Friday, January 24, 2020

Donaldsons Beowulf Essay -- Donaldson Beowulf Essays

Donaldson's Beowulf "Fate often saves an undoomed man when his courage is good" -Beowulf (Donaldson, 12) The passage that I analyzed spans the action when Beowulf returns to the halls of Heorot after a harsh battle with Grendel’s mother. He returns to king Hrothgar in the great hall of Heorot to say that he has successfully completed his boast and killed Grendel’s mother. Beowulf states that it has been a very difficult underwater battle and that he has barely escaped with his life, â€Å"The fight would have been ended straightway if God had not guarded me† (Donaldson, 29). Beowulf mentions this due to the fact that the sword given to him by Unferth, called Hrunting, was powerless against Grendel’s Mother. Hrunting is useless against Grendel’s mother due to the fact that she has the same charm upon her as Grendel did, which is that no normal sword can pierce her skin. Then, by chance, Beowulf finds an ancient sword on a wall during the battle and uses it against the monster. This sword, which was crafted by the giants, is able to pierce th e monster's skin and after one swing, the monster was cut in half. After using this ancient sword to murder the monster, Beowulf watches the blade of the sword melt away due to the toxicity of the monster's blood, until only the hilt was left. A hilt is the handle of a weapon or tool. The hilt is decorated with runic symbols and was given to King Hrothgar of the Danes as proof of Beowulf’s exploits. The King is also given the severed head of Grendel as further reassurance that their troubles at the great hall of Heorot is over. Hrothgar then tells Beowulf, â€Å"Lo, this may one say who works truth and right for the folk, recalls all things far distant, an old guardian of ... ...th for his murders. Beowulf, who is also responsible for the killing of Grendel, is killed as well. The dragon and the trolls, as well as Beowulf, are responsible for their actions. They are all killed: â€Å"He would repay Grendel for the many attacks he made on the West-Danes . . . devouring Danish† (Donaldson 28). This is another example of â€Å"wergild† being applied. Wergild was a part of the warrior code. After the death of Aeschere, Hrothgar’s great advisor and friend, Beowulf says to his lord, â€Å"Sorrow not, wise warrior. It is better to avenge his friend than much mourn† (Donaldson 25). Beowulf was composed during the most noble of times and we enjoy it for what it is. The greatest treasure Beowulf has to offer us is the escape from our reality into our history. Work Cited Donaldson, E. Talbot. Beowulf. Ed. Nicholas Howe. New York: W.W. Norton & Co., 2002.

Thursday, January 16, 2020

Counter-terrorism

What is counterterrorism? Why is it important to understand the motivations behind terrorism efforts? What kind of general motives might you find among terrorists in this country and abroad? Counter-terrorism is a combination of practices, strategies, techniques and practices that the various governments, police departments and the military service units use to stop terrorism acts with both the response to completed acts and the detection of potential terror acts included in counter-terrorism.The techniques and practices used in counter-terrorism aim at preventing or stopping certain terrorism acts, with the strategies usually offensive in operation. One major reason why the motivations behind terrorism efforts need to be understood is its great role in the development and implementation of effective counter-terrorism strategies. Since counter-terrorism measures depend on the nature of the terrorism act being mitigated, it is vital to identify how and why certain terrorism act is und ertaken in order to also combat it successfully.Understanding the motivation behind terrorism efforts forms the base for the development of an effective countering action where lack of a clear understanding of all the issues surrounding a terror act, makes the possibility of curbing the act properly and effectively almost impossible (Bolz. F et al. 2001). In addition, understanding the motive behind terrorism efforts allows the appropriate government organizations to select amongst the many, an effective action to counter a terrorism act that seems like an isolated event.This kind of understanding promotes good intelligence which forms a very vital component of preparing an effective counter-terrorism strategy. Another reason why identification of terrorist motives is vital is the huge role it plays in hunting down hard-core terrorist. It is through proper knowledge of a terrorist’s motives, that a government can isolate the hard-core terrorists and cut them off from external supplies. This makes it possible for the terrorists to be referred to as criminals, making it easy to hunt terrorists according to the law and with popular support.When a government or an organization plans and implements a counter-terrorism strategy, there is need to understand