Thursday, October 31, 2019

What Education Means to Me Essay Example | Topics and Well Written Essays - 750 words

What Education Means to Me - Essay Example Most students in high school are not sure what they want to be when they grow up. Often the lack of surety results in poor decisions and choices. In order to perform well in any job, it is critical to be passionate about it. One cannot be a good doctor if he really wants to be a writer. In my case, I always had a direction about what I wanted to pursue as my career although I did work in the marine infantry. In the marine, I was responsible for guarding the nuclear weapons which are amongst the most significant weapons. I always welcome the opportunity to learn as I believe one learns at every stage of his life. While working at the marine infantry I took the chance to learn more about the workings of the infantry. The experience proved to be invaluable although I showed more inclination towards radiation therapy. I did realize throughout school that education was of vital importance for my academic and professional development. It was my pathway to success. Although I found examinations to be intimidating I acknowledged that they were part of my educational development. But this did not mean that my view of education was limited to school, classes, and examinations. Education for me was beyond examinations and just school. The role of my teachers in motivating me has been great. This resulted in me looking at the world in a new perspective, one that was not confined to the classroom. Perhaps my teachers have had the greatest influence on my life in terms of education in school. They made me realize the importance of learning outside of the class. The ability to observe and apply knowledge to real situations was extremely helpful in building myself academically. Education is definitely beyond the usual textbook for me. It includes just about any knowledge or learning that results in a new perspective of viewing the world.  

Tuesday, October 29, 2019

Picking a stock Essay Example for Free

Picking a stock Essay Picking a stock is not as easy as differentiating NYSE from the Nasdaq. And more importantly, such differences are independent of the quality of the stocks. Both bourses make up the big majority of the US stock market. Easily, these stock exchanges maintain the country’s premiered blue chip stocks; wherein Microsoft is Nasdaq’s â€Å"flagship† stock and General Electric is arguably NYSE’s most well established listed company. The most glaring difference between the two is their own choice of medium to do transactions. â€Å"Nasdaq-listed trades are entirely automated. NYSE trades are still overseen by specialists. While traders have some say in how, when and at what price the trades are crossed, they cant pick the market† (NYSE vs. Nasdaq, (2003), from web site http://www. forbes. com/2003/08/18/cx_aw_0818mondaymatchup. html). Meanwhile, NYSE’s seven (7) specialists act as facilitators with the interest of making a very liquid market in the stock exchange. Nasdaq’s market makers on the other hand, actually act as participants in the buying and selling of shares (electronically, of course). NYSE is a well-know auction’s market wherein â€Å"the highest bidding price will be matched by the lowest asking price† (The Tale of Two Exchanges: NYSE and Nasdaq, from web site http://www. investopedia. com/articles/basics/03/103103. asp). Conversely, Nasdaq is more â€Å"organic† as a dealer’s market where market makers buy and sell from each other against their personal inventories. Lastly, history makes a big contribution to each bourse’s public perception. Whereas the NYSE is viewed as a more established institution (founded in 1792), Nasdaq is perceived as high-growth and highly volatile trading platform and subsequently attracts mostly firms from the IT and Telecom industries. Some first-time participants who are cost-driven prefer Nasdaq’s cheaper listing fee as well. The case of former Worldcom CEO Bernard Ebbers created a ripple effect in the telecommunications industry and severely put its existing form, MCI, into a whirlpool of debt amounting to around $35 billion. Even when Verizon purchased MCI for $7. 6 billion when the latter filed for bankruptcy, the new executive officers had the daunting tasks of regaining public trust while at the same unfolding more antitrust issues and financial window dressing perpetrated by the previous incumbents. Thousands of jobs were lost; creditors and investors alike could not recoup most of their stakes in the company. â€Å"†¦the fall of WorldCom altered the fortunes of a number of telecommunications industry participants, none more so than ATT Corporation† (Romar, Edward J. , Worldcom Case Study Update 2006, (2006), from web site http://www. scu. edu/ethics/dialogue/candc/cases/worldcom-update. html). The demise of Worldcom after the scandal affected the entire industry, especially the other forerunners that put too much reliance on the now bankrupt company as the beacon of industry standards. Bloated projections not only destroyed Worldcom, but it also damaged financially the competitors who reacted aggressively to counter these projections. For example, Worldcom’s former suppliers Nortell and Lucent Technologies took a nosedive via layoffs and below book value share prices because of these overstated figures that were never accomplished anyway.

Sunday, October 27, 2019

Learning And Development As An Organisation Process Management Essay

Learning And Development As An Organisation Process Management Essay If the Challenge of the past has been to get organized, the challenge of the future is to find ways in which we can remain open to continous self-organizations: so that we can adapt and evolve as we go along (Gareth morgan, Imagination, p.17) Learning and development is an organisational process. Learning development is a multi-faceted study. LD activity first acquired a specific organizational meaning in the USA in the 1970s. Termed human resource development its purpose was regarded as primarily about short-term training ,encompassing skills acquistion and behavioural change . It was defined by one of its most influential commentators(Nadler 1970) as: a series of organized activites conducted within a specified time and designed to produce behavioural change. Hall(1984) defined it in more strategic perspective as Strategic human resource development is the identification of needed skills and active management of learning for the long-range future in relation to explicit corporate and business strategies According to CIPDs defnition LD purpose is as follows (CIPD 2001a): The organizational process of developing people involves the integration of learning and developing process,operations and realtionships.its most powerful outcomes for the business are to do with enhanced organizational effectiveness and sustainability .For the individual they are to do with enhanced personal competence,adaptability and employability. It is therefore a critical business process , whether in for profit or not-for-profit organizations. Rosemarys definition of LD purpose is shorter than the CIPDs and has a rather different emphasis: The primary puropse of learning and development as an organizational process is to aid collective progress through the collaborative and expert stimulation and facilitation of learning and knowledge that support business goals, develop individual potential, and respect and build on diversity Learning learning is a selfdirected, work based process leading to increased adaptive capacity in other words an environment where individuals learn to learn and possess the capabilities that enable them to build thier skills and help thier organisation retain competitive advantantage. Development Development implies a longer process of learning , acquiring skills or knowledge by different means such as training, coaching, formal and informal interventions, education or planned experience. It can be strutured by human resource development (HRD)professionals, or created as a personal plan. Learning and development (LD) as a field of management research and practice is concerned with how individuals acquire or create knowledge and skills which enable them to perform and grow in thier current or future occupational role. Historical background Terms for LD as an organisational process ; In the past three terms have been widely used to describe the LD field: training and development , employement development and human resource development.The term training development is still a popular one , however training is only way of achieving development . The term employee development is now touched by political correctness , it gives a view of master- servant relationship. It is no doubt that is falling out of use at time when many organisations are referring to their members as associates or partners rather than employees. The term human resource development retains its popularity amongst academics but it has never been as attractive practitioners. They tend to dislike it because reference to people as resource is felt to be demeaning. Putting people on a mission with money, materials and equipment creates an impression of development as an essentially unfeeling, even manipulative activity. However ,using the term learning and development is not the perfect solution. What is gained in scope is lost somewhat in generalisation. learning has so many meanings . a common view is to see it as a life long activity involving three processes (onions 1973): To develop : to unfold more fully , bring out all that is contained in To educate: to bring up from childhood , so as to form habits , manners and mental and physical aptitudes To train : to instruct and discipline in or for some particular art, profession, occupation or practice: to exercise , practice ,drill. Combining these terms a conditioning process and the gaining of competencies through planned instructional activity . another kind of defnition would draw more attention to learning driven by natural curiousity. So the terms we choose to describe things matters. They influence peoples perceptions and bestows identity. An organisation that uses the term human resource development in preference to employee development, or training or learning and development has reason for that choice. LD activity is first acquired a specific organisational meaning in 1970s. Termed human resource development its purpose was regarded as primarily about short term training , encompassing skills acquistion and behavioural change . it was defined by one of its most influential commentators (Nadler, 1970) as a series of organised activities conducted within a specified time and designed to produce behavioural change. By 1980s some commentators were moving towards a more strategic perspective. According to hall(1984) strategic human resource development is the identification of needed skills and active management of learning for the long range future in relation to explicit corporate and business strategies Now it is easy to find out the stated purpose of LD activity in HSBC? And how well or badly do the employees think LD is linked to other HR practices and to organisational goals. http://books.google.com/books?hl=enlr=id=vMFcnZiT63cCoi=fndpg=PR11dq=nadler+learning+and+developmentots=YZPzM5-Ndnsig=ZY-gDyZiM3LpuLB1IGbCNpp1OcI#v=onepageq=nadler%20learning%20and%20developmentf=false The importance of context Although many employers today increasingly call for thier LD activity to be more convincingly tied to business needs, there are still many organisations where there is not happening and also where LD professionals are to make a strategic contribution. Often this because they do not relate thier activity sufficiently to context. The term has two dimesions , external and internal. The external context consists of the business environment of the organisation and other factors that have a direct relevance for LD practice within the organisation. The internal , organisational context, expressed most obvisouly in workplace culture, is most powerfully shaped by Top managements vision and values , goals and leadership Management (espcecially front line management) style and actions HR strategies and practices. According to survey by CIPD 2004 on Training and development, it showed that greater attention is now being paid to workplace learning, and that on the job training and coaching/mentoring are the most popular processes here. Thier main use , however is to improve individual peformance , tackle underpeformance and improve productivity again, not an indicator that value is placed on longer term development. CIPD (2004a) revealed Minimal evaluation of either coaching or mentoring process against business objectives Very little training provided for the line managers who carry the main burden of coaching roles Uncertainity as to what activities coaching and mentoring involve. Thus research however should be continued to show a gap between strategy delivery across the whole HR area .To tackle this gap in thier field, LD professionals need to work with line managers to build and support learning cultures that will make LD plans come to life in the workplace. Front-line mangers in particular need helping in coping with thier LD responsibilites they are much pressurised by the organisations that regulary restructure in search for competitive advantage. Importance of planning Planning is a process of developing strategies to accomplish the goals. Planning in organizations provides a logical framework approach to the goal. It helps to improve the performance of the company. Planning, learning and development is becoming increasingly important in all organizations to become successful in the present competitive world. There are various planning models like strategic planning, Issue based planning, alignment planning, scenario planning, organic planning etc.., People have to continue learning to develop their skills along with the changing world. Learning theories like behaviorism, cognitive, constructivism, design-based and humanism theories will help in understanding the importance of the LD in the organization. The concept of identifying and analyzing the importance of training and learning is necessary at different levels. The various theories and models have a functional involvement for LD research and practice. However, all the models present only a partial imminent in actual workplace. Learning and development is concerned with how the individuals can gain the knowledge and skills which will assist them to execute the performance well in his future career. Planning is very important and has to be done properly to attain a goal of the organization. Development occurs as a result of the learning,coaching,mentoring,training,planning etc..The motivation of learning and development may differ in individuals depending on their goals.Through Learning people should change from what they were and should be able to produce a proper output. LD Management development planning term refers to the activities involved in enhancing leaders, managers and supervisors abilities to plan, organize, lead and control the organization and its members. Consequently, many view the term management development to include executive development (developing executives), supervisors). leadership development (developing leaders), managerial development (developing managers) and supervisorial development (developing Management development is an effort that enhances the learners ability to manage organizations. Managing includes activities of planning, organizing, leading and coordinating resources. A critical skill for anyone is the ability to manage their own learning The main purpose of learning and development as a process is to help collective improvement through the joint and expert stimulation and facilitation of learning and knowledge that support business goals,develop individual potential and build on diversity. Leaning and development provides a wide range of activities to improve the capacity of the individual. LD can be designed to deliver specific skills in a short time to meet an immediate need or can be designed to attain broader requirements over a longer period. Theories surrounding Learning There are various theories surrounding the learning and development which include Behaviourism theories, Cogtnitivism theories ,Humanism thories, Social and situational theories etc.There are different roles for all the theories in the individual development. Aspect Behaviourist Cognitivist Humanist Social situational PLANNING: Planning consists of some essential and significant aspects to be considered, which include goals, strategies, resources, objectives, tasks etc., Goals: Goals are the important aspects that should be accomplished in total by the organization. Goals are mission of an organization. Strategies and achievements: To achieve the goals in the organization strategies should be planned and followed. Strategies are the processes in the system. Objectives: Objectives are specific targets that must be accomplished to achieve the goal in total. To achieve the goals, objectives are the milestones, which should be implementing the strategies. Tasks: In organizations people are usually assigned with various tasks to implement the plans. If the scope of the plan is small then the responsibilities and activities are essentially the same. Resources: Resources in an organization include people, material, technologies, money etc.., which are required to implement the strategies to accomplish the goals. Costs of these resources are estimated in the form of budget. Planning models There is no one perfect planning model for each organization. All the own environment and model of organization ends with developing their developing their own planning process, planning often by selecting a model and modifying it as they go along in The models like strategic planning, Issue based planning, alignment planning, scenario planning, organic planning etc An organization might choose to integrate different planning models, e.g., work force planning model in an organisation is used in developing and retaining the staff. Using a scenario model to creatively identify strategic issues and goals, and then an issues-based model to carefully strategize to address the issues and reach the goals. Planning determines the future of the organization. The focus of strategic planning is mainly on the entire organization, while the focus of the business plan is usually on a service, product or program. The planning is developed depending on the nature of the leadership, size, capability of planners etc.., in the organization. Development of the planning greatly helps to clarify the organizations plans and make sure that key leaders are all in the same play. The process of planning is more important than the strategic plan document. 1. Basic strategic model Basic strategic model of planning is a very fundamental process is normally followed by organizations that are enormously small, busy, and have not done much planning before. Planning is usually conceded out by top-level administration. This basic strategic planning process includes: a. Identifying the function of the organization (mission statement) This describes the organization its basic purpose. The statement should explain what are the client needs are and what are the services expected by them. The toplevel management should develop and agree on the mission statement. The statements will change over the years. b. Selecting the goals the organization must achieve Goals are about what the organization need to accomplish to meet the purpose. c. Identify specific strategies that must be implemented to reach the goal By closely examining the environments of the organization or by conducting PEST and SWOT analysis specific strategies should be implemented to accomplish the goals d. Implement the action plans for each strategy These are the definite actions that each department must undertake to make sure that the implementation of each strategy is done properly. Objectives should be clear, to the extent that public can assess if the objectives have been met. The top management should ideally develop detailed committees that each has a work plan. e. Monitoring the plan Planners frequently reflect on the level to which the goals are being reached and whether the action plans are being implemented correctly. The most significant indicator of accomplishment of the organization is the positive feedback from the customers. Monitoring requires existing and appropriate data. When the plans are not being implemented according to targeted time, corrective actions must be implemented to reach the target. 1. Issue based Model Organizations that start with the basic planning evolve to using this wider ranging and more efficient type of planning. Issue-Based (or Goal-Based) Planning The organizations may not perform all the following activities every year. 1. External and internal measurement to identify SWOT and PESTEL. 1. Calculated analysis to classify and prioritize major issues and goals. 2. Design most important programs to address issues and goals. 3. Design and update idea, mission and principles. Some organizations may do follow this step first in planning. 4. Establish action plans for implementing the plans. 5. Document the analysis, issues, goals and action plans of the organization. 6. Develop the yearly Operating Plan record. 7. Develop and approve financial plan for year one. 8. Monitor, estimate and update Strategic Plan document 3. Alignment Model The main principle of this model is to make sure that there is a strong alignment between the organizations mission and its resources to efficiently function the organization. This model is useful for organizations that require altering strategies and finding out the problem during the function of a plan. An organization plans to choose this model if its facing a large amount of issues. 4. Workforce planning model Effective workforce plan is an important tool to identify appropriate.Effective workforce plan is an essential tool to identify suitable staffing levels and validate budget allocations so that organizations can accomplish their objectives.Workforce planning is a efficient process for identifying the human capital necessary to meet the organization goals and developing the strategies to meet their requirements. This step involves linking between the workforces planning process with the organization strategic plan. The main purposes of workforce planning are a.To ensure that an organization has the required workers to support their mission and strategic plan. the objectives of its strategic plan Those responsible for workforce planning should identify the organizations mission and b. Analyze workforce, Identify skill gaps and conduct workforce analysis Analysis of workforce data is the main element in the workforce planning process. Workforce analysis usually considers information such as occupations, skills and experience, retirement eligibility, diversity, turnover rates, and trend data. c. Develop and implement action plans Implementation brings your workforce plan to life. You may need a separate action plan to address the implementation of each strategy in the workforce plan. The workforce plan should be implemented in connection with the requirements of the organizations strategic plan. If the strategic plan changes due to unanticipated customer, leadership, or legislative changes, adjustments to workforce plan strategies may be necessary. d. Monitor, Evaluate, and Revise The evaluation and adjustments are very important in workforce planning and are keys to continuous improvement. Although a workforce plan should cover five years, it should be reviewed annually. If an Organization does not regularly review its workforce planning efforts, it runs the risk of failing to respond to unexpected changes. Key enabling features in managing learning and development Everyone has a responsibility in managing learning and development to achieve outcomes efficiently and effectively. Learning and development are critical processes for enhancing productivity and organizational performance. Research shows high-performing organizations in Australia and overseas share certain features in relation to learning and development as follows: à ¢Ã¢â€š ¬Ã‚ ¢ They align and integrate their learning and development initiatives with corporate and business planning by reviewing existing activities and initiating new learning programs to support corporate plans. à ¢Ã¢â€š ¬Ã‚ ¢ The corporate culture supports these initiatives and addresses cultural barriers to learning. They focus on the business application of training rather than the type of training, and they consider appropriate learning options de-emphasizing classroom training and allowing staff time to process what they have learned on the job consistent with adult learning principles. à ¢Ã¢â€š ¬Ã‚ ¢ They evaluate learning and development formally, systematically and rigorously. Most organizations carry out evaluation at the reaction level,but few attempts to assess changes in behaviour of criteria of organizational effectiveness(Ralphs and Stephan,1986;Saari et al..,1988;Training in Britain,1989). (Performance = Ability ÃÆ'- Motivation ÃÆ'-Opportunity). People development will have a lot of impact on the organization performance. Competitive success through people involves fundamentally altering the way we think about the workforce and the employment association. Success can be achieved by working with people, not by replacing them or limiting the scope of their activities. Firms that take this different perspective are often able to sucessfully outsmart and outperform the rivals.

