factors that causes the statistic of cyber crime cannot be detected
or analyzed. First, the aggressive development of todays technology making this
crime is very difficult to be detected. Second, law enforcement officials lack of
necessary technical expertise to deal with criminal activity. Third, once criminal
activity has been detected many businessmen are reluctant to lodge a report
because they afraid of adverse publicity, embarrassment, loss of public confidence,
investor loss, or economic repercussions. Due to these factors, the actual number of
cyber crime cases and the statistic of cyber crime in our country cannot be recorded
accurately.
There are three major categories of cyber crimes which are crimes against the
person, property and the government. The first category of cyber crimes is cyber
crime against person. Cyber crime against person is included harassment via email
or cyber-stalking. Cyber Stalking means following the moves of an individual's
activity over internet. It can be done with the help of many protocols available such
at e- mail, chat rooms, user net groups while, harassment can be included sexual,
racial, religious, or others. This crime usually happens to women and teenager.
There is a case happened to a girl in Ahmedabad, Gujarat India. She was lured to a
private place through cyber chat by a man with his friends, attempted to rape her.
Luckily she was rescue by passersby that heard she cried she was rescued.
Second category of cyber crimes is that of cybercrimes against all forms of property.
These crimes include computer vandalism by transmission of harmful programmes
to other computer through internet. The other example is cyber criminal can take
the contents of individual bank account. One widespread method of getting people's
bank account details is the money transfer email scam. People receive emails
requesting help with transferring funds from another country. Hacking into company
websites is property trespass, and stealing information is property theft. Internet
time theft also one of the cyber crime against property. It is done by an authorized
person in the usage of the internet hours which is actually paid by another person.
The third category is cyber crimes against governments constitute another level of
crime. Cyber terrorism is the most serious type of crime in this category. Hacking
into a government website, particularly the military sites, is one manifestation of
cyber terrorism. The example of cyber crime against government is web jacking. By
web jacking, hackers gain access and control over the website of another, even they
change the content of website for fulfilling political objective or for money.
Cyber crimes are everywhere, can happen to anyone, in any time. Some examples
of cyber crime are identifying theft, storing illegal information, computer viruses,
and fraud. We will discuss about each example in detail.
First, we will talk about identify theft. What is actually identify theft? Identity
theft, also known as ID theft is a crime in which a criminal obtains key pieces of
personal information, such as Social Security or driver's license numbers, in order to
pose as someone else. The information can be used to obtain credit, merchandise,
and services using the victims name. There are two main types of identity theft
named account takeover and true name theft. Account takeover identity theft refers
to the type of situation where an imposter uses the stolen personal information to
gain access to the persons existing accounts. True name identity theft means that
the thief uses personal information to open new accounts. The thief might open a
new credit card account, establish cellular phone service, or open a new checking
account in order to obtain blank checks. To prevent, dont keep all of your
identification and financial information in one place and never write down your PIN
(personal identification numbers) anywhere. Besides, never respond to emails or
snail mail that requests personal information such as passwords or PIN numbers.
Storing illegal information also considered as cyber crime. Criminals often use
the Internet to obtain and transfer illegal images. What do we mean by illegal
images on the web? This means images and in some cases text, which you see or
may be inadvertently exposed to on a website, which contains any of the following:
Child abuse images (also known as child pornography).
Criminally obscene content which means images featuring acts of extreme and
violent sexual activity.
Those who involves in this crime, dont just ignore it, report it. It is important
because reports from the public help the IWF (Internet Watch Foundation) to
remove the images from the internet and to support the investigative processes
which could bring those responsible to justice. Child sexual abuse images record the
real abuse of a child and your reports to the IWF might help the authorities to trace
and rescue a young victim from further exploitation.
Next is computer virus. A computer virus is a small software program that
spreads from one computer to another computer and that interferes with computer
operation. A computer virus may corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on
the hard disk. Computer viruses are most easily spread by attachments in e-mail
messages or by instant messaging messages. Therefore, you must never open an email attachment unless you know who sent the message or unless you are
expecting the e-mail attachment. Computer viruses can be disguised as
attachments of funny images, greeting cards, or audio and video files. Computer
viruses also spread by using downloads on the Internet. Computer viruses can be
hidden in pirated software or in other files or programs that you may download.