how terrorism efforts violate the human rights. This in turn enables the governments to develop effective measures that ensure that severe and appropriate actions are taken against the terrorists who are viewed as human rights violators, a situation that may repel others from participating in terrorists’ activities.Counter-terrorism experts are able to eradicate any terrorist organization if they correctly and accurately understand the terrorists’ motives, where one is able to understand the terrorists’ thoughts so that one can anticipate their next move correctly to stop it on time. In the USA and other countries, terrorist’s motives are many and they vary (Crank, J. et al.. 200 5). In the USA, Some of the general motives that might be found in terrorists include, political motives, fighting for the injustice of a given group of people, economic superiority as well as the creation of fear and a sense of insecurity in the American citizens.When they view themselves as the underserved underdogs on a mission, the terrorists use the strategy of using the weak to weaken the strong and to strengthen the weak. Question 2 Is counterterrorism a tactic of warfare or crime-fighting? What role does due process play in either context? What are the implications when terrorists can be characterized as the â€Å"enemy† rather than mere criminals? Counterterrorism can be used as both a warfare tactic or as a crime fighting tactic. However, in the United States counterterrorism is usually used as a crime- fighting tactic.For instance, the computer and the Internet are used to undertake warfare actions through the cyber space. Counter terrorism as a warfare tactic is t hen used and can be used to stop people from using terrorism tactics against a given nation or organization. In such a case, comprehensive tools can be used to deal with possible terrorist incidents and can further be used to repulse attacks that have been directed against a nation. As a crime fighting tactic, counter terrorism is used by the law enforcement authorities to hunt down terrorists who have been labeled as criminals.The authorities normally cut off hard-core terrorists from external sources of supply so as to label terrorists as criminals, and then use the law to easily hunt the terrorists down (Combs. 2005). When terrorists are referred to as â€Å"enemy† instead of â€Å"criminal,† it encourages more terrorist’s attacks or strengthening of terrorist organizations. For example, it leads to the recruitment of more followers in the terrorist organizations because those who are recruited have developed great desire to become fighters against their enem y.The labeling of terrorists as an enemy serves as a motivation for every group to strengthen itself to attack another group they view as â€Å"enemy†. It further encourages terrorism behavior of solidarity, loyalty and self protection even when the group faces difficult times. The members get convinced that they need to protect themselves from a group that views them as an â€Å"enemy’. Finally, referring to terrorists as ‘enemy’ instead of criminals makes it very hard for the concerned organization or government to hunt down the terrorist according to the law.In addition, the organization lacks the popular support to hunt down the terrorists (Crank. J et al.. 2005) because they are seen as just revenging against other people with an unjustified reason. The terrorists cannot be tracked down in pursuit of justice which makes it difficult to use force against hard-core terrorists with the use of brutal force generating more terrorism and terrorists. Questi on 3 How has surveillance changed from the â€Å"traditional† to â€Å"new surveillance†? Are these changes potentially problematic for civil liberties in any way in the United States?Should law enforcement be permitted to use all technological resources available to accomplish its mission including in the fight against terror? Are there limits? Traditionally, counterterrorism strategies and techniques against terror acts were hugely the responsibility of the military force, and the level of surveillance not as intensive as it is in the new strategies of surveillance. The major reason for this is that in the past, terrorism acts were not as many as they are in the modern world.Traditional institutions approved surveillance only when it was seriously necessary to do so, as compared to new surveillance which has been blamed for overstepping the bounders. The ever increasing terrorist attacks against certain states in the world have demanded the development of many and ef fect counter terrorism measures through surveillance, in comparison to the traditional surveillance. In new surveillance, building of the counterterrorism plans has integrated all the segments of the society or government agencies (Mahan, S and Griset, P. 2007).New surveillance has seen the development of counterterrorism strategies that have increased both the standard of the police as well as domestic