Friday, October 25, 2019

Sterilizing the World of ‘Dumb’ People . . . Why It Won’t Work :: Argumentative Persuasive Intelligence Essays

Sterilizing the World of ‘Dumb’ People . . . Why It Won’t Work â€Å"If we could just keep dumb people from having children, eventually there would be nothing but smart people and this would be a better place.† After reading this statement once and not really fully considering it, a lot of people may agree. At some point in their lives, many people may look at certain parents and their children and say, ‘those people really should not be allowed to have children.’ Usually these thoughts are just thoughts, for who are we to say who can and cannot have children. However, what if a government official proposed to sterilize everyone with less than an average IQ of 100. Would preventing ‘dumb’ people from reproducing really make this world a better place? Is the status of our society based on the intelligence of its people alone? The answer to solving the world’s problems and making this a better place to live are not that simple. There are many complex issues around defining and measuring intelligence. Even if we knew for sure that only ‘smart’ people make this place better, would sterilizing the ‘dumb’ work? How important is it to take into account other things that may affect a person’s development? Intelligence is influenced by the interaction of genetics, environment, and culture; therefore, sterilizing people would probably not keep the world free of people with an IQ of less than 100. If the world were cleansed of ‘dumb’ people, it would not guarantee a perfect world. Having a high IQ does not mean that a person will necessarily make this world a better place. Theodore Kaczynski, the Unabomber, had the IQ of a genius. He spent years of his life terrorizing, injuring, and killing people. On the other hand, just because a person has a low IQ does not mean they cannot make this a better place. Take, for example, the ‘Forest Gumps’ of the world or the mentally challenged. They may not be very smart on what our society subjectively calls intelligence, but they may bring joy and purpose to someone else’s life. Making this world a better place is not something left strictly up to the intelligence of the people in it. Anyone supporting the government official’s proposal is assuming that people’s intelligence alone causes the condition of the world, and there is no proof of this.

Thursday, October 24, 2019

Gay Marriage? Essay

When you think of America, the first thing that should come to your mind is a nation of peace and equality. But in reality it’s not, is it? We live in a nation of racism, sexism, and homophobia. Homosexuals get the worst of all the unfair treatment. Gays have been fighting for rights since the 1960’s, maybe even before then, and yet today in 2012, those pleas for rights are heard, but ignored & lashed at. We should allow same-sex marriage because banning it is unfair, love is all that matters in marriage, & gay families have certain family values that some straight marriages lack. Banning an issue doesn’t make it go away. The fact of the matter is, it’ll always be there: gay people will always exist & so will their need for equal rights. As stated in ’14th amendment’ in the Constitution, â€Å"No State shall make or enforce any law which shall abridge the privileges†¦ nor deny to any person within its jurisdiction the equal protection of the laws. † In short, everyone deserves the same, equal rights: that includes gay people. In that case, banning same-sex marriage is unconstitutional. Making this issue illegal is also a form of discrimination. Homophobes ridicule & abuse gay citizens, gays are just being themselves! We are all created equal, so why can’t we all just try to get along? What’s the reason people get married for? Love is. Who’s to judge someone based ;amp; whom they love? No one has the rights to do so. Gays have feelings too, ;amp; them getting married isn’t hurting anyone. In most, basically all, marriages, vows are said to one another. They have many strong family benefits that some straight marriages lack, such as being more open-minded & accepting. As said in a study of gay/lesbian families/parenting, â€Å"Not a single study has found children of gay or lesbian parents to be disadvantaged in any significant respect relative to children of heterosexual parents, (J. Patterson, Pg. 9). † Gay couples have been proven to have stronger emotional bonds than straight couples. Strong family benefits & strong emotional bonds are necessary to long-lasting relationships & marriages. The thing is, it isn’t who you’re raised by, it’s how you’re raised. Banning the issue is unfair, love is all that matters in marriage, & some gay families have certain family values that some straight marriages lack. Gays, lesbians, bisexuals, transgenders, & transsexual people deserve to have the same rights as & be happy like everyone else. Gays should be allowed to marry.

Wednesday, October 23, 2019

Positive Relationships With Children Essay

Positive relationships with children and young people are important for the following reasons: When a child/young person feels comfortable and settled within their care setting they are more likely to engage and participate more with staff and other children within the group which creates a more relaxed atmosphere, it also makes the separation process easier for the parents/carers as well as the child /young person as it shows that the child/young person is emotionally secure, Building and maintaining positive relationships is also important as it contributes to the developmental needs of each individual child/young person personally, socially and emotionally which then enhances their language skills as they gain confidence talking to each other and staff. Positive relationships also enables us as practitioners to understand and respond to children/young people more effectively as we are able to recognise their emotions and expressions and also enables practitioners to plan more accurately as we know more of the interests and understand the developmental needs of the children/young people in our care. Making sure as a practitioner I keep to my word i.e. if a child/group have done a particular activity today, and I have told another group/child they may have a turn next session I must make sure that is what takes place as theses situations will affect the trust between myself and the children within the setting. Positive relationships are maintained by us practitioners, parents /carers being good role models, by showing courtesy and respect to each other at all times, remembering that we must show respect and courtesy to our younger as well as our elders, Always being fair and consistent, listening to what is being said without making judgement and making sure that any rules and boundaries set out are kept to and understanding when information is to be kept confidential, being able to identify and resolve disagreements /conflicts, help children and young people to understand the difference. Effective communication- the way in which we speak to an individual, according to age and developmental stage of the child/young person, being  aware of body language/hand gestures and facial expressions. Ensuring that children and young people are aware and understand their views and opinions are valued and considered. It is important that people involved in the care of children and young people build and maintain positive relationships with each other, as this can also have an enormous impact the development and wellbeing of the children and young people within their care spectrum, having a positive relationship with the child/young persons parent/carer can have positive effect on the child/young person, as this is the first step in getting to know and understand the initial needs and preferences, likes and dislikes and fears or concerns of each individual, also by including parent/carers in various sessions giving them the opportunity to contribute and get involved in planning and implementing of various activities it encourages people to engage in conversation where different views, ideas, and skills are learned. Also shared whilst showing the children/young people how to live in diverse community where we are all individuals who are able to work together regardless of background or upbringing. positive relationships between the various professionals working with children/young people whether it be colleagues, external agency/organisation or service, is important as it has a direct impact on the child/young person ongoing development, being able to share information between adults involving children/young people in different situations engaging in various activities, means that planning for the children/young people can be done more effectively as each professional involved may see a different way of contributing towards the development /wellbeing of the child/young person, they may also have the opportunity to identify any needs and interests different to those already established, the welfare of children/young people can be properly monitored while being assured that each child/young person is being given consistent care, any concerns or issues can be shared accurately and promptly when required following correct procedures and guidelines.

Tuesday, October 22, 2019

Edible Candle - Fire Science Demonstration

Edible Candle - Fire Science Demonstration For this science magic trick, you light a candle, blow out the flame and then eat the candle. Its safe, fun and even nutritious. Edible Candle Materials This project requires a few simple ingredients from the home: bananapecan nutcandle stick or candle holder with wax drippingsmatch or lighter Set Up The Trick Cut a banana so that it resembles a small candle. You want a candle that you can eat in one or two bites.Set your banana-candle on a candle stick or holder. If the candle stick has white wax drippings, this will add realism to the trick.Cut the pecan into a wick shape and set it into the top of the banana.When you are ready to do the trick, light the pecan, just like an ordinary candle wick. Blow out the flame and eat the candle. How It Works Pecans, as well as other nuts, are high in oils. The nut can be lit like a candle wick and will burn for several minutes. You could even use nuts on a cake as birthday candles!

