Monday, September 30, 2019

People of the Philippines vs Andre Marti

People vs. Marti 193 SCRA 57 Facts : Andre Marti and his wife went to Manila Packing and Export Forwarders, carrying with them four gift wrapped packages to be delivered to his friend in Zurich, Switzerland. Anita Reyes (wife of the proprietor) asked if she could inspect the packages, however, Marti refused assuring that it only contained books, cigars and gloves as gift to his friend. Before delivery to Bureau of Customs/Posts, the proprietor Job Reyes, following standard operating procedure, opened the boxes for final inspection.When he opened Marti's boxes, a particular odor emitted therefrom and he soon found out that the boxes contained dried marijuana leaves. He reported the incident to the NBI who acknowledged custody of the incident. Marti was convicted for violation of R. A. 6425, otherwise known as the Dangerous Drugs Act. Constitutional Issues : 1. Marti contends that the evidence had been obtained in violation of his constitutional rights against unreasonable seach and si ezure and privacy of communication.Ruling : 1. Evidence sought to be excluded was primarily discovered and obtained by a private person, acting in a private capacity and without the intervention and participation of State authorities. In the absence of governmental interference, the libertied guaranteed by the Constitution cannot be invoked against the State. 2. Mere presence of NBI agents does not convert it to warrantless search and siezure. Merely to look at that which is plain sight is not search.Having observed that which is open, where no trespass has been committed is not search. Commissioner Bernas : The protection of fundamental liberties in the essence of constitutional democracy†¦ is a protection against the State. The Bill of Rights governs the relationship between the individual and the State. Its concern is not the relation between individuals, between a private individual and other individuals. What the Bill of Rights does is to declare some forbidden zones in th e private sphere inaccessible to any power holder.

Egypt Warfare Essay

By and large, ancient Egypt is considered to be one of the most peaceful of ancient civilizations — so peaceful, in fact, that they did not have a proper army until the invasion of the Hyksos during their 15th Dynasty! For the longest time, the extent of their military consisted of foot soldiers whose biggest job might involve settling civil unrest. There were still palace guards and those who watched the borders of the country, not to mention men whose job it was to guard trade ships, but until it was absolutely necessary, that was the mainstay of their army. Prior to the Hyksos invasion, fighting was less prevalent in ancient Egypt ; warfare involved campaigns sent out to unify the country, and other, smaller disputes often required the use of foreign mercenaries. Because of their strong leanings toward religion, Egyptians did not have a drive to leave their own lands to fight foreign armies in case they were unable to give the proper funeral rites to their fallen soldiers. When the Hyksos invaded Lower Egypt, they introduced the country to weapons and protective gear never before seen that close to the Nile . Because of the invaders, walls in the tombs of dead nobles and kings were covered in paintings of ancient Egyptian war chariots being driven with an archer who steered the horses with the reins tied around his waist. Other weapons used by the ancient Egyptian army included clubs and maces, as well as axes, knives, and swords; they were also handy with projectile weapons such as spears, bows and arrows, and javelins. Shields were the main bit of defensive equipment, with the occasional use of limited body armor. The Egyptians also used siege weaponry when necessary, such as towers and battering rams. During the time of Amenhotep III and beyond, a good portion of the enlisted men were prisoners of war. Recruits from Nubia and other neighboring areas were also brought in, and eventually a good percentage of Egyptian men were required to join the military, especially towards the time of continuous war due to invaders from not only surrounding areas but from Greece and Rome, as well. As the ancient Egyptians were a very religious people, they had many gods and goddess to pray to. This included the Egyptian god of war, Onuris, who is in many ways similar to Ares, the Greek god of war. His Egyptian name, Anhur, means â€Å"he who leads back the distant one. † He is considered to be the son of Ra, the sun god, and is believed to hunt down and kill the enemies of his father. Ancient Egypt and its people went from being very religious and peaceful to needing to keep their lands free of foreign hands. It worked well for them for a while, at least, though with the invasion of Alexander the Great and his army, Egypt never quite regained what it had been before.

Saturday, September 28, 2019

How the Climate Changes the Environment Essay

The American Heritage Dictionary defines the environment as â€Å"The combination of external physical conditions that affect and influence the growth, development, and survival of organisms† (â€Å"Environment† 2004). The world climate affects every living organism. The climate is part of the environment. Since climatic change will affect other physical conditions, changes in the climate will affect the rest of the environment. Climate is defined by the Random House on line dictionary as â€Å"The composite or generally prevailing weather conditions of a region, as temperature, air pressure, humidity, precipitation, sunshine, cloudiness, and winds, throughout the year, averaged over a series of years. † (â€Å"Climate† 2007). In the scientific community, climate is defined as the mean weather pattern over a large time frame, such as 30 years (Helmuth, Mieszkowska, Moore, Hawkins 2006). The climate affects what organisms can survive and flourish in a given locale. For example, birds migrate south for the winter so that their environment includes a warmer climate. They migrate back during the summer so that they can enjoy a more moderate climate during those months. If this natural climate cycle changes, there may be no impetus for migration. The climate that we observe is driven by solar energy. The green house effect is a natural occurring process. Heat from the Sun is trapped by greenhouse gases in the lower atmosphere. Some of this heat is re-radiated down to the surface, warming the Earth. Without the greenhouse effect, the mean temperature on the surface would be about zero degrees F. Instead, with the greenhouse effect, it is 57 degrees F (NOAA 2001). Obviously, our environment would be vastly different if the mean temperature was zero degrees F. HOW THE CLIMATE CHANGES THE ENVIRONMENT Page 2 of 5 The climate is changing. Global surface temperatures have increased by about . 6 degrees centigrade since the late 1800’s; with half the increase occurring in the last 25 years (NOAA 2001). With this increase comes a decrease of about . 3% of the artic sea ice (NOAA 2001). This is consistent with the temperature increase that has been observed. Over the next 100 years, the estimate for the mean global temperature increase varies from 2. 3 to 10. 1 degrees F. At the extreme, this would equate to a mean temperature of 67 degrees F, or an increase of 17% (Karl 2001). Computer models show that the Earth is becoming wetter and warmer. Over the next 100 years, rainfall will increase in the tropics and mid latitudes. If rainfall increases enough, then the salinity of the oceans will be reduced (Burroughs 1999). This could affect the Great Ocean Conveyor, the circulation process that brings warm water and energy from the tropical regions into the Northern Atlantic. Modeling shows that the Conveyor is very sensitive to rain water runoff from the continents. Small variations in the input of fresh water into the system may change the currents, and thus significantly alter the climate in the Americas and Europe (Burroughs 1999). The amount of impact that humans have on the climate has also been debated. For the first time, the Intergovernmental Panel on Climate Change, a United Nations network, stated that global warming was â€Å"unequivocal† and caused largely by the burning of coal (Associated Press 2007). Natural agents alone cannot explain the climatic warming trend. Computer modeling has shown that a significant amount of the warming is human caused (Karl 2001). Since the temperatures are forecast to continue to increase, the amount of climatic change will also increase. HOW THE CLIMATE CHANGES THE ENVIRONMENT Page 3 of 5 The changing climate will affect the environment. Human habitation in coastal zones will be greatly affected. The forecasted temperature increase of 10 degrees F mean temperature would equate to a sea level rise, at the extreme, of about 35 inches by the year 2100 due to melting of the polar ice and runoff from the melt of glaciers (Karl 2001). A more extreme calculation puts 100 million people a year being flooded by rising sea levels by 2080 (Borenstein 2007). If the rise in temperature reaches 14 degrees F, the West Antartic ice sheet could collapse, with the resulting rise in sea level of 47 inches per century from that alone. The resulting flood would encompass a large part of Florida, including Miami, and the Atlantic seaboard. Internationally, large population centers such as Ho Chi Min City would be flooded (Burroughs 1999). Indeed, some research has shown that some fragile habitats could be even more drastically and rapidly affected. It has been shown that the environmental stresses caused to intertidal organisms by climate changes affects them faster then terrestrial organisms (Helmuth, et. al. 2006). In fact, the change in climate can lead to extermination of some intertidal organisms. If these are prey, then the environment will change for the predators, resulting in reduced populations or migration (Helmuth, et. al. 2006). The change in climate will also affect food production. In developed countries, the effect will be to a much lesser degree, at least for the foreseeable future. More food will be produced as the temperatures continue to rise. Soybean and rice yields are expected to rise in Latin America. Northern latitudes will see a longer growing season, resulting in higher output (Borenstein 2007). By 2050, the effects of the climate change on food production will be negligible (Burroughs 1999). HOW THE CLIMATE CHANGES THE ENVIRONMENT Page 4 of 5 In developing countries the effects will be much more pronounced. The United Nations Food and Agriculture Organization (FAO) has stated that the severest impact of global warming food shortages would be in the sub-Saharan countries of Africa (Pullella 2005). Lower latitudes will have reduced food production. The rapid crop development along with rising heat and the need for more water will result in lower yields (Burroughs 1999). By the year 2080, 600 million people may go hungry because of the climate change (Borenstein 2007). Those populations that can would attempt to migrate to more fertile land. This will place an economic and political strain on the nations that are losing population and those who would accept these environmental refugees. Large scale movements of populations would place a burden on the food supplies on neighboring countries, possibly affecting the food production. A true risk of local overpopulation would exist, changing the environment for all who reside there. Water shortages are also a threat in the developing nations. In less than 20 years, hundreds of millions of Africans and tens of millions of Latin Americans will be short of water. By 2080, the water shortages may effect up to 3. 2 billion people (Borenstein 2007). The sea level rise will also affect the quality of water. Saline intrusion, contamination of water supplies, and the need for an increased water supply for agriculture to offset the temperature change all will have a negative impact (Burroughs 1999). The climate change will also affect the health and welfare of both human and other organism’s populations. With the change in the environment there will come a change in distribution of insect carried diseases (Burroughs 1999). There has already been a resurgence of malaria world-wide over the past 20 years. By 2100, due to the change of climate, malaria is expected to affect 50-80 million more people a year. The distribution of malaria will extend into HOW THE CLIMATE CHANGES THE ENVIRONMENT Page 5 of 5 Eurasia, Northeastern Canada, all of Australia, and even into the southern coast of Alaska and the coastal regions of the northwestern United States and Canada (Burroughs 1999). Higher temperatures not only increase the insects range and numbers, but also how often they bite and how infectious they are (Burroughs 1999). Other insect borne diseases will extend their range. Dengue, also carried by mosquitoes, will extend into non-endemic areas. Rodents will also extend their ranges and bring insects that carry diseases like the Plague and Hantavirus with them. The warmer temperatures will reduce the rodent’s mortality, further increasing the spread of disease (Burroughs 1999). Lyme disease will also have an increased range of occurrence as the ticks responsible are able to survive in a larger habitat (Burroughs 1999). Other diseases will also flourish. As the amount of water is reduced in developing countries, diseases such as cholera and diphtheria will become more prevalent. Increased exposure to ultraviolet light will cause an increase in the occurrence of skin cancer, ocular disease, and weakened immune systems (Burroughs 1999). The changing climate will indeed change the environment on a global scale. All aspects of the environment, from insect range to food production, sea level to water supply, will be affected in some way. These changes will be far more pronounced in developing nations then developed ones. The ability to adapt to these changes will also be affected by the economic status of the nations involved. References Associated Press. (2007, February 28). Scientists Urge Global Action On Clean Energy. New York Times, p. A8. Borenstein, S. (2007). Warming Report to Warn of Coming Drought. Retrieved March 11, 2007, from Yahoo! News. Website: http://news.yahoo.com/s/ap/20070311/ap_on_sc/climate_report

