Saturday, August 31, 2019

A Game of Thrones Chapter Thirty-seven

Bran A light snow was falling. Bran could feel the flakes on his face, melting as they touched his skin like the gentlest of rains. He sat straight atop his horse, watching as the iron portcullis was winched upward. Try as he might to keep calm, his heart was fluttering in his chest. â€Å"Are you ready?† Robb asked. Bran nodded, trying not to let his fear show. He had not been outside Winterfell since his fall, but he was determined to ride out as proud as any knight. â€Å"Let's ride, then.† Robb put his heels into his big grey-and-white gelding, and the horse walked under the portcullis. â€Å"Go,† Bran whispered to his own horse. He touched her neck lightly, and the small chestnut filly started forward. Bran had named her Dancer. She was two years old, and Joseth said she was smarter than any horse had a right to be. They had trained her special, to respond to rein and voice and touch. Up to now, Bran had only ridden her around the yard. At first Joseth or Hodor would lead her, while Bran sat strapped to her back in the oversize saddle the Imp had drawn up for him, but for the past fortnight he had been riding her on his own, trotting her round and round, and growing bolder with every circuit. They passed beneath the gatehouse, over the drawbridge, through the outer walls. Summer and Grey Wind came loping beside them, sniffing at the wind. Close behind came Theon Greyjoy, with his longbow and a quiver of broadheads; he had a mind to take a deer, he had told them. He was followed by four guardsmen in mailed shirts and coifs, and Joseth, a stick-thin stableman whom Robb had named master of horse while Hullen was away. Maester Luwin brought up the rear, riding on a donkey. Bran would have liked it better if he and Robb had gone off alone, just the two of them, but Hal Mollen would not hear of it, and Maester Luwin backed him. If Bran fell off his horse or injured himself, the maester was determined to be with him. Beyond the castle lay the market square, its wooden stalls deserted now. They rode down the muddy streets of the village, past rows of small neat houses of log and undressed stone. Less than one in five were occupied, thin tendrils of woodsmoke curling up from their chimneys. The rest would fill up one by one as it grew colder. When the snow fell and the ice winds howled down out of the north, Old Nan said, farmers left their frozen fields and distant holdfasts, loaded up their wagons, and then the winter town came alive. Bran had never seen it happen, but Maester Luwin said the day was looming closer. The end of the long summer was near at hand. Winter is coming. A few villagers eyed the direwolves anxiously as the riders went past, and one man dropped the wood he was carrying as he shrank away in fear, but most of the townfolk had grown used to the sight. They bent the knee when they saw the boys, and Robb greeted each of them with a lordly nod. With his legs unable to grip, the swaying motion of the horse made Bran feel unsteady at first, but the huge saddle with its thick horn and high back cradled him comfortingly, and the straps around his chest and thighs would not allow him to fall. After a time the rhythm began to feel almost natural. His anxiety faded, and a tremulous smile crept across his face. Two serving wenches stood beneath the sign of the Smoking Log, the local alehouse. When Theon Greyjoy called out to them, the younger girl turned red and covered her face. Theon spurred his mount to move up beside Robb. â€Å"Sweet Kyra,† he said with a laugh. â€Å"She squirms like a weasel in bed, but say a word to her on the street, and she blushes pink as a maid. Did I ever tell you about the night that she and Bessa—† â€Å"Not where my brother can hear, Theon,† Robb warned him with a glance at Bran. Bran looked away and pretended not to have heard, but he could feel Greyjoy's eyes on him. No doubt he was smiling. He smiled a lot, as if the world were a secret joke that only he was clever enough to understand. Robb seemed to admire Theon and enjoy his company, but Bran had never warmed to his father's ward. Robb rode closer. â€Å"You are doing well, Bran.† â€Å"I want to go faster,† Bran replied. Robb smiled. â€Å"As you will.