intelligence. While traditional surveillance involved the interception of communication and tracing of the suspected terrorists, new surveillance has expanded its ways of operation due to the advancement in technology. For instance, new surveillance has managed to expand the range of both the law and the military enforcement operations. The direction of domestic intelligence at specific groups that is based on origin and religion is a feature of the new surveillance.Mass surveillance is also done in new surveillance where an entire population is investigated. In the United States, ch anges in the surveillance have raised concerns based on the civil liberties. One good example is the mass surveillance which involves the surveillance of an entire population, an issue that has been objected since it is considered to defy civil liberty of the citizens (http://www. usatoday. com/news/washington/2006-05-10-nsa-x. htm). The surveillance defies the citizen’s liberty in that mass surveillance is done whether or not there is the consent of those being surveyed.Furthermore, surveillance is done whether it serves or it does not serve the citizen’s interest. For instance, use of a network of secret police informers is considered a new surveillance abuse. In the United States, the government has been accused of illegally cooperating with the National Security Agency to monitor the US citizens’ phone records. Further allegations that the government has conducted electronic surveillances of domestic phone calls without warrants are an issue that has been sa id to go against the civil liberty.However, the law enforcement organizations should not be fully allowed to use technological resources to fight terror. This is because uncontrolled use consequently may result to severe negative effects. For instance, there have been some instances where technological measures against terror have resulted to the abuse and violation of the human rights. The return and extradition of people within countries and restriction of freedom of citizens are some of the examples that violate human rights during the process of counterterrorism.Invasion of people’s private lives through technology-advanced tools need to be stopped by limiting how far the law enforcement bodies should go to fight terror. Lack of a boundary within which technology can be used poses a great risk, where the authorities may undertake counterterrorism practices while they violate the human rights at the same time. Question 4 What is the FISA court? Explain how it works. What a uthorities can it grant law enforcement? How is it different from traditional courts? What concerns exist about expanding the use of FISA?A FISA court refers to a secret court in the USA that has the responsibility of approving the wiretaps that target the terrorists. It was established and has been working since 1979 to ensure that terrorists and foreign agents are monitored. The FISA court was established under the 1978 US Foreign Intelligence Surveillance Act. The court has approved domestic wiretaps and has continued to handle very sensitive domestic wiretaps in the US national security investigations| (media filter. org/CAQ/cqq53. court. html). The FISA court operates through a process that is based on probable cause.An application to a FISA court judge is normally made by the FBI (Federal Bureau of Investigation) if it believes that it can show probable cause that the target of the surveillance is either a suspected terrorist or a foreign agent. The application should contain 4 documents; a request for a wiretap, FBI directors’ or executive branch official’s certification that information cannot be acquired through the normal investigative tactics, and an FBI supervisory affidavit with a statement of fact about the target of surveillance.This is then followed by the submission of the documents to the Justice Department for the Justice Department attorneys’ review. The application is then forwarded to the FISA court and presented to a federal judge. There are 10 federal judges in the FISA court who sit on the court on a rotating basis. The FISA court grants authority to the law enforcement authorities based on the probable cause presented to them. It gives warrant to the authorities to conduct surveillance on a suspected target, if enough evidence is provided in the court to justify why a suspect should be surveyed.It receives an application if the FBI director certifies that there is need to obtain information above the normal invest igative tactics. Clear indication of facts about the target of surveillance is also demanded by the FISA court before they give the authority and the judges often demand for more details about the targeted communication to authorize or approve a wiretap. It maintains a high rate of secrecy where a judge can make an ultimate decision to approve a wiretap (FISA orders 1979-2004)The FISA court is different from the traditional court in its secret nature of operation where the