Monday, October 21, 2019

Key Concepts in Conversation Analysis

Key Concepts in Conversation Analysis Though a man succeeds, he should not (as is frequently the case) engross the whole talk to himself; for that destroys the very essence of conversation, which is talking together .(William Cowper, On Conversation, 1756) In recent years, the related fields of discourse analysis and conversation analysis have deepened our understanding of the ways in which language is used in everyday life. Research in these fields has also widened the focus of other disciplines, including rhetoric and composition studies. To acquaint you with these fresh approaches to language study, weve put together a list of 15 key concepts related to the ways we talk. All of them are explained and illustrated in our Glossary of Grammatical and Rhetorical Terms, where youll find a name for . . . the assumption that participants in a conversation normally attempt to be informative, truthful, relevant, and clear: cooperative principlethe manner in which an orderly conversation normally takes place: turn-takinga type of turn-taking in which the second utterance (for example, Yes, please) depends on the first (Would you like some coffee?): adjacency paira noise, gesture, word, or expression used by a listener to indicate that he or she is paying attention to a speaker: back-channel signala face-to-face interaction in which one speaker talks at the same time as another speaker to show an interest in the conversation: cooperative overlapspeech that repeats, in whole or in part, what has just been said by another speaker: echo utterancea speech act that expresses concern for others and minimizes threats to self-esteem: politeness strategiesthe conversational convention of casting an imperative statement in question or declarative form (such as Would you pass me the potatoes?) to co mmunicate a request without causing offense: whimperative a particle (such as oh, well, you know, and I mean) thats used in conversation to make speech more coherent but that generally adds little meaning: discourse markera filler word (such as um) or a cue phrase (lets see) used to mark a hesitation in speech: editing termthe process by which a speaker recognizes a speech error and repeats what has been said with some sort of correction: repairthe interactive process by which speakers and listeners work together to ensure that messages are understood as intended: conversational groundingmeaning thats implied by a speaker but not explicitly expressed: conversational implicaturethe small talk that often passes for conversation at social gatherings: phatic communicationa style of public discourse that simulates intimacy by adopting features of informal, conversational language: conversationalization Youll find examples and explanations of these and over 1,500 other language-related expressions in our ever-expanding Glossary of Grammatical and Rhetorical Terms. Classic Essays on Conversation While conversation has only recently become an object of academic study, our conversational habits and quirks have long been of interest to essayists. (Not surprising if we accept the notion that the essay itself may be regarded as a conversation between writer and reader.) To take part in this ongoing conversation about conversation, follow the links to these eight classic essays. The Musical Instruments of Conversation, by Joseph Addison (1710) I must not here omit the bagpipe species, that will entertain you from morning to night with the repetition of a few notes which are played over and over, with the perpetual humming of a drone running underneath them. These are your dull, heavy, tedious, story-tellers, the load and burden of conversations. Of Conversation: An Apology, by H.G. Wells (1901) These conversationalists say the most shallow and needless of things, impart aimless information, simulate interest they do not feel, and generally impugn their claim to be considered reasonable creatures. . . . This pitiful necessity we are under, upon social occasions, to say something- however inconsequent- is, I am assured, the very degradation of speech. Hints Toward an Essay on Conversation, by Jonathan Swift (1713) This degeneracy of conversation, with the pernicious consequences thereof upon our humours and dispositions, hath been owing, among other causes, to the custom arisen, for sometime past, of excluding women from any share in our society, further than in parties at play, or dancing, or in the pursuit of an amour. Conversation, by Samuel Johnson (1752) No style of conversation is more extensively acceptable than the narrative. He who has stored his memory with slight anecdotes, private incidents, and personal peculiarities, seldom fails to find his audience favourable. On Conversation, by William Cowper (1756) We should try to keep up conversation like a ball bandied to and fro from one to the other, rather than seize it all to ourselves, and drive it before us like a football. Childs Talk, by Robert Lynd (1922) Ones ordinary conversation seems so far beneath the level of a small child. To say to it, What wonderful weather weve been having! would seem an outrage. The child would merely stare. Talking About Our Troubles, by Mark Rutherford (1901) [A]s a rule, we should be very careful for our own sake not to speak much about what distresses us. Expression is apt to carry with it exaggeration, and this exaggerated form becomes henceforth that under which we represent our miseries to ourselves, so that they are thereby increased. Disintroductions by Ambrose Bierce (1902) [W]hat I am affirming is the horror of the characteristic American custom of promiscuous, unsought and unauthorized introductions. You incautiously meet your friend Smith in the street; if you had been prudent you would have remained indoors. Your helplessness makes you desperate and you plunge into conversation with him, knowing entirely well the disaster that is in cold storage for you. These essays on conversation can be found in our large collection of Classic British and American Essays and Speeches.

Saturday, October 19, 2019

Accidents Happen All the Time

It involved a car border line illegal with balding tires, and brakes set on suicide mode. The person driving the vehicle of doom was a struggling college student, with little and or no money. The lady driving a car right off the lot spoke with thick New York accent and had the temper to match. It’s funny how at any moment, thoughts turn into actions, actions turn into events, and suddenly were left to face the aftermath. That day specifically was a mess of intertwining events that lead to two people meeting in unfavorable circumstances. Everyone gets involved in accidents, whether they’re cautious or reckless. The driver of a black kia death machine was especially cautious considering she knew it was not the best in regards to safety. She knew it wasn’t long before some freak accident would cross his path, but she would try to avoid it like hell. The fact is life is a recycling wheel, in which past leads to present, and every action has its foot print in the future. It was early in the morning, around 7:30 and the streets were busy with stop and go traffic in every direction. The sky was overcast, gray clouds blocking all sunlight, with rain pouring down in scatters. The streets were glossy with rain, and the reflection of the lights shone on the surface. Traffic was absolutely ridiculous and early commuters are often aggressive if not outright maniacs. The young woman was driving her way home from a late night with friends, still a little groggy since she wasn’t use to being up so early. She had driven down that road a million times and never had any issues with the morning flow. She was just about to merge into the next lane, since the turn for the highway was coming up further ahead. She started to drive over and saw the car ahead break lights shining brightly through the light rain. She began to pump the breaks, when suddenly the car didn’t slow down as expected. The car ahead seems to being nearing quickly, and her heart started to race. She pulls the emergency break and feels the drive of the car as it pushes forward regardless. In mere moments a normal drive home turned into a scary event. The sound of screeching tires pierced the air, a loud thud broke the morning silence, and what followed can be described as an atmosphere of confusion and anger. The driver in the black kia didn’t know what to do. She had just hit a car from behind, and she knew he had to get out and confront the other driver. It was raining, which made it entirely more uncomfortable, and all around him cars honked and whizzed by in frustration. She opened the door cautiously with shaking hands. A head a lady comes at her with craziness in her eyes, staring directly at her. â€Å"You little punk, are you freaking blind†. The lady that hit the car was trying to stay calm saying â€Å"Lady, get a grip. Your car is still drivable†¦ my bumper is sitting on the ground†. The lady was furious; she screamed for 5 minutes before she noticed the other driver wasn’t saying anything and then she apologized. The two began to explore the damage, which inflicted much more harm on the kia then the new 2013 escalade. The new car had a few scratches, but the young college student’s car looked like it had a head on collision with a semi-truck. It wasn’t even the worst Part of everything because the faulted driver had no insurance, and she knew she was going to get totally screwed by the man in blue because she has zero car insurance. The cops arrived on scenes approximately two hours later. The thought of fleeing the scene had cross the faulted drivers mind more than a few times. If it weren’t for a bumper half on the ground, and an exchange of information holding her back, she has been half way home and scott free. Three hundred dollars in fines, and lawsuit pending, that young driver figured something crucial out. Don’t drive without insurance, and if you are don’t do it with a car with bad breaks because you will inevitably screw your life over and get into an accident. Accidents Happen All the Time It involved a car border line illegal with balding tires, and brakes set on suicide mode. The person driving the vehicle of doom was a struggling college student, with little and or no money. The lady driving a car right off the lot spoke with thick New York accent and had the temper to match. It’s funny how at any moment, thoughts turn into actions, actions turn into events, and suddenly were left to face the aftermath. That day specifically was a mess of intertwining events that lead to two people meeting in unfavorable circumstances. Everyone gets involved in accidents, whether they’re cautious or reckless. The driver of a black kia death machine was especially cautious considering she knew it was not the best in regards to safety. She knew it wasn’t long before some freak accident would cross his path, but she would try to avoid it like hell. The fact is life is a recycling wheel, in which past leads to present, and every action has its foot print in the future. It was early in the morning, around 7:30 and the streets were busy with stop and go traffic in every direction. The sky was overcast, gray clouds blocking all sunlight, with rain pouring down in scatters. The streets were glossy with rain, and the reflection of the lights shone on the surface. Traffic was absolutely ridiculous and early commuters are often aggressive if not outright maniacs. The young woman was driving her way home from a late night with friends, still a little groggy since she wasn’t use to being up so early. She had driven down that road a million times and never had any issues with the morning flow. She was just about to merge into the next lane, since the turn for the highway was coming up further ahead. She started to drive over and saw the car ahead break lights shining brightly through the light rain. She began to pump the breaks, when suddenly the car didn’t slow down as expected. The car ahead seems to being nearing quickly, and her heart started to race. She pulls the emergency break and feels the drive of the car as it pushes forward regardless. In mere moments a normal drive home turned into a scary event. The sound of screeching tires pierced the air, a loud thud broke the morning silence, and what followed can be described as an atmosphere of confusion and anger. The driver in the black kia didn’t know what to do. She had just hit a car from behind, and she knew he had to get out and confront the other driver. It was raining, which made it entirely more uncomfortable, and all around him cars honked and whizzed by in frustration. She opened the door cautiously with shaking hands. A head a lady comes at her with craziness in her eyes, staring directly at her. â€Å"You little punk, are you freaking blind†. The lady that hit the car was trying to stay calm saying â€Å"Lady, get a grip. Your car is still drivable†¦ my bumper is sitting on the ground†. The lady was furious; she screamed for 5 minutes before she noticed the other driver wasn’t saying anything and then she apologized. The two began to explore the damage, which inflicted much more harm on the kia then the new 2013 escalade. The new car had a few scratches, but the young college student’s car looked like it had a head on collision with a semi-truck. It wasn’t even the worst Part of everything because the faulted driver had no insurance, and she knew she was going to get totally screwed by the man in blue because she has zero car insurance. The cops arrived on scenes approximately two hours later. The thought of fleeing the scene had cross the faulted drivers mind more than a few times. If it weren’t for a bumper half on the ground, and an exchange of information holding her back, she has been half way home and scott free. Three hundred dollars in fines, and lawsuit pending, that young driver figured something crucial out. Don’t drive without insurance, and if you are don’t do it with a car with bad breaks because you will inevitably screw your life over and get into an accident.

Friday, October 18, 2019

What account for the deplorable conditions on the continent of Africa Essay

What account for the deplorable conditions on the continent of Africa - Essay Example Throughout the continent of Africa corruption is rampant. In order to receive even the most basic services Africans must pay bribes. In order for companies such as Shell to do business in Nigeria (ranked 121 in the world by Transparency International1) a huge amount of money must be paid out to local officials to â€Å"grease the wheels.† In hospitals, patients may have to put money in doctors’ consulting books in order to be treated. In schools, students may have to pay their teachers for passing grades.2 All of these situations are commonplace. Studies have shown that Africa loses $150 billion a year due to corruption and that products cost as much as 20 per cent more.3 It is impossible to measure how much more developed Africa would be at this moment had not a culture of corruption existed there for so long. In countries with poorly constructed, inefficient, and non self-enforcing constitutional rules, opportunistic behavior (including rent seeking) are usually quite pervasive. In such countries, the rules that regulate socio-political interaction, have failed to adequately constrain the government. As a result, state intervention in private exchange is equally pervasive. Excessive regulation of economic activities creates many opportunities for rent seeking, including bureaucratic corruption.4 Many public servants in Africa may have power to allocate resources, but they make small salaries. It is very easy for them to make a lot of money on the side by taking payments from special interests. Plus, public servants may have poor relatives who they are also supporting. They may not simply take bribes out of selfishness, but possibly to help feed their extended families. Nevertheless, it is clear that more rules and guidelines are required for public servants in their dealings with the private sector. Enforcement of such rules is desperately required.5 John Githongo argues that corruption usually begins at the top of a country’s leadership, and

A Case of Corporate Ethical Failure, and Discuss Where Blame Might Be Essay

A Case of Corporate Ethical Failure, and Discuss Where Blame Might Be Assigned - Essay Example According to the research findings, in an environment where an employee does what he or she wants, there tends to be the ethical failure in the leadership. These failures often affect the productivity of an organization because there is lack of clear direction on how things should be done in the organization. Organisations need to establish an ethical code that guides the behaviors of employees including the top management. However, where such the ethical code of conduct is ignored by the workers, then an organization is exposed to different problems including ethical leadership failures. Ethical failures in any organization result from what people do at the workplace. In addition, ethical failures are created as a result of the behaviors and thinking that is supported by the organization in general. The individual behaviors that may cause ethical failures include ignoring boundaries, lack of self-control, the entitlement view, self-interest, lacking moral compass and crowd following . On the other hand, organization culture that can lead to ethical failures include lack of clarity regarding ethical conduct in the organization, lack of effective leaders to act as role models, lack of accountability, shifting blame and there is no performance integration and things are done incorrectly in the organization. A former manager of the Siemens testified regarding unethical practice in the company that involved slashing funds and bribery which amounted to corporate corruption. The manager testified on his role in the bribery scandal that was first exposed by German prosecutors in 2006. This corruption scandal has tarnished the name of the company resulting in two top executives losing their jobs. In addition, the remaining executives still faced fines and indictments that amounted to billions of euros because of the corporate corruption.