† He sent his gelding into a trot. The wolves raced after him. Bran snapped the reins sharply, and Dancer picked up her pace. He heard a shout from Theon Greyjoy, and the hoofbeats of the other horses behind him. Bran's cloak billowed out, rippling in the wind, and the snow seemed to rush at his face. Robb was well ahead, glancing back over his shoulder from time to time to make sure Bran and the others were following. He snapped the reins again. Smooth as silk, Dancer slid into a gallop. The distance closed. By the time he caught Robb on the edge of the wolfswood, two miles beyond the winter town, they had left the others well behind. â€Å"I can ride!† Bran shouted, grinning. It felt almost as good as flying. â€Å"I'd race you, but I fear you'd win.† Robb's tone was light and joking, yet Bran could tell that something was troubling his brother underneath the smile. â€Å"I don't want to race.† Bran looked around for the direwolves. Both had vanished into the wood. â€Å"Did you hear Summer howling last night?† â€Å"Grey Wind was restless too,† Robb said. His auburn hair had grown shaggy and unkempt, and a reddish stubble covered his jaw, making him look older than his fifteen years. â€Å"Sometimes I think they know things . . . sense things . . . † Robb sighed. â€Å"I never know how much to tell you, Bran. I wish you were older.† â€Å"I'm eight now!† Bran said. â€Å"Eight isn't so much younger than fifteen, and I'm the heir to Winterfell, after you.† â€Å"So you are.† Robb sounded sad, and even a little scared. â€Å"Bran, I need to tell you something. There was a bird last night. From King's Landing. Maester Luwin woke me.† Bran felt a sudden dread. Dark wings, dark words, Old Nan always said, and of late the messenger ravens had been proving the truth of the proverb. When Robb wrote to the Lord Commander of the Night's Watch, the bird that came back brought word that Uncle Benjen was still missing. Then a message had arrived from the Eyrie, from Mother, but that had not been good news either. She did not say when she meant to return, only that she had taken the Imp as prisoner. Bran had sort of liked the little man, yet the name Lannister sent cold fingers creeping up his spine. There was something about the Lannisters, something he ought to remember, but when he tried to think what, he felt dizzy and his stomach clenched hard as a stone. Robb spent most of that day locked behind closed doors with Maester Luwin, Theon Greyjoy, and Hallis Mollen. Afterward, riders were sent out on fast horses, carrying Robb's commands throughout the north. Bran heard talk of Moat Cailin, the ancient stronghold the First Men had built at the top of the Neck. No one ever told him what was happening, yet he knew it was not good. And now another raven, another message. Bran clung to hope. â€Å"Was the bird from Mother? Is she coming home?† â€Å"The message was from Alyn in King's Landing. Jory Cassel is dead. And Wyl and Heward as well. Murdered by the Kingslayer.† Robb lifted his face to the snow, and the flakes melted on his cheeks. â€Å"May the gods give them rest.† Bran did not know what to say. He felt as if he'd been punched. Jory had been captain of the household guard at Winterfell since before Bran was born. â€Å"They killed Jory?† He remembered all the times Jory had chased him over the roofs. He could picture him striding across the yard in mail and plate, or sitting at his accustomed place on the bench in the Great Hall, joking as he ate. â€Å"Why would anyone kill Jory?† Robb shook his head numbly, the pain plain in his eyes. â€Å"I don't know, and . . . Bran, that's not the worst of it. Father was caught beneath a falling horse in the fight. Alyn says his leg was shattered, and . . . Maester Pycelle has given him the milk of the poppy, but they aren't sure when . . . when he . . .† The sound of hoofbeats made him glance down the road, to where Theon and the others were coming up. â€Å"When he will wake,† Robb finished. He laid his hand on the pommel of his sword then, and went on in the solemn voice of Robb the Lord. â€Å"Bran, I promise you, whatever might happen, I will not let this be forgotten.† Something in his tone made Bran even more fearful. â€Å"What will you do?† he asked as Theon Greyjoy reined in beside them. â€Å"Theon thinks I should call the banners,† Robb said. â€Å"Blood for blood.