court makes approval of the applications in secret. Furthermore, the FISA court is considered to have acquired expanded authority than a traditional court to approve surveillance applications made, after President’s Clinton signing of the Executive Order 12949. Unlike in the traditional courts, the FISA court evidence can be used in criminal trials after the 1995 expansion as compared to the traditional courts where the evidence could only be collected and stockpiled only for intelligence purposes.The FISA court has expanded powers and it has the authority to allow both the electronic and physical searches due to its expanded powers. The expansion of using the FISA court in the USA has raised great concern. One concern of the FISA court expansion is the possibility of government’s extreme intrusion into people’s private lives. Because the court operates secretly, government measures that may intrude into people’ lives unnecessarily may result. Another great concern is the fact that, it promotes surveillance that defies people of their liberty.For instance, the expansion of the FISA court has made it able to give legal authority to approve black-bag operations, that authorize the Department of Justice to conduct both electronic and physical searches without an open court warrant. Furthermore, the subjects are not notified and an inventory of seized items not provided. Sometimes the surveillance allowed by the FISA court is considered to be unconstitutional. The Civ il liberty lawyers in the United States have stated that some searches that have been conducted are unconstitutional.It is a great worry that under the FISA court cover of secrecy, the court is likely to exceed its own broad legal mandate. The expansion of the court has been argued to have been motivated by the governments need to conduct searches they would not have been allowed to undertake under the nation’s national provisions. For instance, the US government may attempt and fail under the traditional constitutional argument to secure a search warrant, but it would go to FISA court and secure approval for a search by converting the case into a national security investigation. Question 5 How has aviation security changed since 9111?What were the provision of the Aviation and Transportation Act? Did this Act change Aviation security in a dramatic way? What role does racial and religious profiling play in securing the aviation industry and its consumers? What role should it play? Before the 9/11 terrorist attack, the aviation security in the USA was the responsibility of the Federal Aviation Administration within the Department of transportation. However after the 9/11 attack there was great urgency in securing the US nation’s entire transportation systems. The federal agencies concerned with transport security were transferred to the Department of Homeland security (www.encyclopedia. com/doc/iG2-34033000149. html). The need to increase aviation security after the 9/11 led to the enactment of the Aviation and Transportation Act on Nov 19, 2001. This saw the creation of the TSA (Transportation Security Administration) within the DOT (Department of Transportation). The Act permits the existing authorities to permit the TSA to flexibly manage and deploy the workforce to carry out important security work where the national security is concerned. The act mandates the increase in the number of federal air marshals and has placed the US airport securit y screeners under federal control.All the screeners were required to be US citizens, though the provision was later changed by American Civil Liberties Union. It was the Act’s provision that all the bags in the airports to be first screened and then matched to the passengers. Another provision of the Act was the $1. 5 billion award to the airports and private contractors so that the direct costs of meeting new security requirements were met. Checks for baggage in the airports was made necessary with screening recommended by use of explosive detection machinery or manual methods.The Act allowed the Transportation Secretary to authorize airports to use all the necessary equipment for the chemical and biological weapons detection. The Act did change the aviation security dramatically. For instance, before the 9/11 attack, the civil aviation security was handled by the Federal Aviation Administration (FAA). After the creation of the Act, the civil aviation security was put under the Transportation Security Administration (TSA). There were also changes in the federal statutes that covered aviation security (contained in title 49 of the Code of Federal Regulations Chapter XII).The provisions that were made by the Act changed security practices in the airports with the airports implementing changes in the checking and screening procedures, where tight security procedures were and are still being developed. The placement of the airport security screeners under federal control made changes when all screeners were required to