Fukuyama Francis The end of history The national Interest (Summer Essay

Fukuyama Francis The end of history The national Interest (Summer 1989) - Essay Example He insists, therefore, in this case that the threat to the security and the freedom rights of people are no longer available. The history has, therefore, come to its conclusion from this point (Fukuyama 54). The phrase, â€Å"end of history,† according to Fukuyama symbolizes the end of human â€Å"ideological evolution,† the search for good governance that encompasses the rights and freedoms of every citizen within it. The most important information in the text is the urge for change or move from capitalism to communism. Mankind underwent transformation from the tiny under civilized forms of government to higher and progressive forms of governments systems. It is from this notion that Fukuyama where insists that the history would assume its ending in an absolute moment. He also believed that through such ending, only the victorious forms of government will assume the power to head such states. Upon the assumption of power, the citizens will be able to realize good governance that respects their democratic rights. The government too will also be able to understand their social, cultural, economic, and political backgrounds. Such type of governance will in turn foster the peaceful coexistence of the country’s citizens (Fukuyama 110). The main conclusion (explicit or implicit) in this article is that the homogenous state would eventually become victorious throughout the material world since ideological development has, in fact, ended. As presented by Fukuyamas context, it is not a must that all societies be liberal to become successful (Fukuyama 218). Clear evidence about this situation is in their difference in their ideological pretensions of representing different and higher forms of human society. The main assumptions underlying an author’s thinking are that the country would change from a communist state to a capitalist state. He also believed that the country would attain a liberal form of government with free

Thursday, October 17, 2019

Should college athletes be paid to play Research Paper

Should college athletes be paid to play - Research Paper Example Yet again, not all students are interested in playing sports as a side activity. Consequently, apart from their initially decided terms of a sports scholarship, they often get little part in the revenue these sports generate for their school. Critics and coaches are, therefore, now arguing in favor of these players saying that they deserve a share of the revenue, as they for the most part contribute towards generating. The debate is a highly heated one with each side feeling just as strongly of their opinion. The number of college athletes in a particular college can be very significant and all these athletes have a choice of which sport they want to take part at the college level. Some sports may have a high popularity level while others low. Deciding upon paying athletes for playing may compel the college to pay all the athletes for all the different kinds of sports in the college. This may result in heavy payments at the end of the day and it may also reduce the profits earned by the colleges at a massive level. Those who argue in favor of paying athletes generally say that colleges make millions of dollars off these athletes abilities and, therefore, for them to get no money from it is unfair, and, in a sense, exploitation to them (Haden 673). Without these players there would be no generated money, and without this money, many colleges would be unable to function. Colleges gain popularity at the sports arena due to the talented athletes that represent the college in the sports. Earning by the talent of the athletes and not paying those athletes sounds an unfair practice. Accordingly, it seems fair to pay to these players, just as any national sports association would pay its players. But, of course, the counter-argument to this claim is that students should be kept away from the business side of a college, regardless of the link between both elements (Parent 226). College level is the stage where the students explore their talents and

The issues human resources encounter on a day to fay bases Essay

The issues human resources encounter on a day to fay bases - Essay Example They include among others the management needs to develop human resource strategies at the business formulation level, delegation of the right human resource matters to departmental managers is important in freeing the human resource department and in the process allows it to focus on the development of strategic policies. This role becomes effective when the training section of the human resources training section equips the departmental and line managers with adequate, knowledge, skills, and attitude to enable them to develop and manage staff effectively. Strategic functions of the human resource management form part of the core functions of the department, therefore, it is important that the selection and development of employees with the right skills that fit the job description be thorough. The process of change is gradual hence, it must be planned and managed carefully. The value of the process is in the change in the organization’s culture. Literature Review Armstrong, (34) suggests that business companies are involved in reorganizing their culture in the process of developing responsive and acceptable structures. Notably, achieving efficiency and profitability depends on innovative policies on the management of people, resources, and Financials. He gives priority to the process that the human resources department goes through in managing challenges in the day-to-day operations within the business. Crow, (1997, 23) posits that the issues of human resources management as a strategic approach to handling employees within business organizations is new and has existed for about three decades. Various factors influenced the development of human resources management from the traditional personnel department. They included an increase in pressure from competition brought by globalization and liberalization of trade a market. Other scholars among them Hendry (44) hold that human resources management is not different in any way from the traditional personn el department apart from the change of terminology. Leggae (71) identifies new issues of human resource management as development of an integrated system for the management of human resource issues, transforming the approach to human resources management making the process more professional, dealing with the decentralization of the right human resource management issues, and delegation of appropriate roles of the human resources to departmental managers. Human Resource Issues and challenges Employers experience various human resource issues during their day-to-day operations. These issues include recruiting, productivity, training of employees, arranging staff, and eliminating discrimination within the organization. Employees working in the human resource management on the hand, face challenges that include conflict resolution and making sure that the employees in other departments operate within environments that are safe. Other concerns include dealing with issues that come with o utsourcing, determining and distributing benefits, enhancing and maintaining cultural diversity. The company policy and human resources director dictate the manner in which individual organizations deal with human resource issues. The management of issues by the human resource management is a continuous process irrespective of the type and size of the company under discussion. Productivity Management and organization of employees make

Wednesday, October 16, 2019

Fukuyama Francis The end of history The national Interest (Summer Essay

Fukuyama Francis The end of history The national Interest (Summer 1989) - Essay Example He insists, therefore, in this case that the threat to the security and the freedom rights of people are no longer available. The history has, therefore, come to its conclusion from this point (Fukuyama 54). The phrase, â€Å"end of history,† according to Fukuyama symbolizes the end of human â€Å"ideological evolution,† the search for good governance that encompasses the rights and freedoms of every citizen within it. The most important information in the text is the urge for change or move from capitalism to communism. Mankind underwent transformation from the tiny under civilized forms of government to higher and progressive forms of governments systems. It is from this notion that Fukuyama where insists that the history would assume its ending in an absolute moment. He also believed that through such ending, only the victorious forms of government will assume the power to head such states. Upon the assumption of power, the citizens will be able to realize good governance that respects their democratic rights. The government too will also be able to understand their social, cultural, economic, and political backgrounds. Such type of governance will in turn foster the peaceful coexistence of the country’s citizens (Fukuyama 110). The main conclusion (explicit or implicit) in this article is that the homogenous state would eventually become victorious throughout the material world since ideological development has, in fact, ended. As presented by Fukuyamas context, it is not a must that all societies be liberal to become successful (Fukuyama 218). Clear evidence about this situation is in their difference in their ideological pretensions of representing different and higher forms of human society. The main assumptions underlying an author’s thinking are that the country would change from a communist state to a capitalist state. He also believed that the country would attain a liberal form of government with free

The issues human resources encounter on a day to fay bases Essay

The issues human resources encounter on a day to fay bases - Essay Example They include among others the management needs to develop human resource strategies at the business formulation level, delegation of the right human resource matters to departmental managers is important in freeing the human resource department and in the process allows it to focus on the development of strategic policies. This role becomes effective when the training section of the human resources training section equips the departmental and line managers with adequate, knowledge, skills, and attitude to enable them to develop and manage staff effectively. Strategic functions of the human resource management form part of the core functions of the department, therefore, it is important that the selection and development of employees with the right skills that fit the job description be thorough. The process of change is gradual hence, it must be planned and managed carefully. The value of the process is in the change in the organization’s culture. Literature Review Armstrong, (34) suggests that business companies are involved in reorganizing their culture in the process of developing responsive and acceptable structures. Notably, achieving efficiency and profitability depends on innovative policies on the management of people, resources, and Financials. He gives priority to the process that the human resources department goes through in managing challenges in the day-to-day operations within the business. Crow, (1997, 23) posits that the issues of human resources management as a strategic approach to handling employees within business organizations is new and has existed for about three decades. Various factors influenced the development of human resources management from the traditional personnel department. They included an increase in pressure from competition brought by globalization and liberalization of trade a market. Other scholars among them Hendry (44) hold that human resources management is not different in any way from the traditional personn el department apart from the change of terminology. Leggae (71) identifies new issues of human resource management as development of an integrated system for the management of human resource issues, transforming the approach to human resources management making the process more professional, dealing with the decentralization of the right human resource management issues, and delegation of appropriate roles of the human resources to departmental managers. Human Resource Issues and challenges Employers experience various human resource issues during their day-to-day operations. These issues include recruiting, productivity, training of employees, arranging staff, and eliminating discrimination within the organization. Employees working in the human resource management on the hand, face challenges that include conflict resolution and making sure that the employees in other departments operate within environments that are safe. Other concerns include dealing with issues that come with o utsourcing, determining and distributing benefits, enhancing and maintaining cultural diversity. The company policy and human resources director dictate the manner in which individual organizations deal with human resource issues. The management of issues by the human resource management is a continuous process irrespective of the type and size of the company under discussion. Productivity Management and organization of employees make

Tuesday, October 15, 2019

Desktop Migration Proposal Essay Example for Free

Desktop Migration Proposal Essay The purpose of this desktop migration proposal is to layout the proposed tasks and activities that are required to efficiently transition HACKM, LLC users from a Windows 7 computing environment to Windows 8. Currently, HACKM, LLC has 500 desktops/laptops that run Windows 7. The CEO of HACKM, LLC recognizes a need to implement HACKM employees to the latest Windows 8 technology. This proposal includes deployment schedules, resource estimates,  identification of special resources and staffing. This proposal also defines management controls and reporting procedures, as well as the risks and contingencies in this transition. Overview In upgrading to Windows 8, HACKM is seeking to reduce support costs while enhancing the user computing experience. HACKM would like to keep their systems current with the latest Windows technology by acquiring a top of the line laptop/tablet hybrid. The budget provided by HACKM is a maximum of $1,000,000 in which $700,000 has been set aside for the acquisition of the hardware needed to meet the requirements. The remaining $300,000 is allotted for contract support to execute the task. More details on the recommended product: 1. 10.6 widescreen with 1920 x 1080 resolution This high-resolution screen is ideal for word processing, Web browsing, research, reading and streaming HD video content. 2. Microsoft Windows 8.1 Pro operating system Full laptop capability in the size of a tablet. Run your existing desktop programs, download apps from the Windows Store and share files in the cloud for easy access anywhere you go. 3. 512GB internal storage capacity plus microSD slot Significant amount of storage space for software, apps, documents, photos, videos and more. Expand storage with a microSD card. 4. Dual-core processor Delivers responsive performance, smooth-streaming video and fast access to the Web and e-mail. 5. Supports the full Microsoft Office experience – Equipped with Microsoft Office Suite. 6. Powerful connectivity with USB 3.0 Share files, connect accessories and display content on the big screen with a full-size USB port. 7. Docking station (separate) Upgrade Benefits Migrating to Windows 8 will bring HACKM up to speed with the most current operating system. Windows 8 offers superior performance in comparison to Windows 7 and all other versions of Windows. Windows 8 offers improvements in performance, existing capabilities, and is relatively cheaper in costs. Windows 8 starts up more than twice as fast as Windows 7. Windows 8 gives PC users a whole new world of full-screen, touch-friendly, Web-connected apps to explore. Laptop/Tablet Hybrids Benefits 2-in-1s come with the advantages of both tablets and notebooks. Typically they’ll have the form factor of a tablet, allowing users to easily enjoy their favorite websites and apps with touch like they would on an iPad. They sometimes boast better battery life than a typical notebook. They provide mobility advantages for personnel that are regularly on-the-go. Objectives The objective of the task is to migrate all HACKM desktops to Windows 8 including all of the user’s files and folders with no data loss, with as much transparency to the user community as possible. Approach With any project, a well thought out and sound plan is necessary. Migration technicians will check the hardware compatibility list (HCL) to verify that the recommended hardware is compatible with the operating system. This includes visiting the vendors website and checking for operating system compatibility. For specialty applications technicians will obtain the latest drivers for all hardware. If necessary, 64-bit drivers will be obtained before installation to ensure that devices are compatible with 64-bit operating systems. Windows’ Upgrade Advisor will be utilized to determine whether any special modifications to system will be required for an upgrade.  Technicians will use Microsoft Assessment and Planning Toolkit (MAP) to automatically scan multiple computers and identify each computers compatibility for an upgrade to Windows 8. MAP checks hardware compatibility, identifies the availability of updated device drivers, and recommends a migration path to Windows 8. Other migration tasks that will be performed and documented include: Audit user community Conduct user interviews; verify user profiles, data location, answer any questions regarding migration. Audit all hardware and software to determine upgrade needs for compatibility with Windows 8 Identify total number of desktops, laptops and related hardware Examine current operating system configuration, user profiles Technicians will use Microsoft Windows Compatibility Center/Advisor to ensure current systems meet upgrade requirements. Identify project manager, project team, and stakeholders Define migration management team and points of contact Conduct weekly status meetings to discuss progress and milestones Examine risks for migrating to Windows 8 Data migration Technicians will utilize Microsoft’s Windows Easy Transfer utility to migrate user data. Windows Easy Transfer is a built-in migration tool to transfer files and settings from one computer to another. Software compatibility Group Policy Objects (GPO) will be migrated across the HACK domain forest with Advanced Group Policy Management (AGPM). Technicians will use Across Forest Migration to export the GPO and import it into the new Windows 8 production environment. After GPO migration, users will authenticate to the HACKM domain and therefore will not be required to use a Microsoft account with the new Windows 8 systems. Data Backup Restore Data protection is crucial for HACKM continuity after the migration. Technicians will: 1. Identify the critical data that needs to be archived 2. Archive this data to dedicated backup servers provided by HACKM 3. Review data for integrity and quality Technicians will backup: 1. Program data, software data, user folders and files including offline files identified during auditing and user interviews 2. Offline files will be copied to external USB hard drives (1TB). 3. Backups will be save for 90 days after migration Full backups will be run nightly with incremental backups weekly during the migration effort. Technicians will perform a full integrity and consistency check of data. Encryption Each tablet will be encrypted using Windows BitLocker Drive Encryption. BitLocker makes use of a Trusted Platform Module (TPM) to provide stronger data protection for the data on the device. BitLocker will allow our technicians to encrypt all HACKM data stored on the Windows operating system volume and configured data volumes, and by using the TPM, it can also help ensure the integrity of the information. Networking All of the new tablets will be equipped with docking stations that have built in gigabit Ethernet networking technology. For increased network security, the built-in wireless feature will only be made available on a case-by-case basis. Anti-Virus Protection Each tablet will be protected from various threats and vulnerabilities via Windows Defender. Windows Defender is antispyware software thats included with Windows and runs automatically when its turned on. Windows Defender offers two ways to help keep spyware from infecting your computer: 1. Real-time protection.†Ã¢â‚¬  Windows Defender alerts you when spyware attempts to install itself or to run on your computer. It also alerts you when programs attempt to change important Windows settings. 2. Scanning options. Windows Defender can be used to scan for spyware that might be installed on your computer, to schedule scans on a regular basis, and to automatically remove anything thats detected during a scan. Windows Defender works with Windows Update to automatically install new definitions as theyre released. Post Migration Technicians will perform the following tasks after migrating users to Windows 8: Update device drivers for unrecognized devices. During installation, drivers for many devices are installed from drivers on the installation disc. Technicians will use Device Manager to verify the status of all hardware devices, and download and install drivers for any unknown devices. Configure Windows Update and download the latest updates. Configure security software; configure the Windows Firewall and install anti-virus software. Technicians will make sure to update anti-virus definition files. Migrate user configuration settings and data using the following methods: For local files not backed-up to the network, technicians will use Windows Easy Transfer to transfer files from the old computer to the new computer. For all other user data technicians will use the User State Migration Tool (USMT): ScanState will be used on the existing computer to save user settings and files. LoadState will be used on the new computer to move files onto the new computer. Install applications and add other Windows features. Configure system backups and other protection methods. Take a complete PC backup and schedule regular user data backups. Roles Responsibilities Project Manager: Responsible for managing high performance, interdisciplinary  team to meet project milestones and achieving measurable performance outcomes. Project manager will manage and communicate task progress and milestones. Lead Migration Administrator: Responsible for leading the desktop migration effort. This includes analysis of the existing Windows 7 systems and development of the plan and approach and migration of data to the new the new Windows 8 systems. Migration Technician: Responsible for user interviews, surveys, data back-up, operating system installation and data migration. Technician will document any issues for escalation and lessons learned. Technician will regularly communicate with Lead Migration Administrator and Project Managers. Works Cited Abbass, H. (2012, November 15). How to Transfer your files to a Windows 8 Computer. Retrieved from Darktips.com: http://darktips.com/transfer-files-to-windows-8/ BestBuy.com. (2014, December). Microsoft Surface Pro 2 512GB. Retrieved from BestBuy.com: http://www.bestbuy.com/site/microsoft-surface-pro-2-512gb-dark-titanium/2147061.p?id=1219070148385skuId=2147061 Bestbuy.com. (2014, December). Microsoft Surface Pro 3 Docking Station. Retrieved from Bestbuy.com: http://www.bestbuy.com/site/microsoft-surface-pro-3-docking-station/7524004.p?id=1219276472271skuId=7524004 Microsoft.com. (2010, May). BitLocker Drive Encryption. Retrieved from Microsoft Technet: http://technet.microsoft.com/en-us/library/cc731549%28ws.10%29.aspx Microsoft.com. (2014, December). sing Windows Defender. Retrieved from Microsoft.com: http://windows.microsoft.com/en-us/windows/using-defender#1TC=windows-7 Muchmore, M. (2013, June 24). 5 Reasons You Should Upgrade to Windows 8. Retrieved from PCMag.com: http://www.pcmag.com/article2/0,2817,2411451,00.asp

