Thursday, January 16, 2020
Korean ââ¬ÅComfort Womenââ¬Â of Wwii Essay
ââ¬Å"â⬠¦Use curiosity to ask challenging questions about what appear as normal, everyday banalities in order to try and understand make visibleââ¬â¢ the hidden gendering of the practice and theorizing of international relationsâ⬠ââ¬âCynthia Enloe In times of armed conflict, women are most susceptible to violence and silencing through the sexualization, dehumanization, and stigmatization of their identities. Janie Leatherman highlights this point when stating ââ¬Å"gender based violence often intensifies and becomes more extreme in a crisis, even escalating into a tool of war ââ¬Å" (4). This is inevitable in a patriarchal society where hegemonic masculine values construct gender norms and gender expectations. Sexual violence during armed conflict does not develop in isolation from the societyââ¬â¢s preexisting socioeconomic and culturally shaped gender relationships. Furthermore, the patriarchal nature of a society does not work alone in creating injustices, such as sexual violence, against women during and after armed conflict; there must be a ââ¬Å"framework that embraces the realities, contradictions, and intersections of various global relations of powerâ⬠(Kempadoo, 29). These intersections include the relationships between gender, race, class, cultural, and societal ideologies. In my paper, I take on Cynthia Enloeââ¬â¢s challenge of using an enquiring, gendered lens to explore the silencing of women during and after war by examining the case of the Korean ââ¬Ëcomfort womenââ¬â¢ of World War II. I will analyze how the intersection of prevailing social determinants and ideologies have regulated and perpetuated the rationale and, thus, the invisibility of the Korean comfort women during and in the aftermath of World War II. Literature Review & Research Methodology Yoshiaki Yoshimiââ¬â¢s Comfort Women: Sexual Slavery in the Japanese Military during World War II, Margaret Stetzââ¬â¢s Legacies of the Comfort Women of World War II, as well as Toshiyuki Tanakaââ¬â¢s Hidden Horrors: Japanese War Crimes in World War II were mainly used throughout my research to gather the testimonies of surviving Korean comfort women. All three books give a comprehensive look into the phenomenon of the Japanese military comfort women system with historical background and an abundance of testimonies and documentation of the Korean comfort women. Because my research focuses on the silencing of Korean comfort women during and in the aftermath of World War II, these oral histories provide crucial supporting evidence throughout my paper. Besides two testimonies by one Japanese soldier and one Japanese military doctor, testimonies by other Japanese soldiers and government officials that have acknowledged the existence of the comfort women stations were difficult t o find. Therefore, throughout these testimonies, I specifically looked for patterns that revealed evidence of Japanese gender hierarchies through the diction and accounts that imply any dehumanization and objectification imparted by Japanese soldiers. To investigate the determinants that had cultivated the Japanese comfort station system and, more importantly, the targeting of Korean women for the system, I specifically used Cynthia Enloeââ¬â¢s Maneuvers: The International Politics of Militarizing Womenââ¬â¢s Lives as well as Janie Leathermanââ¬â¢s Sexual Violence and Armed Conflict. Both authors give insights and analyses of the causes and consequences of sexual violence during armed conflict. They both emphasize the interplay of patriarchal systems, gender constructions/norms, and political/economic/cultural structures as large contributors. In addition to these specific determinants, I incorporate Sara Ahmedââ¬â¢s analysis to sexual violence by considering the ââ¬Å"cultural intersections between gender, race, and colonialismâ⬠in my analytical approach (138). By applying and intertwining the critical approaches of Enloe, Leatherman, and Ahmed, I am able to isolate the multifaceted, yet intersecting institutions and ideologies that had fabricated the invisibility of and the rationale for the Korean comfort women. Background of the Japanese Comfort Stations The euphemism ââ¬Ëcomfort womenââ¬â¢ was the name assigned to thousands of women ââ¬âmainly Korean but also Burmese, Chinese, Dutch, Eurasians, Indians, Indonesian, Filipina, and Taiwanese ââ¬âwho were forced into the Japanese comfort station system (Japanââ¬â¢s military controlled whore houses or brothels) throughout World War II (Yoshimi). These so called ââ¬Ëcomfort stationsââ¬â¢ were far from comforting. The conditions of the physical spaces have been described as ââ¬Å"barrack-like facilities, rudimentary tents, [or] shacksâ⬠(Yoshimi, 25). One Japanese military doctor has testified that the women were treated like ââ¬Å"female ammunitionâ⬠and that their dehumanized bodies were reduced to the likes of ââ¬Å"public toiletsâ⬠(Wantabe, 20). The testimony of Hwang Kum-Ju, one of the first Korean comfort women to testify in public, only reveals a glimpse of the sufferings she and fellow comfort women had to endure: ââ¬Å"There were so many soldiers. Sometimes, we had to do it with twenty to thirty soldiers a day. I think ours was the only comfort station in that area, and soldiers and officers came whenever they had some spare moments. Higher-ups came freely, and at night we usually slept with officers. Women who contracted venereal diseases were simply left to die or shot. Anyone resisting the advances was beatenâ⬠(Kim, 97). Comfort women were subjected to daily rapes, sexual diseases, torture, murder, and other forms of mental, physical, and sexual violence. The comfort stations were created during World War II as a solution to the aftermath of the Japanese military committing mass murders and rapes as they moved across mainland Asia. The catalyst for the creation of the comfort system was the most infamous massacre known as the ââ¬Å"The Rape of Nankingâ⬠in which the whole village of Nanking was murdered after the Japanese soldiers raped approximately 20,000 village women. Because this particular massacre caused such an outcry in the international press, Emperor Hirohito of Japan ordered the creation and systematic expansion of the comfort stations. However, the purpose for which these comfort stations were created was not out of concern for the safety of local women of in the territories in which the Japanese soldiers were stationed. Naoai Murata, the Defense Agency Director of the Secretariat in 1992, claimed that they were created in order to ââ¬Ëâ⬠¦maintain order [and] to ease the anti-Japanese feeling aroused by the Japanese soldierââ¬â¢s deedsââ¬â¢ (Schmidt, 88). This would restore the image of the Imperial Army by confining and concealing rape and sexual violence to military controlled facilities. Additionally, as the war progressed, these comfort stations transformed into spaces that provided opportunities for the Japanese soldiers to have sex as a means of relaxation and comfort, a boost for morale, a space to assert their masculinity, to relieve the stress and fear of combat, and an outlet from strict military discipline (Yoshimi, 53). The following interview of one Japanese soldier highlights the psychological influence and importance of the comfort women to the Japanese soldiers: ââ¬Å"Even though we had just returned from lengthy military operations at the front, the thought of having sex made us leave immediately for the [comfort women]. When we arrived at where the women were, soldiers took their place in line and mulled over life and death while waiting for their turn. There was nothing else like the supreme feeling of completeness that the soldiers experienced when engaging in sex with the women. This was the only way for them to whole-heartedly escape from their abnormal existenceâ⬠(Yoshimi, 54-55). The advocacy and rationale for the comfort women system reveal the dependency of the military on women. The comfort women system was considered an important element for the war efforts, even if only temporary. Why Korean Comfort Women? Approximately 80% of the 100,000 to 200,000 comfort women were Korean with ages ranging from 13 to mid-20ââ¬â¢s (Yoshimi, 67). The question that can be elucidated from this statistic is simple: ââ¬Ëwhy were the majority of the comfort women Korean?ââ¬â¢ The answer to this question can be answered with: ââ¬Å"â⬠¦the military usually does not need ââ¬â or want- all women to provide all these militarized services. Rather, government officials have needed women of some classes and some races and some ages to serve some of these functionsâ⬠¦Ã¢â¬ (Enloe 2000, 44). Furthermore, in order to further pinpoint the determinants to why this marginalized group was targeted, there needs to be ââ¬Å"an engagement with the interplay of global relations of power around gender, race, nationality, and the economy (Kempadoo, 29). These underlying intertwining ideologies and institutions that have contributed to the explicit targeting of Korean women for the Japanese comfort stat ions need to be explored. Racial Ideologies: Racism The excessive usage of Korean women for the Japanese comfort system is directly linked to the elements of racism. This phenomenon can be analyzed by the intertwined relationship between colonialism, race, socially constructed gender ideologies. As Sara Ahmed emphasizes, ââ¬Å" a consideration of cultural intersections between gender, race, and colonialism is important for two main reasons. First it demands that feminism reject any approach, which isolates the production of gender from race and colonialism. As a result, it requires us to consider how certain feminisms may themselves function as part of the colonialist cultureâ⬠(138). With this framework in mind, it can be elucidated that the targeting of Korean women stems from the Russo-Japanese War of 1904-1905 from which Korea became a protectorate of Japan and later officially colonized in 1910. Despite the fact that Korea had become a colony under Japanââ¬â¢s rule, the Japanese government and societyââ¬â¢s sentiment ââ¬Å"dictated that the [Korean] population was still considered to be racially inferiorâ⬠(Tanaka, 96). While exploiting and objectifying Korean women, the Japanese military did not see it appropriate to exploit their own women to the same extent: ââ¬Å"[Japanese] officials believed [international] laws were not applicable to Japanââ¬â¢s colonies, and this, combined with the belief in the superiority of Japanese women and the suitability of women of other races for prostitution, cemented to use [Korean] women from the colonies as comfort womenâ⬠(Tanaka, 97) The Korean comfort women were positioned and identified as ââ¬Ëuncivilized,ââ¬â¢ inferior, subjugated, and promiscuous by the Japanese masculine colonial mindset. Derogatory and sexualized words, accompanied by violence, were used against the Korean comfort women at the comfort stations as racially discriminatory identifiers of the superior and the inferior groups. These words included ââ¬ËPpagayor! Senpino kuseni!