Friday, September 27, 2019

Legionella Pneumophila Essay Example | Topics and Well Written Essays - 500 words

Legionella Pneumophila - Essay Example On the basis of similarities Legionella pneumophila is classified under Kingdom Procaryotae (Bacteria), Phylum Proteobacteria, Genus Legionella, and Species Pneumophila (Engelkirk and Burton, 2007). Legionella pneumophila consisting of 32 identified species are globally found in natural water sources like lagoons, rivers, and streams, and in artificial habitats like air-conditioning systems, chilling structures, evaporating compressors, whirlpools in spas, hot tubs, shower heads, humidifiers, tap water, distillation systems, decorative fountains, misting devices, dust, people, and soil. The microorganisms may be transmitted by direct contact with the infected person, inhalation of dust where the spores are, or direct contact to the identified reservoirs (Engelkirk and Burton, 2007). The pathogenicity of the species was confirmed by the Center for Disease Control and Prevention of the United States of America in 1977 after a year of having infected a host of victims temporarily living in Philadelphia Hotel in 1976. The pathogens were confirmed to have come from the vent of the hotel's airconditioning system (hydrosense(R), 2009). Legionnaire's disease was the name given to the infection caused by the bacteria Legionella pneumophila.

Thursday, September 26, 2019

Business Analysis and Review of Timberland Case Study

Business Analysis and Review of Timberland - Case Study Example This relationship makes the company to give more emphasis on the societal and environmental issues and concerns. Now-a-days, it has become a trend that before buying a product, customers not only look for quality and price but the commitment from the part of that business organization as well for the common good of the society. According to a survey undertaken within the organization, most of the employees are interested in working for a socially committed company than receiving high salary. As there is a good working environment there will be less absenteeism and which means there is a reduction in the cost of recruitment, selection and training ,and leads to the over all improvement in the performance of the organization. The main drawbacks of the relationship include many employees in Timberland lost their job and the company downsized its operation. City Year faced shortage of funds as Congress threatened to withdraw federal funding. Employees of Timberland were not ready to accept the decision of diversion of a big amount to City Year. Timberland also faced financial problems which affected their social service. Association of a profit organization and a non-profit organization may raise some questions regarding its objective which is different from each other. So some adjustments might require in this regard which affect shareholders of both the organization. Main motto of Timberland behind this association was social commitment but they gave secondary or no preference to the brand and company image and also to the equity base of the company. Consider some of the other factors of this relationship such as co-dependency, drawbacks and benefits of being tied to only one community organization, exclusive sponsorship, etc. As Timberland is having association with only one organization, that is City Year, give the advantage of interdependency. In other words both the organization can make some unifies action in their policy formulation and also they can share the resources available. The disadvantage is that the society may raise question like this; if the company (Timberland) is more committed to the social service why did not they make association other charity organization. As a result of this relationship the organizations whom helped the City Year financially may withdraw their further help as City Year got sponsorship of Timberland. Now discuss each of these issues in a short narrative and then construct a Benefit/Drawback table to summarize your findings. Then discuss the impact and strategic value of each and try to determine the overall impact of this relationship: Table showing the benefits and drawbacks of relationship Parties Concerned Benefits Drawbacks The Organizations (Timberland and City Year) The reputation of the Timberland enhanced and also it resulted in increase in the business and decrease in labour turnover. As regards to City Year is concerned, financial position become strong and the interdependency helped in decision making. It led to employee dissatisfaction at Timberland as their colleagues lost their job and also it affected the financial balance of the company. With regard to City year, the association

Rhetorical Analysis of JFK'S Inaugural Address Essay

Rhetorical Analysis of JFK'S Inaugural Address - Essay Example Therefore, the speech encourages Americans that through him a torch of a new revolution has been handed over to them and all must participate. JFK feels that in unity Americans can achieve more. Therefore, he calls them to a pledge of allegiance to the nation. Additionally, JKF called for Americans to be proud of their nation and to give it the necessary support to climb ladders that other nations have not climbed. His speech lures Americans to believe in their great potential to bring about changes they want in their land and beyond. This paper will focus on rhetorical analysis of JFK’s inaugural address. The inaugural speech by JFK had several goals. First, JFK needed to pass a message of accomplishment in winning the presidential elections. Kennedy was nominated as the democratic candidate for presidency in 1960, defeating the republican’s choice, Richard Nixon. Therefore, JFK starts his speech with diction to show his celebration of winning and his belief in freedom gained through his election. To him, this day not only signifies victory but also is a celebration of freedom, because it symbolizes the end of poor leadership and a beginning of another era. JFK starts his speech by reminding Americans of the pre-existing sense of pride of their nation. Kennedy says, â€Å"For I have sworn before you and Almighty God the same solemn oath our forebears prescribed nearly a century and three-quarters ago† (Kennedy). One reason that makes Kennedy revisit ancient achievements is to show that he is in line with American Vision and to build a good name for himself. To Americans, the day when they have received their independence means very much – it is one of the most significant moments in their history. Mentioning it, Kennedy is bound to get some followers who associate themselves with the independence. He later claims, â€Å"Let the word go forth from this time and place, to friend and foe alike, that the torch has been passed to a new generation of Americans born in this century, tempered by war, disciplined by a hard and bitter peace, proud of our ancient heritage † (Kennedy). By this, Kennedy shows, through words, a picture to the Americans – he has taken the mantle from leaders before him to fulfill certain tasks and responsibilities according to the collective wish of the Americans. Secondly, JFK seeks support for his presidency and uses the unification tool to lure Americans to support him. His speech is full of anaphora of â€Å"to† and â€Å"let both sides† to address both the republicans and the democrats present in this inauguration. JFK has a goal of uniting all Americans and fighting racism. To achieve this, he sates, â€Å"And so, my fellow Americans: ask not what your country can do for you—ask what you can do for your country. My fellow citizens of the world: ask not what America will do for you, but what together we can do for the freedom of man† (Kennedy). This statement inspires Americans and the world at large as they have so much they can do for their country. Additionally, it demonstrates them that if people collectively put their mind to something, they will achieve it. For instance, it will take unification to do away with racism, corruption, and achieve world freedom and world peace. Additionally, Kennedy unifies the public through the use of alliteration. For instance, he says, â€Å"Let’s go forth and lead the land we love†

Wednesday, September 25, 2019

Grains and the Environment Essay Example | Topics and Well Written Essays - 2250 words

Grains and the Environment - Essay Example The invasive plants are the species of plants (aquatic weeds, shrubs and herbs) that requires careful management to reduce their harmful effects (Ondrasek et al., 2014). Another area of discussion under the Land and Water Management is the land degradation. Land degradation occurs when the land is rendered unstable. The land degradation displays the loss of the vegetation cover, soil fertility. The three categories of the land degradation include; soil erosion, ecosystem decline, and soil erosion. Irrigated Agriculture is a sub-topic that is covered under the Land and Water Management. Under this subtopic, various ways effective irrigation systems are discussed. The catchment hydrology discusses the various hydrological processes that are operating in the eroded catchment so as to determine the relationship between the run-off and the rainfall. The last subtopic under the land and water management is the salinity management. Salinity is brought about through the accumulation of salt in the soil (Irvine, & Doughton, 2001). I have chosen Land and Water management because water and land are the most powerful providers of the ecosystems services. By improving the manner in which we use the water and land, we can boost the food production, helping people adapt to the climate change and mitigate its effects while fostering the biodiversity hence enhancing the contribution to the greener economy (Tang & Rengel, 2003). Nurturing of the land, in particular, is essential to human existence. Therefore, the understanding of the water and land management is important to human life. Another topic that I chose under the PMP is soil. The sub-topics that are covered under this topic are soil management, soil health, coastal acid sulfate soils, soil health checklist, soil matters, soil PH, soil and land survey directory, soil glossary, and soil texture. Soil and land survey directory provide the information of the history of the soils. Soil health, on the other