Monday, October 14, 2019

Preventing Piracy and Terrorism in Shipping Industry

Preventing Piracy and Terrorism in Shipping Industry Can the shipping industry overcome the challenges it faces with Piracy and Terrorism? Although many think that pirates went out of circulation with sailed ships and swords, piracy is becoming an increasingly serious global problem. These range from small thefts to complex hijacks, and while taking place globally, tend to be concentrated in a few geographically restricted shipping channels. The breadth and complexity of the piracy problem makes it almost impossible to address in simple terms. The first factor is the enormous scope of the shipping industry. An estimated 90% of world trade moves by sea, in over 50,000ships each supposedly governed by the laws of the nation whose flag it bears (Crawford 2004). There is no one place for information concerning piracy, nor any distinct entity to police the oceans. To further complicate the matter, piracy-type acts are now also committed by terrorists, either for political results or as a way to fund their operations. This research first undertakes a review of available literature on the piracy issue, including types and motives of piracy attacks, ahistorical and current summary of pirate activity, and a consideration of terrorist attacks on shipping concerns. Two particularly volatile areas of pirate activity are then reviewed, the Malacca Straights in Southeast Asia, and the waters off the coast of Nigeria, Africa. Combining best practise findings from the literature reviewed with these case studies then provides a foundation for recommendations on how the piracy issue can best be addressed, by individual shipping concerns, individual countries, and the international community. Countermeasures will be weighed and analysed on the basis of feasibility. Of particular focus in this research is addressing some of the underlying factors contributing to the rise in piracy, in addition to defensive and offensive measures. These are typically overlooked in studies of effective countermeasures to the maritime piracy / terrorist problem. It is anticipated that this research will reveal the need to address this complex issue holistically and internationally, with greater unity and coordination than currently exists in the maritime community. Hypothesis This study considers piracy as a result of other underlying issues, and considers countermeasures from a prevention rather than combative perspective, although all types of piracy countermeasures are addressed. Specifically, it is anticipated piracy will be found to be heavily influenced by economic, political, and ideological factors. Its further anticipated that a truly effective response to the growing piracy problem in international shipping will include measures to combat the causes of increased piracy, in addition to the pirates ’actions. Literature Review Piracy Defined One of the initial difficult factors in a study of piracy is the wide range of definitions. What constitutes piracy, what constitutes robbery, and what constitutes terrorism? National and international organisations disagree on the parameters of piracy, as opposed to thievery or terrorist activity, and all agree the lines between are blurring more and more (Langeweische 2003). The International Maritime Bureau (IMB), an organisation of the International Chamber of Commerce, has some responsibility for piracy and legal considerations on the high seas (that is, areas of the ocean not controlled by a particular country, typically more than twelve miles from the country’s coast)(Hawkes 2001). Therefore, where the attack occurred in relation to the coast is of high importance. This is reinforced by the United Nations ‘Law of the Sea, which has been ratified by almost every nation except the United States (Hawkes 2001). The IMB’s Piracy Reporting Centre in Kuala Lumpur, however, defines piracy as â€Å"any act of boarding an vessel with the intent to commit theft or any other crime and with the intent or capability to use force in the furtherance of that act† ((Liss 2003, 55). While only attacks that take place on the high seas are registered with the PRC, they continue to maintain a broader definition of piracy (Chalk 1998). Forth purpose of this research, attacks against shipping vessels at port, in national waters, and on the high seas will be considered piracy if committed with a primarily economic motive. Acts committed from apolitical or ideological motive will be considered terrorist activities. Most recently, an organisation called the Comate Maritime International (CMI), composed of a number of shipping and law enforcement organisations such as the IMB, The Baltic and International Maritime Council, and Interpol, drafted a Model National Law on Acts of Piracy and Maritime Violence, which expands the definition of piracy to include national waters and the high seas (Hawkes 2001). Types of Piracy Pirate attacks also can be categorised according to the location, scope and violence involved. Non-violent hit-and-run attacks are widespread and often unreported. According to Liss (2003)â€Å"the vast majority of pirate attacks today are simple hit-and-run robberies, committed by what can best be described as common sea-robbers† (59). This attack can occur while the ship is in harbour or at anchorage. The IMB would define these attacks as low-level armed robbery. These are usually quick, low sophistication attacks where thieves make off with cash and portable personal valuables. The average theft in this type of attacks between $5,000 and $15,000 US dollars (Chalk 1998). These pirates are typically groups of men from poor areas who have known each other for quite some time, and steal for economic reasons. Outside of ports, these pirates tend to target smaller vessels (Liss 2003). The men will speak on board a ship, usually at night, and take valuables, electronics, the ship’s equipment, or any other easily transportable and saleable item they can find. These raids often last less than thirty minutes, and rarely have any violence, except in the rare instance when a pirate is confronted by one of the crews (Liss 2003). Violent hit-and-run attacks typically target yachts and other smaller vessels on the open sea. These are typically a heavily-armed group with some planning and training involved. Attacks in territorial waters or on the high seas have a higher level of sophistication, and are categorised as medium-level armed robbery by the IMB (Chalk 1998). In these attacks the pirates board the ship and again take any valuable or saleable items. However, they are unafraid to confront the ship’s occupants or crew, and have injured or killed in a number of cases(Liss 2003). In neither of these two types of attacks is the pirate gang organised or sophisticated enough to also consider stealing the boat (Liss 2003). Ship-seizing attacks require a much higher level of planning and sophistication, including participation in some wider crime network in order to be able to move the ship’s cargo and the ship itself quickly. Not surprisingly, these types of attacks are usually carried out by professional pirates funded by syndicates (Liss 2003). In temporary seizures, the pirates board the ship and restrain the crew; on rare occasions they may also be held for ransom. The ship is diverted to safe location and its cargo off-loaded, after which the ship and crew are released (Liss 2003). Pirates in this type of attack typically work from a â€Å"mother ship,† and may also take portable personal valuables (Chalk 1998). In the most violent and sophisticated attacks, permanent seizures, the ship itself is hijacked at sea, considered a major criminal hijack byte IMB (Chalk 1998). The crew may be abandoned at sea, but in many of these instances they are simply killed. These attacks usually occur in busy narrow shipping channels, and often at night (Langeweische 2003). The ship is typically repainted and its name changed. It then becomes what is called a phantom ship, changing its name and flag regularly(Liss 2003). Permanent seizures occur almost exclusively in the FarEast (Liss 2003). The phantom ship may be used as a pirate ship, but is more often used for a sophisticated type of robbery (Liss 2003). The ship takes on aloud of cargo for a legitimate business, but both the ship and the cargo disappear. The legitimate business loses both its cargo and the shipping fees it invested, and the thieves sell the cargo on the black market, paint the ship and change its name, and repeat the process(Langeweische 2003). A convincing phantom ship can draw in shippers and reroute their cargo quickly, often making up to pounds 30 million a year (Lewis, M. 2004). A Historical Perspective When most people think of piracy, they do so from a historical perspective. Blackbeard, Captain Kidd and their compatriots, swashbuckling, sword-carrying figures aboard tall ships with patches over one eye, supposedly once looted and pillaged the high seas and buried their treasure on deserted islands. In reality, however, piracy has historically been tied to national political and economic concerns. There is evidence that this continues today (Langeweische2003). The â€Å"pirates† in Southeast Asia during the colonisation period, for example, typically undertook slave raiding and robbery activities to strengthen and with the support of their local chiefdoms or sultanates. What the colonising powers considered piracy was seen by locals as state-sponsored means of enriching the local community at foreign powers’ expense (Liss 2003). In the early 1800s, pirates in the Mediterranean were supported by the Barbary States of northern Africa, but primarily for economic gain Loft and Koran 2004). These pirates would typically take over merchant ships and demand ransom for their crews. The United States responded with the Barbary Wars, which eventually successfully addressed the piracy problem with military intervention (Loft and Koran 2004). In various times of economic downturn, particularly when the economic difficulties were localised in areas near popular shipping channels, piracy has historically increased. Piracy experienced a surge with the opening of the Americas, and later Australia (North 1968). On the Atlantic Ocean, these were typically rogue European ships operating for personal profits. However, local residents of Africa, South America, and Asia have also been historically inclined to piracy at various periods. The important historical conclusion from a study of such activity is that piracy rose substantially in and around areas experiencing economic difficulty and which cargo-laden ships passed through, and decreased with economic upturn (North 1968). In recent decades oil shipments have been an increased target of pirates, particularly during periods of high crude prices. For example, tankers were frequently attacked in the Strait of Hormuzduring the mid-1980s (Loft and Koran 2004). As shipments were rerouted and insurers began to pull out from ships in the area, global oil prices were effected. Shipping in the Persian Gulf dropped by almost twenty-five present, and was not restored until the United States intervened, sending military vessels to regain order in the region(Loft and Koran 2004). The decade of the 1990s was also a historical turning point in the piracy saga. Worldwide piracy tripled over the period, escalating from just over one hundred annually in the beginning of the decade to a high of 469 in 2000 (Halloran 2003). Geographically, piracy was high in the early 1990s in the Malacca Straights, but increased policing in the1993 to 1995 period reduced incidences there. The area again fell victim to a high number of attacks in the closing years of the decade(Anon 2005). Piracy also developed from its random, unorganised thievery practise in the late 1800s and much of the 1900s, to sophisticated and highly trained criminal activity, facilitated by the increased number in crime syndicates and terrorist groups becoming involved in piracy activities (Anon 2005b). Many pirates joined â€Å"organized crime syndicates comprising corrupt officials, port workers, hired thugs, and businessmen,† developing into sophisticated networks that could gain intelligence on particular ships, plan attacks, and dispose of the stolen property or ships (Loft and Koran 2004, 68). The problem was compounded by the gross underpayment of maritime security in high piracy (and typically economically depressed) areas throughout the 1990s, who become more susceptible to bribes and in some cases even took part in piracy attacks (Loft and Koran 2004). Piracy Today Piracy today is a global disaster. Statistics on piracy do not accurately paint the current picture. As many as half of attacks are estimated to go unreported (Anon 2005b). Ship owners are reluctant to detain their ships to participate in an investigation, as doing so costs them significant loss. Incidents of piracy can also make it more difficult for them to recruit high-quality crew members (Clark 2004). Reporting piracy would also cause an increase in their insurance premiums, often costing more in the long-term than simply absorbing the loss (Armstrong 2004). â€Å"Since many shipping companies do not report incidents of piracy, for fear of raising their insurance premiums and prompting protracted, time-consuming investigations, the precise extent of piracy is unknown â€Å" (Loft and Koran 2004, 64). Various international and shipping organisations make the attempt, however, and can at least document trends in piracy events that are reported. Both attacks and their violence are reported to be on theorise. International Maritime Bureau, in its annual piracy report, recorded 325 piracy attacks and thirty deaths in 2004, a decrease in attacks (from 445) but increase in deaths (from 21) in 2003 (Anon2005b). â€Å"The number of seafarers taken hostage last year almost doubled to 359, while 311 ships were boarded and 19 vessels hijacked†(Akbar 2004, 27). Armstrong (2004) similarly lists piracy as growing at twenty present annually. Armed attacks increased by nearly fifty present in 2003, with the death count more than doubled from 2002(Akbar 2004). 644 incidents of violence to crews were reported overall, including six on UK-flagged ships and twenty-one on vessels owned or managed from the UK (Akbar 2004). These attacks tend to be clustered in and near some of the busiest Third World ports, particularly off the shores of Indonesia, Malaysia and Nigeria(Mihailescu 2004, Halloran 2003). In two incidents receiving high media coverage in the UK, pirates executed Sir Peter Blake, the Greenpeace activist, off the coast of Brazil in 2002. Alan MacLean was similarly killed by pirates off the coast of Somalia during an adventure-related trip (Akbar 2004). The financial impacts are huge. Loft and Koran (2004) report a loss of ships, loss of cargo, and increased insurance costs the shipping industry in excess of sixteen billion US each year. This trainslates to a weekly cost of pounds 300m per week (Akbar 2004, Reynolds 2003). As much as 10 billion US of this loss is to the insurance industry alone, with the true amount being significantl y higher due to underreporting (Crawford 2004). Pirates today are additionally too broad a group to truly generalise. However, technological advances have allowed pirates to become better equipped and have greater information as to their targets, which contributes to an increased number of attacks on larger ships (Lewis. 