Last but not least, fraud. Fraud is a deliberate misrepresentation which
causes another person to suffer damages. Fraud can be committed through many
media, including mail, wire, phone, and the Internet (computer crime and Internet
fraud). Several types of criminal fraud include false advertising, advance-fee fraud,
bankruptcy fraud, etc. The best way to prevent fraud in both personal and
Religion can inspire people's potential and make them undaunted in the face of
death. However, countless disasters have broken out when religious extremism and
terrorism combined with each other. Religious- based terrorism has become a major
form of contemporary terrorism. Currently, the world's situation has experienced
drastic changes and religion as a supernatural deity worship met the requirements
of people's spiritual sustenance. Therefore, the religious- based terrorism as a type
of terrorist activities spread around the world rapidly and it will long exist. This
essay will firstly discuss the similarities between terrorism that is primarily religious
and terrorism that is primarily secular. Following this, it will discuss the differences
between terrorism that is primarily religious and terrorism that is primarily secular
by analyzing one act of contemporary religious violence in detail. Finally, it will
analyze the reason why it is not possible for terrorists to achieve their aims by using
violence..
where will the terrorist activities occur? What are their aims? How terrorist activities
start on? All of these issues are unknown until the terrorist events happen. Its
unpredictability expanding the effect of terrorist violence and terrorism becomes
very difficult to deal with. Third, the victims of the religious-based terrorism and
secular terrorism have a symbolic meaning. The potential victims of terrorist attacks
are not really randomly selected. These targets are the symbol of what the terrorists
want to attack because of their status, their location or their activities. Fourth, the
religious-based terrorism and secular terrorism's action usually has a specific
political purpose. Terrorism has a political purpose which includes two situations:
Firstly, some groups or organizations use such means of violent and terrorist to
achieve their own political purposes. Secondly, they adopt that means of violent
terrorist to change social political thoughts.
Take Islamic fundamentalist terrorism for example. Compared with the secular
terrorism, they considered violence as a sacred act or duty and terrorist activities
have been given a sacred name. Killing is "glorious" if it is for the sacred religious.
Secular moral fetters, struggle of the human nature dissipated in this "glorious".
Terrorists use murder and they have no limitation on the political impact, moral and
practical conditions that limited secular terrorism. Bruce Hoffman, 1993
Religious allow terrorists to find a way to legitimize their acts of terror. Many
religious doctrines have violent sanctions content to urge their follower filled with
admiration to the God. Terrorism is a natural supporter of violence. It captured this
feature of religion, misleading those devout followers. These followers believed that
violence is an expression of worship and they were taking away the sinners in
accordance the will of God. Therefore, they not only will not feel guilty for the
murder, but believes their actions are legitimate and sacred (Sedgwick M, 2004).
Compared with the other types of terrorism, their "enemy" is broader and
numerous. This fact doomed religious-based terrorism are much bloody than the
other types of terrorism.
The religious-based extremism terrorists are both victimizer and victim. Piety to the
religious is their spiritual motivate of carrying out terrorist attacks, but not the root
causes of terrorism. They had lived quietly in the world which many religions exist
there like most people. They protected their religion carefully, but their religion
gradually declined under the impact of Western culture. Those desperate followers
have to take the extreme method of killing to eradicate those who threaten their
religious beliefs and it seems that those numerous religions may erode their faith.
Those experiences in the real-life, including the power politics of Western countries,
economic sanctions, military strikes, made them feel that they are victims and they
have the right to retaliate to these people who bring them disaster. Terrorism will
not grow up without any reason and no one born a suicide bomber ( Jones JW,2009;
Roislien HE, 2005).
Analysis of the possibility for religious terrorists to achieve their aims by violence
Since the nineteen eighties, various types of world's religious terrorist organizations
developed rapidly. The ravages of terrorism have brought great harm to the
international community and undermine the normal social order. Terrorism
intensifies various contradictions and becomes a major threat to the peace of the
world. Therefore, many governments condemn atrocities of the terrorist and have
made it clear that they will fight against terrorism.