Tuesday, September 24, 2019

Healthy Eating Essay Example | Topics and Well Written Essays - 500 words

Healthy Eating - Essay Example I resumed my afternoon routine but still felt some hunger as the day wore on. At supper time I had two plates of spaghetti with minced meat and called it a day. On the second day, careful not to get entangled in the previous day’s mayhem again, I awoke in good time – enough to get myself cleaned up and prepare breakfast. I ate a plate of left over spaghetti from the previous night with a cup of coffee. During the day, I felt less hunger pangs in between meals as I had experienced on the previous day and instead of four chocolate bars, I consumed only two before lunch hour. At lunch, I had a quick meal – 2 beef burger pieces and a bottle of soda. I ate another burger at 4pm on my way home and later on at night I had a plateful of roasted meat with some beer as we enjoyed a get-together evening with a couple of friends. And yesterday, I took 2 cups of plain coffee and rushed off to get the day going. On this particular day I had very little appetite for food and so I had no snacks in between the meals (which I also labored through). At lunch time I ate a plate of meat stew with rice and a glass of water. In the evening, for supper, I again had meat but this time with spaghetti (a plateful). From my analysis of my feeding habits over the last three days and other days in general, I can conclude that I primarily consume carbohydrates/ sugars (chocolate, flavored drinks, sausages, fries, beer, rice, and spaghetti), fats (fries, sausages, chocolates, beer and meat) and proteins (beef burgers, meat). This is a very alarming and dangerous eating habit as it is lacking in a plethora of foods from other vital groups (such as vitamins). Healthy eating is an absolutely essential component toward health and well-being. What one eats, how often and how much are all vital towards attaining a healthy and balanced diet. There are numerous changes and additions that I can make in order to improve on my eating

Monday, September 23, 2019

Social Justice and Social Order Essay Example | Topics and Well Written Essays - 3250 words

Social Justice and Social Order - Essay Example The majority sociological explorations of mass culture, especially those undertaken within a Marxist or critical theory standpoint, tend to be restricted in their cultural and political postulations. This cultural elitism also rests upon a position of high culture, needing discipline and simplicity which can only be acquired by the professional rational through years of withdrawal from everyday labor and daily realities. More significantly, an elitist criticism of mass culture presumes, not only the peculiarity between low and high culture, but also the accessibility of some general or complete values from which a position of critique can be sustained. Subsequent Alasdair MacIntyre's reasonably influential study After Virtue (1981), argue that a rational system of values as the base of criticism presupposes a comparatively coherent community as the fundamental social fabric of moral systems and ethical point of view. As in contemporary society the primary communal realism of values has been devastated, there can be no clear position of hierarchical values so as to found a critique of mass culture. In any case, the significance of postmodern cultural pluralism is to weaken the basis for the privileged asserts high culture to be the standard of aesthetic preeminence. Therefore, the leading metaphor or mode of thought in modern critical theory is inevitably reflective, since critical evaluation should be retrospective. The foundationalist and dualist philosophical endeavor that under girds the social order should be abandoned, so that alternative ideas can be amuses. In this regard, West admits that he has "a very strong anti-metaphysical bent" (West, 1993b: 51). Truth is thus conditional and tied thoroughly to human desires and aims. Truth, as West writes, is the product of reasonable assertions that are themselves value-laden and commendable of human beings working in cohesion for the common good" ( West, 1989: 100). In this way, West is anti-metaphysical. Consequently, persons should be made sentient that an all surrounding common culture is not a prerequisite for securing vivacious and harmonious race relations. As Roland Barthes is fond of saying, postmodernists consider persons to be open signifiers (Barthes, 1977). Undeniably, writers such as bell hooks, Paul Gilroy, Henry Louis Gates, Jr., Cornel West, and Manning Marable--prominent writers in the field of race relations concur that the analysis of essentialism offered by postmodernists is dominant to establishing an democratic society. This does not mean, though, that all the writers such as Paul Gilroy, Henry Louis Gates, Jr., and Cornel West consider themselves to be postmodernists. Indeed, at times, each one condemns postmodernism for a diversity of reasons. But what is clear is that their basic arguments are consistent with Lyotard's understanding of the key thrust of postmodernism: "astonishment toward meta-narratives" ( Lyotard, 1984: xxiv). The consequence of this attack on absolutes is that the racial ontology offered by assimilationists is no longer workable. Certainly, the uneven social relationships continued by minorities based on disparities in biological, cultural, or genetic aspects, which have put in to enriching particular cultures over others, can no longer be

Sunday, September 22, 2019

Social media negative impact on teenagers Essay Example for Free

Social media negative impact on teenagers Essay Many types of social media display a ‘bad boy’ image which consists of addiction to substance abuse (drugs and alcohol), violence, emphasis on luxurious material possessions and lack of moral values. It is this ‘bad boy’ image that severely impacts the minds of teenagers. It is very common to find a video of a celebrity portraying a character that is addicted to substance abuse. For instance, Youtube is filled with plenty of music videos, movies and pictures that display celebrities with numerous addictions to substance abuse. Examples of such celebrities include, Nicolas Cage (alcohol addict) in the movie Leaving Las Vegas and Leonardo DiCaprio (drug addict) in the movie The Basketball Diaries. When a celebrity plays a fictional role of an addict, many teenagers pick up the addiction. Teenagers tend to think that such types of addictions are ‘cool’ as their icons engage in such addictions. In addition, social media portray a lot of violence that amuse teenagers. For instance, cp24.com shows videos and pictures of gangsters and thieves shedding blood of innocent people. In such situations, culprits are often seen settling problems through violence rather than through peace. Teenagers pick up on this depiction of brutality and think that it is better to solve a conflict through violence in order to gain a popular image in society. Also, social media is actively engaged in promoting exquisite materialistic goods. For instance, Facebook displays many pictures of celebrities endorsing expensive products. Examples of such endorsements include Michael Schumacher (Ferrari, Lamborghini) and Jessica Simpson (Gucci, Prada). Teenagers that look up to their icons come to the conclusion that in order to be popular one must acquire such luxurious goods. Moreover, social media places a great emphasis on acting immorally. For example, etonline.com shows real life situations of celebrities lying, stealing, and taking part in scandalous affairs. Teenagers are often taken into believing that such irresponsible acts are normal and expected to be followed. Thus, it is fairly evident that social media plays a vital role in exerting a strong negative influence on teenagers.