2004). In addition, the end of the Cold War has reduced the number of sea patrols in certain areas of the world while simultaneously making a tremendous volume of weapons and munitions available on the black market, often at relatively inexpensive prices (Armstrong 2004). Meanwhile, exponential in global trade has greatly increased the amount of highly valuable and saleable goods moving across the seas. This combination of more to steal, less policing, and greater easy in theft has led to a significant rise in piracy activity (Liss 2003). Attempts to regulate shipping have led to the development of the flags of convenience problem. The practice began after World War II, but did not become widespread or a problem in the international maritime community until the 1990s (Langewiesche 2004). A number of impoverished countries, such as Malta, Panama, and Liberia, began to sell their flags for a fee, with little concern for the legitimacy of the ship’s owners (Loft and Koran 2004). This allowed ship owners to literally choose under which country’s laws they wanted to sail their ship, regardless of their home port of call (Liss 2003). Today, according to Langewiesche (2004), â€Å"no one pretends that a ship comes from the home port painted on its stern† (50). This has greatly facilitated the operation of phantom ships, previously described. The massive Tsunami that devastated much of the South Asian coast in December 2004 has had a particular impact on piracy. It is believed many pirate syndicates and individual pirate groups lost ships in the disaster, as did many legitimate ship owners. In addition, changes to the Malacca Straights have reduced shipping in the region and left piracy there almost non-existent (Bangs erg 2005). It will be of note to see if piracy rebounds as issues with passage through the Straights are resolved, or whether piracy increases in some other area or areas. Terrorism: The New Threat On top of all the above, groups operating from a political motive, terrorists, have entered the piracy trade. Following September 11,terrorism has become a worldwide concern. The maritime community had already experienced a number of terrorist actions and threats, such as when Islamic militants bombed the side of the Cole, an American warship, in 2000 (Anon 2004). Since 9/11, the Limburg, a French oil tanker, has been similarly bombed, while â€Å"Abu Soya, a terrorist outfit from the southern Philippines, claimed responsibility for bombing a ferry in Manila Bay earlier this year† (Anon 2004). While most countries can provide at least reasonable protection for land targets, â€Å"the super-extended energy umbilical cord that extends by sea to connect the West and the Asian economies with the Middle East is more vulnerable than ever† (Loft and Koran 2004, 64). Ninety perceptive the world’s trade is transported via ship, with 4,000 slow and difficult to defend tanker ships moving sixty present of the world oil supply. These ships have little or no protection, and are frequently alone on open water with nowhere to hide (Loft and Koran 2004). Current International Maritime Organization regulations prevent firearms on vessels, even for self-protection, leaving ships’ crews to face terrorist and pirate threats with spotlights and high-powered firehouses (Mihailescu 2004). Interestingly, Russian and Israeli ships ignore the IMO regulations, allowing their crewmembers to be armed, and subsequently have a lower incident of successfully attacks from either pirates or terrorists (Loft and Koran 2004). As Armstrong (2004) contends, â€Å"the world economy relies on the seamless delivery of trade via the worlds seaways† (7). This gives the terrorist threat immediate international implications. The international community has attempted to address terrorist concerns with acts such as the International Ship and Port Security Code, implemented in July 2004, the Customs-Trade Partnership Against Terrorism, and the Container Safety Initiative. However, the terrorist threat remains â€Å"a function of the terrorists will, the terrorist’s capability, and the targets perceived importance† (Armstrong 2004). Terrorists are separated from pirates by motive. While pirates attack for purely economic reasons, terrorist groups strike for political or ideological reasons, sometimes with economic considerations an additional cause (Anon 2005). â€Å"Unlike the pirates of old, whose sole objective was quick commercial gain, many of todays pirates are maritime terrorists with an ideological bent and a broad political agenda† (Loft and Koran 2004). There is, of course, a connection. Terrorists sometimes act as pirates, usually to finance their political or ideological activities. â€Å"Pirates claiming to be members of the Free Aceh Movement, who take ships crews hostage for ransom, have started to blur the lines between terror and piracy† (Hand 2004, 5). They show no interest in the ship or its cargo, but simultaneously achieve economic gains while embarrassing the government they oppose (Hand2005). In addition, as pirates become more sophisticated, they may be through their very success revealing to the terrorists where opportunities for successful destruction exist (Anon 2005). â€Å"Terrorism is imitative and adaptive, learning from other groups and wider trends† (Armstrong 2004,7). In addition, â€Å"the apparent lack of concrete evidence linking pirates and terrorism has not stopped senior Singapore government officials from publicly making this link on a number of occasions†(Hand 2004, 5). One possible terrorist target is blocking a major shipping lane. Six major shipping channels geographically lend themselves to such an attack (Armstrong 2004). The Malacca Straights are considered the most vulnerable, as the area suffers from lack of funds for policing by its littoral nations yet carries as much as one-third of the world’s total trade and one-half of the world’s oil supply (Anon 2005). â€Å"One ship sunk in a strategic right spot has the potential to block much of the Straight and cripple world trade† (Anon 2004, 37). Fourteen present of world trade moves through the Suez Canal, with the Panama Canal, thebe-el-Man dab, and the Strait of Gibraltar also carrying significant percentages of world trade. All are narrow, busy channels where well-planned terrorist strike could partially or completely block passage (Armstrong 2004). The Strait of Hormuz, connecting the Persian Gulf and Arabian Sea, is only two kilometres at its most narrow point, yet accounts for over fifteen million barrels of oil transport daily(Loft and Koran 2004). One well-placed scuttle could physically block these channels, crippling trade, as could refusal of insurance carriers to cover vessels in the area, if the terrorist situation became too severe(Armstrong 2004). Either would have devastating global economic impact. Oil and raw materials would be blocked, soon crippling manufacturing and transportation industries. Targeting energy infrastructure is increasingly recognised as terrorist intention. â€Å"Indecent years, terrorists have targeted pipelines, refineries, pumping stations, and tankers in some of the worlds most important energy reservoirs, including Iraq, Nigeria, Saudi Arabia, and Yemen† (Loft 2004). â€Å"Given al-Qaedas understanding of the sensitivity of Western economies to the price of oil, the oil and gas industry represents particularly tempting target, where a single terrorist incident could have a huge ripple effect† (Armstrong 2004). The damage would be heightened by today’s just-in-time logistics systems. Companies reduced inventories and capital structures, made possible by international outsourcing and trade, would cause an almost immediate shortage of some goods (Armstrong 2004). This would be compounded if multiple attacks were to occur on vulnerable shipping conduits simultaneously. Terrorists could also hijack ships and make them into floating bombs, which in addition to closing a shipping lane could be deployed against ports, oil refineries, or other critical infrastructures (Anon 2004). Last year in Singapore, supposed pirates hijacked a chemical tanker in the Malacca Straights, and then abandoned the ship after only an hour, fuelling speculation that terrorists were practising for a just such an attack (Anon 2004). This could cause severe damage, also with global impact in the case of a major port of oil refinery, in addition to having a potential devastating environmental impact on the targeted area. The threats â€Å"posed by the environmental impact of a deliberate tanker spill or a gas or chemical tanker being used as a floating bombard sobering yet very real scenarios (Crawford 2004, 9). Case Study: The Malacca Straights The Malacca Straights will be considered in this case study in inspire-December 26, 2004 condition. The channel was devastated by the earthquake and Tsunamis in the region. Several thousand navigational aids have shifted out of position, and at least two deep areas of the channel have filled in dramatically, with one previously over 1,000metres deep now only thirty metres (Bangs erg 2005). Old wrecks were also shifted and joined by ships downed by the waves, which will all need to be charged, and possibly moved or salvaged. London’s International Maritime Organisation is partnering with the United States to re-chart the area and plan for any needed channel modifications, with complete re-charting and dredging where necessary expected to last at least a year (Bangs erg 2005). The Malacca Strait is to the south and west of Singapore and Malaysia, north of Indonesia. It is a narrow channel, approximately 900kilometres long; at one point it narrows to less than two kilometres wide. (Anon 2005, Anon 2004). Over twenty-five present of total world trade, half of the global oil transport, and nearly two-thirds of the international supply of liquefied natural gas pass through the Straight(Loft and Koran 2004). Last year the Straight recorded over 62,000passages, including 3,300 crude oil tankers and 3,280 natural gas carriers (Hand 2004). Other freighters carry a variety of deadly substances, such as nuclear waste from Japan headed for European reprocessing facilities. The majority of the raw materials for China’s extensive manufacturing activities and products for its growing economy move through the Straight (Loft and Koran 2004). According to the IMB, the Strait of Malacca is the most dangerous shipping passage in the world (Hand 2004). The Strait is â€Å"almost entirely made up of territorial waters belonging to the three littoral states† (Hand 2004). This has been a historical point of collapse in addressing piracy in the region, as only recently have these three countries been able to coordinate activities to address shipping safety. In addition, while Malaysia and Singapore are better of financially than Indonesia, none of the countries has the full range of resources needed to confront the problem (Anon 2004). The Association of Southeast Asian Nations (ASEAN) has been unable to promote cooperation and a common strategy to deal with piracy in the area, and Indonesia and Malaysia have strongly rejected offers from the United States to dispatch the US Navy to patrol the area (Halloran 2003, Anon2004, Lewis, L. 2004). Of the three countries, Indonesia has done the least to fight piracy. However, it is not surprising that in such an economically disadvantaged country piracy is far down on its list of priorities. â€Å"The vast majority of shipping it is being asked to protect provides noneconomic benefit for the country† (Hand 2004, 5). In addition, Indonesia has faced significant political turmoil. The simultaneous political and economic crises have left the country unable to address piracy adequately, even if it wanted to (Armstrong 2004). The Indonesian Navy was dispatched to combat piracy near Singapore at that country’s insistence, but in the long-term â€Å"Indonesia lacks both the resources and the political will to maintain security across the entire length of the strait; it is a poor country with deep economic and political problems† (Hand 2004). The Indonesian navy is nearly bankrupt and has, at best estimate, perhaps twenty seaworthy boats appropriate for use on patrol. With these resources they attempt to guard the waters surrounding nearly 17,000 islands (Anon 2004). Singapore and Indonesia attempted to work bilaterally on the problem in the 1990s, but coordination disintegrated (Chalk 1998). Malaysia has been more aggressive in addressing piracy. Pre-Tsunami, the government even planned to enhance security with a24-hour radar system covering its areas in the Straight (Anon 2005a). The IMB credits Malaysian vigilant policing and anti-piracy activities as directly leading to the drop in piracy at the western end of the Straight. In 2000, seventy-five attacks were reported in that area, but by 2002 the number had dropped to sixteen (Halloran 2003). Unfortunately this number was tempered by increased attacks in the eastern areas of the Straight, such as the area above the impoverished Indonesian Port Clang, where the sea lanes initially widen (Anon 2004). Following this success, Singapore joined with Malaysia to launch anoint offensive. Seventeen ships were dispatched by the two countries to hunt pirates and terrorists in the Malacca Straight. The countries-ordinated patrols, allowing suspect ships to be pursued across national sea boundaries (Lewis, L. 2004). This led to a further decrease in pirate activity throughout the Straight. However the Indonesian waters of the Straight continue to report the highest number of pirate attacks globally, although the number has dropped from 121 in 2003 to 93 in 2004 (Anon 2005b). Thesis more than twenty-five present of pirate activity worldwide (Anon2005b). Indonesians had recently joined with Malaysia and Singapore,pre-Tsunami, to address piracy. The countries have agreed to allow each other’s policing and patrol ships to pursue suspected pirates and terrorists into each other’s waters (Lewis, L. 2004). While each country remains responsible for its own section of the Straight, any reported pirate or terrorist activity will be immediately reported to cooperating the other countries, allowing for multi-national response where needed (Lewis, L. 2004). Armstrong (2004) points out that increases in piracy typically follow economic crises, and â€Å"flourish in a political / security vacuum†(7). â€Å"The growth in incidents in the Malacca Strait, for example, follows the Asian economic crisis of the late 1990s† (Armstrong 2004,7). Ideologically, the Muslim religion remains prominent in the region. This has encouraged Muslim extremists to establish bases near the Straight, from which they attack ships for political or economic gain (Kokand 2004). The recent natural disasters in the region have only intensified economic and political problems. It is therefore unlikely that the Straight will remain pirate-free once the Tsunami effects on the shipping lanes are dealt with, unless the economic and political instabilities of the region, particularly in Indonesia, are addressed. Case Study: Nigeria The high seas and territorial waters off the coast of Nigeria are another hotbed of pirate and terrorist activity. The country is on the western coast of Africa, bordered to the north and west by Benin and Cameroon, and to the south by the Gulf of Guinea (Nigeria 2005). The river Niger flows through Nigeria to its delta in the gulf. The county is Africa’s most populous, but the vast majority of Nigerians live at below-poverty levels, surviving through subsistence farming (Anon2004b). Petroleum and petroleum products account for ninety-five present of the nation’s exports, making departing tankers a prime target for pirates and terrorist groups (Nigeria 2005). The Nigerian government has been going through massive changes. Constitution was enacted in 1999 following sixteen years of corrupt and poorly managed military rule (Nigeria 2005). Agricultural productivity has plummeted, causing what was once one of Africa’s leading agricultural producers to import food supplies. The economy has been allowed to become over-reliant on petroleum, without the creation of diverse economic interests or investment in infrastructure (Nigeria2005). Nigeria is home to over 250 ethnic people groups, leading to religious and ethnic dissention within the country (Nigeria 2005). While not having as high an incidence of strikes as the Malacca Straight, attacks in the region are significantly more violent (Clark2004). In the first half of 2004, Nigeria had thirteen attacks, compared