† For once Greyjoy did not smile. His lean, dark face had a hungry look to it, and black hair fell down across his eyes. â€Å"Only the lord can call the banners,† Bran said as the snow drifted down around them. â€Å"If your father dies,† Theon said, â€Å"Robb will be Lord of Winterfell.† â€Å"He won't die!† Bran screamed at him. Robb took his hand. â€Å"He won't die, not Father,† he said calmly. â€Å"Still . . . the honor of the north is in my hands now. When our lord father took his leave of us, he told me to be strong for you and for Rickon. I'm almost a man grown, Bran.† Bran shivered. â€Å"I wish Mother was back,† he said miserably. He looked around for Maester Luwin; his donkey was visible in the far distance, trotting over a rise. â€Å"Does Maester Luwin say to call the banners too?† â€Å"The maester is timid as an old woman,† said Theon. â€Å"Father always listened to his counsel,† Bran reminded his brother. â€Å"Mother too.† â€Å"I listen to him,† Robb insisted. â€Å"I listen to everyone.† The joy Bran had felt at the ride was gone, melted away like the snowflakes on his face. Not so long ago, the thought of Robb calling the banners and riding off to war would have filled him with excitement, but now he felt only dread. â€Å"Can we go back now?† he asked. â€Å"I'm cold.† Robb glanced around. â€Å"We need to find the wolves. Can you stand to go a bit longer?† â€Å"I can go as long as you can.† Maester Luwin had warned him to keep the ride short, for fear of saddle sores, but Bran would not admit to weakness in front of his brother. He was sick of the way everyone was always fussing over him and asking how he was. â€Å"Let's hunt down the hunters, then,† Robb said. Side by side, they urged their mounts off the kingsroad and struck out into the wolfswood. Theon dropped back and followed well behind them, talking and joking with the guardsmen. It was nice under the trees. Bran kept Dancer to a walk, holding the reins lightly and looking all around him as they went. He knew this wood, but he had been so long confined to Winterfell that he felt as though he were seeing it for the first time. The smells filled his nostrils; the sharp fresh tang of pine needles, the earthy odor of wet rotting leaves, the hints of animal musk and distant cooking fires. He caught a glimpse of a black squirrel moving through the snow-covered branches of an oak, and paused to study the silvery web of an empress spider. Theon and the others fell farther and farther behind, until Bran could no longer hear their voices. From ahead came the faint sound of rushing waters. It grew louder until they reached the stream. Tears stung his eyes. â€Å"Bran?† Robb asked. â€Å"What's wrong?† Bran shook his head. â€Å"I was just remembering,† he said. â€Å"Jory brought us here once, to fish for trout. You and me and Jon. Do you remember?† â€Å"I remember,† Robb said, his voice quiet and sad. â€Å"I didn't catch anything,† Bran said, â€Å"but Jon gave me his fish on the way back to Winterfell. Will we ever see Jon again?† â€Å"We saw Uncle Benjen when the king came to visit,† Robb pointed out. â€Å"Jon will visit too, you'll see.† The stream was running high and fast. Robb dismounted and led his gelding across the ford. In the deepest part of the crossing, the water came up to midthigh. He tied his horse to a tree on the far side, and waded back across for Bran and Dancer. The current foamed around rock and root, and Bran could feel the spray on his face as Robb led him over. It made him smile. For a moment he felt strong again, and whole. He looked up at the trees and dreamed of climbing them, right up to the very top, with the whole forest spread out beneath him. They were on the far side when they heard the howl, a long rising wail that moved through the trees like a cold wind. Bran raised his head to listen. â€Å"Summer,† he said. No sooner had he spoken than a second voice joined the first. â€Å"They've made a kill,† Robb said as he remounted. â€Å"I'd best go and bring them back. Wait here, Theon and the others should be along shortly.† â€Å"I want to go with you,† Bran said. â€Å"I'll find them faster by myself.