Saturday, September 21, 2019

Russias Approach to Cyber Warfare

Russias Approach to Cyber Warfare Policy Briefing on the Imminent Russian Cybersecurity Threat: The Need For Action Against Russian Cybercrimes In recent years, Russia has found a reliance on using cyberwar and crimes as a tactic to achieve their strategic goals both in their near-abroad and against Western countries. The United States must be prepared to retaliate against any cyber attack directed at our nation by assessing options to limit and counter the Russians without leading to an overescalation and possible war. Background: The frequency with which we hear about Russian hackers hacking into a country’s important information and systems has become more and more regular, and as a result of this it is important to trace back the history of Russian cyber warfare. The first instance of a large scale Russian cyber attack happened in Estonia in 2007. At the time, tensions were high between Russia and the former Soviet State, and the Kremlin authorized a campaign which targeted Estonian governmental agencies and businesses through use of massive DDoS (distributed denial of service) attacks that shut down countless websites essential to the functioning of these agencies and businesses (Batashvili). In 2008, Russia coordinated an even larger cyber attack during the Russo- Georgian War. On August 7, a cyber attack was conducted from Russia against Georgian government and media websites, while at the same time Russian troops were crossing the Georgian border. According to the Report of the Independent International Fact-Finding Mission on the Conflict in Georgia, the attack lead to several Georgian servers and high amounts Internet traffic being taken control of and placed under external control (Batashvili). The offensive persisted through the conflict lasting until ceasefire was announced on August 12. Furthermore, the Kremlin had tested their abilities in the lead up to the invasion, shutting down the official website of the president of Georgia for an entire day on July 10. The Russian cyber attacks affected practically all Georgian government websites, crippling the state’s ability to respond to the conflict. Additionally, attacks targeted Georgian media, business, and other political organizations in order to control them from turning the conflict away from Russia’s favor by making it difficult for information of what was happening inside of the conflict zone to spread out to the rest of the world. According to a report by the US Cyber Consequences Unit, â€Å"the primary objective of the cyber campaign was to support the Russian invasion of Georgia, and the cyber attacks fit neatly into the invasion plan†. The attacks achieved their intent, since they â€Å"significantly impeded the ability of the Georgian government to deal with the Russian invasion by interfering with communications between the government and the public, stopping many payments and financial transactions, and causing confusion about what was happening† (US Cyber Crimes Unit). Recent cyber attacks against Ukraine are a worrying signal of a continued use of this strategy. Ukrainian president Petro Poroshenko said that during in the final two months of 2016, Ukrainian state institutions had 6,500 instances of hacking, most directed towards the ministries of defence and finance, in addition to Kiev’s power grid and the treasury. According to the Poroshenko, the operation came at the hand of the Russian security services, following the same playbook as they had in Georgia (Batashvili). Russian cyber operations are not use solely in tandem with military offensives however, with many also being employed in the wars on information, especially against Western nations. The 2016 American presidential election, while highly publicized is not the only instance in which there is evidence of Russian interference with the 2017 French and German elections also being targeted. Numerous French officials and agencies, including the Defense Minister and DGSE have raised concern over the issue of Russian interference in the nation’s election, citing concern that fake news and cyber attacks were being directed to now President Macron and his party as they were not the candidates the Kremlin believed would be most beneficial to the Russian state interests. German intelligence agencies have also brought up similar concerns about Russian cyber activities being directed against Germany and its election, with Chancellor Angela Merkel, herself seeing attacks as threatening the foundation of German democracy and the effective functioning of the German state (Delker). Russian Objectives: As practiced today, Russian use of cyberwarfare has three common and consistent objectives: Capturing Territory Without Resorting to Overt or Conventional Military Force This was the strategic goal we saw Russia trying to achieve in 2014, when they successfully annexed Crimea. The annexation of Crimea relied on a group of Russian Special Forces operatives known as the â€Å"little green men†, who took their directives from a newly created Russian special operations command. The deployment of these highly trained operatives, in coordination with a massive information warfare campaign, as well as the involvement of   local Russian loyalist proxies created the opportunity for Russia to takeover without needing to shed blood as they had forced momentum to shift in their favor allowing for Crimeans in Ukraine to vote for secession from Ukraine (Chivis). In 2008, Russia used similar tactics in its invasion of Georgia, during which they similarly coordinated cyber attacks against essential government computing services while simultaneously operating special operation forces in coordination with Russian loyalists from the Georgian State. A major impact of these tactics has led to a weakened ability to integrate these countries with Western thought. In 2013, Russian Chief of the General Staff, General Valery Gerasimov showed Russia’s current views on such hybrid cyber warfare tactics, stating that in modern conflicts non-military means are put to use more than 4 times as often than are conventional military operations (Gerasimov). This suggests in the future such cyber attacks will be likely, and even at this point many are not being properly identified. In its use of cyberspace, Russia has shown it can find success in achieving territorial expansion goals in a manner that is nonviolent and seemingly peaceful, however there is always the underlying threat of actual military force being used unsparingly. Creating a Pretext for Overt, Conventional Military Action In a similar manner to capturing territory through covert, non-militarial expansion, Russia is also capable of using cyber warfare in order to create a conflict which gives them solid reasoning to use military force in foreign nations (Chivis). For instance, the Russian annexation of Crimea has lead to a reasonable concern that the Kremlin could engage in a hybrid strategy to manufacture a conflict worthy of military action elsewhere, possibly the Baltic states. As it did in Crimea, Russia could try to create tension in a country like Estonia by conducting a campaign which foments discord between the minority Russian population and the Estonians. In creating these sentiments which portray the government of Estonia as oppressive towards the minority Russians, the Kremlin can justify a Russian military intervention their behalf of the Russian minority, as Russian sentiment still sees these people as their own. Conducting an operation of this sort requires the accompaniment of simultaneous cyber operations directed at inflaming attitudes and creating difficulties in executing both national and NATO responses. It would almost certainly be accompanied by efforts to influence broader European and world opinion in ways that favored Russia’s intervention through use of propaganda and opinion shifting which portrays Russia as acting on behalf of a repressed population that seeks its aid. On the ground, it would involve the use of Russian secret agents and proxies, both to act as aid/support for local populations creating tensions, and to coordinate with military forces awaiting instruction and guidance. Using Hybrid Measures to Influence the Politics and Policies of Countries in the West and Elsewhere This last objective is the most pressing for the United States and Western countries out of the near vicinity of Russia. In this objective, the Kremlin seeks to use cyber operations in lieu of military action or war to create tension and distress in Western governments. The goal of this strategy is to influence and create favorable political outcomes in targeted countries to serve Russia’s national interests (Chivis). The countries where these types of operations are most likely to find success are those with high levels of corruption and weak legal systems. However, more stable countries such as the United States and the United Kingdom are similarly susceptible to such operations. Examples of ways the Kremlin can engage in cyber operations to influence an outside nation’s political system include the use of fake â€Å"troll† accounts used on social media to spread propaganda and create divides amongst the citizens of that nation. Also the hacking of servers of government officials can provide them with material which they can use to either influence that official through blackmail, or which can be leaked to induce further tension. In creating these narratives, Russia has the ability to influence democracy by planting false information and manufacturing biases against those that act against the interests of the Kremlin. American Stakes: The continued use of cyber attacks by the Russian government brings up very realistic threats both domestically and internationally for the United States. Internationally as Russia continues with their their goals of territorial expansion, the United States is faced with the concern of a wider influence of Russian thought and expansion of pro-Russian policies in areas where the United States has worked to promote democracy and peace. The desire of Russia to reassemble the Soviet Union remains very real, and as seen in Estonia, Georgia, and Crimea cyber attacks can play a key role in these territorial gains. By allowing continued expansion of the Russian state, the United States risks losing the strategic relationships they have developed with these countries as well as the progress they made towards finding them more independence from Russia as democracy began to take its roots in these nations. Furthermore, these attacks can be used by Russia in places like Syria as a way to promote the Assad regime which works in coordination with Russia in achieving other strategic goals, such as the development of an oil pipeline through Syria. Domestically, Russian cyber attacks can destabilize the US government by creating rifts and tensions amongst the American populace through the spread of false information and fake news.   As seen by the hacks against the DNC as well as the use of trolls during the 2016 Presidential Election, Russia’s use of cyber attacks can undermine American democracy by allowing for a foreign nation to alter the minds of our citizens, feeding them lies and inflammatory material to create disarray in our democracy. This is especially hurtful as Russia can cite American disorder as a reason to not take our example and implement democracy in the American fashion to foreign nations. Attacks by Russia can also cripple the government’s ability to function towards the service of its citizens.   Government Organization for a Cyber Attack The 2016 Presidential Policy Directive (PPD) 41 United States Cyber Incident Coordination   defines a significant cyber attack as â€Å"likely to result in demonstrable harm to national security interests, foreign relations, the domestic and global economy, public confidence, civil liberties, or public health and the safety of the American people.† (PPD 41). Cyber attacks by Russia against domestic communication or critical IT infrastructure fall under this classification. Should such an attack actually occur, the National Cyber Response Group would lead the defensive response as an arm of the National Security Council (PPD 41). The Secretary of Defense, in tandem with the directors of our Intelligence agencies would be responsible for managing incoming threats, and coordinating any strategy or movement that would require active military response. In the event that the telecommunications systems of the National Security and Emergency Preparedness sector fail, the National Coordinating Center for Communications would be tasked with re-establishing communications. Furthermore, PPD 41 stipulates that if an operation with clear attribution is found to have occured, the Cyber Response Group shall assemble a team of qualified and skilled cyber personnel to respond to the cyber incident. This response team shall have experience together in the form of practice sessions and war games. U.S. Strategic Responses After addressing the immediate effects of a Russian cyber attack, it’s imperative the United States consider its options of strategic and tactical responses. One option for the United States is response through non-military means such as indictment, diplomacy, or sanctions (Bate). A lower-level military and intelligence strategy that could possibly be employed by the United States is the use of counter-surveillance intelligence operations,   non-attributable cyber or conventional attacks, or attributable cyber or conventional attacks (Herb). These operations would target Russian military, civilian, or critical infrastructure systems. Since NATO classifies cyberspace as the fifth operational domain, it is likely that if the United States identified a significant cyber incident against its citizens as originating from Russia, their response would come in the form of aggressive cyber tactics. The possibility of conventional military expeditions may be explored, however the risk of further escalation makes it more likely that the United States respond only through cyber operations. Low-Level Attributable Cyber Intrusion One possible response the United States could utilize in retaliation to Russian cyber attacks is low-level cyber intrusion, distributed across a array of cyber incidents that could not be collectively categorized as a major attack. This intrusion would appear as a result of what is called â€Å"loud cyber weapons†, which are tools that can be traced back to the U.S military (Herb). The US military would send these weapons, embedded with encrypted codes, into Russian networks. The United States would then publicly provide the encryption key to end the intrusions caused by these weapons as a way to claim responsibility for the attack. The purpose of taking credit for the attacks is a key paradigm shift in U.S military strategy, now emphasizing attribution as a key aspect of a successful operation, and public knowledge as vital for deterrence. The United States also has the option of conducting more basic cyber attacks against Russia’s network, including by not limited to: alteration of government websites, disruptions of Internet service, interferences and disablements of communications, or the spreading of propaganda (Department of Defense Law of War Manual). In the aftermath of the hack of the DNC, senior officials weighed options for counter attacks on the Russian Federal Security Service (FSB) and the Main Intelligence Agency (GRU), including the use of the NSA’s TreasureMap tool, which tracks all global connections to the Internet, and can be utilized to install malware in targeted Russian computer systems with the purpose of intelligence gathering and future cyber-assaults (Bamford). Medium-Level Cyber Attack -No Immediate Casualties   The United States also has to ability to employ the use of â€Å"logic bombs† in cyber operations targeting both military and non-military targets in Russia. â€Å"Logic bomb† are codes developed with the purpose of overloading a computer’s system rendering them incapable to operate by presenting them with an endless amount of logic questions to answer. Sending these â€Å"logic bombs† into computer systems critical to Russia’s infrastructure will lead to the United States causing dramatic economic and operational damages to the Russian government and its people (Sternstein). The United States has invested a large sum of money into the development of these â€Å"logic bombs†, with initial investment coming back in 2014 when U.S. Cyber Command offered a $460 million contract to develop a â€Å"computer code capable of killing adversaries.†(Storm). High-Level Cyber Attack – Possible Casualties The United States could use logic bombs or other cyber intrusion methods to attack Russian critical infrastructure in a more serious fashion, leading to a larger potential for loss of human life or safety. These attacks include targeting systems such as those of a dam above a populated level where a   hacking could lead to floodgates being opened onto Russian citizens, or disabling air traffic control services leading to air safety where planes pose a threat to each other and the land beneath them. These options, particularly if they are easily traceable, have the potential to escalate quickly into further intensified conflict. Military-Level Cyber Attack – Escalatory The United States also has the ability to use similar cyber operations to directly attack Russian military targets, with possible targets including the shut off of power at a nuclear facility or an airfield, which will lead to the cause of serious casualties. These attacks will most definitely lead to a triggering of a notable escalatory threshold of response by the Russians. It is significant that many Russian industrial networks run computer systems operating Windows XP, and in some cases even older systems, while maintaining connections to the Internet. Not only are these dated systems particularly vulnerable to attack, as evidenced by the United States already demonstrating its ability to break into these systems. In November 2016, the United States reportedly penetrated Russian military systems, leaving behind malware to be activated in retaliation in the case of Russian interference of U.S. elections (Dilanian et. al). This demonstrated both confidence in the success of the malware implant, and political willingness to trigger a consequential conflict given Russia attacks the United States in a serious manner (Bernish). Strategic Considerations for U.S. Decisions In response to a Russian cyber attack, the United State’s strategic responses should be a result of its classification of the attack as being non-significant, significant, or an act of war. State Department Cyber Coordinator Chris Painter said the United States would respond to incidents on a case-by-case basis in testimony before the House Subcommittee on Information Technology and National Security in November 2016, saying that retaliation â€Å"could be through cyber means. It could be through diplomacy. It could be through indictments and law enforcement actions.†(Pellerin). Some of these responses require action while others do not; the path taken must be dependent on actual and anticipated effects of a cyber attack, including damage, injury, and death. Painter testified that, â€Å"cyber activities may in certain circumstances constitute an armed attack that triggers our inherent right to self-defense as recognized by Article 51 of the U.N. Charter†(Hearing on â€Å"Digital Acts of War: Evolving the Cybersecurity Conversation†). The United States could also identify a cyberattack as being an infringement upon its territorial integrity and political independence, per Article 2(4) of the Charter. However, recent political happenings indicate that the United States would be hesitant in invoking Article 51, regardless of whether a Russian cyber attack lead to nominal death, injury, or damage. Instead, the United States could limit its declarations and address the attack as a â€Å"significant cyber incident,† invoking the full support of the U.S. military while avoiding over-escalation. Furthermore, even though NATO justifies military response in the realm of cyberspace, the lack of precedent means that the United States actually has more options in responding to Russia if it were to employ use of cyber means, that may or may not lead to conventional consequences. The United States would need to decide between conducting a covert or overt counter-cyber attack. The tactical considerations noted above show that hidden, non-attributable cyber attacks do not fall within the Department of Defense’s deterrence strategy, and would not be treated as a suitable strategy. In the aftermath of the 2014 Sony Pictures hacking by the North Korean government, the United States didn’t respond with a public cyber operation, and it was â€Å"unclear how the United States may have retaliated against the North in secret, if it even did so.†(Sanger). The lack of a publicly noticed retaliation as well mild economic sanctions now seems ineffective as punishment. A situation could come up that would give the United States the opportunity to execute an immediately observable cyber attack or a preparatory attack (logic bomb), with the target being either a Russian military or civilian infrastructure. Similar to Russia, the United States should also avoid directly targeting a military structure in order to avoid escalation to full-scale war. As a result of this, the United States should choose to deploy a cyber weapon against critical Russian infrastructure, leading to conventional consequences being faced by Russia. Even the use a medium-level choice in terms of retaliation, would require global ramifications to be taken into account. Even still, it is my recommendation to engage in a retaliatory strategy, which employs the use of both a combination of an observable cyber attack through use of â€Å"loud cyber weapons† and â€Å"logic bombs† against significant parts of the Russian infrastructure. The United States cannot allow Russia to attack them and take global credit for the attack without retaliating in some way to show dominance over Russia. â€Å"Loud cyber weapons† are particularly suitable for retaliation that the public is aware of and will show the world that the United States is not only willing to retaliate, but is better skilled in cyber war and confident enough in its abilities to retaliate swiftly. â€Å"Logic bombs† targeted against non-military sites that still hold significant value to Russian infrastructure will be the second leg of the suggested attack. The crippling of essential infrastructure will both warn the Russians that an attack on us will be met with an attack that hurts their citizens and keep them from being able to retaliate back since they will not have the resources to come back at the United States. Works Cited Batashvili, David. â€Å"Russias Cyber War: Past, Present, and Future.† EUobserver, 15 Feb. 2017, euobserver.com/opinion/136909. Delker, Janosch. â€Å"Germany Fears Russia Stole Information to Disrupt Election.† POLITICO, POLITICO, 28 Jan. 2018, www.politico.eu/article/hacked-information-bomb-under-germanys-election/. The Military Doctrine of the Russian Federation, approved by Russian Federation presidential edict on February 5, 2010 (translated). Accessed at http://carnegieendowment.org/files/ 2010russia_military_doctrine.pdf. Understanding Russian â€Å"Hybrid Warfare† and What Can Be Done About It (2017) (testimony of Christopher S. Chivvis). Print. US Cyber Consequences Unit. (2009) ‘Overview by the US-CCU of the cyber campaign against Georgia in August of 2008’ Valery Gerasimov, â€Å"The Value of Science is in the Foresight: New Challenges Demand   Rethinking the Forms and Methods of Carrying out Combat Operations,† Voyenno-Promyshlennyy Kurier, February 26, 2013.