In recent years, the international community has joint together to act against
terrorism. Many countries recognize that anti-terrorism can not be met by one
country alone. They must rely on the strength of the entire international community.
Contemporary terrorism is more like cancer, which spread and undermined the body
health of the community seriously. It undermines the international peace and social
stability, which lead the international community into deep fear. So compromise
with terrorists is generally refused by the whole world. Recently, many countries
have committed to the fight against terrorism and have made remarkable
achievements. Therefore, in this situation, religious terrorism is difficult to achieve
their goal by violence.
Global Terrorism
Our history blog for Mr.Schwab's US history class.
Monday, January 2, 2012
essay
Terrorism. This word strikes fear into the hearts of many, and yet to others it is misunderstood. Terrorism
has no internationally agreed-upon definition, but essentially, terrorists are ideologically motivated and
use violence against civilians to create panic and fear, in hopes of changing policies or laws. While there
is no international definition of terror, there are many different types, and the following will demonstrate
the dizzying array terrorist practices. Firstly there is civil disorder. It can range from protesting legally to
illegally lambasting the government. Different countries allow for different levels of dissent, but in some
peaceful assembly is considered terrorism. Truly destructive forms of terrorism are political, quasi political,
and religious. Political terrorists attack in hopes of changing policies, usually in reference to color, creed,
or profession. Quasi political terrorism is the use of terrorist tactics for personal gain. For instance, taking
a hostage is terrorizing someone, but it is not an action designed to enact wide scale change. Lastly,
religious terrorism focuses on proliferating ones belief at the cost of others. Overall, terrorism is unjust
and cruel; we must take stand against it.
Terrorism flies in the face of diplomatic process, purposefully disrupting peace and safety in order to
achieve a goal. Many terrorists consider a mission successful if hundreds of helpless, innocent women
and children lie bloody in the street. A popular terrorist attack is to set off a relatively small bomb, and kill
say, 30 people, and detonate a far larger one when police and medics arrive. If this problem sounds like
something that does not affect you, think again. Terrorist attacks have happened literally hundreds of
times in the United States. Exact figures are unclear because the line between domestic terrorism and
political violence is blurred, but since 1999, there have been over 50 separate terror attacks on domestic
soil according the Department of Justice. In 2011 alone there have been over 11,500 acts of terror
around the world, according the FBIs worldwide NCTC data trend. These international attacks were
located in 72 countries, and resulted in approximately 50,000 casualties. Of this 50,000, 13,200
succumbed to massive trauma. The methods are diverse, the perpetrators are perverse, and the acts of
terror are utterly inexcusable.
Terrorism comes from the Latin word terrero, meaning fear. This could not be a more accurate depiction
of terrorists and their actions. Commonly terrorists are generalized as Middle Eastern men, motivated by
their fanatic beliefs to harm innocent people. Unfortunately, terrorism is incredibly diverse, located in
every region of the world and used for almost any goal imaginable. Generally, terrorists are either
politically or religiously motivated. There are international and homegrown terrorists. As the latter
suggests, homegrown terrorists organize and act in their native countries. The list of terrorist
organizations is far too long to discuss in this project, but I will provide a brief summary of various groups,
their motivations and tactics, and most importantly, what is being done to stop it and how you can help.
I deliberately chose a homegrown terrorist group as the first to be reviewed, because Americans need to
understand, fear, and work against terrorism at home. Jamaat al-Fuqra is an Islamic terror organization
whose goal, according to the Center for Peace and Security, is to purify Islam through violence. Put
simply, this group of radical Islamic men believe that they are commanded by God to proliferate their
religion. Furthermore, violence is the only acceptable way to deal with differing beliefs, and frighteningly,
they are credited with various shootings and firebombings, and members have been convicted of criminal
violations, including murder and fraud. This group was active largely in the 1980s, but it has given birth to
a radical Islamic movement in America, and other terrorist groups have stepped in to fill the void left by
Jamaat al-Fuqra.