ââ¬â¢ which translates to ââ¬ËIdiot! Nothing but a Korean cunt!ââ¬â¢ (Yoshimi, 113). Enloe explains that objectifying foreign women makes it easier for military officials to marginalize them: ââ¬Å"it was far easier for commanders to send women if they could be portrayed as rootless, promiscuous, parasitic, and generally a drag on the militaryââ¬â¢s discipline and battle readinessâ⬠(2000, 40). The images inscribed on the inferior, ââ¬Ëcolonizedââ¬â¢ Korean comfort women rose from the colonialist, racial, and masculine institutions. The importance of the intersection of these institutions is emphasized by Kempadoo ââ¬Å"a large number of women upon whose bodies and labor such constructions of masculinity depend are of nations, races, and ethnicities other than those of men is a reality that cannot be neglected or ignoreâ⬠(31). These constructions of the Korean comfort womenââ¬â¢s identities fabricated a justification that only naturalized the Japanese nationââ¬â¢s domination over Korean through the Korean comfort women. Gender Ideologies: Sexualized Femininity/Militarized Masculinity During World War II, the prominently patriarchal nature of the Japanese society reestablished the preexisting gendered, dichotomous construction of sexuality for both men and women in which the degree of masculinity of soldiers was greatly dependent on the comfort women. Cynthia Enloe highlights this notion by recognizing that ââ¬Å"the women were one of the strengths, which maintained the military organizationâ⬠(Enloe 1988, 187). Enloe draws attention to this dependency by stating ââ¬Ëthe military needs women as the gender ââ¬Ëwomenââ¬â¢ to provide men with masculinity ââ¬âreinforcing incentives to endure all the hardships of soldiering (Enloe 1988, 214). During World War II, within the Japanese military, there were socially constructed forms of masculinity and femininity that were reinforced by the onset of war and the military. The service of and dependency on the objectified womenââ¬â¢s body s tems from what Carole Vance explains to be social constructions of gender and sexuality, not as ââ¬Å"naturalâ⬠and ââ¬Å"unchangingâ⬠biologically determined notions of gender and sexuality. Socially constructed gender roles have shaped ââ¬Å"sexuality as a form of powerâ⬠(Mackinnon, 2). Catherine Mackinnon further describes these powerful gender roles: ââ¬Å"the social beings we know as man and woman are bound by social requirements of heterosexuality, which institutionalizes male sexual domination and female sexual submissionâ⬠The womanââ¬â¢s identity becomes inexplicably attached to her sexuality, becoming ââ¬Å"that which is most of her own, yet is most taken awayâ⬠(Tong, 111). Sexuality becomes distorted into an ideal of sexuality that reduces women to sexual objects while placing men as the dominating, sexual subject. The highly hierarchical gender system of Japan during World War II fostered an inequality between men and women in which ââ¬Å"men create the demand and women are the supplyâ⬠(Hughes, 11). The objectification of the Korean women was necessary for the militarization of men. (Enloe 2000). During times of war, the ideologies of masculinity that ââ¬Å"their love and respect can only be met by being masculine, powerful, and ult imately violentâ⬠are fuelled (Kokopeli, 233). This is because the military as a social institution is constructed by ideals of male sexuality. The sexualization of the female body aids the military in the marginalization of women as it depicts women as objects and tools for the soldierââ¬â¢s sexual satisfaction. Vance states that all ââ¬Å"social construction approaches adopt the view that physically identical sexual acts may have varying social significance and subjective meaning depends on how they are defined and understood in different cultures and historical periodsâ⬠(29). Militarized masculinities are sexualized in violent forms, which was clearly the case among the Japanese soldiers. The socially constructed feminine identity at the time was one of which sexuality was merely designed to service individual men and male defined institutions. This explanation creates a foundation for the upheld rigid distinctions between masculine and feminine ideals in the Japanese society during World War II. For the Japanese male soldiers, the militarized masculine model of sexuality embodied notions of dominance, destructi on, aggression, and sexual conquest. On the other hand, the Korean comfort women subjected to this patriarchal society were merely reduced to submissive, obedient, and sexual tools. Enloe also argues that wartime sexual violence provides ââ¬Ëmasculinity-reinforcing incentives to endure all the hardships of soldieringââ¬â¢ (1988, 214). The practice of going to the comfort stations to have sex with the comfort women became a routine for the Japanese soldiers; the women were seen as a ââ¬Å"necessary evilâ⬠(Tanaka, 67). Whereas on the battlefield, the Japanese soldiers had little control, having sex with women against their will gave the men the masculine power of dominance and self-assertion. In battle, Japanese soldiers were merely seen as military ammunition for combat, but they were able to reinforce their own masculine subjectivity and agency through the sexual objectification of Korean comfort women. This can be comprehended through the account of one Korean comfort woman, Yi Sunok: ââ¬Å"There were many times when I was almost killed. If I refused to do what one man asked, he would come back drunk and threaten me with his sword. Others simply arrived drunk, and had intercourse with their swords stuck in the tatami. This left the tatami scarred, but this sort of behavior was more of a threat to make me accede to their desires and give them satisfactionâ⬠(Tanaka, 56). The Korean comfort women provided an environment where the men could reinforce militarized masculine at the expense of the womenââ¬â¢s dehumanization as well as their mental and physical health. The Korean comfort women not only suffered enforced sex, but sex routinely accompanied by routine violence and torture. Although the comfort women station system was blatant throughout World War II, it was rationalized by socially constructed, yet biologically justified, notions of male sexuality. Vance would call this justification as ââ¬Å"biological determinism,â⬠which is the belief that biology determines fundamentally all behavior and actions. The belief that the comfort women were needed because of the male Japanese soldiersââ¬â¢ biologically determined, uncontrollable sexual needs can be perceived in the secret report by a psychiatrist of the Konodai army hospital in 1939: ââ¬Å"The army authorities established comfort stationsâ⬠¦because they assumed that it was impossible to suppress the sexual urge of soldiers. The main purposes of setting up comfort facilities were to relieve soldiers of daily stresses by giving them a sense of sexual satisfaction and to prevent rapes which would damage the reputation of the Imperial army from happeningâ⬠(Yoshimi, 1992, 228). This understanding of male sexuality inadvertently reduces the rationale for the comfort station system to a biological one. It justifies the creation of the comfort women system as unavoidable and inevitable as though there was no other solution. The biological determinism argument is a legitimizing tool for it positions this constructed masculinity as outside of human control. The trope of ââ¬Ëuncontrollable military male sexualityââ¬â¢ rooted in the ââ¬Ënatureââ¬â¢ rationale only suspends moral and legal restrains on the comfort women system while perpetuating and justifying the womenââ¬â¢s objectified, subordinate position. Socioeconomic Status The majority of the Korean women that were targeted in the comfort station system were from a low socioeconomic class. Hughes reiterates this point by pointing out that recruiters of areas in the sex industry ââ¬Å"take advantage of poverty, unemployment and a desire to emigrate to recruit and traffic women into the sex industryâ⬠(11). Hughes also includes a report from the Womenââ¬â¢s NGO which states, ââ¬Å"â⬠¦economic hard times has lead to a depression of womenââ¬â¢s psychological state with a loss of self esteem and hope for the future. Women accept unlikely offers of employment in unskilled jobs at high salaries with the resignation that ââ¬Ëit cannot be worseââ¬â¢ than their present lives. Recruiters for the sex industry target the most economically depresses areasâ⬠(12). The Korean women of low economic status and class were vulnerable to the deceitful recruitment methods of the Japanese. For example, the Korean population in the Japanese colonized territories was very poor during World War II because Japan had taken any available means of production of food and clothes for the war effort (Argibay, 378). This left most of the young Korean women and girls living in poverty and starting menial labor at a very early age in order to support their families. ââ¬ËRecruitersââ¬â¢ would encourage compliance by convincing the women that they would obtain high paid jobs as seamstresses and nurses or working in a hospital or a factory (Stetz, 10). One comfort women named Suntok Kim recalls that when she was being ââ¬Ërecruited,ââ¬â¢ the prospects of being a ââ¬Ëcomfort womanââ¬â¢ for the Japanese seemed promising because she came from a poor family and had no education. Working in a factory was far better than her current working and living conditions (Stetz, 10). Furthermore, the U.S. Office of War Interrogation Report No. 49 reports that when being recruited ââ¬Å"Korean women assumed that comfort service consisted of visiting wounded soldiers and generally making the soldiers happy, and that many Korean women enlisted on the basis of these misrepresentationsâ⬠(Arigbay , 378) Another means of recruitment that targeted Koreans of low socioeconomic class was through the method of debt bondage, indenturing the Korean comfort women to the Japanese military. Economically destitute rural families were deceived into thinking that they had a choice of whether or not to sell their daughters to the Japanese military; however, in reality, they were being coerced with violence and had no agency in this matter. Many reports have indicated that families who refused to sell their daughters were killed and girls taken to the Japanese military bases after. The Japanese would also threaten to destroy ââ¬Å"the whole village, kill the elders and children and commit other violent measuresâ⬠(Arigbay, 278). Many Korean