Friday, September 20, 2019

Challenges ASEAN Will Face In Establishing A Community

Challenges ASEAN Will Face In Establishing A Community ASEAN nations have signed the Cebu Declaration on the Acceleration of the Establishment of an ASEAN community by 2015 on the 12th ASEAN Summit in Cebu. This ASEAN community comprises of 3 main pillars, the ASEAN economic community, ASEAN political security community and ASEAN socio-cultural community. It is aimed at being a concert of Southeast Asian nations, displaying the outward looking nations that are living in peace, stability and prosperity as a whole region which is bonded strongly together in a dynamic and wide development and in a community of caring societies. However, it seems that due to the many differences between the countries, there would be many challenges in fulfilling its 2015 vision of establishing an ASEAN community by 2015. Background of ASEAN ASEAN was established on 8th of August 1967 when the Bangkok declaration was signed by Philippines, Thailand, Malaysia , Singapore and Indonesia. Brunei Darussalam joined the ASEAN community on January 1984 and Myanmar joined in 1997. Vietnam, Laos and Cambodia became members in 1995, 1997 and 2004 respectively. ASEAN was established to strengthen self-reliance and regional cohesion, while emphasizing social, cultural and economic cooperation and developmentà £Ã¢â€š ¬Ã¢â‚¬Å¡Another reason why ASEAN was formed was because back then, countries like China were getting too powerful and the only way the smaller countries could prosper was to group together. Thus, ASEAN was established. Now the main purpose of ASEAN is to help its members increase its economic growth and social development, and to establish peace between the ASEAN countries. Map of ASEAN countries Overview of challenges In this project we will study the ASEAN community and their commitment towards their goals, the problems they might face, and find the possible impact of it. The security and religious issues continue to be a barrier for ASEAN, with the many ethno-religious movements that will likely affect the coherence and stability within a nation and possibly ASEAN as a whole. The issue of more transparent boundaries that will be established will also cause the security to be less tight and will affect the peace of all. The different rate of economic development between the ASEAN nations is a huge challenge for ASEAN members in establishing a stable ASEAN economic community as the economy is a very important area and it will affect everyone in the ASEAN community. The differences in political systems of ASEAN members also poses a challenge as it would be difficult for so many different countries to work together cohesively with the nations operating differently. Challenge 1:Religious and security issues One of ASEANs greatest challenges in creating an ASEAN community is the security issues caused by ethno-religious movements and the more transparent boundaries that might greatly disrupt the peaceful coexistence that the ASEAN nations have tried established with one another. The ASEAN community will create more transparent boundaries so that it is more accessible for the people but that will also lead into a security that is not that tight and making it more unsafe for the people. The ASEAN countries remain vulnerable to threats from ethno-religious movements of the people who are hungry for self-governance. Ethno-religious movements have been a huge block for ASEAN in establishing a fully fledged ASEAN Community as there would be issues arising regarding the coherence of the country or the entire region. Southeast Asia has housed Islamic militant groups for the past few decades. After the World War II, Southeast Asian countries mostly became independent as the colonial powers that once ruled then departed. The countries were governed by undemocratic and brutal governments and affected the Muslim identities and values. This stirred up a sense of antagonism and animosity towards their various central governments, causing a great impact on the stability and security of ASEAN as a whole. Take for example, the Abu Sayyaf and Moro Islamic Liberation Front, both guerrilla organisations in the Philippines, are using political violence in attempt to pursue an autonomous Islamic state in Mindanao in the midst of the mostly Christian country and is said to have links to Malaysian and Indonesian jihadist forces. They have kidnapped foreign tourists from Malaysia, bombed a Philippines Airlines plane, assassinated and kidnapped priests and businessmen. Abu Sayyaf is said to have received arms and munitions from Afghanistan. It aims to evict Christians. As stated in the 2003 Declaration of Asean Concord II, Asean shall urgently and effectively address the challenge of translating Asean cultural diversities and different economic levels into equitable development opportunity and prosperity, in an environment of solidarity, regional resilience and harmony. Also, as ASEAN builds up its ASEAN Community, it also makes boundaries between the countries more transparent and this will result in a simpler way for terrorists groups to gather more members with the same beliefs as there is a larger number of people and the influence coming from so many areas will cause one to be daring enough to stand up for what they think that it is unfair to them as there are others backing them. This also makes it easier for terrorists movements to move about within the region as there is a widespread of members throughout the whole ASEAN and resources will be easier to get and access resources within the region. Even though ASEAN recognises that the region is divided into many ethno-cultural groups, efforts can only be taken to try to preserve the diversity in cultural heritage and to promote regional identity and it will be very challenging for ASEAN to overcome such issues to achieve a harmonious community. Along with the issue of more transparent borders, ASEAN can try their best to understand and accommodate the different religions and the reasons being such movement, however, ASEAN must also remember that even though the boundaries are more transparent, security must always remain tight and must always be alert and looking out for terrorist threats that will be constantly heading towards every country. Challenge 2: Differences in each countries development rates Different rates of development between ASEAN countries makes it difficult for all of them to work together cohesively on the large scale. Many ASEAN countries have widely different economic states, making fulfilling the goal of establishing the ASEAN community by 2015 rather challenging. GDP per capita of ASEAN countries as of 2005 in USD One example of counties with vastly and Cambodia. Although Cambodia is more than 250 times the size of Singapore and has 30 times the population, Singapore has a much better economy. In Cambodia, as of 2004, the percentage of the population below poverty line is a whopping 31%, while comparatively, in Singapore, the amount of citizens below poverty line is almost 0%. The currency and GDP per capita of Singapore is also much higher than that of Cambodia, at 1.4 per USD and $50,300 compared to 4221 per USD and $1,900 respectively. Singapore also has a lot of well developed infrastructure while Cambodia has barely any infrastructure in the rural areas. With the huge differences in these statistics, it is easy to tell that the Singapore economy is doing much better than the Cambodia economy. Another pair of countries with different development rates is Cambodia and Thailand, these two countries are right next to each other and both are relatively unstable. Both countries have gone through many economic and political troubles, but the economic situation in Thailand has generally been better than that in Cambodia, and the GDP of Thailand has constantly remained above that of Cambodia. In the countryside, Cambodia does not really have even the more basic infrastructure and the majority of Cambodias population is in fact younger than 21 years old and many of these youths lack the skill and education required to help push forward Cambodias economy. While on the other hand, Thailand has relatively well developed infrastructure and the countries people generally better educated. The GDP per capita of Thailand and Cambodia as of 2009 was $8,100 and $1,900 respectively. Although Thailand has slightly over four times the population of Cambodia, it has around twenty times the GDP. The death rate and infant mortality rate is also higher in Cambodia, and the life expectancy in Thailand is 73 years while in Cambodia it is 62 years. All these information shows that Thailand is a more economically developed country than Cambodia. All these information shows that the countries in ASEAN all have vastly different economic development rates, this would pose a problem when attempting to fulfil the 2015 vision. Statistics on ASEAN countries Challenge 3: differences in each countries political system Differences in government systems between ASEAN countries make it rather difficult for the countries to cooperate, as actions taken by different countries to tackle a similar issue may vary and there might be conflicts between the countries. The type of government greatly affects the domestic stability of a country and many other aspects, such as the economy, security and welfare of the citizens. Differences in government system in ASEAN can be seen through the case study of Myanmar and Thailand. Myanmar has a military government, in which military officers took up the majority of the ministries and cabinet posts which control the country. Though major political parties, such as the National League for Democracy and the Shan Nationalities league for Democracy and parties representing other ethnic groups are present in the country, their activities are greatly suppressed and controlled by the military government. Little room is given for the political organisations while many parties and underground student organisations are prohibited by the military. Despite pressure from ASEAN nations to release all the political prisoners and the request for greater progress towards democracy and a harmonious country, human rights in Myanmar remained poor. ASEAN nations had failed to come to an agreement on Myanmars lack of political reform during the 12th ASEAN summit, as each country has their own opinions and concerns. While some countries do not wish to interfere with Myanmars internal issues, others regard democracy and human rights issues as a possible obstacle for ASEAN to be integrated in terms of politics, which is part of the 2015 vision. Furthermore, Myanmar ranks 178 positions out of 180 countries for the level of corruption in the country, according to the Corruption Perceptions Index. This also affects the militarys efficiency and their practice of good governance in the country. On the other hand, Thailand is under a constitutional monarchy government, led by a king, a Prime Minister and has a parliamentary democratic system with multiple political parties. In Thailand,their King is more of a symbol of national identity and unity rather than having direct power under Thailands constitution. Thailand was similar to Myanmar in the way that Thailand was under the rule of a succession of military leaders with relatively weak democratic system. In the recent years, Thailands political landscape has been constantly plagued with issues such as persisting and significant difference between the urban and rural political orientation and focus, and democratically elected leaders abusing their power and their conflict of interest. Currently, the ongoing political unrest in Thailand began due to a coup dà ©tat staged by the military in 2006 that overthrown Thaksin, the former Prime Minister, for corruption and abuse of power. Thaksin supporters, who are mostly working class constituency and people from poor rural areas, accuse Thailands urban elites for coordinating the coup. These poorer citizens liked his ideas of more affordable medical care and debt relief, which can greatly improve their living standard. This is one of the key reasons for the overwhelming support from the red-shirt protestors even when he was on self-imposed exile. Not only was Thailands national economy crippled by its political instability. Thaksins supporters had disrupted the 14th ASEAN summit that was held in Thailand last year, and brought embarrassment to the ASEAN community. All of these issues makes it difficult for the ASEAN countries to work together, and much things need to be done to dampen these problems. Conclusion ASEAN countries face quite a number of challenges towards achieving their goal of setting up an ASEAN community as there are always some problems in cooperation faced by the member countries. Security issues, political and government issues make it hard for countries to cooperate together to form the community. These problems faced will not allow the member countries to make decisions and agree with one another easily. To fulfil its dream of the 2015 ASEAN community, ASEAN has to put in much effort into rectifying these problems, even though much has already been done towards establishing the ASEAN community.