† Robb spurred his gelding and vanished into the trees. Once he was gone, the woods seemed to close in around Bran. The snow was falling more heavily now. Where it touched the ground it melted, but all about him rock and root and branch wore a thin blanket of white. As he waited, he was conscious of how uncomfortable he felt. He could not feel his legs, hanging useless in the stirrups, but the strap around his chest was tight and chafing, and the melting snow had soaked through his gloves to chill his hands. He wondered what was keeping Theon and Maester Luwin and Joseth and the rest. When he heard the rustle of leaves, Bran used the reins to make Dancer turn, expecting to see his friends, but the ragged men who stepped out onto the bank of the stream were strangers. â€Å"Good day to you,† he said nervously. One look, and Bran knew they were neither foresters nor farmers. He was suddenly conscious of how richly he was dressed. His surcoat was new, dark grey wool with silver buttons, and a heavy silver pin fastened his fur-trimmed cloak at the shoulders. His boots and gloves were lined with fur as well. â€Å"All alone, are you?† said the biggest of them, a bald man with a raw windburnt face. â€Å"Lost in the wolfswood, poor lad.† â€Å"I'm not lost.† Bran did not like the way the strangers were looking at him. He counted four, but when he turned his head, he saw two others behind him. â€Å"My brother rode off just a moment ago, and my guard will be here shortly.† â€Å"Your guard, is it?† a second man said. Grey stubble covered his gaunt face. â€Å"And what would they be guarding, my little lord? Is that a silver pin I see there on your cloak?† â€Å"Pretty,† said a woman's voice. She scarcely looked like a woman; tall and lean, with the same hard face as the others, her hair hidden beneath a bowl-shaped halfhelm. The spear she held was eight feet of black oak, tipped in rusted steel. â€Å"Let's have a look,† said the big bald man. Bran watched him anxiously. The man's clothes were filthy, fallen almost to pieces, patched here with brown and here with blue and there with a dark green, and faded everywhere to grey, but once that cloak might have been black. The grey stubbly man wore black rags too, he saw with a sudden start. Suddenly Bran remembered the oathbreaker his father had beheaded, the day they had found the wolf pups; that man had worn black as well, and Father said he had been a deserter from the Night's Watch. No man is more dangerous, he remembered Lord Eddard saying. The deserter knows his life is forfeit if he is taken, so he will not flinch from any crime, no matter how vile or cruel. â€Å"The pin, lad,† the big man said. He held out his hand. â€Å"We'll take the horse too,† said another of them, a woman shorter than Robb, with a broad fiat face and lank yellow hair. â€Å"Get down, and be quick about it.† A knife slid from her sleeve into her hand, its edge jagged as a saw. â€Å"No,† Bran blurted. â€Å"I can't . . . â€Å" The big man grabbed his reins before Bran could think to wheel Dancer around and gallop off. â€Å"You can, lordling . . . and will, if you know what's good for you.† â€Å"Stiv, look how he's strapped on.† The tall woman pointed with her spear. â€Å"Might be it's the truth he's telling.† â€Å"Straps, is it?† Stiv said. He drew a dagger from a sheath at his belt. â€Å"There's ways to deal with straps.† â€Å"You some kind of cripple?† asked the short woman. Bran flared. â€Å"I'm Brandon Stark of Winterfell, and you better let go of my horse, or I'll see you all dead.† The gaunt man with the grey stubbled face laughed. â€Å"The boy's a Stark, true enough. Only a Stark would be fool enough to threaten where smarter men would beg.† â€Å"Cut his little cock off and stuff it in his mouth,† suggested the short woman. â€Å"That should shut him up.† â€Å"You're as stupid as you are ugly, Hali,† said the tall woman. â€Å"The boy's worth nothing dead, but alive . . . gods be damned, think what Mance would give to have Benjen Stark's own blood to hostage!† â€Å"Mance be damned,† the big man cursed. â€Å"You want to go back there, Osha? More fool you. Think the white walkers will care if you have a hostage?