be US citizens and the matching of bags to passengers was made necessary with new security requirements adopted in airports. Racial and religious profiling in the US Aviation Security practices has been seen by some as illegal and inconsistent with American values (travelsecurity.blogspot. com/2007/09lantos-warns-tsa-against-religious. html). Furthermore, this profiling is detrimental to the national security. Civil liberties of some religio us groups have claimed that TSA employees conduct secondary screening for passengers wearing ‘religious’ clothing. For instance, TSA employees have discriminated the Sikh by ordering Sikh Americans to remove their turbans, which defies their faith. There have been an estimated 50 incidents of religious discrimination since the institution of the new policy. Racial and religious profiling has led to discrimination and humiliation of people including the ordinary Americans.The practice leads to stereotyping of some citizens as terrorists and provokes a sense of fear against innocent citizens. The racial and religious profiling should instead promote changes that will prevent discrimination and humiliation of travelers. The profiling should not be used as a means of abuse but instead should be used with respect for the civilians. Exposing people to extra screening procedures simply because they belong to a certain race or religion should be done away with, but instead ever yone subjected to the procedures to promote equality. References Bolz, F. , Dudonis, K. and Schulz, D.(2001). The Counterterrorism Handbook: Tactics, Procedures and Techniques. Second Edition. CRC Publishers Crank, J. P. , & Gregor, P. E. 2005. Counter-Terrorism After 9/11: Justice, Security and Ethics Reconsidered. Cincinatti: Anderson Publishing Colangelo, P. The secret FISA court: Rubber Stamping on Rights. Covert Action Quarterly. Online at: media filter. org/CAQ/cqq53. court. html. Retrieved on June 26, 2008 Combs, (2005). Terrorism in the 21st Century, 4th Edition. Prentice Hall. FISA orders 1979-2004 Judson, K. Civil Aviation Security United States. Encyclopedia of Espionage, Intelligence andSecurity. 2004. Available at: www. encyclopedia. com/doc/iG2-34033000149. html. Retrieved on June 26, 2008 Lantos, T. US representative from California. Lantons Warns TSA Against Religious Profiling Insensitivity Sept 7, 2007. Online at: travelsecurity. blogspot. com/2007/09lantos-warns-t sa-against-religious. html. Retrieved on June 26, 2008 Mahan, S and Griset, P. 2007. Terrorism in Perspective. Sage Publications, Inc USA TODAY Com – NSA has Massive database of American’s phone calls http://www. usatoday. com/news/washington/2006-05-10-nsa-x. htm. Retrieved on June 26, 2008

Wednesday, January 8, 2020

Domestic Violence Against Immigrant And Refugee Women

4. How can Canada protect and welcome refugees and newcomers? How can domestic violence against immigrant and refugee women be prevented? Some of the ways Canada can protect and welcome and protect refugees by; Making the status in Canada secure- This means that Canada should make permanent residency open to all including migrant workers. They should not restrict the Permanent Residency to only those coming for high wage jobs. There should be a legislation and enforcement to protect them effectively. The migrant workers should also be empowered so that they can access to information and different services useful to them and access to justice. Permanent Residency should also be opened to persons who have been trafficked. The law should provide adequate protection to all trafficked persons so that they apply temporary resident permits, Can make refugee claims and can file their application for humanitarian and compassionate consideration. Canada should have broad, inclusive and effective refugee resettlement program- The government should resettle a significant number of refugees specially persons who are most likely to be abused. They should resettle them without discrimination. Newcomers refugees should have access to protection- Canada should create opportunities for refugees to reach Canada. They should also have a fair system without discrimination. Trafficked persons without permanent status should be provided effective protection specially women in situation ofShow MoreRelatedThe Effects Of Domestic Violence On Women Essay1246 Words   |  5 Pagesaddressed the domestic violence and continue to persist as a social problem affecting a large number of Canadian Women. The authors are trying to answer this question giving some statistics, how the women are abused from their partner, such as the violence reported when the relationship is ended, and is some other case the violence starts after the separation. Furth more the authors mention another key answer that I think could be a question, is what are the effects of domestic violence? Alaggia, RegehrRead More Refugee Women During the 21st Century Essay694 Words   |  3 PagesRefugee Women During the 21st Century Refugees