Thursday, September 19, 2019

Normandy Invasion :: essays research papers

As they prepared for a cross-Channel assault on France, the Western Allies built up on British soil one of the largest and most powerful invasion forces in history. For 2 months before the landing, while troops, equipment, and supplies poured into Britain, the Allied air forces bombed railroads, bridges, airfields, and fortifications in France and Belgium and continued their attacks on German industrial centers. Postponed by delays in gathering the necessary landing equipment and by weather and tidal conditions, Operation Overlord, with Eisenhower in command, began on June 6, 1944, afterward known as D-Day. Throughout the preceding night, paratroopers were dropped behind German coastal defenses to sever communications and seize key defense posts. Hundreds of warships and innumerable small craft supported the invasion. Between 6:30 and 7:30 A.M., waves of Allied troops moved ashore between Cherbourg and Le Havre in history's largest amphibious operation, involving approximately 5,000 ships of all kinds. About 11,000 Allied aircraft operated over the invasion area. More than 150,000 troops disembarked at Normandy on D-Day. Because all major French ports in the north were mined and fortified, the Allies improvised two artificial harbors, with pontoons, breakwaters, and sunken ships. One of the harbors was destroyed by a severe Atlantic gale, but the other worked perfectly. Twenty pipelines below the Channel were used to bring in critical supplies of gasoline for the tanks. The Germans had anticipated an Allied invasion of western Europe at about this time but were surprised by its location. Gen. Gerd von Rundstedt, commander of German forces in the West, had expected the Allies to take the shortest water route and land at Pas de Calais. A British intelligence operation called Ultra, having broken key German ciphers, learned of his misapprehension. To capitalize on the situation, the Allies stationed a phantom army in Kent that reinforced Rundstedt's mistaken opinion. It may also have influenced Hitler to decide against sending reserve panzer divisions to Normandy, a decision that greatly facilitated the landing and the establishment of beachheads.

Wednesday, September 18, 2019

Sex and Sexuality in Dracula Essay -- European Literature Bram Stoker

Bram Stoker's novel Dracula, published in 1897, explores various sexual erotic possibilities in the vampire's embrace, as discussed by Leonard Wolf. The novel confronts Victorian fears of homosexuality; that were current at the time due to the trial of playwright Oscar Wilde. The vampire's embrace could also be interpreted as an illustration of Victorian fears of the changing role of women. Therefore it is important to consider: the historical context of the novel; the Victorian notion of the `New Woman' specifically the character of Lucy Westenra; the inversion of gender roles; notions of sexuality; and the emasculation of men, by lessening their power over women; in the novel Dracula. In doing this I will be able to explore the effects of the vampire's embrace in depth, and achieve a wider understanding of the variety of erotic undercurrents Stoker incorporated into the novel. Stoker was born in Ireland in 1847, and later he graduated from Trinity College in 1867, and joined the civil service. While working, as a freelance journalist and drama critic enabled him to meet Henry Irving and entered London's literary circles, which included figures such as Arthur Conan Doyle and Oscar Wilde. In the course of Irving's tours he also had the chance to travel around the world. Stoker later married Florence Balcome, who had previously had a romantic affair with Oscar Wilde. In my opinnion Stoker could not fail to be infuleced by these people while he was writing Dracula. In Dracula, Stoker relied greatly upon the conventions of Gothic fiction. Traditionally gothic elements such as dark and sublime settings, and the innocent threatened by the ineffable evil obviously feature in Dracula. Stoker modernises his novel by bringing the set... ...toker, B. (1994) Dracula, Penguin Classics, London. Weissman, J. (1988) Dracula as a Victorian Novel in Dracula: The Vampire and the Critics, UMI Press. Wolf, L. (1993) The essential Dracula, Byron Preiss. Wolf, L. (1972) A Dream of Dracula: In Search of the Living Dead, Popular Library, New York. (1997) Oscar Wilde [internet] can be found at http://www.neuroticpoets.com/wilde/ [accessed 10-11-2005] (2000) Clash of Cultures: The New Woman [internet] can be found at http://history.osu.edu/Projects/Clash/NewWoman/newwomen-page1.htm [accessed on 10-11-2005] (1997) Thor [internet] can be found at http://www.pantheon.org/articles/t/thor.html [accessed on 10-11-2005]