† He turned back to Bran and slashed at the strap around his thigh. The leather parted with a sigh. The stroke had been quick and careless, biting deep. Looking down, Bran glimpsed pale flesh where the wool of his leggings had parted. Then the blood began to flow. He watched the red stain spread, feeling light-headed, curiously apart; there had been no pain, not even a hint of feeling. The big man grunted in surprise. â€Å"Put down your steel now, and I promise you shall have a quick and painless death,† Robb called out. Bran looked up in desperate hope, and there he was. The strength of the words were undercut by the way his voice cracked with strain. He was mounted, the bloody carcass of an elk slung across the back of his horse, his sword in a gloved hand. â€Å"The brother,† said the man with the grey stubbly face. â€Å"He's a fierce one, he is,† mocked the short woman. Hali, they called her. â€Å"You mean to fight us, boy?† â€Å"Don't be a fool, lad. You're one against six.† The tall woman, Osha, leveled her spear. â€Å"Off the horse, and throw down the sword. We'll thank you kindly for the mount and for the venison, and you and your brother can be on your way.† Robb whistled. They heard the faint sound of soft feet on wet leaves. The undergrowth parted, low-hanging branches giving up their accumulation of snow, and Grey Wind and Summer emerged from the green. Summer sniffed the air and growled. â€Å"Wolves,† gasped Hali. â€Å"Direwolves,† Bran said. Still half-grown, they were as large as any wolf he had ever seen, but the differences were easy to spot, if you knew what to look for. Maester Luwin and Farlen the kennelmaster had taught him. A direwolf had a bigger head and longer legs in proportion to its body, and its snout and jaw were markedly leaner and more pronounced. There was something gaunt and terrible about them as they stood there amid the gently falling snow. Fresh blood spotted Grey Wind's muzzle. â€Å"Dogs,† the big bald man said contemptuously. â€Å"Yet I'm told there's nothing like a wolfskin cloak to warm a man by night.† He made a sharp gesture. â€Å"Take them.† Robb shouted, â€Å"Winterfell!† and kicked his horse. The gelding plunged down the bank as the ragged men closed. A man with an axe rushed in, shouting and heedless. Robb's sword caught him full in the face with a sickening crunch and a spray of bright blood. The man with the gaunt stubbly face made a grab for the reins, and for half a second he had them . . . and then Grey Wind was on him, bearing him down. He fell back into the stream with a splash and a shout, flailing wildly with his knife as his head went under. The direwolf plunged in after him, and the white water turned red where they had vanished. Robb and Osha matched blows in midstream. Her long spear was a steel-headed serpent, flashing out at his chest, once, twice, three times, but Robb parried every thrust with his longsword, turning the point aside. On the fourth or fifth thrust, the tall woman overextended herself and lost her balance, just for a second. Robb charged, riding her down. A few feet away, Summer darted in and snapped at Hali. The knife bit at his flank. Summer slid away, snarling, and came rushing in again. This time his jaws closed around her calf. Holding the knife with both hands, the small woman stabbed down, but the direwolf seemed to sense the blade coming. He pulled free for an instant, his mouth full of leather and cloth and bloody flesh. When Hali stumbled and fell, he came at her again, slamming her backward, teeth tearing at her belly. The sixth man ran from the carnage . . . but not far. As he went scrambling up the far side of the bank, Grey Wind emerged from the stream, dripping wet. He shook the water off and bounded after the running man, hamstringing him with a single snap of his teeth, and going for the throat as the screaming man slid back down toward the water. And then there was no one left but the big man, Stiv. He slashed at Bran's chest strap, grabbed his arm, and yanked. Suddenly Bran was falling. He sprawled on the ground, his legs tangled under him, one foot in the stream. He could not feel the cold of the water, but he felt the steel when Stiv pressed his dagger to his throat. â€Å"Back away,† the man warned, â€Å"or I'll open the boy's windpipe, I swear it.† Robb reined his horse in, breathing hard. The fury went out of his eyes, and his sword arm dropped. In that moment Bran saw everything. Summer was savaging Hali, pulling glistening blue snakes from her belly. Her eyes were wide and staring. Bran could not tell whether she was alive or dead. The grey stubbly man and the one with the axe lay unmoving, but Osha was on her knees, crawling toward her fallen spear. Grey Wind padded toward her, dripping wet. â€Å"Call him off!