Terrorist groups are numerous and wide ranging. Al Shabaab is a radical Islamic group with strongholds in
Pakistan and the United Kingdom. Various small scale bombings have been traced back to this group. In
India, the Al Tipura Tiger force blows up innocent civilians about once a year in an effort to fight the
governments Pakistani foreign policy. The Maoist Party of India and Communist Party of the Philippines
train guerillas to frighten individuals in order to gain votes and support. Hamas is another Islamic group
operating in Palestine, and they are responsible for hundreds of rocket and mortar attacks on Israel. The
Pilipino Liberation Tigers of Tamil recently gunned down a local organizer who questioned their brutal
tactics and radical beliefs. In the news recently, political Anarchists have rioted in various places around
Europe, including Greece, Italy, the U.K., and France. As I said before, these maniacs are numerous and
wide ranging. They are deadly and must be met with equal force.
September 11, 2001 is a day that will live in infamy. On that fateful day, various al Qaeda operatives of
Pakistani and Saudi birth hijacked three planes. One plane was flown into the world trade center. In this
first impact, 1402 people were killed. As fire scorched the building, the main support beam began to heat
and bend. Slightly over an hour later, a second plane impacted the tower sending deadly shrapnel onto
the streets and effectively destroying the buildings structural support. As we know, the towers fell. Later
that day, passengers aboard another hijacked plane realized their inevitable fate, and overpowered their
hijackers, crashing the plane in an amazing display of patriotic sacrifice. These attacks killed 2,918 people
total, 343 firefighters and paramedics, and 23 NYPD officers. It was the greatest loss of life on American
soil since Pearl Harbor. This attack proved to many Americans that terrorism was very real and needed to
be ended.
Globally, terrorism is down 12 percent, according the FBI NCTC data compilation. This has been
accredited to slight economic success in some countries, yet baffling because the number of young males
in places of conflict rose by 70,000. Despite this clear success by counter terrorism organizations, attacks
continue to be prevalent in Southeast Asia. Contrary to popular belief, Asia is the terrorism capital of the
world; with the FBI estimating that 75 percent of the worlds terrorist attacks and deaths took place in
South Asia and the near East. This year, these attacks totaled 8,690 and resulted in 9,960 deaths. Due to
rural conditions and lack of medical care, NTC.gov report on 2011 terror does not include a figure
assessing the number of people wounded by these attacks. With terrorism obviously being incredibly
prevalent and equally dangerous, you may wonder what is being done to stop it, and what you can do to
help.
Our group is arguing that either you stand up against terrorism today, or will see the horror and
destruction that it creates. Terrorists are viscous criminals who feel no shame in taking life, and
deliberately instill fear and panic. This is wrong, and is unacceptable. If we continue to turn a blind eye to
these killers we will lose more lives globally, and as a result we are sending the wrong message to
terrorists that what theyre doing is ok, and until we stop them, they will keep doing such. This is also
using logos, or the logical approach of persuasion in our facts, statistics, and commentary. As human
beings it is our duty stand up for what is right and protect the lives of other people.
The United States is without question home to the finest counterterrorism forces on the planet. The
Federal Marshalls, Critical Incident Response Team, FBI Counterterrorism division, CIA Counterterrorism
division, Department of Homeland Security, federal tactical teams and many more stand constantly vigil,
ready to defend you against an attack. Local police S.W.A.T. teams are trained and equipped to handle
attacks as well, and there are thousands of professionals who remain on the watch. If you are under age,
the best way to support these groups is spreading awareness. Attend counterterrorism seminars, and
learn as much as you can. The first step in preventing recruitment is understanding what terrorism is. If
you know what these groups do and why, you will be much more willing to take a stand against them.
Additionally, organizations such as the United Nations offer jobs in which you can help victims of terror
overseas and see firsthand what these horrible acts do. You can also donate money through multiple
organizations to a number of countries crippled by war and terrorism. You can help children who have
been plagued with poverty and who live in fear everyday of being attacked. So educate yourself, join
organizations, donate for the cause, and the educate others. Our future is bleak if terrorism continues to
ruin the lives of many, so do your part to help create a brighter future, today.