Tuesday, September 17, 2019

Elements of the Gothic Genre

The gothic novel was invented almost single-handedly by Horace Walpole, whose The Castle of Otranto (1764) contains essentially all the elements that constitute the genre. Walpole's novel was imitated not only in the eighteenth century and not only in the novel form, but it has influenced writing, poetry, and even film making up to the present day. It introduced the term â€Å"gothic romance† to the literary world. Due to its inherently supernatural, surreal and sublime elements, it has maintained a dark and mysterious appeal. However, the roots of the Gothic? precede the Gothic? works of Horace Walpole.The focus on the grotesque in the medieval period (visible especially in the paintings and architecture of the period) provides a key backdrop against which Gothic must be read, as do the violent and often grotesque tragedies written for the Elizabethan and Jacobean theatre, with their detailed, almost surgical exploration of the supernatural, vice, corruption, imprisonment, br utality and sexuality, all of which were to provide the very substance of the Gothic authors. (Note particularly ‘Macbeth? and ‘Dr Faustus?) Gothic literature is devoted primarily to stories of horror, the fantastic, and the â€Å"darker† supernatural forces.These forces often represent the â€Å"dark side† of human nature— irrational or destructive desires. Gothic literature derives its name from its similarities to the Gothic medieval cathedrals, which feature a majestic, unrestrained architectural style with often savage or grotesque ornamentation (the word â€Å"Gothic† derives from â€Å"Goth,† the name of one of the barbaric Germanic tribes that invaded the Roman Empire). The Gothic genre (in both literature and architecture) is therefore associated with savagery and barbarism.Generally speaking, gothic literature delves into the macabre nature of humanity in its quest to satisfy mankind's intrinsic desire to plumb the depths of t error. The key features of gothic texts are: 1) the appearance of the supernatural, 2) the psychology of horror and/or terror, 3) the poetics of the sublime, 4) a sense of mystery and dread 5) the appealing hero/villain, 6) the distressed heroine, and 7) strong moral closure (usually at least). ELEMENTS OF THE GOTHIC IN TEXTS 1. Setting in a castle or haunted house. The action takes place in and around an old castle, sometimes seemingly abandoned, sometimes occupied.The castle often contains secret passages, trap doors, secret rooms, dark or hidden staircases, and possibly ruined sections. The castle may be near or connected to caves, which lend their own haunting flavour with their branchings, claustrophobia, and mystery. (Translated into modern filmmaking, the setting might be in an old house or mansion–or even a new house–where unusual camera angles, sustained close ups during movement, and darkness or shadows create the same sense of claustrophobia and entrapment. ) It is usually a dwelling that is inhabited by or visited regularly by a ghost or other supposedly supernatural being.Example: Horace Walpole's The Castle of Otranto. Walpole's novel first introduced to gothic literature its single most influential convention, the haunted castle. The castle is the main setting of the story and the centre of activity. Cemetery /Graveyard. A cemetery defines a place which is used for the burial of the dead. Cemeteries are widely used in Gothic Literature as oftentimes frightening places where revenance can occur. Catacombs are especially evocative Gothic spaces because they enable the living to enter below ground a dark labyrinth resonating with the presences and mysteries of the dead. . The Weather is used in a number of ways and forms, some of these being: Mist – This convention in Gothic Literature is often used to obscure objects (this can be related to the sublime) by reducing visibility or to prelude the insertion of a terrifying person or thing; Storms – These frequently accompany important events. Flashes of lightning accompany revelation; thunder and downpours prefigure the appearance of a character or the beginning of a significant event (eg thunder precedes the entrance of the witches in ‘Macbeth?;Sunlight – represents goodness and pleasure; it also has the power to bestow these upon characters. 3. An atmosphere of mystery and suspense. (or a sense of dread) The work is pervaded by a threatening feeling, a fear enhanced by the unknown. Often the plot itself is built around a mystery, such as unknown parentage, a disappearance, or some other inexplicable event eg. Ghosts walking or a painting coming to life. There may be an ancient prophecy connected with the castle or its inhabitants. It is usually obscure, partial or confusing.This serves to captivate the reader and encourage further reading. The atmosphere may also be seen acting upon the protagonists in texts, influencing them by excitin g their curiosity or fear. 4. Claustrophobia / Entrapment & Imprisonment: A favourite horror device of the Gothic finds a person confined or trapped, such as being shackled to a floor or hidden away in some dark cell or cloister. This sense of there being no way out contributes to the claustrophobic psychology of Gothic space. It consists of an abnormal dread of being confined in a close or narrow space.Often ttributed to actual physical imprisonment or entrapment, claustrophobia can also figure more generally as an indicator of the victim's sense of helplessness or horrified mental awareness of being enmeshed in some dark, inscrutable destiny 5. The supernatural may be intrinsic to the plot. This is generally in the form of some kind of supernatural being or object, such as a vampire, witch, devil or ghost, which is frightening due to its refusal to adhere to the laws of nature, God or man. In ‘Macbeth? there are three witches. Dr Faustus communicates with a demon and indirec tly with Lucifer.All of ‘Paradise Lost? involves the supernatural. 6. Dreams, omens, portents, visions. Dreaming is characterised as a form of mental activity that takes place during the act of sleep. Dreams invoke strong emotions within the dreamer, such as ecstasy, joy and terror. Dreams dredge up these deep emotions and premonitions that reflect tellingly upon the dreamer, what one might conceal during waking hours but what emerges in sleep to haunt and arouse the dreamer. It is most likely due to this heightened emotional state that dreams are used so often within Gothic Literature.By invoking dream states within their characters, authors are able to illustrate emotions on a more unmediated and, oftentimes, terrifying level. Dreams reveal to the reader what the character is often too afraid to realise about himself or herself. Dreaming also has an ancient relation with the act of foretelling wherein the future is glimpsed in the dream state. Perhaps the most famous Gothic example of significant dreams occurs in Shelley's ‘Frankenstein? after Frankenstein ‘awakes' his creature: he falls into a dream state that begins with his kissing of Elizabeth, his love.However, this kiss changes her in the most drastic way as she transforms into the rotting corpse of Caroline, Victor's dead mother. Upon awakening from this horrifying dream, Victor finds himself staring into the face of the monster he has created. Interpretations of this dream lead to explorations of Frankenstein's psyche, relational ability and sexuality. A character may have a disturbing dream vision, or some phenomenon may be seen as a portent of coming events. For example, if the statue of the lord of the manor falls over, it may portend his death.In modern fiction, a character might see something (a shadowy figure stabbing another shadowy figure) and think that it was a dream. This might be thought of as an â€Å"imitation vision. † Banquo in ‘Macbeth? dreams of the â €˜weird sisters?. Lady Macbeth?s suppressed guilt emerges when she is seen sleepwalking. 7. The stock characters of Gothic fiction include tyrants, villains, bandits, maniacs, Byronic heroes, persecuted maidens, femmes fatales, madwomen, magicians, vampires, werewolves, monsters, demons, angel, fallen angel, the beauty and the beast, revenants, ghosts, perambulating skeletons, the Wandering Jew, and the Devil himself. .Villain-Hero (Satanic, Promethean, Byronic Hero) The villain of a story who either 1) poses as a hero at the beginning of the story or 2) simply possesses enough heroic characteristics (charisma, sympathetic past, etc) so that either the reader or the other characters see the villain-hero as more than a simple charlatan or bad guy. Three closely related types exist: Satanic Hero: a Villain-Hero whose nefarious deeds and justifications of them make him a more interesting character than the rather bland good hero.Example: The origin of this prototype comes from Roman tic misreading of Milton's Paradise Lost, whose Satan poets like Blake and Shelley regarded as a far more compelling figure than the moralistic God of Book III of the epic. Gothic examples: Beckford's Vathek, Radcliffe's Montoni, and just about any vampire. Promethean: a Villain-Hero who has done good but only by performing an over-reaching or rebellious act. Prometheus from ancient Greek mythology saved mankind but only after stealing fire and ignoring Zeus' order that mankind should be kept in a state of subjugation.Mary Shelley's Frankenstein is tellingly subtitled the â€Å"Modern Prometheus. † Consider whether Dr Faustus is a Promethean hero. (The vaulting arches and spires of Gothic cathedrals reach wildly to the sky as if the builders were trying to grasp the heavens , an ambition for the eternal that is likewise expressed in many works of Gothic literature (consider Manfred's quest for supernatural power in Byron's poem, or Frankenstein's quest to become godlike by cr eating life or Dr. Faustus pact – offering his soul for 24 years of power).Byronic Hero: a later variation of the â€Å"antithetically mixed† Villain-Hero. Aristocratic, suave, moody, handsome, solitary, secretive, brilliant, cynical, sexually intriguing, and nursing a secret wound, he is renowned because of his fatal attraction for female characters and readers and continues to occasion debate about gender issues. Example: Byron's Childe Harold and, more gothically, Manfred are the best examples, but this darkly attractive and very conflicted male figure surfaces everywhere in the 19th and 20th century gothic eg Heathcliff or Wilde?s Dorian Gray.Byron himself was described as â€Å"mad, bad and dangerous to know. † The Byronic hero in literature and life: A. Robin Hood B. Richard III C. Iago D. Faust/ Dr. Faustus E. Milton's Satan F. Victor Frankenstein G. Frankenstein's Creature H. Dracula I. Byron?s Manfred J. Cain K. Lara L. Conrad M. Childe Harold N. Byron, Shelley O. Ambrosio P. Peter Quint Q. Miss Jessel R. Stalin S. Hitler T. The Unabomber U. Prometheus 9. The Pursued Protagonist This refers to the idea of a pursuing force that relentlessly acts in a severely negative manner on a character.This persecution often implies the notion of some sort of a curse or other form of terminal and utterly unavoidable damnation, a notion that usually suggests a return or â€Å"hangover† of traditional religious ideology to chastise the character for some real or imagined wrong against the moral order. The Wandering Jew is perhaps the archetypically pursued/pursuing protagonist. –Drew McCray 10. Pursuit of the Heroine This is the pursuit of a virtuous and idealistic (and usually poetically inclined) young woman by a villain, normally portrayed as a wicked, older but still potent aristocrat.While in many early Gothic novels such a chase occurs across a Mediterranean forest and/or through a subterranean labyrinth, the pursuit of the he roine is by no means limited to these settings. This pursuit represents a threat to the young lady's ideals and morals (usually meaning her virginity), to which the heroine responds in the early works with a passive courage in the face of danger; later gothic heroines progressively become more active and occasionally effective in their attempts to escape this pursuit and indict patriarchy. eg. Angela Carter?s ‘The Bloody Chamber. ?Women in distress. As an appeal to the pathos and sympathy of the reader, the female characters often face events that leave them fainting, terrified, screaming, and/or sobbing. A lonely, pensive, and oppressed heroine is often the central figure of the novel, so her sufferings are even more pronounced and the focus of attention. The women suffer all the more because they are often abandoned, left alone (either on purpose or by accident), and have no protector at times.Women threatened by a powerful, impulsive, tyrannical male. One or more male chara cters has the power, as king, lord of the manor, father, or guardian, to demand that one or more of the female characters do something intolerable. The woman may be commanded to marry someone she does not love (it may even be the powerful male himself), or commit a crime. 