face governmental turmoil, political prosecution and natural disasters; however, women are further burdened by their female status, biological functions and lack of attention to the needs of women in refugee camps. Refugee women sustain emotional and often physical scars attempting to escape from oppressive situations. They are forced to leave, face death or perhaps something worse. They may find these horrors anyway, but they will risk thatRead MoreThe American Of The United States Essay1731 Words   |  7 PagesAs demonstrated, women from Central America left their homes to seek employment in the United States for domestic work for a variety of reasons and factors. During the 1960s and 1970s the demographics of migrants from Central America started to shift. Originally men were the primary immigrants to migrate to the United States for jobs in agriculture. However, as the openings in the domestic work industry formed, Central American women started to pioneer their own labor migration. An example of thisRead MoreImplications Of The Involement Of Neighboring Countries1599 Words   |  7 Pagesconflict and seemingly unending civil war in Syria has made the refugee settlement mission a difficu lt task. The persistent state of fear has given rise to security controls across the border, and the incessant displacement of people from Syria has increased vulnerability amongst refugees seeking asylum. The number of refugees has grown steadily and has reached a disturbing number of 235,000 according to UNHCR. In addition, many immigrants remain unregistered and vulnerable in the neighbouring regionsRead MoreThe Problem Of Gang Violence1356 Words   |  6 PagesGang violence has grown to be a great problem in El Salvador in the last 30 years. Gangs have grown into large, complex organized crime units; the two largest gangs, MS13 (also known as Mara Salvatrucha 13) and Barrio18 (also known as Calle18), now encompass large parts of Central America. Both gangs rely heavily on local drug-peddling, which drives most of the general gang violence. The desire for control over certain areas had forged a fierce rivalry, in which civilians are often endangered whenRead MoreWomen And Domest ic Violence : Lauren Lys Essay1699 Words   |  7 Pages Women and Domestic Violence Lauren Lys Eastern Michigan University Abstract Domestic violence, also called intimate partner violence, is a pattern of behavior used to establish power and control over another person through fear and intimidation, often including the threat or use of violence. Statically women are the victims of domestic violence; this has been happening for a long time. In 1994 Congress passed the Violence Against Women Act, for the first time providing recognitionRead MoreThe State Of Israel2396 Words   |  10 PagesWithin the context of human history there have been many unfortunate events. Whether it is controllable by man, or nature. The world can be a formidable foe, especially In case of the former. Man against man, the eternal struggle. Since ages long forgotten to the folds of time, man has waged war against himself. Likewise can be said regarding the conditions in which present day Palestinians find themselves in. A world not of their making, yet the are forced to live within the conditions others haveRead MoreThe Movement Of Suda nese Refugees1510 Words   |  7 PagesI have chosen to investigate whether immigrants should interact with host peoples or establish marginal communities away from the culture of their destination. Egypt is grappling with these troubles today. The movement of Sudanese refugees to Egypt can be dated to the 19th century, when Sudan was part of Egypt, under British colonial rule. Up until the late nineteen-eighties, most of the early Sudanese who moved to Egypt were northerners and were able to take advantage of bilateral treaties betweenRead MoreImmigration And The United States1430 Words   |  6 Pagesliterature exists concerning the psychosocial and mental health problems experienced by immigrants as a result of immigrating and subsequent adjustments. Undocumented immigrants have no legal rights and are often emotionally, physically, and economically abused. Without the right to vote and stay in the U.S. legally, immigrants have little power to change oppressive social structu res. Given the dramatically growing immigrant population in the U.S., multicultural social justice counselors are confrontedRead MoreThe Radicalization Of Somali Youths2016 Words   |  9 Pagesresearch investigates the radicalization of Somali youths living in upstate New York and in Minnesota, the state with the largest Somali refugee population in the United States. Somali immigrants are subject to many of the post-9/11 American discrimination and harassment against Muslims. Unlike many Muslims in the United States who are mostly middle class, Somali immigrants are predominantly of the lower class. In addition to being a religious minority, they are also economically marginalized and black