Conclusion
Religion is an important component of human civilization and its contribution to
mankind is undeniable. The ethical and legal norms it advocates still play an
irreplaceable constraints role of people's behavior for peace and stability of human
society. But religious-based terrorism undermined international peace and social
stability, which lead the international community into deep fear. Anti-terrorist is
imperative, but it is also essential for each country involved in terrorism to rethink
what makes them become the targets of terrorist attacks. If people use violence to
combat with religious terrorism, this will only lead to more conflict of civilizations
and more severe social panic. However, elimination of terrorism is an extremely
complex and difficult task. So the religious-based terrorism will long exist. Therefore,
all the countries involved in terrorism need to find the root causes of religious-based
terrorism .What they can do now is try to prevent terrorism and minimize losses
caused by terrorist activities.
TERRORISM
media is an excellent window for the terrorists to shout their demands and views
immediately after an attack. The US has a very strict policy concerning terrorism.
Our country refuses to negotiate with terrorists or give in to any of their demands.
We do all we can to bring terrorists to justice after they commit crimes. We aim to
isolate terrorist sponsoring nations, such as Iraq, from the rest of the world and
attempt to perform counter-terrorism.
Although this policy is written down on paper down at the State Department, it is
not always followed. For example, whe...
International Terrorism
International terrorism is referred to violent acts that are used to put fear into the people that they are targeting.
These are usually done because of an ideological, political, or religious goal and they sometimes have target but
sometimes they just kill harmless and defenseless civilians. International terrorism has been such a problem that
there is a convention to help stop it. At the Comprehensive Convention On International Terrorism a treaty was
proposed, this is intended to criminalize every form of international terrorism and to deny the terrorists finances and
the supporters that gives them the funds, safe havens, and arms.
The negotiations have been going on over thirteen years and the United Nations are deadlocked on the proposal that
was established at the convention on international terrorism. Even with suicide bombings going on in places like
Russia, Iraq, Afghanistan, Egypt, and Syria, they still havent reached an agreement treaty. International terrorism is
defined by the convention as a person who commits an offence that causes death or serious injury to another person,
major damage to public or private property, this included places like state and government facilities, public transit, or
the environment, also damage that leads to a major economic loss that can prevent people from doing anything after
the attack.
For example, 9/11 is a good example of this because it covered all of the requirements of an international terrorism
attack. It causes death and injuries to people, it has serious damage to property and made it impossible for people to
work, which is why the stock market crashed after it happened and gas prices went up. International terrorism is a
very scary thing because it can cause so much damage during and long after the attack is over. The long term can
be just as bad as the actually act.
Its not that the convention doesnt like the definition it is just they arent sure if it applies to some groups like the
armed forces or people that are in the self-determination movements. Because of this they have been trying to adjust
it to make it more clear but have been unsuccessful in their efforts. If you think about it, they have been taking a long
time to decide but maybe they want to make the right decision so as to not leave something out. Or they are just
being difficult like most governments like to do sometimes.
PIJ, the Palestine Islamic Jehad has so far inflicted 30 suicide attacks
on Israel.
There are a number of terrorist organization recruiting and training
militants against India particularly to disturb peace in Kashmir.
Kashmir valley has been under the shadow of militancy since 1989.
There is large infiltration of foreign mercenaries from across the
border. Pakistans ISI spend Rs. 60 to 80 crores every year for running
proxy war in Jammu and Kashmir. Besides youths from Jammu and
Kashmir and Pakistan occupied Kashmir a large number of heavily
armed foreign militants are also operating in the state attacking
military and civil targets. Pakistans regular army personnel are also
operating in disguise as militants and civilians collecting intelligence
about Indian army and air force movements. A new phenomenon of
Fidayeen attacks have been added to the operating method of
terrorists, various suicidal missions have been carried out by them
which include attacks on Indian parliament, Akshardham Temple,
Temples in Jammu and latest twin blasts in Bombay.
After September 11 attack the world realized the gravity and
seriousness of the terrorists problem. Britain, Russia, India, Iran,
China, NATO, the UN all pledged support to the United States in their
campaign against terrorists. Pakistan has forced to support the US and
out of compulsion condescendly offered full cooperation and bases for
US forces. Pakistans motive was to prevent a hostile especially proIndia regime in Afghanistan and at the same time to save Kashmir
militants from larger war on terrorism. The US put together an
international coalition in its war against terrorism. Aim was to hunt
down Osama-Bin-Laden and destroy the Al-Qaeda network in
Afghanistan. It was also stressed that the operation will not be
restricted to capture of Osama-Bin-Laden only but will extend to other
countries to hunt down associated networks of terrorists.