11. The Outsider: The one theme that cuts through virtually all Gothic is that of the â€Å"outsider,† embodied in wanderers like Frankenstein's creature.Gothic fiction is concerned with the outsider, whether the stationary figure who represses his difference, or the wandering figure who seeks for some kind of salvation, or else the individual who for whatever reason- moves entirely outside the norm. In any event, he is beyond the moderating impulses in society, and he must be punished for his transgression. He is gloomy and melancholy, full of self-pity and self-hatred. Like Cain, he is the perpetual outsider, marked by his appearance, doomed to wander the four corners of the earth, alone and reviled.It may be argued that Frankenstein himself becomes an outsider as he grows more and more like his creation. . While the society at large always appears bourgeois in its culture and morality, the Gothic outsider is a counterforce driven by strange longings and destructive needs. While everyone else appears sane, he is insane; while everyone else appears bound by legalities, he is trying to snap the pitiless constrictions of the law; while everyone else seems to lack any peculiarities of taste or behaviour, he feels only estrangement, sick longings, terrible surges of power and devastation.Take for example, Heathcliff in ‘Wuthering Heights?. 12. Possession The popularity of belief in demonic possession seems to have originated within Christian Theology during the Middle Ages. During this time, Christians lived in fear concerning the war being waged between God and the Devil over every mortal soul. Hence, this fear of possession seemed to culminate into an act that could be viewed by t he mortal eye. This act is defined as the forced possession of a mortal body by the Devil or one of his demons.There are two types of possession and either can be voluntary or involuntary. Voluntary possession seems to involve a willing exchange in the form of some compact between evil spirit and mortal, often involving wealth, power or goods (eg. The pact Faustus makes); involuntary possession occurs when the devil randomly selects an unwitting host. The two types of possession consist of the transference of the Devil or demon directly into the mortal body or the sending of the Devil or demon into the body by a third party, usually a mortal dabbler in the dark arts.Following the act, the possessed is said to show many symptoms including abnormal strength, personality changes, fits, convulsions, bodily odours resembling sulphur, lewd and lascivious actions, the ability to levitate, the ability to speak in tongues or the ability to foretell future events. Many religions acknowledge t he act of possession still today, most notably the Catholic Church. There seem to be three ways in which to end a possession. 13. Revenance This is the return of the dead to terrorise or to settle some score with the living.4. Revenge Revenge is characterized as the act of repaying someone for a harm that the person has caused; the idea also points back generically to one of the key influences upon Gothic literature: the revenge tragedies of Elizabethan and Jacobean drama. Revenge may be enacted upon a loved one, a family member, a friend, an object or even an area. Within Gothic Literature, revenge is notably prominent and can be enacted by or upon mortals as well as spirits.Revenge can take many forms, such as harm to body, harm to loved ones, and harm to family. The most Gothic version of revenge in Gothic Literature is the idea that it can be a guiding force in the revenance of the dead. 15. Unreliable Narrator A narrator tells a story and determines the story?s point of view. A n unreliable narrator, however, does not understand the importance of a particular situation or makes an incorrect conclusion or assumption about an event that he/she witnesses.An important issue in determining the The Turn of the Screw. 16. Multiple Narrative/Spiral Narrative Method The story is frequently told through a series of secret manuscripts or multiple tales, each revealing a deeper secret, so the narrative gradually spirals inward toward the hidden truth. The narrator is often a firstperson narrator compelled to tell the story to a fascinated or captive listener (representing the captivating power of forbidden knowledge). (Note ‘Wuthering Heights?) 17. High, even overwrought emotion.The narration may be highly sentimental, and the characters are often overcome by anger, sorrow, surprise, and especially, terror. Characters suffer from raw nerves and a feeling of impending doom. Crying and emotional speeches are frequent. Breathlessness and panic are common. In the fi lmed gothic, screaming is common. 18. The Sublime: The definition of this key term has long been a contested term, but the idea of the sublime is essential to an understanding of Gothic poetics and, especially, the attempt to defend or justify the literature of terror.Put basically (and this really is basic – a fuller understanding of the Sublime would be useful to students of Wordsworth or any Gothic Literature), the Sublime is an overpowering sense of the greatness and power of nature, which can be uplifting, aweinspiring and terrifying, caused by experience of beauty, vastness or grandeur. Sublime moments lead us to consider the place of humanity in the universe, and the power exhibited in the world. 19. Darkness as intrinsic to humanity:Generally speaking, gothic literature delves into the macabre nature of humanity in its quest to satiate mankind's intrinsic desire to plumb the depths of terror. 0. Necromancy This is the black art of communicating with the dead. This is usually done to obtain information about the future, but can also be used for other purposes, such as getting the dead to perform deeds of which humans are not capable. The conjurer often stood in a circle, such as a pentagram, in order to protect himself from the dead spirit, yet he was often overpowered by the spirit. Examples: The most famous examples of necromancy can be found in literary renditions of the Faust legend, from Marlowe to Johann Wolfgang von Goethe to Byron with his Manfred.In these works, Faust not only speaks with the devil in order to strike a deal but necromantically invokes various dead, famous figures from the past for his amusement and edification. 21. Blood -This is a prominent symbol in Gothic works often intimating the paradox of the human condition; blood can represent both life and death, or both guilt (e. g. , murder) and innocence (e. g. , redemptive blood). Consider references to blood in ‘Macbeth?, Byron's Manfred and Mary Shelley's Frankenste in. 22.Marriage as Resolution: The importance of marriage in this scheme cannot be overstated. Not only does movement toward matrimony in the Gothic's present trigger the appearance of the buried past, but that buried past itself always contains information tied to the institutions of matrimony or family interest. 23. Sadism : The word â€Å"sadism† was coined to describe the writings of Donatien-AlphonseFrancois, the Marquis de Sade. Sadism is a sexual perversion where one person gains gratification by inflicting physical or mental pain on others.It can also mean a delight in torment or excessive cruelty. (Heathcliff in ‘Wuthering Heights? / or the husband in ‘The Bloody Chamber?. 24. Strong Moral Closure: If de Sade is to be believed, the Gothic genre arose as a response to the brutality and bloodiness of Romantic society, and it as part of this response that Gothic fiction usually contains a strong moral. 25. The metonymy of gloom and horror. Metonymy is a subt ype of metaphor, in which something (like rain) is used to stand for something else (like sorrow).For example, the film industry likes to use metonymy as a quick shorthand, so we often notice that it is raining in funeral scenes. Note that the following metonymies for â€Å"doom and gloom† all suggest some element of mystery, danger, or the supernatural. wind, especially howling doors grating on rusty hinges footsteps approaching lights in abandoned rooms characters trapped in a room ruins of buildings thunder and lightning rain, especially blowing sighs, moans, howls, eerie sounds clanking chains gusts of wind blowing out lights doors suddenly slamming shut aying of distant dogs (or wolves? ) crazed laughter 26. The vocabulary of the gothic. The constant use of the appropriate vocabulary set creates the atmosphere of the gothic.Here as an example are some of the words (in several categories) that help make up the vocabulary of the gothic in The Castle of Otranto: Mystery dia bolical, enchantment, ghost, goblins, haunted, infernal, magic, magician, miracle, necromancer, omens, ominous, portent, preternatural, prodigy, prophecy, secret, sorcerer, spectre, spirits, strangeness, talisman, vision Fear, Terror, or Sorrow fflicted, affliction, agony, anguish, apprehensions, apprehensive, commiseration, concern, despair, dismal, dismay, dread, dreaded, dreading, fearing, frantic, fright, frightened, grief, hopeless, horrid, horror, lamentable, melancholy, miserable, mournfully, panic, sadly, scared, shrieks, sorrow, sympathy, tears, terrible, terrified, terror, unhappy, wretched Surprise alarm, amazement, astonished, astonishment, shocking, staring, surprise, surprised, thunderstruck, wonder Haste anxious, breathless, flight, frantic, hastened, hastily, impatience, impatient, impatiently, impetuosity, precipitately, running, sudden, suddenlyAnger anger, angrily, choler, enraged, furious, fury, incense, incensed, provoked, rage, raving, resentment, temper, wrath , wrathful, wrathfully Largeness enormous, gigantic, giant, large, tremendous, vast 27. Elements of Romance In addition to the standard gothic aspects, many gothic novels contain elements of romance as well. Elements of romance include these: Powerful love. Heart stirring, often sudden, emotions create a life or death commitment. Many times this love is the first the character has felt with this overwhelming power. Uncertainty of reciprocation. What is the beloved thinking?Is the lover's love returned or not? Unreturned love. Someone loves in vain (at least temporarily). Later, the love may be returned. Tension between true love and father's control, disapproval, or choice. Most often, the father of the woman disapproves of the man she loves. Lovers parted. Some obstacle arises and separates the lovers, geographically or in some other way. One of the lovers is banished, arrested, forced to flee, locked in a dungeon, or sometimes, disappears without explanation. Or, an explanation ma y be given (by the person opposing the lovers' being together) that later turns out to be false.Gothicism: In literary criticism, this refers to works characterised by a taste for the medieval or morbidly attractive. A gothic novel prominently features elements of horror, the supernatural, gloom, and violence: clanking chains, terror, charnel houses, ghosts, medieval castles, and mysteriously slamming doors. The term â€Å"gothic novel† is also applied to novels that lack elements of the traditional Gothic setting but that create a similar atmosphere of terror or dread. Mary Shelley's Frankenstein is perhaps the best-known English work of this kind. Grotesque 1) This term originated from oddly shaped ornaments found within Roman dwellings, or grottoes, during the first century. From a literary standpoint, this term implies a mutation of the characters, plants and/or animals. This mutation transforms the normal features and/or behaviours into veritable extremes that are meant to be frightening and/or disturbingly comic (Cornwell 273. (2) The term grotesque also defines a work in which two separate modes, comedy and tragedy, are mixed. The result is a disturbing fiction wherein comic circumstances prelude horrific tragedy and vice versa.