with fif Preventing Piracy and Terrorism in Shipping Industry Preventing Piracy and Terrorism in Shipping Industry Can the shipping industry overcome the challenges it faces with Piracy and Terrorism? Although many think that pirates went out of circulation with sailed ships and swords, piracy is becoming an increasingly serious global problem. These range from small thefts to complex hijacks, and while taking place globally, tend to be concentrated in a few geographically restricted shipping channels. The breadth and complexity of the piracy problem makes it almost impossible to address in simple terms. The first factor is the enormous scope of the shipping industry. An estimated 90% of world trade moves by sea, in over 50,000ships each supposedly governed by the laws of the nation whose flag it bears (Crawford 2004). There is no one place for information concerning piracy, nor any distinct entity to police the oceans. To further complicate the matter, piracy-type acts are now also committed by terrorists, either for political results or as a way to fund their operations. This research first undertakes a review of available literature on the piracy issue, including types and motives of piracy attacks, ahistorical and current summary of pirate activity, and a consideration of terrorist attacks on shipping concerns. Two particularly volatile areas of pirate activity are then reviewed, the Malacca Straights in Southeast Asia, and the waters off the coast of Nigeria, Africa. Combining best practise findings from the literature reviewed with these case studies then provides a foundation for recommendations on how the piracy issue can best be addressed, by individual shipping concerns, individual countries, and the international community. Countermeasures will be weighed and analysed on the basis of feasibility. Of particular focus in this research is addressing some of the underlying factors contributing to the rise in piracy, in addition to defensive and offensive measures. These are typically overlooked in studies of effective countermeasures to the maritime piracy / terrorist problem. It is anticipated that this research will reveal the need to address this complex issue holistically and internationally, with greater unity and coordination than currently exists in the maritime community. Hypothesis This study considers piracy as a result of other underlying issues, and considers countermeasures from a prevention rather than combative perspective, although all types of piracy countermeasures are addressed. Specifically, it is anticipated piracy will be found to be heavily influenced by economic, political, and ideological factors. Its further anticipated that a truly effective response to the growing piracy problem in international shipping will include measures to combat the causes of increased piracy, in addition to the pirates ’actions. Literature Review Piracy Defined One of the initial difficult factors in a study of piracy is the wide range of definitions. What constitutes piracy, what constitutes robbery, and what constitutes terrorism? National and international organisations disagree on the parameters of piracy, as opposed to thievery or terrorist activity, and all agree the lines between are blurring more and more (Langeweische 2003). The International Maritime Bureau (IMB), an organisation of the International Chamber of Commerce, has some responsibility for piracy and legal considerations on the high seas (that is, areas of the ocean not controlled by a particular country, typically more than twelve miles from the country’s coast)(Hawkes 2001). Therefore, where the attack occurred in relation to the coast is of high importance. This is reinforced by the United Nations ‘Law of the Sea, which has been ratified by almost every nation except the United States (Hawkes 2001). The IMB’s Piracy Reporting Centre in Kuala Lumpur, however, defines piracy as â€Å"any act of boarding an vessel with the intent to commit theft or any other crime and with the intent or capability to use force in the furtherance of that act† ((Liss 2003, 55). While only attacks that take place on the high seas are registered with the PRC, they continue to maintain a broader definition of piracy (Chalk 1998). Forth purpose of this research, attacks against shipping vessels at port, in national waters, and on the high seas will be considered piracy if committed with a primarily economic motive. Acts committed from apolitical or ideological motive will be considered terrorist activities. Most recently, an organisation called the Comate Maritime International (CMI), composed of a number of shipping and law enforcement organisations such as the IMB, The Baltic and International Maritime Council, and Interpol, drafted a Model National Law on Acts of Piracy and Maritime Violence, which expands the definition of piracy to include national waters and the high seas (Hawkes 2001). Types of Piracy Pirate attacks also can be categorised according to the location, scope and violence involved. Non-violent hit-and-run attacks are widespread and often unreported. According to Liss (2003)â€Å"the vast majority of pirate attacks today are simple hit-and-run robberies, committed by what can best be described as common sea-robbers† (59). This attack can occur while the ship is in harbour or at anchorage. The IMB would define these attacks as low-level armed robbery. These are usually quick, low sophistication attacks where thieves make off with cash and portable personal valuables. The average theft in this type of attacks between $5,000 and $15,000 US dollars (Chalk 1998). These pirates are typically groups of men from poor areas who have known each other for quite some time, and steal for economic reasons. Outside of ports, these pirates tend to target smaller vessels (Liss 2003). The men will speak on board a ship, usually at night, and take valuables, electronics, the ship’s equipment, or any other easily transportable and saleable item they can find. These raids often last less than thirty minutes, and rarely have any violence, except in the rare instance when a pirate is confronted by one of the crews (Liss 2003). Violent hit-and-run attacks typically target yachts and other smaller vessels on the open sea. These are typically a heavily-armed group with some planning and training involved. Attacks in territorial waters or on the high seas have a higher level of sophistication, and are categorised as medium-level armed robbery by the IMB (Chalk 1998). In these attacks the pirates board the ship and again take any valuable or saleable items. However, they are unafraid to confront the ship’s occupants or crew, and have injured or killed in a number of cases(Liss 2003). In neither of these two types of attacks is the pirate gang organised or sophisticated enough to also consider stealing the boat (Liss 2003). Ship-seizing attacks require a much higher level of planning and sophistication, including participation in some wider crime network in order to be able to move the ship’s cargo and the ship itself quickly. Not surprisingly, these types of attacks are usually carried out by professional pirates funded by syndicates (Liss 2003). In temporary seizures, the pirates board the ship and restrain the crew; on rare occasions they may also be held for ransom. The ship is diverted to safe location and its cargo off-loaded, after which the ship and crew are released (Liss 2003). Pirates in this type of attack typically work from a â€Å"mother ship,† and may also take portable personal valuables (Chalk 1998). In the most violent and sophisticated attacks, permanent seizures, the ship itself is hijacked at sea, considered a major criminal hijack byte IMB (Chalk 1998). The crew may be abandoned at sea, but in many of these instances they are simply killed. These attacks usually occur in busy narrow shipping channels, and often at night (Langeweische 2003). The ship is typically repainted and its name changed. It then becomes what is called a phantom ship, changing its name and flag regularly(Liss 2003). Permanent seizures occur almost exclusively in the FarEast (Liss 2003). The phantom ship may be used as a pirate ship, but is more often used for a sophisticated type of robbery (Liss 2003). The ship takes on aloud of cargo for a legitimate business, but both the ship and the cargo disappear. The legitimate business loses both its cargo and the shipping fees it invested, and the thieves sell the cargo on the black market, paint the ship and change its name, and repeat the process(Langeweische 2003). A convincing phantom ship can draw in shippers and reroute their cargo quickly, often making up to pounds 30 million a year (Lewis, M. 2004). A Historical Perspective When most people think of piracy, they do so from a historical perspective. Blackbeard, Captain Kidd and their compatriots, swashbuckling, sword-carrying figures aboard tall ships with patches over one eye, supposedly once looted and pillaged the high seas and buried their treasure on deserted islands. In reality, however, piracy has historically been tied to national political and economic concerns. There is evidence that this continues today (Langeweische2003). The â€Å"pirates† in Southeast Asia during the colonisation period, for example, typically undertook slave raiding and robbery activities to strengthen and with the support of their local chiefdoms or sultanates. What the colonising powers considered piracy was seen by locals as state-sponsored means of enriching the local community at foreign powers’ expense (Liss 2003). In the early 1800s, pirates in the Mediterranean were supported by the Barbary States of northern Africa, but primarily for economic gain Loft and Koran 2004). These pirates would typically take over merchant ships and demand ransom for their crews. The United States responded with the Barbary Wars, which eventually successfully addressed the piracy problem with military intervention (Loft and Koran 2004). In various times of economic downturn, particularly when the economic difficulties were localised in areas near popular shipping channels, piracy has historically increased. Piracy experienced a surge with the opening of the Americas, and later Australia (North 1968). On the Atlantic Ocean, these were typically rogue European ships operating for personal profits. However, local residents of Africa, South America, and Asia have also been historically inclined to piracy at various periods. The important historical conclusion from a study of such activity is that piracy rose substantially in and around areas experiencing economic difficulty and which cargo-laden ships passed through, and decreased with economic upturn (North 1968). In recent decades oil shipments have been an increased target of pirates, particularly during periods of high crude prices. For example, tankers were frequently attacked in the Strait of Hormuzduring the mid-1980s (Loft and Koran 2004). As shipments were rerouted and insurers began to pull out from ships in the area, global oil prices were effected. Shipping in the Persian Gulf dropped by almost twenty-five present, and was not restored until the United States intervened, sending military vessels to regain order in the region(Loft and Koran 2004). The decade of the 1990s was also a historical turning point in the piracy saga. Worldwide piracy tripled over the period, escalating from just over one hundred annually in the beginning of the decade to a high of 469 in 2000 (Halloran 2003). Geographically, piracy was high in the early 1990s in the Malacca Straights, but increased policing in the1993 to 1995 period reduced incidences there. The area again fell victim to a high number of attacks in the closing years of the decade(Anon 2005). Piracy also developed from its random, unorganised thievery practise in the late 1800s and much of the 1900s, to sophisticated and highly trained criminal activity, facilitated by the increased number in crime syndicates and terrorist groups becoming involved in piracy activities (Anon 2005b). Many pirates joined â€Å"organized crime syndicates comprising corrupt officials, port workers, hired thugs, and businessmen,† developing into sophisticated networks that could gain intelligence on particular ships, plan attacks, and dispose of the stolen property or ships (Loft and Koran 2004, 68). The problem was compounded by the gross underpayment of maritime security in high piracy (and typically economically depressed) areas throughout the 1990s, who become more susceptible to bribes and in some cases even took part in piracy attacks (Loft and Koran 2004). Piracy Today Piracy today is a global disaster. Statistics on piracy do not accurately paint the current picture. As many as half of attacks are estimated to go unreported (Anon 2005b). Ship owners are reluctant to detain their ships to participate in an investigation, as doing so costs them significant loss. Incidents of piracy can also make it more difficult for them to recruit high-quality crew members (Clark 2004). Reporting piracy would also cause an increase in their insurance premiums, often costing more in the long-term than simply absorbing the loss (Armstrong 2004). â€Å"Since many shipping companies do not report incidents of piracy, for fear of raising their insurance premiums and prompting protracted, time-consuming investigations, the precise extent of piracy is unknown â€Å" (Loft and Koran 2004, 64). Various international and shipping organisations make the attempt, however, and can at least document trends in piracy events that are reported. Both attacks and their violence are reported to be on theorise. International Maritime Bureau, in its annual piracy report, recorded 325 piracy attacks and thirty deaths in 2004, a decrease in attacks (from 445) but increase in deaths (from 21) in 2003 (Anon2005b). â€Å"The number of seafarers taken hostage last year almost doubled to 359, while 311 ships were boarded and 19 vessels hijacked†(Akbar 2004, 27). Armstrong (2004) similarly lists piracy as growing at twenty present annually. Armed attacks increased by nearly fifty present in 2003, with the death count more than doubled from 2002(Akbar 2004). 644 incidents of violence to crews were reported overall, including six on UK-flagged ships and twenty-one on vessels owned or managed from the UK (Akbar 2004). These attacks tend to be clustered in and near some of the busiest Third World ports, particularly off the shores of Indonesia, Malaysia and Nigeria(Mihailescu 2004, Halloran 2003). In two incidents receiving high media coverage in the UK, pirates executed Sir Peter Blake, the Greenpeace activist, off the coast of Brazil in 2002. Alan MacLean was similarly killed by pirates off the coast of Somalia during an adventure-related trip (Akbar 2004). The financial impacts are huge. Loft and Koran (2004) report a loss of ships, loss of cargo, and increased insurance costs the shipping industry in excess of sixteen billion US each year. This trainslates to a weekly cost of pounds 300m per week (Akbar 2004, Reynolds 2003). As much as 10 billion US of this loss is to the insurance industry alone, with the true amount being significantl y higher due to underreporting (Crawford 2004). Pirates today are additionally too broad a group to truly generalise. However, technological advances have allowed pirates to become better equipped and have greater information as to their targets, which contributes to an increased number of attacks on larger ships (Lewis. 