comfort women did not have the agency, autonomy, or the economic option to oppose Japanese forces. Offering a payment was simply a customary ruse by the Japanese military to justify their methods in taking these powerless Korean women. Continuum of Injustice & Invisibility in the Aftermath Stigmatization: Cultural & Social Institutions In the aftermath of World War II, the experiences of the comfort women were silenced for approximately 50 years. This silence was finally broken in the early 1990s when the issue was brought to light as former comfort women began to release their testimonies to the public. When this issue began to gain public attention, the Japanese government immediately declared that the comfort women system did not exist in the Japanese military and thus ââ¬Å"there could be no question of any apology, memorial, or disclosures by the Japanese governmentâ⬠(Uncomfortable Truths). To this day, comfort women are still waiting for an apology for the violation of their human rights and for the objectification of their bodies and identities from the Japanese government. Many grassroots organizations and feminist groups have been created since the early 1990s to draw attention to issue of the comfort women. These include the Korean Research Institute for Chongsindae and the Korean Council for the Women Drafted for Sexual Slavery by Japan. Since the early 1990s over one hundred women in South Korea have registered with the Korean government as former comfort women (Kim, 74). However, despite these efforts, the stark question of ââ¬Ëwhyââ¬â¢ the surviving Korean comfort women were silenced for so long still remains. The surviving women have not only suffered from mental and physical injuries, but also had to suffer from additional social injuries. Many of the surviving Korean comfort women have had to live a stigmatized and isolated life as they tried to assimilate back into the communities. They were ââ¬Å"condemned to live out their lives as social, pariahs, shunned by their families, tortured by injury and illness, some sent mad by their ordealâ⬠¦some committed suicide, others became insaneâ⬠(Askin, 13). This stigmatization can be attributed to the Confucian societies in Korea for the Korean comfort women were products of this culture. The Confucian definition of the traditional feminine identity highlights docility and emphasizes chastity as a womanââ¬â¢s most important virtue (Stetz, 13). As Iris Chang reiterates: ââ¬Å"Asian Confucianism-particularly Korean Confucianism- upheld female purity as a virtue greater than life and perpetuated the belief that any woman who could live through such a degrading experience and not commit suicide was herself an affront to society] This cultural ideology demanded that unmarried women must be virgins and blamed the women for not being able to prevent any forms of sexual violation (53). With high moral value attached to chastity and purity, the comfort women ââ¬Å"invariably emerged from their wartime experiences defiled, yet unable to accuse their abusersâ⬠(Askin, 25). The fear of isolation and stigma from their defilement only silenced them, leaving these sexual atrocities in the dark for 50 years. The internalization of this feminine identity caused Korean comfort women to lose self-respect, to live in shame, and ultimately perpetuate their own stigmatization. Furthermore, the social stigma and shame attached to rape and sex were fostered by Korean society and the Korean comfort womenââ¬â¢s own families. Patty Kelly explains this stigma as ââ¬Å"a blemish of individual character that [the] women cannot escapeâ⬠¦the stigmatized person is perceived as possessing weak will, unnatural passions, and treacherous beliefsâ⬠(192). The stigma of rape and sex embody has implications on community, family, and responsibility. Kelly asserts that stigma associated with sex work ââ¬Å"circumscribes oneââ¬â¢s social relationsâ⬠¦causes fear and shameâ⬠¦creates inauthenticity in daily lifeâ⬠(194). Keith Howard describes the lives that the surviving Korean comfort women had to endure in their communities: ââ¬Å"When they returned to Koreaâ⬠¦they were neither faithful nor chaste. They were not exemplary women. The families of the comfort women feared the ostracism they would suffer if the shameful past were discovered; the women became an extra burden, and there was little chance to marry them offâ⬠(7). This social stigma and discrimination oppressed the surviving Korean comfort women. As Kelly points out, social relations with the family were tainted. Some of the Korean comfort women were seen as a disgrace to their family by their own family and by the rest of society. One Korean comfort woman by the name of Tokchin Kim has revealed that the honor of her family and the relationship with her family hindered her from publicizing her experience, which only allowed the comfort station system to remain invisible. Tokchin Kim had tried to register at the Korean Council for the Women Drafted for Military Sexual Slavery by Japan as a former comfort woman. However, her nephew expressed ââ¬Å"You will only bring trouble on your family and your children will be traumatizedâ⬠(Yoshimi, 4 9). Because of the stigmatization, humiliation, and disgrace that inevitably arose from their past as comfort women, the Korean comfort womenââ¬â¢s experiences had unjustly remained hidden for an inordinate amount of time. Conclusion The Japanese comfort stations during World War II completely disregarded comfort womenââ¬â¢s rights and silenced their past as a product of the rationale for the system. Leatherman explicates that the silences and justifications ââ¬Å"undergird[ed] the economic, social, cultural, and political power structures of patriarchy. Patriarchy is a hierarchal social order centered on dominant or hegemonic forms of masculinityâ⬠(4). The justifications and invisibility stem from the intersection of socially constructed gender, cultural, racial, and socioeconomic institutions. Comfort women have had to unjustly bear the ââ¬Å"shame, ostracism, and dishonor that should be imputed to the perpetrator of sexual violenceâ⬠(Askin, 31). There has been a continuum of this disregard into the present day as the Japanese government has failed to give an official apology for their wartime atrocities after 50 years of ignoring the existence of comfort women. This untiring neglect reproduces injustice and invisibility of the comfort women to this day. As of right now, there are only 63 registered Korean comfort women in South Korea waiting out their last years to be fully recognized as comfort women by the Japanese government. In order for there to be any strides in this movement, it is imperative that the social and gender hierarchies encumbering Japanese and Korean societies be deconstructed and reevaluated. Additionally, the vast gap between the value of the female and maleââ¬â¢s experience and rights in the patriarchal nature of Japanââ¬â¢s society needs to be closed. Bibliography Ahmed, Sara. ââ¬Å"Construction of Women And/in the Orient.â⬠Women, Power, and Resistance: An Introduction to Womenââ¬â¢s Studies. By Tess Cosslett, Alison Easton, and Penny Summerfield. Buckingham [England: Open UP, 1996. 225-32. Print. Argibay, Carmen M. ââ¬Å"Sexual Slavery and the ââ¬Å"Comfort Womenâ⬠of World War II.â⬠Berkeley Journal of International Law 21.375 (n.d.): 375-89. Print. Askin, Kelly D. ââ¬Å"Comfort Women- Shifting Shame and Stigma from Victims to Victimizers.â⬠International Criminal Law Review 1 (2001): 5-32. Print. Chang, Iris. ââ¬Å"The Rape of Nanking.â⬠The Law of War, a Documentary History. By Leon Friedman. New York: Random House, 1972. N. pag. Print. Enloe, Cynthia H. Bananas, Beaches & Bases: Making Feminist Sense of International Politics. Berkeley: University of California, 1988. Print Enloe, Cynthia H. Maneuvers: The International Politics of Militarizing Womenââ¬â¢s Lives. Berkeley: University of California, 2000. Print. Howard, Keith, and Young Joo. Lee. True Stories of the Korean Comfort Women. N.p.: Cassell, 1995. Print. Hughes, Donna M. ââ¬Å"The ââ¬ËNatashaââ¬â¢ Trade: The Transnational Shadow Market of Trafficking in Women.â⬠The ââ¬ËNatashaââ¬â¢ Trade: The Transnational Shadow Market of Trafficking in Women. Journal of International Affairs, 2000. Web. 13 Dec. 2012. Kelly, Patty. ââ¬Å"The Secrets We Keep: Sex, Work, and Stigma.â⬠Lydiaââ¬â¢s Open Door: Inside Mexicoââ¬â¢s Most Modern Brothel. By Patty Kelly. Berkeley: University of California, 2008. N. pag. Print. Kempadoo,. ââ¬Å"Women of Color and the Global Sex Trade: Transnational Feminist Perspectives.â⬠Meridians: Feminism, Race, Transnationalism. Indiana University Press, n.d. Web. 13 Dec. 2012. Kim, Hyun S. ââ¬Å"History and Memory: The ââ¬Å"Comfort Womenâ⬠Controversy.â⬠Positions: East Asia Cultures Critique 5.1 (1997): 73-108. Print. Kokopeli, Bruce, and George Lakey. ââ¬Å"More Power Than We Want: Masculine Sexuality and Violence.â⬠Reweaving the Web of Life: Feminism and Nonviolence. By Pam McAllister. Philadelphia, PA: New Society, 1982. N. pag. Print. Leatherman, Janie. Sexual Violence and Armed Conflict. Cambridge: Polity, 2011. Print. MacKinnon, Catharine A. Feminism, Marxism, Method and the State. N.p.: University of Chicago, 1987. Print. Schmidt, David A. Ianfu, the Comfort Women of the Japanese Imperial Army of the Pacific War: Broken Silence. Lewiston, NY: Edwin Mellen, 2000. Print. Stetz, Margaret D., and Bonnie B. C. Oh. Legacies of the Comfort Women of World War II. Armonk, NY: M.E. Sharpe, 2001. Print. Tanaka, Toshiyuki. Hidden Horrors: Japanese War Crimes in World War II. Boulder, CO: Westview, 1996. Print. Tong, Rosemarie. Feminist Thought: A Comprehensive Introduction. Boulder, CO: Westview, 1989. Print. ââ¬Å"Uncomfortable Truths.â⬠Trouble and Strife RSS. N.p., n.d. Web. 13 Dec. 2012. ââ¬Å"United Nations Office on Drugs and Crime.â⬠What Is Human Trafficking? N.p., n.d. Web. 13 Dec. 2012. Vance, Carole S. ââ¬Å"Social Construction Theory.â⬠An Introduction to Womenââ¬â¢s Studies: Gender in a Transnational World. By Inderpal Grewal and Caren Kaplan. Boston: McGraw-Hill Higher Education, 2006. 29-32. Print. Varga, Aniko. ââ¬Å"National Bodies: The ââ¬ËComfort Womenââ¬â¢ Discourse and Its Controversies in South Korea.â⬠Studies in Ethnicity and Nationalism 9.2 (2009): n. pag. Print. Watanabe, Kazuko. ââ¬Å"Trafficking in Womenââ¬â¢s Bodies: Then and Now: The Issue of Military ââ¬Å"Comfort Womenâ⬠â⬠Peace & Change 20.4 (1995): 501-14. Print. Yang, Hyunah. ââ¬Å"Finding the ââ¬Å"Map of Memoryâ⬠: Testimony of the Japanese Military Sexual Slavery Survivors.â⬠Positions: East Asia Cultures Critique 16.1 (2008): 79-107. Print. Yoshimi, Yoshiaki, and Suzanne Oââ¬â¢Brien. Comfort Women: Sexual Slavery in the Japanese Military during World War II. New York: Columbia UP, 2000. Print.