The rout of the Taliban forces that were hardworking the Al-Qaeda
organization finally broke the Taliban Osama axis. The Al-Qaeda
forces in Afghanistan were destroyed and Afghanistan was no longer a
haven for their activity. Most of the fighters of Osama Bin Ladens Al-
Dhaka, the capital city of Bangladesh is one of the most populous megacities in the world. As the growth
of urban population tacking place at an exceptionally rapid rate, the city is unable to cope with changing
situations due to their internal resource constraints and management limitations. In recent years Dhaka
City is facing extensive water logging during the monsoon (May to October) as a common and regular
problem of the city like water pollution, traffic congestion, air and noise pollution, solid waste disposal,
black smoke etc. This research applied remote sensing and GIS techniques to detect the low land status
in different time period and the trend of unplanned urbanization that is one of the major causes of water
logging in Dhaka City. Remote sensing could provide timely and low-cost information on floods and land
use status whereas GIS is an excellent tool in handling information in land management and flood
mitigation. Management of drainage system of Dhaka City is presently a challenge for the urban
authorities because of rapid growth of population and unplanned development activities. Therefore, a
close coordination among urban authorities and agencies and collaboration between public and private
sectors is needed for effective management and sustainable operation of urban drainage system. It
ascertain the inherent causes of such water logging and its effects on the city life from the perception of
authorities of different development organizations, experts and people living in different parts of Dhaka
City
The heat wave in May and June really brought the city dwellers to their knees. It was a suffocating,
energy sapping heat and continued for days on end. There were reports of people dying due to
heatstroke other heat-related illnesses. So when the rains came in the morning of June 11, Thursday,
Dhakaites breathed a sigh of relief as the temperatures came down. Unfortunately though, what
started as a relief to the citizens soon enough became a source of countless miseries. The downpour
in no time became a deluge and many parts of the city were submerged in knee-deep water bringing
traffic to a standstill.
People of the city, instead of enjoying cooler weather and heavy rain, had now to deal with making
their ways through flood and sewage water. Some of the main streets in Mirpur, Shantinagar, Jurain,
Malibagh, old quarters of the city, Motijheel, Kakrail became waterlogged. In some of the areas,
rainwater had entered many houses on the ground floor. Even after the rain stopped the waters took
hours to drain. This proves that the drainage system was not functioning properly for swift water
drainage. And traffic jams, already terrible in the city in the best of times worsened even further, as
the day progressed. In these days in a modern city such a situation should not be expected. However
in Bangladesh one learns to expect the unexpected and also live with it.
More perplexing is the fact that the capital witnesses severe water logging even after brief spells of
rain, throwing life out of gear. Almost on an annual basis Dhaka WASA and the two city corporations
trade blame over the recurrent failure to keep the 360 square km capital free from water logging in
rainy days.
The three entities repeated the same old story that none of them controlled the facilities for the
drainage of the entire capital. The blame game does little good to the residents as they see no
progress in bringing the capitals drainage system under a single authority, though a move was
initiated in this direction more that a decade back.
Increased traffic jams due to water logging caused terrible sufferings to office and school goers and
other commuters. Many pedestrians fell into manholes without covers as they had just gone under
clogged water. Its a routine plight of the residents during monsoons, said residents, the only
difference being water logging increased on broken and ill maintained streets and lanes. Apparently
there is no one to address the recurring problem. People are forced to wade through on several
streets and lanes even in posh neighbourhoods. Acute water logging disrupted normal life in most
areas of the capital.
Dhaka Water Supply and Sewerage Authority has the responsibility to look after the drainage of 39
per cent area of the capital. DWASA with its 10 km of box culverts and four pumping stations drains
140 square km of the 360-square km capital into 65km open canals. DWASAs drainage pumping
stations are located at Dholaikhal, Kallayanpur, Rampura and Janapath. The two city corporations
maintain around 2,500 km of surface drains and around 4,000 km of underground drains.