2004). In addition, the end of the Cold War has reduced the number of sea patrols in certain areas of the world while simultaneously making a tremendous volume of weapons and munitions available on the black market, often at relatively inexpensive prices (Armstrong 2004). Meanwhile, exponential in global trade has greatly increased the amount of highly valuable and saleable goods moving across the seas. This combination of more to steal, less policing, and greater easy in theft has led to a significant rise in piracy activity (Liss 2003). Attempts to regulate shipping have led to the development of the flags of convenience problem. The practice began after World War II, but did not become widespread or a problem in the international maritime community until the 1990s (Langewiesche 2004). A number of impoverished countries, such as Malta, Panama, and Liberia, began to sell their flags for a fee, with little concern for the legitimacy of the ship’s owners (Loft and Koran 2004). This allowed ship owners to literally choose under which country’s laws they wanted to sail their ship, regardless of their home port of call (Liss 2003). Today, according to Langewiesche (2004), â€Å"no one pretends that a ship comes from the home port painted on its stern† (50). This has greatly facilitated the operation of phantom ships, previously described. The massive Tsunami that devastated much of the South Asian coast in December 2004 has had a particular impact on piracy. It is believed many pirate syndicates and individual pirate groups lost ships in the disaster, as did many legitimate ship owners. In addition, changes to the Malacca Straights have reduced shipping in the region and left piracy there almost non-existent (Bangs erg 2005). It will be of note to see if piracy rebounds as issues with passage through the Straights are resolved, or whether piracy increases in some other area or areas. Terrorism: The New Threat On top of all the above, groups operating from a political motive, terrorists, have entered the piracy trade. Following September 11,terrorism has become a worldwide concern. The maritime community had already experienced a number of terrorist actions and threats, such as when Islamic militants bombed the side of the Cole, an American warship, in 2000 (Anon 2004). Since 9/11, the Limburg, a French oil tanker, has been similarly bombed, while â€Å"Abu Soya, a terrorist outfit from the southern Philippines, claimed responsibility for bombing a ferry in Manila Bay earlier this year† (Anon 2004). While most countries can provide at least reasonable protection for land targets, â€Å"the super-extended energy umbilical cord that extends by sea to connect the West and the Asian economies with the Middle East is more vulnerable than ever† (Loft and Koran 2004, 64). Ninety perceptive the world’s trade is transported via ship, with 4,000 slow and difficult to defend tanker ships moving sixty present of the world oil supply. These ships have little or no protection, and are frequently alone on open water with nowhere to hide (Loft and Koran 2004). Current International Maritime Organization regulations prevent firearms on vessels, even for self-protection, leaving ships’ crews to face terrorist and pirate threats with spotlights and high-powered firehouses (Mihailescu 2004). Interestingly, Russian and Israeli ships ignore the IMO regulations, allowing their crewmembers to be armed, and subsequently have a lower incident of successfully attacks from either pirates or terrorists (Loft and Koran 2004). As Armstrong (2004) contends, â€Å"the world economy relies on the seamless delivery of trade via the worlds seaways† (7). This gives the terrorist threat immediate international implications. The international community has attempted to address terrorist concerns with acts such as the International Ship and Port Security Code, implemented in July 2004, the Customs-Trade Partnership Against Terrorism, and the Container Safety Initiative. However, the terrorist threat remains â€Å"a function of the terrorists will, the terrorist’s capability, and the targets perceived importance† (Armstrong 2004). Terrorists are separated from pirates by motive. While pirates attack for purely economic reasons, terrorist groups strike for political or ideological reasons, sometimes with economic considerations an additional cause (Anon 2005). â€Å"Unlike the pirates of old, whose sole objective was quick commercial gain, many of todays pirates are maritime terrorists with an ideological bent and a broad political agenda† (Loft and Koran 2004). There is, of course, a connection. Terrorists sometimes act as pirates, usually to finance their political or ideological activities. â€Å"Pirates claiming to be members of the Free Aceh Movement, who take ships crews hostage for ransom, have started to blur the lines between terror and piracy† (Hand 2004, 5). They show no interest in the ship or its cargo, but simultaneously achieve economic gains while embarrassing the government they oppose (Hand2005). In addition, as pirates become more sophisticated, they may be through their very success revealing to the terrorists where opportunities for successful destruction exist (Anon 2005). â€Å"Terrorism is imitative and adaptive, learning from other groups and wider trends† (Armstrong 2004,7). In addition, â€Å"the apparent lack of concrete evidence linking pirates and terrorism has not stopped senior Singapore government officials from publicly making this link on a number of occasions†(Hand 2004, 5). One possible terrorist target is blocking a major shipping lane. Six major shipping channels geographically lend themselves to such an attack (Armstrong 2004). The Malacca Straights are considered the most vulnerable, as the area suffers from lack of funds for policing by its littoral nations yet carries as much as one-third of the world’s total trade and one-half of the world’s oil supply (Anon 2005). â€Å"One ship sunk in a strategic right spot has the potential to block much of the Straight and cripple world trade† (Anon 2004, 37). Fourteen present of world trade moves through the Suez Canal, with the Panama Canal, thebe-el-Man dab, and the Strait of Gibraltar also carrying significant percentages of world trade. All are narrow, busy channels where well-planned terrorist strike could partially or completely block passage (Armstrong 2004). The Strait of Hormuz, connecting the Persian Gulf and Arabian Sea, is only two kilometres at its most narrow point, yet accounts for over fifteen million barrels of oil transport daily(Loft and Koran 2004). One well-placed scuttle could physically block these channels, crippling trade, as could refusal of insurance carriers to cover vessels in the area, if the terrorist situation became too severe(Armstrong 2004). Either would have devastating global economic impact. Oil and raw materials would be blocked, soon crippling manufacturing and transportation industries. Targeting energy infrastructure is increasingly recognised as terrorist intention. â€Å"Indecent years, terrorists have targeted pipelines, refineries, pumping stations, and tankers in some of the worlds most important energy reservoirs, including Iraq, Nigeria, Saudi Arabia, and Yemen† (Loft 2004). â€Å"Given al-Qaedas understanding of the sensitivity of Western economies to the price of oil, the oil and gas industry represents particularly tempting target, where a single terrorist incident could have a huge ripple effect† (Armstrong 2004). The damage would be heightened by today’s just-in-time logistics systems. Companies reduced inventories and capital structures, made possible by international outsourcing and trade, would cause an almost immediate shortage of some goods (Armstrong 2004). This would be compounded if multiple attacks were to occur on vulnerable shipping conduits simultaneously. Terrorists could also hijack ships and make them into floating bombs, which in addition to closing a shipping lane could be deployed against ports, oil refineries, or other critical infrastructures (Anon 2004). Last year in Singapore, supposed pirates hijacked a chemical tanker in the Malacca Straights, and then abandoned the ship after only an hour, fuelling speculation that terrorists were practising for a just such an attack (Anon 2004). This could cause severe damage, also with global impact in the case of a major port of oil refinery, in addition to having a potential devastating environmental impact on the targeted area. The threats â€Å"posed by the environmental impact of a deliberate tanker spill or a gas or chemical tanker being used as a floating bombard sobering yet very real scenarios (Crawford 2004, 9). Case Study: The Malacca Straights The Malacca Straights will be considered in this case study in inspire-December 26, 2004 condition. The channel was devastated by the earthquake and Tsunamis in the region. Several thousand navigational aids have shifted out of position, and at least two deep areas of the channel have filled in dramatically, with one previously over 1,000metres deep now only thirty metres (Bangs erg 2005). Old wrecks were also shifted and joined by ships downed by the waves, which will all need to be charged, and possibly moved or salvaged. London’s International Maritime Organisation is partnering with the United States to re-chart the area and plan for any needed channel modifications, with complete re-charting and dredging where necessary expected to last at least a year (Bangs erg 2005). The Malacca Strait is to the south and west of Singapore and Malaysia, north of Indonesia. It is a narrow channel, approximately 900kilometres long; at one point it narrows to less than two kilometres wide. (Anon 2005, Anon 2004). Over twenty-five present of total world trade, half of the global oil transport, and nearly two-thirds of the international supply of liquefied natural gas pass through the Straight(Loft and Koran 2004). Last year the Straight recorded over 62,000passages, including 3,300 crude oil tankers and 3,280 natural gas carriers (Hand 2004). Other freighters carry a variety of deadly substances, such as nuclear waste from Japan headed for European reprocessing facilities. The majority of the raw materials for China’s extensive manufacturing activities and products for its growing economy move through the Straight (Loft and Koran 2004). According to the IMB, the Strait of Malacca is the most dangerous shipping passage in the world (Hand 2004). The Strait is â€Å"almost entirely made up of territorial waters belonging to the three littoral states† (Hand 2004). This has been a historical point of collapse in addressing piracy in the region, as only recently have these three countries been able to coordinate activities to address shipping safety. In addition, while Malaysia and Singapore are better of financially than Indonesia, none of the countries has the full range of resources needed to confront the problem (Anon 2004). The Association of Southeast Asian Nations (ASEAN) has been unable to promote cooperation and a common strategy to deal with piracy in the area, and Indonesia and Malaysia have strongly rejected offers from the United States to dispatch the US Navy to patrol the area (Halloran 2003, Anon2004, Lewis, L. 2004). Of the three countries, Indonesia has done the least to fight piracy. However, it is not surprising that in such an economically disadvantaged country piracy is far down on its list of priorities. â€Å"The vast majority of shipping it is being asked to protect provides noneconomic benefit for the country† (Hand 2004, 5). In addition, Indonesia has faced significant political turmoil. The simultaneous political and economic crises have left the country unable to address piracy adequately, even if it wanted to (Armstrong 2004). The Indonesian Navy was dispatched to combat piracy near Singapore at that country’s insistence, but in the long-term â€Å"Indonesia lacks both the resources and the political will to maintain security across the entire length of the strait; it is a poor country with deep economic and political problems† (Hand 2004). The Indonesian navy is nearly bankrupt and has, at best estimate, perhaps twenty seaworthy boats appropriate for use on patrol. With these resources they attempt to guard the waters surrounding nearly 17,000 islands (Anon 2004). Singapore and Indonesia attempted to work bilaterally on the problem in the 1990s, but coordination disintegrated (Chalk 1998). Malaysia has been more aggressive in addressing piracy. Pre-Tsunami, the government even planned to enhance security with a24-hour radar system covering its areas in the Straight (Anon 2005a). The IMB credits Malaysian vigilant policing and anti-piracy activities as directly leading to the drop in piracy at the western end of the Straight. In 2000, seventy-five attacks were reported in that area, but by 2002 the number had dropped to sixteen (Halloran 2003). Unfortunately this number was tempered by increased attacks in the eastern areas of the Straight, such as the area above the impoverished Indonesian Port Clang, where the sea lanes initially widen (Anon 2004). Following this success, Singapore joined with Malaysia to launch anoint offensive. Seventeen ships were dispatched by the two countries to hunt pirates and terrorists in the Malacca Straight. The countries-ordinated patrols, allowing suspect ships to be pursued across national sea boundaries (Lewis, L. 2004). This led to a further decrease in pirate activity throughout the Straight. However the Indonesian waters of the Straight continue to report the highest number of pirate attacks globally, although the number has dropped from 121 in 2003 to 93 in 2004 (Anon 2005b). Thesis more than twenty-five present of pirate activity worldwide (Anon2005b). Indonesians had recently joined with Malaysia and Singapore,pre-Tsunami, to address piracy. The countries have agreed to allow each other’s policing and patrol ships to pursue suspected pirates and terrorists into each other’s waters (Lewis, L. 2004). While each country remains responsible for its own section of the Straight, any reported pirate or terrorist activity will be immediately reported to cooperating the other countries, allowing for multi-national response where needed (Lewis, L. 2004). Armstrong (2004) points out that increases in piracy typically follow economic crises, and â€Å"flourish in a political / security vacuum†(7). â€Å"The growth in incidents in the Malacca Strait, for example, follows the Asian economic crisis of the late 1990s† (Armstrong 2004,7). Ideologically, the Muslim religion remains prominent in the region. This has encouraged Muslim extremists to establish bases near the Straight, from which they attack ships for political or economic gain (Kokand 2004). The recent natural disasters in the region have only intensified economic and political problems. It is therefore unlikely that the Straight will remain pirate-free once the Tsunami effects on the shipping lanes are dealt with, unless the economic and political instabilities of the region, particularly in Indonesia, are addressed. Case Study: Nigeria The high seas and territorial waters off the coast of Nigeria are another hotbed of pirate and terrorist activity. The country is on the western coast of Africa, bordered to the north and west by Benin and Cameroon, and to the south by the Gulf of Guinea (Nigeria 2005). The river Niger flows through Nigeria to its delta in the gulf. The county is Africa’s most populous, but the vast majority of Nigerians live at below-poverty levels, surviving through subsistence farming (Anon2004b). Petroleum and petroleum products account for ninety-five present of the nation’s exports, making departing tankers a prime target for pirates and terrorist groups (Nigeria 2005). The Nigerian government has been going through massive changes. Constitution was enacted in 1999 following sixteen years of corrupt and poorly managed military rule (Nigeria 2005). Agricultural productivity has plummeted, causing what was once one of Africa’s leading agricultural producers to import food supplies. The economy has been allowed to become over-reliant on petroleum, without the creation of diverse economic interests or investment in infrastructure (Nigeria2005). Nigeria is home to over 250 ethnic people groups, leading to religious and ethnic dissention within the country (Nigeria 2005). While not having as high an incidence of strikes as the Malacca Straight, attacks in the region are significantly more violent (Clark2004). In the first half of 2004, Nigeria had thirteen attacks, compared with fif