Wednesday, January 8, 2020
The People Of Yellow Springs - 1635 Words
Ryan Finney Professor Kristen Sweet-McFarling ANTH 2102 27 July 2016 People of Yellow Springs I spent several days observing the small village of Yellow Springs, Ohio. Founded in 1825 and incorporated in 1856, Yellow Springs has a long history of advocating for civil rights. During the Civil War, Yellow Springs became a safe haven for over thirty freed and escaped slaves. Yellow Springs has also come under government and media scrutiny multiple times over the years for the local support of the political left-wing. This became especially true during the Red Scare of the Cold War, where they supported the right of academic freedom, which included Russia and Communism (Chiddister). In the following decades the village continued its trend of civil rights advocacy, becoming the smallest town to pass ordinances that protected sexual orientation as a status, which prohibited discrimination around it. I chose to do observe the population of Yellow Springs in two major hubs of the village, in order to try and get a broad idea of what exactly it meant to be a citizen of this ââ¬Å"hip pyâ⬠town. My first observation location was on Xenia Avenue, which is the main street of ââ¬Å"downtownâ⬠, where many of the shops are located. I picked this as an observation point because it is where most people in the town go during their day to day life; I saw it as an opportunity to be able to observe the townsfolk living their lives without drawing too much attention to myself, which could skew myShow MoreRelatedFreedom Of Choice : Yellow Springs865 Words à |à 4 Pagesturning down of the industry, Yellow Springs was green, productive and alive. Yellow springs was established as an Underground Railroad town in 1825 (Ghansah, 2). This was home to Dave Chappelle, who lived a simple life amid great pastures and fresh air. This small town was home to many of the African Americans whom had the freedom to choose whatever they desired from the several pleasures, thus Yellow springs was a place defined by liberty of the blacks. In Yellow Springs, space was adequate for t heRead MoreA Report On The Dayton City865 Words à |à 4 Pagesturning down of the industry, Yellow Springs was green, productive and alive. Yellow springs was established as an Underground Railroad town in 1825 (Ghansah, 2). This was home to Dave Chappelle, who lived a simple life amid great pastures and fresh air. This small town was home to many of the African Americans who had the freedom to choose whatever they desired from the several pleasures, thus Yellow springs was a place defined by the liberty of the blacks. In Yellow Springs, space was adequate for theRead More Comparing and Contrasting the Movie and Natalie Babbitts Book Entitled Tuck Everlasting902 Words à |à 4 Pagesvery dangerous secret about a particular spring water. When you drink the water, it makes you immortal. A movie on this book was produced later on. Things change when you have to audition something that is written. And so, the movie Tuck Everlasting was very different from the book Tuck Everlasting. Winnie Foster, a ten-year-old girl, discovered a very dangerous secret about the spring water in the woods her parents owned. She found out that if the spring water is drunk, it makes one immortal. WinnieRead MoreWhat Is Tuck Everlasting Essay1616 Words à |à 7 Pagesforest where most of the characterââ¬â¢s name what they want most in the world. Winnie wants to go to the fair; Mae, wants to see her son again; Jesse wants to see the familiar sights in the forest; Miles, wants to be unstuck in time; and the man in the yellow suit wants to learn the secret of the forests and become immortal. Winnie goes into her house where she spends most of her time with her loving mother and grandmother since her father has passed away. Winnie is a good girl, but wishes her life wasRead MoreThe Four Seasons Of The Year !1021 Words à |à 5 Pagesseasons of the year! Love every season. Each season has its own unique feel to the year. For winter there is cold weather, which means bringing and st arting the New Year. Summer, who doesnââ¬â¢t love them hot summer days, eating anything that is cold. Spring, for them raining days, where the smell of fresh flowers begin to blossom, and grow. Lastly, fall. Fall is when itââ¬â¢s time for the kids to head back to school, or those Saturday night college football games to come on. Every season is meaningful inRead MoreGrowing up in central Ohio there are several things that you will see on a regular basis. One of600 Words à |à 3 Pagesseveral things that you will see on a regular basis. One of these items in a buckeye, it is the symbol of the university here in town. Around the holidays we make candies called buckeyes that are rolled balls of peanut butter dipped in chocolate. People refer to individuals from Ohio as buckeyes as well. What is a buckeye and where does it come from? The buckeye tree, which is also, known as Aesculus Glabra is the state tree of Ohio. Sometimes called a horse chestnut the buckeye tree is commonlyRead MoreThe Orange Trees By Gustave Caillebotte1169 Words à |à 5 Pagesasymmetrical due to everything mainly being on the left side of the artwork. For example, the trees, the flowers, both Martial and Zoà « are also on the left, while the right does not really have much. The artist uses more naturalistic colors such as green, yellow and red. He also uses the light as a dazzling and smoothing effect of direct sunlight, which creates value because, on the bottom half of the artwork, Martial and Zoà « are in the shade (MFAH). The artwork by Paul Ranson was ââ¬Å"influenced by the JapaneseRead MoreWest way to Yellowstone National Park Trip Theme This trip starts from Denver, Colorado to1400 Words à |à 6 Pagesname. Of the 18th century, a group of French-Canadian people hunting these river named Roche Jaune (French, meaning yellow rock), which may be translated Hidatsa this river called Mi tsi a -da-zi . After that, the American people turn to hunt for the English translation of Yellow Stone. Although Native American named source is still inconclusive, it is generally believed that this is because the Grand Canyon of the Yellowstone yellow stone Trip itinerary Day 1 (Denver---Jackson) TravelRead MoreExamples Of Realism In The Story Of An Hour892 Words à |à 4 PagesCharlotte Perkins Gilman and Kate Chopin both use realism to focus on everyday people in an accurate portrayal of life. The Yellow Wallpaper is a short story about a woman that goes to a summer home to rest and get well under the supervision of her husband who is also a physician. Her husband decided it would be best if she sat in a room alone and did nothing. In the end, she becomes insane and finally finds her freedom. The Story of An Hour is about, Mrs. Mallard, a woman who has just foundRead MoreThe Tell Tale Heart Essay1071 Words à |à 5 PagesA person that brutally killed four people, and unaware of the very fact that he is the one that murdered all of them. ââ¬Å"Strawberry Springâ⬠by Stephen King is a story that takes place at New Sharon college, at the start of strawberry spring, and the narrator tells the story about how there is a killer on the coll ege campus, and in the end we find out he is the killer. ââ¬Å"The Yellow Wallpaperâ⬠by Charlotte Perkins Gilman is a story from the perspective of a mentally ill woman, who is on a summer stay
Tuesday, December 31, 2019
Rudyard Kipling s The Jungle Book - 1375 Words
The author who wrote the beloved childrenââ¬â¢s story ââ¬Å"The Jungle Bookâ⬠is also an accused jingoist (Kipling, RudyardNobel Prize Winners). Rudyard Kipling was a European man born in Bombay India in 1865. Kipling was born during an age of British Imperialism in India (McNamara and Kipling, Rudyard Hutchinson Encyclopedia). He himself was rumored to be an imperialist for Britain. Throughout his lifetime Kipling lived in Britain, India, and the United States of America (Kipling, Rudyard World Authors). He used his many experiences from these areas to shape his writings. Kipling was also highly interested in the military affairs of Britain and managed to convince his son to join the military. In turn, this led Kipling and his wife to volunteer in the Red Cross during World War I (Kipling, Rudyard Nobel Prize Winners). Rudyard Kipling wrote works that were heavily influenced by different aspects such as Indian culture, British culture, and Imperialism, along with different military action throughout the mid to late 1800s and early 1900s. Rudyard Joesph Kipling was born to John and Alice Kipling in Bombay, India on December 30, 1865. His father, John, was the principal at the School of Art in Lahore, India. His uncle was an artist and his aunt at the time was a future British Prime Minister. In his early childhood, Kipling and his sister were raised by an Indian couple who spoke ââ¬Å"kitchen Hindiâ⬠. At the age of six Kipling and his sister were sent back to Britain to pursueShow MoreRelatedAn Analysis Of Rudyard Kipling s The Jungle Books 1275 Words à |à 6 Pagespaper, I compared the two different works of Rudyard Kipling with both the protagonists suffering from identity crisis by means of a close reading. In this study, I found out that both the novels have an autobiographical element of identity crisis. In the Jungle Books, Kipling confronts his young male audience with the reality of death and violence, in order to turn them into effici ent rulers. The law of jungle plays an important role in this. The law of jungle was meant to be practical, not moral. IRead MoreRudyard Kipling1394 Words à |à 6 PagesThe Legendary Life of Rudyard Kipling Rudyard Kipling was one of the greatest writers of all time. He was a gifted writer and a huge celebrity, and has provided us with countless writings that will continue to be enjoyed by future generations. There are two perspectives when it comes to Kiplingââ¬â¢s canonization; those that believe based solely on his writing abilities think he should be canonized, and those who saw him as an only an outspoken political figure do not. The questions surrounding hisRead MoreThe Jungle Book By George Orwell2731 Words à |à 11 PagesJohnson The Fear Necessities Considered a true classic, the Jungle Book has always been a favorite story for children everywhere. The Jungle Book is a compilation of many stories, but the more common stories are the ones involving Mowgli, a village boy who falls into the hands of a wolf pack that raise him as their own in the Indian jungle. While writing the Jungle Book, there were many distractions that ran through Rudyard Kipling?s head, including the peak of British Imperialism. These distractionsRead MoreIdentity Crisis : A State Of Psychological Distress1321 Words à |à 6 Pageswhich makes his sense of identity becomes insecure on physical and intellectual segregation from the main stream of life. It is accepted by the psychologists that the establishment of character is a standout amongst the most crucial parts of a human s life. A personality emergency is a period of investigation and concentrated dissection of diverse methods for taking a gander at oneself. People, particularly adolescents experie nce the development of personality emergency in which they have battle betweenRead MoreI Will Be Exploring The Short Film Surviving Sabu Which Was Written And Directed By Ian Iqbal Rashid In 19982740 Words à |à 11 Pagesï » ¿Explore the presentation of Orientalist discourses in the short film Surviving Sabu. I will be exploring the short film Surviving Sabu which was written and directed by Ian Iqbal Rashid in 1998, with reference to the 1942 film The Jungle Book. My analysis will question the presentation of Indian and Muslim identities in both films. Surviving Sabu presents the relationship between two characters: a father and his son. The family have immigrated to England at some point in recent decades, althoughRead MoreThe Most Dangerous Game Essay815 Words à |à 4 Pages Personal essay Throughout the past five years, I have indulged myself in a fascinating array of short stories. From stories such as ââ¬Å"Rikki-Tikki-Taviâ⬠by Rudyard Kipling to ââ¬Å"Song of the Treesâ⬠by Mildred D. Taylor, to even ââ¬ËThe Smallest Dragonboyââ¬â¢ by Anne McCaffrey, just to say a few. All these stories stood out to fascinate me in a variety different ways. They included thrilling adventures, saddening romances, murderRead MoreMasquerading Colonial Innocence in Rudyard Kiplings Kim2940 Words à |à 12 PagesKim: Masquerading Colonial Innocence Introduction Rudyard Kipling was one of the most famous writers of his time, and his popular novel Kim, had first become published in 1901, has turned into one of his most infamous non-juvenile writing masterpieces. The novel happens during a time and place that is contemporary to the publication of the book; the location is set in India up under the reign of the British Empire. The main character is a boy of Irish descent who has been an orphan that has grownRead More 1900-1910 Essay1184 Words à |à 5 PagesSigmund Freud wrote a book called The Interpretation of Dreams (Magill 14). This book documented Freudââ¬â¢s theory that dreams are meaningful and can be understood. Another great mind of that era was Albert Einstein. He came up with his theory of relativity in 1905(Magill 19). Great artists of the world were also creating some of their most brilliant work during this decade. Henri Matisse fought to find the artistic freedom he needed by creating the Fauvist movement in the early 1900ââ¬â¢s(Pioch 2). FauvismRead More1.Briefly Describe Your Favorite Character From Literature,1859 Words à |à 8 Pagessociological perspective. Be sure that you clearly define and identify the sociological perspective and the sociological imagination. Be careful not to give a detailed summary of the character ââ¬â stick to the sociology! The New View about The Jungle Book of 2016 Scientists believe that every child is born as a blank sheet of paper, their development depends very much on the environment, especially on their parents. However, not every child is fortunate to grow up in the arms of the family. ProofRead MoreLiterary Tendency of Victorian Literature: Special Reference to Lord Alfred Tennyson and Robert Browning3101 Words à |à 13 Pagesreached its height and covered about a quarter of the Earth. Industry and trade expanded rapidly, and railways and canals crisscrossed the country. Science and technology made great advances. The size of the middle class grew enormously. By the 1850s, more and more people were getting an education. In addition, the government introduced democratic reforms, such as the right to vote for an increasing number of people. Many important events took place during Victorias reign. Britain fought in the