According to experts until and unless DWASA recovered its 26 canals there could be no
improvement of the situation. WASAs clogged outlets obstruct the passage of water into its canals
and WASA rarely if ever cleans its outlets. As said earlier the situation can improve only if the three
entities worked together. On July 11, 2003, the government decided to bring the drainage system
either under the control of either then Dhaka City Corporation or DWASA. There has been no
progress on the issue ever since.
A total of Tk 303 crore was spent in last four years of the project launched for reducing the water
logging problem of the capital city Dhaka. But what is the outcome of the project? On May 24, an
only 34 millimeter rainfall was witnessed while only 20 millimeter on May 25, created water logging
in several areas of Dhaka. Similarly, on June 25 2 milimetre rain caused massive water logging in 20
areas of Dhaka including the old part of the city. Dhaka WASA source claimed that crores of taka was
spent for a smooth drainage system. So far, in five months of this year, WASA authorities got Tk 20
crore in three phases.
Garbage keeps piling on the roadside or beside the drains and many manholes are kept uncovered.
So the solid waste is washed into the drains after rainfalls. Thus hundred crores of taka is wasted in
the name of sewerage clean up. It is vital to clear the drains before the rainy season. Besides, Dhaka
WASA should ensure transparency of the drainage clean up fund.
Now when it rains in Dhaka rather than people being out on the streets singing and dancing in the
rain, they have to worry about flooded major connecting roads, water logging and falling trees. The
situation is quite similar in other parts of country as well.
A major cause of the problem is that cities have become less dependent on their own water sources.
The number of water bodies in all major cities has drastically come down over the last three decades.
The builder-politician nexus has knowingly and intentionally suffocated the city's open spaces for
commercial purposes. This loss of and subsequent commercialization and concretization of open
spaces has meant that water, which previously could seep into the soil has practically nowhere to go,
leading to flooding.
These floodplains and lakes in the low-lying parts of a
city, did not just fulfil the water needs of a city, but also drained it off the excess rain water. When
construction blocked the path of water, it led to water-logging on the city roads.
The blame then fell on the storm water drains which in most cases, were designed very long ago and
were not capable of handling the excess.
Dhakas drainage system was designed in the early 20th century for a maximum rainfall of 25 mm
per hour, assuming that half the rain would be absorbed by the soil and only half would flow into the
drainage system. With the onset of rampant and indiscriminate urbanization, most areas are now
paved, concreted or asphalted. As a result very little rainwater is absorbed into the ground. Thus
even at one inch per hour, the drainage system is having to cope with almost twice its intended
capacity. Natural drainage or the slope of a city was never kept in mind when cities were planned.
The government should start cleaning drains in February at least so that passage for rain water is
clear. But they wake up only in May when monsoon is right in the face and then too, debris collected
from the drain is left on the banks of water bodies for it to flow back when rain comes.
Water harvesting in lakes and ponds is a time-tested solution and need of the hour, not just to
mitigate floods but also to fulfil our water requirements locally. Rain water is actually meant to
become ground water so every citizen has to take the initiative to recharge it. When somebody
constructs a house it is their responsibility to take care of the excess water from that plot of land,
which would otherwise go into a storm water drain or else create water-logging around the plot.
The solution is a proper rain water harvesting system in the house itself. It would not just replenish
ground water but also improve its quality and mitigate flooding. Five per cent of
any built up area, be it an apartment complex or individual house, if used for rainwater harvesting,
can mitigate floods and also reduce water bills. Some towns in Germany have made it mandatory for
construction projects to take responsibility for their excess run-off or pay more for putting pressure
on storm water drains.
Rain water harvesting is what all individuals can do but the administration can contribute to this
effort as well. Storm water drains could be utilized as water harvesting measure rather than just act
as carriers of excess water to the sea. Recharge wells can be constructed in open spaces around storm
water drains. Water in drains can be intercepted and directed to these wells. In areas where open
spaces are not available, recharge wells can be dug in the drain itself under the man-hole so that it
can be cleaned also from time to time.