Monday, December 23, 2019
Effect of the Police on the Prison Population Essays
Effect of the Police on the Prison Population Because of the increase in crime in America, the public has demanded an increase in the amount of protection received from police. This increase in police protection has increased the incarceration level by numerous amounts within the last ten years. The number of inmates incarcerated in America is a direct cause of the policing that is going on in the streets of American cities. The method of policing has a tremendous impact on the outcome of the situation, meaning the type of policing determines the amount of arrests mad and the amount of inmates incarcerated. The historical pattern of prison sentencing has always shown that the offenders almost always served a much shorter sentence thanâ⬠¦show more contentâ⬠¦Experiments done on the effectiveness of police during the 1970s showed that traditional methods of policing were not effective in decreasing the amount of crime on the streets. Until the early 1970s most states used the indeterminate sentencing method which allowed parole boards the authority to allow offenders to be released early. The idea of indeterminate sentencing came about in the mid-1800s and was preferred over determinate sentencing because determinate sentencing allowed no room for reform. Because of the dissatisfaction with indeterminate sentencing and the pressure for longer sentencing, there was a policy implemented in the 1980s which made it mandatory to have a guide for the minimum amount of time served as well as new sentencing guidelines. This method caused inmates to serve more time and because of this, there became a problem with overcrowding. To alleviate the overcrowding, inmates were then available to get sentence reduction because of good behavior and also with certain work programs they could be released early by the building up of earned time credit. In 1984 the first truth in sentencing laws were in acted. These laws required that prisoners serve a substantial portion of their sentence. To ensure that offenders served the majority of their sentence, the violent crime control and law enforcement act of 1994 were passed. This act allowed additionalShow MoreRelatedIncreased Population of Prisons Essay1606 Words à |à 7 PagesOvercrowded prisons and improper punishment systems are enormous social issues for our government. The United States has seen steady growth in its prisons. A projected increment in seen due to ââ¬Å"get-toughâ⬠policies that locks up offenders for longer sentences (Ohlemacher, 2007, para. 1). The correction system had been through various phases of transformation, and the government had been tough on crime; this approach had resulted in rising prison populations. There are many factors that cause overcrowdingRead MoreMichelle Alexander s The New Jim Crow Essay1123 Words à |à 5 PagesStates. Although this statement is partially true, Alexander misses the fact that in recent years, other racial groups have been affected by the same unjust profiling done by authorities . Recently, overall police brutality and racial profiling has seen an increase in the United States population. Furthermore, unprovoked or inappropriate use of force by authorities has sparked conversation in America racial profiling and incarceration rates in the country. Due to this, claiming that Jim Crow laws orRead MorePolice Perceptions And Programs Like Crisis Intervention Teams1281 Words à |à 6 PagesPolice officers usually are the first people to respond to mental health emergencies. This means that police officers have the most discretion when deciding what to do with mentally ill individuals who commit crimes. Mentally ill individuals are more likely to be arrested regardless of severeness or type of crime, then any other population. There have been several cases that suggest that police use of force with mentally ill individuals is different. This field of study is relatively new and thereRead MoreSentencing Guidelines For Non Violent Drug Offenders1371 Words à |à 6 PagesThe United Statesââ¬â¢ prison population is currently number one in the world. As a nation that proclaims freedom for citizens, the United States houses more than one million more persons than Russian and almost one million more persons than China. Currently, the United States makes up five percent of the worldââ¬â¢s population and imprisons twenty-five percent of the worldââ¬â¢s inmate population. Drug offenders who committed no act of violence make up a large portion of the inmates in the United States. CountyRead MoreRacial Disparities Of Mass Incarceration1572 Words à |à 7 Pageschoice because rapid growth in the prison and jail populations, the long sentences the inmates face, and the inability for some inmates to incorporate themselves back into society. Since the 1970ââ¬â¢s the U.S. prison population quadrupled from 158 to 635 people per 100,000, causing the U.S. to gain the title of country with the highest incarceration rate. (Massoglia, Firebaugh, Warner, 2013, p. 142; Muller, 2012) As the growth of the U.S prison and jail population rapidly increased, so did the growthRead MoreCanada s Prisons Are The New Resdiential School Essay1629 Words à |à 7 PagesCANADAââ¬â¢S PRISONS ARE THE ââ¬ËNEW RESDIENTIAL SCHOOLââ¬â¢ Nancy Macdonald (2016), an editor who works for the Macleanââ¬â¢s, writes an article on the way Indigenous and non-Indigenous citizens are treated by the law and police force. At least 36 per cent of the women and 25 per cent of men, who are Indigenous, were already sentenced to provincial and territorial custody in Canada. Nancy explains, from these scores, these statistics make up at least 4 per cent of the national population. She also explainsRead MoreProfit Over Youth : A Look Into The Business Of Prison950 Words à |à 4 PagesProfit Over Youth: A Look into the Business of Prison. The Office of Juvenile Justice and Delinquency Prevention established that in 2009 there were a total of 1,812,900 juvenile arrest. These arrest consisted of those who were arrested and never tried as adults, for the purpose of this paper the same definition of a juvenile will be used. It can be easily argued that the juvenile population is Americas most vulnerable, and this is the population that we are arresting at such high numbers. To understandRead MoreWe Can Not Deny Society s Progression Of Social Equality Essay1187 Words à |à 5 PagesWe cannot deny societyââ¬â¢s progression of social equality, however, it is imperative that we not only understand the inequalities that are presently riddled in our social framework, but also understand how inequalities effect people at both micro and macro levels and how they intersect. Acquiring some base knowledge of institutionalized inequalities is fundamental to any attempts in rectifying (or easing) social injustices. Using Patricia Hill Collinsââ¬â¢ Intersectionality theory, along with Omi and Winantsââ¬â¢Read MoreThe War On Drugs : American Foreign And Domestic Policy1676 Words à |à 7 Pageshave been imprisoned, many have been unfairly treated by the criminal justice system, the rights of both legitimate suspects and average citizens have been violated and the quality of life of many millions more has been adversely affected. These effects are the consequences of deliberate decisions; first, to fight a war on drugs, and second, to fight that war against low-level street dealers in communities populated by people of color. In this section, I consider the impact of the War on DrugsRead MoreThe Endless Battle with Prison Gangs1689 Words à |à 7 PagesBattle with Prison Gangs As the years pass, the rate of gang affiliated crimes in the Unites States has progressed extensively, accumulating more inmates into our major prisons doubling the maximum occupancy that the jails can hold. In the U.S there are currently 33,000 active violent street, motorcycle, and prison gangs with a recorded 1.4 million members combined. The registered number of police officers is a mere 683,396; which is not even half of our countries gang population. Incredibly enough
Sunday, December 15, 2019
Bomb Threat and Explosion Investigation Free Essays
In addition, other law enforcement agencies may have specific information value. The Intelligence Service, Armed Forces of the Philippines (ISAFP), Police Intelligence Group (PIG) and National Intelligence Coordinating Agency (NICA) maintains files on individuals who make threats against political leaders. The Bureau of Customs (BOC) may provide information of imported goods; the Bureau of Immigration and Deportation (BID) can provide information on individuals entering or leaving the country; the Firearms and Explosive Division, Civil Security Group, Philippine National Police (FED, CSG, PNP) maintains records on firearms and explosives; the Bureau of Corrections (BUCOR) maintains records on fugitives; the Philippine Postal Corporation (PHILPOST) may assist in matters related to the mails; the National Anti-Kidnapping Task Force (NAKTAF) may, have files of information and intelligence because they have primary jurisdiction in kidnap-for-ransom cases. We will write a custom essay sample on Bomb Threat and Explosion Investigation or any similar topic only for you Order Now On the local level, the local police authorities frequently maintain individual photo or ââ¬Å"mugâ⬠files, alias files, business indexes, modus operandi (MO) files, victimization records and crime patterns. In addition, court records, probation and parole files, and other municipal records such as utilities, may prove valuable. Records of businesses, such as the telephone, electric and water companies, may also be helpful. Surveillance and stakeouts are important components of kidnap-for-ransom investigations. These activities may require various forms of electronic surveillance, including wiretapping, eavesdropping, automobile locator systems, videotaping and photography. Such efforts may require assistance from other agencies. The investigator should be familiar, not only with the use of such equipment, but also with the laws surrounding their application. The investigator must know when a court order is necessary for the use of electronic surveillance. In no case should an investigator use extralegal means to secure information. CHAPTER 7 BOMB THREAT AND EXPLOSION INVESTIGATION INTRODUCTION The use of explosives, by certain criminals and criminal organizations, has increased since the mid ââ¬â 1980ââ¬â¢s. Statistics also show that homes, vehicles and businesses were the primary targets of bombings and, in eight out of ten incidents, the motive was vandalism and revenge. Bombs are often made out common household items regularly found in the kitchen, garage or under the sink. The pipe bomb, the easiest bomb to construct, is often packed with screws and nails which act as projectiles, similar to hand grenades. These are materials that the bomber relies on, in part, to help conceal their identity. Because they are usually home-made, they are limited in their design only by the imagination of the bomber. When searching for a bomb, the investigator should simply look for anything that appears unusual. The bomb technician decides what is and is not a bomb. The bombing crime scene must be linked to the bomber and, if found intact, the bombs themselves can sometimes reveal the identity of the bomber. Bombs can be constructed to look like almost anything and can be placed or delivered in a variety of ways. The chance of locating a bomb that looks like the stereotypical bomb is almost non-existent. INVESTIGATING THE BOMB THREAT Bomb threats are delivered in a variety of ways. Most are telephoned in to the target. Occasionally, these calls are made through a third party. Sometimes, a threat is communicated through in writing or via a recording. There are two (2) general explanations as to why the bombers communicate a bomb threat: 1. The caller has definite knowledge or believes that an explosive or incendiary bomb has been or will be placed, and that he or she wants to minimize personal injury or property damage. The caller may be the person who placed the device or someone else who has become aware of such information. 2. The caller wants to create an atmosphere of anxiety and panic that will, in turn, results in disruption of normal activities at the facility where the device is supposedly placed. Whatever the reason, there will certainly be a reaction to it. However, through proper planning, the wide variety of uncontrollable reactions can be minimized. The bomb threat caller is the best source of information about a bomb. When bomb threat is called in, the following steps should be implemented: 1. Keep the caller on the line as long as possible. 2. Ask him or her to repeat the message and record every word spoken by the person. 3. Ask the caller about the location of the bomb and the time of detonation of the device. 4. Inform the caller that the building is occupied and the detonation of a bomb could kill or injure innocent people. 5. Pay particular attention to background noise such as motor running, music playing or any other noise. This may give a clue as to the location of the caller. 6. Listen closely to he voice (male or female), voice quality (calm or excited), accent and speech impediments. 7. Interview the person who received the call for the preceding information. RESPONDING TO A BOMB THREAT In response to a bomb threat, the following reminders must be strictly observed by the first responders: 1. Refrain from broadcasting while at the location. Radio transmissions might trigger the explosive device. 2. Anyone involved in the search must not touch any suspected items. Under any circumstances, if a suspicious object is located, it should not be touched or disturbed. 3. Maintain a safe distance from the explosive device. 4. Call the Explosive Ordinance Disposal Team (EODT) to handle the explosive device. SAFETY PRECAUTIONS In a raid or search situation in which explosive devices are expected to be encountered, investigations should be accompanied by an explosives expert. This person can be used to inform other police officers of what type of device is at hand and how best to proceed safely with the raid. Other precautions include the following: 1. Only one officer at a time should approach the suspected booby trap. 2. When trip wires are located, both ends of the wire should be checked. 3. Wires that appear to be electric should not be cut. 4. No containers should be opened without thorough examination. ELEMENTS OF BOMB INCIDENT PLANNING To counter bomb incidents, a physical security plan and bomb incident plan should be made. The elements of these plans are as follows: 1. Control 1) Who will be in charge of the incident? 2) Where will the control center be located? 3) How will critical decisions be made? 4) Who will man the control center? 5) What primary and alternate communication system will be employed during the incident? 2. Initiation What procedures will be followed upon receipt of a bomb threat or notice that a device has been found? 3. Evacuation If evacuation is ordered, what procedure will be followed? 4. Search 1) What will be searched? 2) What search technique will be employed? 3) Who will search? 5. Damage Control 1) What damage control measures will be taken? ) Who will take the damage control measure? 6. Detonation 1) What procedure will be followed if a bomb detonates without warning? BOMB ââ¬â SEARCHING TECHNIQUES A two-person search item is recommended when looking for bombs. When the search team enters the room, they should first move to various parts of the room and stand quietly, with their eyes closed, and listen for clockwork device. Often, a clockwork device can easily be detected without the use of specialized equipment. Even if no clockwork mechanism can be detected, the search team is now aware of the background noise level within the room itself. Background noise is always disturbing during a building search. If a ticking sound is heard but cannot be located, one might become unnerved. The ticking sound might come from an unbalanced air conditioner fan, several floors away, or from a dripping sink down the hall. Sound can transfer through air conditioning ducts, along water pipes and through walls. One of the more difficult buildings to search is one that has steam of hot water heat. This type of building will constantly thump, crack, chatter and tick because of the movement of the steam of hot water through the pipes and the expansion and contraction of the pipes. The room should be divided into two virtually equal parts. An imaginary line is then drawn between two objects in the room. The first searching height will usually cover items in the room up to hip height. The searchers then position themselves on opposite sides of the room and begin searching their way around the room, working toward each other. During the search, all items resting on the floor and positioned around or on the wall area are inspected. Although many minor variations are possible in searching a room, the following are the summary of the basic searching steps: 1. Divide the area and select a search height. 2. Start from the bottom and work yourself up. 3. Start back-to-back and work toward each other. 4. Go around the walls and proceed toward the center of the room. How to cite Bomb Threat and Explosion Investigation, Papers
Friday, December 6, 2019
Prevent Computer Crime Essay Example For Students
Prevent Computer Crime Essay Computer Crime Billions of dollars in losses have already been discovered. Billions more have gone undetected. Trillions will be stolen, most without detection, by the emerging master criminal of the twenty-first centurythe computer crime offender. Worst of all, anyone who is computer literate can become a computer criminal. He or she is everyman, everywoman, or even everychild. The crime itself will often be virtual in naturesometimes recorded, more often notoccurring only on the Internet, with the only record being electronic impulses. Before discussing Internet crimes, we can expect to see in the years ahead, lets look at the good news: The most-dreaded types of offensescrimes such as murder, rape, assault, robbery, burglary, and vehicle theftwill be brought under control in the years ahead by a combination of technology and proactive community policing. Creation of the cashless society, for example, will eliminate most of the rewards for robbers and muggers, while computer-contro lled smart houses and cars will thwart burglars and auto thieves. Implanted bodily function monitors and chemical drips (such as sober-up drugs and synthesized hormones) will keep most of the sexually and physically violent offenders under control. But computer criminalsranging in age from preteen to senior citizenwill have ample opportunities to violate citizens rights for fun and profit, and stopping them will require much more effort. Currently, we have only primitive knowledge about these lawbreakers: Typically, they are seen only as nuisances or even admired as innovators or computer whizzes. But increasingly, the hacker is being replaced by the menacing crackeran individual or member of a group intent on using the Internet for illegal profit or terrorism. Access to the Internet has begun to expand geometrically, and technology is making the Internet even more friendly and affordable for millions of users. But foolproof protective systems can probably never be developed, althou gh some high-tech entrepreneurs are certainly trying. Even if a totally secure system could ever be developed, it would likely disrupt the free flow of informationan unacceptable intrusion to most users. In fact, it is the ease of access that is driving this rapidly expanding field of crime. What are the major computer crimes being committed, how, and by whom? More importantly, where is computer crime headed in the twenty-first century? Lets look at five crime categories: communications, government, business, stalking, and virtual crimes. COMMUNICATIONS CRIMES Already, cellular theft and phone fraud have become major crimes. Low-tech thieves in airports and bus terminals use binoculars to steal calling-card access numbers as unsuspecting callers punch in their phone codes. Other thieves park vans beside busy interstate highways and use equipment obtained from shopping mall electronics stores to steal cellular phone access codes from the air. Within moments of these thefts, internati onal calls are being made with the stolen numbers in what is becoming a multibillion-dollar-a-year criminal industry. Phone company employees, meanwhile, are also stealing and selling calling card numbers, resulting in more hundreds of millions of dollars in unauthorized calls. In 1994, an MCI engineer was charged with selling 60,000 calling card numbers for $3 to $5 each, resulting in more than $50 million in illegal long-distance charges. In another case, when a phone company tried to institute a call-forwarding program, crackers quickly defrauded the system of more money than the company stood to make in legal profits. In the future, the opportunities for hacking and cracking will escalate, with telephones, computers, faxes, and televisions interconnected to provide instantaneous audiovisual communication and transmission of materials among individuals. The wide appeal of new multimedia communication systems will likely create such a huge volume of subscribers that the price will plummet and make access by all possible. But if billions of dollars of losses are to thieves, compounded by billions more required to repair damages created by system terrorists, the cost might become prohibitive to all but the wealthy. COMPUTER CRIMES AGAINST THE GOVERNMENT In 1995, the U.S. Internal Revenue Service instituted stringent new regulations on electronic tax filing and returns. This move was to stop a rash of fraud that cost taxpayers millions in 1994: Returns that were processed quickly via this method turned out to be for tens of thousands of fictitious corporations and individuals. Similarly, in an attempt to stop food-stamp fraud, the government issued electronic debit cards to a trial population and plans to go nationwide with the system later in the decade. However, reports show that many recipients are selling their benefits for cash50 to 60 on a dollarto brokers who then receive full payment. Cyberpunks regularly break into government computer systems, usually out of curiosity and for the thrill of the challenge. They often intercept classified data and sometimes even interrupt and change systems. One U.S. Justice Department official reported that military computers are the most vulnerable, even less secure than university computers. This official noted that, during Operation Desert Storm, hackers were able to track both actual and planned troop movements. James V. Christy II, director of an Air Force unit of computer-crime investigators, set up a team of hackers to test the security of military computer systems. He reported that the hackers broke into Pentagon systems within 15 seconds and went on to break into over 200 Air Force systems with no one reporting or even recognizing the break-ins. Ironically, computer hackers often beat the system using the very technology intended to stop them. For example, federal law-enforcement agencies use an Escrowed Encryption Standard to protect classified information and a chip-specific key to decry pt the system. Experienced hackers can easily discover the key and use it to obtain passwords, gaining full access to encrypted systems. Newer, more-secure encryption systems for protecting government and international business transactions require storing the keys in escrow with a specific government agencyusually the U.S. Treasury Department. Hackers find this security solution unacceptable because it slows the free flow of information and puts almost all sensitive and important data in the hands of government officials. This is seen by many as being dangerous to individual freedoms and a major step in the direction of creating a class structure based on the information rich and information poor.. As more government data is stored in computers, protection will become both more vital and more difficult. When the livelihood of an individual depends on data in government computers, the temptation to adjust that record to increase benefits and reduce charges will be great. Many will t ry to do the adjusting themselves; others will be willing customers for a burgeoning black market of professional crackers. For those who have little need for government benefits but would like to eliminate their tax liability, a highly destructive method would be to plant a computer virus in government computers to destroy large numbers of records. In this way, suspicion would not fall on an individual. TARGETING BUSINESS Today, most banking is done by electronic impulse, surpassing checks and cash by a wide margin. In the near future, nearly all business transactions will be electronic. Thus, access to business computers equals access to money. Recently, computer hacker John Lee, a founder of the infamous Masters of Deception hacker group, discussed his 10-year career, which began when he was 12 years old and included a one-year prison term in his late teens. Without admitting to any wrongdoing, Lee said that he could commit a crime with five keystrokes on the computer. He could: (1) change credit records and bank balances; (2) get free limousines, airplane flights, hotel rooms, and meals without anyone being billed; (3) change utility and rent rates; (4) distribute computer software programs free to all on the Internet; and (5) easily obtain insider trading information. Though prison was no fun, Lee admitted that he would certainly be tempted to do it all again. In a groundbreaking study published in Criminal Justice Review in the spring of 1994, Jerome E. Jackson of the California State University at Fresno reported the results of a study of a new group of criminals he called fraud masters. These professional thieves obtain credit cards via fake applications, or