Every drop of rainwater contributes to floods, so permeable gravel or stone lined parking spaces and
footpaths that can absorb water rather than concretized floor would also help. And there is no
substitute to planting trees in whatever area is available to promote absorption of water and control
run-off of soil. The incidents of water-logging in Dhaka, other cities and rural areas have been
worsening every monsoon due to the fact that effective prevention measures are not undertaken or
executed properly by the designated authorities.
Even though the issue of water logging hits the headlines and the authorities concerned repeatedly
admit their inability to tackle it and pledge better action and preparedness, we dont see urgency in
government officials to work for an end to the massive hindrance of public life by carrying out
effective long, medium or short-term measures.
Water-logging has a serious impact on public health as rain water mixes with dumped waste, toxins
of the drains and even weak sewerage systems. In many areas, water supply connections are
contaminated and people have to go far to collect drinking water. People often face common skin
diseases, malaria and water-borne diseases.
Initiating development activities in the dry season is a major step the government has to take
breaking the age-old malpractice. Theres no alternative to coordination among the related
agencies and individuals in planning and execution of the comprehensive work plans to protect the
people of the country. We need to ensure a sustainable society where the citizens would not be
devastated by natural disasters due to a handful of brutal and greedy officials lack of affection for
mankind. It is perhaps the incredible and natural abundance of water in Bangladesh that has
resulted in many of the environmental concern that Bangladesh faces today. The dual forces of the
topography and ecology of Bangladesh have certainly shaped water logging as a natural problem,
but this cannot be cited as the only reason. In fact, it is a dangerous inclination to leave the solution
to water logging in the hands of nature hoping it will take care of itself.
Water logging in Dhaka can also be considered a result of poor river management and in general,
failed water management projects over decades, making it a primarily a human induced issue. In
fact, most modern environmental problems are human induced, resulting either from a lack of
compliance with national policies, rules and regulations, or from resource constraints to implement
different measures.
The case for taking action against water logging in Dhaka must further be framed through an
economic lens. It is well recognized that flooding and water logging has severe impacts on local
businesses and commerce. During the major floods in September 2004, business and economic
activities came to a halt in Dhaka as a result of heavy rainfall and flooding. Dhakas Stock Exchange
was temporarily suspended and many garment factories were closed and many workers were unable
to even reach the factories since most of their homes were flooded. Business in shopping centers and
stores were unusually low for the city and airline flights, especially on domestic routes which also
faced severe delays.
Traffic jam has become a regular feature of Dhaka city. Traffic jam obstructed increasing our trade and
commerce. If we out from home for office or school, we may face jam and only twenty minute way may
take two hours because of the jam. So that we need more time to reach our destination and we lose our
valuable time. The students also face problems to attend their class times. For Traffic jam we cannot
complete our task write time so our trade and commerce affected. We cannot provide goods and material
with in due time. We have to spend half of the day on the road if we want to go somewhere in the city. It
also polluted our environment because many vehicles gathering together are created sound and air
pollution.
Reasons behind
Many reasons are for causing frequent jams in the Dhaka city. Illegal parking is one of the main reasons
for Traffic jam. Many trucks, Cars and other vehicles are parked inside and on the road. The reason is
faulty traffic signaling systems, narrow road spaces and overtaking tendency of drivers. Bus drivers are
mostly responsible for a Traffic jam and they do not care about the traffic rules and signals.
The drivers and person's irresponsibility and lack of knowledge is also causing jams. The rickshaw pullers
are mostly responsible for Traffic jam in the Dhaka city. There are about seven hundred thousand
rickshaws are playing on the road of Dhaka city. So the huge rickshaw makes jam and it is one of the
most uses vehicle in the city. The narrow roads are also causes Traffic jam because huge vehicle are
playing in the road.
Main roads should be one way and all parking must bend in all roads.
People should use zebra cross and foot over bridge while crossing roads and should respect the law.
Increase parking facilities for vehicles.
Invalid vehicles must be prohibits in the road.
Everyone should follow the Traffic rules.
So everybody should care about Traffic rules that will helpful to prevent jamming. If we solve Traffic
jam we get facilities of all sectors of our city life like trade and commerce and personal life also. We can
reach our destination within short time and we will work more in every day.