by electronic theft, and pass them around among their peers internationally for profit. These young men and women want the good life after growing up in poverty. They are proud of their skills of deception and arrogant enough to feel they wont be caught. None of those in the five-year case study we re caught. As seen in the $50-million-plus losses in the MCI case, a far greater threat to businesses than hackers are disgruntled and financially struggling employees. As internal theft from retail stores has always been many times greater in volume than theft from shoplifters, robbers, and burglars, theft by employees armed with inside information and computer access is and will continue to be a much larger problem than intrusion by hackers, crackers, and terrorists combined. By the turn of the century, 80% of Americans will process information as a major part of their employment, according to a United Way study. In addition, the future portends new and brighter for-profit invasion of business computers. As one Justice Department official says, This technology in the hands of children today is technology that adults dont understand. The first generation of computer-literate citizens will reach adulthood shortly after the turn of the century and will surely open a new age in the an nals of crime and crime fighting. COMPUTER-STALKING One frightening type of computer criminal emerging rapidly is the cyberstalker. Possibly the most disturbing of these criminals is the pedophile that surfs computer bulletin boards, filled with bright young boys and girls, in search of victims. He develops a relationship and then seeks to meet the child in person to pursue his sexual intentions. Already recognized as a serious problem, cyberstalking has spawned the cybercop a police officer assigned to computer bulletin boards in search of these pedophiles. Once a suspect is spotted, the cybercop plays the role of a naive youngster and makes himself or herself available for a meeting with the suspect in hopes of gaining evidence for an arrest. Also on the network, in search of pedophiles, are computer pornography sellers who offer magazine-quality color photographs of young boys and girls in a variety of sexually suggestive or actual sexual acts. Such a ring was broken up in 1994 a nd was found to have clients in several countries, with the pictures themselves transmitted from Denmark. Another type of stalker expected to be seen more in the future is the emotionally disturbed loner, seeking attention and companionship through the Internet, and who often becomes obsessed with a bulletin board friend. If this person obtains personal information about the acquaintance, he or she sometimes seeks a close, often smothering relationship. If spurned, the stalker launches a campaign of harassment, moving into real-space harassment if adequate information is obtained. Vengeance can take many forms, from ruining credit records and charging multiple purchases to the victim to creating criminal records and sending letters to employers informing them of the shady background of the victim. In the twenty-first century, with access to the Internet available to all and information from data banks networked into dossiers reserved for official use only (but easily accessible to h ackers and crackers), stalking will not only increase but be facilitated by a new generation of portable computers. Organic nanocomputers may one day be implanted in the human brain, making possible a new crime: mindstalking. Unauthorized intrusion and seduction will reach directly into the victims brain, making the stalker harder to evade and even more difficult to escape. VIRTUAL CRIMES Stock and bond fraud is already appearing on the Internetstocks and bonds that appear on the markets, are actively traded for a short time, and then disappear. The stocks and bonds are nonexistent; only the electronic impulses are real. In a recent case, a trader was paid $9 million in commissions for what appeared to be some $100 million in sales of bonds. But investigators now feel that these bonds may never have changed hands at all, except over the Internet. In the future, a virtual-reality expert could create a hologram in the form of a respected stockbroker or real estate broker, then advise clients on the Internet to buy certain stocks, bonds, or real estate. Unsuspecting victims acting on the advice might later find that they had enlarged the coffers of the virtual-reality expert, while buying worthless or nonexistent properties. This is just the tip of the iceberg in what might be tagged as virtual crimeoffenses based on a reality that only exists over the computer. As virtual reality becomes increasingly sophisticated, it is the young adults in the first decade of the twenty-first century whohaving grown up with virtual realitywill create the software and determine the legal and criminal uses of this technology. And with virtual reality potentially reaching directly into the brains of recipients via organic computers, the ability to separate reality from the truth outside, will be one of the greatest challenges of the twenty-first century. TWENTY-FIRST CENTURY EXPECTATIONS The outlook for curtailing computer crime by technology or conventional law-enforcement method s is bleak. Most agencies do not have the personnel or the skills to cope with such offenses, and to date all high-tech approaches have been met by almost immediate turnabouts by hackers or crackers. As individuals see and talk to each other over computers in the next few years, and as nanotechnology makes computers even more portable, new technology will emerge to protect data. But simplifying systems to make them more universally acceptable and accessible will also make them more vulnerable to intruders. Control of access by optical patterns, DNA identification, voice spectrographs, encryption, and other methods may slow down hackers, but no method is foolproof or presents much of a challenge to todays most-talented hackers. The trouble is that in the future many more users will have skills far beyond those of todays crackersa process one expert termed the democratization of computer crime.. Still, there is much to be gained by easy access to the Internet. The cyberpunk imperative s, a code subscribed to many hackers, include: (1) information should be free so that the most capable can make the most of it; (2) the world will be better off if entrepreneurs can obtain any data necessary to provide needed or desired new products and services; and (3) decentralization of information protects us all from Big Brother.. Computer crime probably cannot be controlled by conventional methods. Technology is on the side of the offender and motivation is highits fun, exciting, challenging, and profitable. The only real help is one that has not proven very successful in recent decades: conscience and personal values, the belief that theft, deception, and invasion of privacy are simply unacceptable. Behavioral psychologists argue that all values are learned by a system of rewards and, to a lesser extent, punishment. Thus, if these values are necessary for survival, children should consciously be conditioned to live by them. If all citizensall computer userswere taught these values and sought to live by them, the Internet could become the wondrous and friendly place its creators have envisioned. Ironically, the greatest possible allies to be found in this search for values are the adolescent hackers of the 1980s, many of whom are the software programmers of the 1990s. In his book, Secrets of a Super-Hacker, a hacker named Knightmare says that true hackers love to break into systems and leave proof of their skills, but do not hurt individuals by stealing tangible goods or money, or destroying files or systems. Hacker ethics, Knightmare writes, include informing computer managers about problems with their security and offering to teach and share knowledge about computer security when asked. Increasingly, government and business computer managers are asking. Many of the Fortune 500 companies and numerous government agencies have hired hackers to test their systems and even design new security protocols for them. Thus, hackers are helping to protect the inf ormation superhighway from crackers and terrorists. As one hacker says, Hackers love computers and they want the Net safe. In conclusion, computer crime is major part of our technological society and should be dealt with similarly to real crimes. In the electronic world, it is harder to find the criminal and track him/her down. In the end, all advantages, such as using a computer, come with their disadvantages, computer crime in its worst form. Bibliography Works Cited Caryl, Christian. Reach out and rob someone. Russian V. Levin robs Citibank. U.S. News World Report April 1997: 58 Chidley, Joe. Cracking the Net. Macleans May 1995: 54-56. Gill, Mark Stuart. Cybercops take a byte out of computer crime. Smithsonian May 1997: 114-116. Roush, Wade. Hackers taking a byte out of computer crime. Technology Review April 1995: 32-40 Sussman, Vic S. Policing cyberspace. U.S. News World Report Jan 1995: 54-60 Witkin, Gordon. Wanted, in cyberspace. U.S. News World Report March 1994: 71 Word Count: 2719 None Provided2 Analysis Essay
Prevent Computer Crime Essay Example For Students
Prevent Computer Crime Essay Computer Crime Billions of dollars in losses have already been discovered. Billions more have gone undetected. Trillions will be stolen, most without detection, by the emerging master criminal of the twenty-first centurythe computer crime offender. Worst of all, anyone who is computer literate can become a computer criminal. He or she is everyman, everywoman, or even everychild. The crime itself will often be virtual in naturesometimes recorded, more often notoccurring only on the Internet, with the only record being electronic impulses. Before discussing Internet crimes, we can expect to see in the years ahead, lets look at the good news: The most-dreaded types of offensescrimes such as murder, rape, assault, robbery, burglary, and vehicle theftwill be brought under control in the years ahead by a combination of technology and proactive community policing. Creation of the cashless society, for example, will eliminate most of the rewards for robbers and muggers, while computer-contro lled smart houses and cars will thwart burglars and auto thieves. Implanted bodily function monitors and chemical drips (such as sober-up drugs and synthesized hormones) will keep most of the sexually and physically violent offenders under control. But computer criminalsranging in age from preteen to senior citizenwill have ample opportunities to violate citizens rights for fun and profit, and stopping them will require much more effort. Currently, we have only primitive knowledge about these lawbreakers: Typically, they are seen only as nuisances or even admired as innovators or computer whizzes. But increasingly, the hacker is being replaced by the menacing crackeran individual or member of a group intent on using the Internet for illegal profit or terrorism. Access to the Internet has begun to expand geometrically, and technology is making the Internet even more friendly and affordable for millions of users. But foolproof protective systems can probably never be developed, althou gh some high-tech entrepreneurs are certainly trying. Even if a totally secure system could ever be developed, it would likely disrupt the free flow of informationan unacceptable intrusion to most users. In fact, it is the ease of access that is driving this rapidly expanding field of crime. What are the major computer crimes being committed, how, and by whom? More importantly, where is computer crime headed in the twenty-first century? Lets look at five crime categories: communications, government, business, stalking, and virtual crimes. COMMUNICATIONS CRIMES Already, cellular theft and phone fraud have become major crimes. Low-tech thieves in airports and bus terminals use binoculars to steal calling-card access numbers as unsuspecting callers punch in their phone codes. Other thieves park vans beside busy interstate highways and use equipment obtained from shopping mall electronics stores to steal cellular phone access codes from the air. Within moments of these thefts, internati onal calls are being made with the stolen numbers in what is becoming a multibillion-dollar-a-year criminal industry. Phone company employees, meanwhile, are also stealing and selling calling card numbers, resulting in more hundreds of millions of dollars in unauthorized calls. In 1994, an MCI engineer was charged with selling 60,000 calling card numbers for $3 to $5 each, resulting in more than $50 million in illegal long-distance charges. In another case, when a phone company tried to institute a call-forwarding program, crackers quickly defrauded the system of more money than the company stood to make in legal profits. In the future, the opportunities for hacking and cracking will escalate, with telephones, computers, faxes, and televisions interconnected to provide instantaneous audiovisual communication and transmission of materials among individuals. The wide appeal of new multimedia communication systems will likely create such a huge volume of subscribers that the price will plummet and make access by all possible. But if billions of dollars of losses are to thieves, compounded by billions more required to repair damages created by system terrorists, the cost might become prohibitive to all but the wealthy. COMPUTER CRIMES AGAINST THE GOVERNMENT In 1995, the U.S. Internal Revenue Service instituted stringent new regulations on electronic tax filing and returns. This move was to stop a rash of fraud that cost taxpayers millions in 1994: Returns that were processed quickly via this method turned out to be for tens of thousands of fictitious corporations and individuals. Similarly, in an attempt to stop food-stamp fraud, the government issued electronic debit cards to a trial population and plans to go nationwide with the system later in the decade. However, reports show that many recipients are selling their benefits for cash50 to 60 on a dollarto brokers who then receive full payment. Cyberpunks regularly break into government computer systems, usually out of curiosity and for the thrill of the challenge. They often intercept classified data and sometimes even interrupt and change systems. One U.S. Justice Department official reported that military computers are the most vulnerable, even less secure than university computers. This official noted that, during Operation Desert Storm, hackers were able to track both actual and planned troop movements. James V. Christy II, director of an Air Force unit of computer-crime investigators, set up a team of hackers to test the security of military computer systems. He reported that the hackers broke into Pentagon systems within 15 seconds and went on to break into over 200 Air Force systems with no one reporting or even recognizing the break-ins. Ironically, computer hackers often beat the system using the very technology intended to stop them. For example, federal law-enforcement agencies use an Escrowed Encryption Standard to protect classified information and a chip-specific key to decry pt the system. Experienced hackers can easily discover the key and use it to obtain passwords, gaining full access to encrypted systems. Newer, more-secure encryption systems for protecting government and international business transactions require storing the keys in escrow with a specific government agencyusually the U.S. Treasury Department. Hackers find this security solution unacceptable because it slows the free flow of information and puts almost all sensitive and important data in the hands of government officials. This is seen by many as being dangerous to individual freedoms and a major step in the direction of creating a class structure based on the information rich and information poor.. As more government data is stored in computers, protection will become both more vital and more difficult. When the livelihood of an individual depends on data in government computers, the temptation to adjust that record to increase benefits and reduce charges will be great. Many will t ry to do the adjusting themselves; others will be willing customers for a burgeoning black market of professional crackers. For those who have little need for government benefits but would like to eliminate their tax liability, a highly destructive method would be to plant a computer virus in government computers to destroy large numbers of records. In this way, suspicion would not fall on an individual. TARGETING BUSINESS Today, most banking is done by electronic impulse, surpassing checks and cash by a wide margin. In the near future, nearly all business transactions will be electronic. Thus, access to business computers equals access to money. Recently, computer hacker John Lee, a founder of the infamous Masters of Deception hacker group, discussed his 10-year career, which began when he was 12 years old and included a one-year prison term in his late teens. Without admitting to any wrongdoing, Lee said that he could commit a crime with five keystrokes on the computer. He could: (1) change credit records and bank balances; (2) get free limousines, airplane flights, hotel rooms, and meals without anyone being billed; (3) change utility and rent rates; (4) distribute computer software programs free to all on the Internet; and (5) easily obtain insider trading information. Though prison was no fun, Lee admitted that he would certainly be tempted to do it all again. In a groundbreaking study published in Criminal Justice Review in the spring of 1994, Jerome E. Jackson of the California State University at Fresno reported the results of a study of a new group of criminals he called fraud masters. These professional thieves obtain credit cards via fake applications, or by electronic theft, and pass them around among their peers internationally for profit. These young men and women want the good life after growing up in poverty. They are proud of their skills of deception and arrogant enough to feel they wont be caught. None of those in the five-year case study we re caught. As seen in the $50-million-plus losses in the MCI case, a far greater threat to businesses than hackers are disgruntled and financially struggling employees. As internal theft from retail stores has always been many times greater in volume than theft from shoplifters, robbers, and burglars, theft by employees armed with inside information and computer access is and will continue to be a much larger problem than intrusion by hackers, crackers, and terrorists combined. By the turn of the century, 80% of Americans will process information as a major part of their employment, according to a United Way study. In addition, the future portends new and brighter for-profit invasion of business computers. As one Justice Department official says, This technology in the hands of children today is technology that adults dont understand. The first generation of computer-literate citizens will reach adulthood shortly after the turn of the century and will surely open a new age in the an nals of crime and crime fighting. COMPUTER-STALKING One frightening type of computer criminal emerging rapidly is the cyberstalker. Possibly the most disturbing of these criminals is the pedophile that surfs computer bulletin boards, filled with bright young boys and girls, in search of victims. He develops a relationship and then seeks to meet the child in person to pursue his sexual intentions. Already recognized as a serious problem, cyberstalking has spawned the cybercop a police officer assigned to computer bulletin boards in search of these pedophiles. Once a suspect is spotted, the cybercop plays the role of a naive youngster and makes himself or herself available for a meeting with the suspect in hopes of gaining evidence for an arrest. Also on the network, in search of pedophiles, are computer pornography sellers who offer magazine-quality color photographs of young boys and girls in a variety of sexually suggestive or actual sexual acts. Such a ring was broken up in 1994 a nd was found to have clients in several countries, with the pictures themselves transmitted from Denmark. Another type of stalker expected to be seen more in the future is the emotionally disturbed loner, seeking attention and companionship through the Internet, and who often becomes obsessed with a bulletin board friend. If this person obtains personal information about the acquaintance, he or she sometimes seeks a close, often smothering relationship. If spurned, the stalker launches a campaign of harassment, moving into real-space harassment if adequate information is obtained. Vengeance can take many forms, from ruining credit records and charging multiple purchases to the victim to creating criminal records and sending letters to employers informing them of the shady background of the victim. In the twenty-first century, with access to the Internet available to all and information from data banks networked into dossiers reserved for official use only (but easily accessible to h ackers and crackers), stalking will not only increase but be facilitated by a new generation of portable computers. Organic nanocomputers may one day be implanted in the human brain, making possible a new crime: mindstalking. Unauthorized intrusion and seduction will reach directly into the victims brain, making the stalker harder to evade and even more difficult to escape. VIRTUAL CRIMES Stock and bond fraud is already appearing on the Internetstocks and bonds that appear on the markets, are actively traded for a short time, and then disappear. The stocks and bonds are nonexistent; only the electronic impulses are real. In a recent case, a trader was paid $9 million in commissions for what appeared to be some $100 million in sales of bonds. But investigators now feel that these bonds may never have changed hands at all, except over the Internet. In the future, a virtual-reality expert could create a hologram in the form of a respected stockbroker or real estate broker, then advise clients on the Internet to buy certain stocks, bonds, or real estate. Unsuspecting victims acting on the advice might later find that they had enlarged the coffers of the virtual-reality expert, while buying worthless or nonexistent properties. This is just the tip of the iceberg in what might be tagged as virtual crimeoffenses based on a reality that only exists over the computer. As virtual reality becomes increasingly sophisticated, it is the young adults in the first decade of the twenty-first century whohaving grown up with virtual realitywill create the software and determine the legal and criminal uses of this technology. And with virtual reality potentially reaching directly into the brains of recipients via organic computers, the ability to separate reality from the truth outside, will be one of the greatest challenges of the twenty-first century. TWENTY-FIRST CENTURY EXPECTATIONS The outlook for curtailing computer crime by technology or conventional law-enforcement method s is bleak. Most agencies do not have the personnel or the skills to cope with such offenses, and to date all high-tech approaches have been met by almost immediate turnabouts by hackers or crackers. As individuals see and talk to each other over computers in the next few years, and as nanotechnology makes computers even more portable, new technology will emerge to protect data. But simplifying systems to make them more universally acceptable and accessible will also make them more vulnerable to intruders. Control of access by optical patterns, DNA identification, voice spectrographs, encryption, and other methods may slow down hackers, but no method is foolproof or presents much of a challenge to todays most-talented hackers. The trouble is that in the future many more users will have skills far beyond those of todays crackersa process one expert termed the democratization of computer crime.. Still, there is much to be gained by easy access to the Internet. The cyberpunk imperative s, a code subscribed to many hackers, include: (1) information should be free so that the most capable can make the most of it; (2) the world will be better off if entrepreneurs can obtain any data necessary to provide needed or desired new products and services; and (3) decentralization of information protects us all from Big Brother.. Computer crime probably cannot be controlled by conventional methods. Technology is on the side of the offender and motivation is highits fun, exciting, challenging, and profitable. The only real help is one that has not proven very successful in recent decades: conscience and personal values, the belief that theft, deception, and invasion of privacy are simply unacceptable. Behavioral psychologists argue that all values are learned by a system of rewards and, to a lesser extent, punishment. Thus, if these values are necessary for survival, children should consciously be conditioned to live by them. If all citizensall computer userswere taught these values and sought to live by them, the Internet could become the wondrous and friendly place its creators have envisioned. Ironically, the greatest possible allies to be found in this search for values are the adolescent hackers of the 1980s, many of whom are the software programmers of the 1990s. In his book, Secrets of a Super-Hacker, a hacker named Knightmare says that true hackers love to break into systems and leave proof of their skills, but do not hurt individuals by stealing tangible goods or money, or destroying files or systems. Hacker ethics, Knightmare writes, include informing computer managers about problems with their security and offering to teach and share knowledge about computer security when asked. Increasingly, government and business computer managers are asking. Many of the Fortune 500 companies and numerous government agencies have hired hackers to test their systems and even design new security protocols for them. Thus, hackers are helping to protect the inf ormation superhighway from crackers and terrorists. As one hacker says, Hackers love computers and they want the Net safe. In conclusion, computer crime is major part of our technological society and should be dealt with similarly to real crimes. In the electronic world, it is harder to find the criminal and track him/her down. In the end, all advantages, such as using a computer, come with their disadvantages, computer crime in its worst form. Bibliography Works Cited Caryl, Christian. Reach out and rob someone. Russian V. Levin robs Citibank. U.S. News World Report April 1997: 58 Chidley, Joe. Cracking the Net. Macleans May 1995: 54-56. Gill, Mark Stuart. Cybercops take a byte out of computer crime. Smithsonian May 1997: 114-116. Roush, Wade. Hackers taking a byte out of computer crime. Technology Review April 1995: 32-40 Sussman, Vic S. Policing cyberspace. U.S. News World Report Jan 1995: 54-60 Witkin, Gordon. Wanted, in cyberspace. U.S. News World Report March 1994: 71 Word Count: 2719 None Provided2 Analysis Essay
Subscribe to:
Posts (Atom)