† the big man shouted. â€Å"Call them both off, or the cripple boy dies now!† â€Å"Grey Wind, Summer, to me,† Robb said. The direwolves stopped, turned their heads. Grey Wind loped back to Robb. Summer stayed where he was, his eyes on Bran and the man beside him. He growled. His muzzle was wet and red, but his eyes burned. Osha used the butt end of her spear to lever herself back to her feet. Blood leaked from a wound on the upper arm where Robb had cut her. Bran could see sweat trickling down the big man's face. Stiv was as scared as he was, he realized. â€Å"Starks,† the man muttered, â€Å"bloody Starks.† He raised his voice. â€Å"Osha, kill the wolves and get his sword.† â€Å"Kill them yourself,† she replied. â€Å"I'll not be getting near those monsters.† For a moment Stiv was at a loss. His hand trembled; Bran felt a trickle of blood where the knife pressed against his neck. The stench of the man filled his nose; he smelled of fear. â€Å"You,† he called out to Robb. â€Å"You have a name?† â€Å"I am Robb Stark, the heir to Winterfell.† â€Å"This is your brother?† â€Å"Yes.† â€Å"You want him alive, you do what I say. Off the horse.† Robb hesitated a moment. Then, slowly and deliberately, he dismounted and stood with his sword in hand. â€Å"Now kill the wolves.† Robb did not move. â€Å"You do it. The wolves or the boy.† â€Å"No!† Bran screamed. If Robb did as they asked, Stiv would kill them both anyway, once the direwolves were dead. The bald man took hold of his hair with his free hand and twisted it cruelly, till Bran sobbed in pain. â€Å"You shut your mouth, cripple, you hear me?† He twisted harder. â€Å"You hear me?† A low thrum came from the woods behind them. Stiv gave a choked gasp as a half foot of razor-tipped broadhead suddenly exploded out of his chest. The arrow was bright red, as if it had been painted in blood. The dagger fell away from Bran's throat. The big man swayed and collapsed, facedown in the stream. The arrow broke beneath him. Bran watched his life go swirling off in the water. Osha glanced around as Father's guardsmen appeared from beneath the trees, steel in hand. She threw down her spear. â€Å"Mercy, m'lord,† she called to Robb. The guardsmen had a strange, pale look to their faces as they took in the scene of slaughter. They eyed the wolves uncertainly, and when Summer returned to Hali's corpse to feed, Joseth dropped his knife and scrambled for the bush, heaving. Even Maester Luwin seemed shocked as he stepped from behind a tree, but only for an instant. Then he shook his head and waded across the stream to Bran's side. â€Å"Are you hurt?† â€Å"He cut my leg,† Bran said, â€Å"but I couldn't feel it.† As the maester knelt to examine the wound, Bran turned his head. Theon Greyjoy stood beside a sentinel tree, his bow in hand. He was smiling. Ever smiling. A half-dozen arrows were thrust into the soft ground at his feet, but it had taken only one. â€Å"A dead enemy is a thing of beauty,† he announced. â€Å"Jon always said you were an ass, Greyjoy,† Robb said loudly. â€Å"I ought to chain you up in the yard and let Bran take a few practice shots at you.† â€Å"You should be thanking me for saving your brother's life.† â€Å"What if you had missed the shot?† Robb said. â€Å"What if you'd only wounded him? What if you had made his hand jump, or hit Bran instead? For all you knew, the man might have been wearing a breastplate, all you could see was the back of his cloak. What would have happened to my brother then? Did you ever think of that, Greyjoy?† Theon's smile was gone. He gave a sullen shrug and began to pull his arrows from the ground, one by one. Robb glared at his guardsmen. â€Å"Where were you?† he demanded of them. â€Å"I was sure you were close behind us.† The men traded unhappy glances. â€Å"We were following, m'lord,† said Quent, the youngest of them, his beard a soft brown fuzz. â€Å"Only first we waited for Maester Luwin and his ass, begging your pardons, and then, well, as it were . . . † He glanced over at Theon and quickly looked away, abashed. â€Å"I spied a turkey,† Theon said, annoyed by the question. â€Å"How was I to know that you'd leave the boy alone?† Robb turned his head to look at Theon once more. Bran had never seen him so angry, yet he said nothing. Finally he knelt beside Maester Luwin. â€Å"How badly is my brother wounded?† â€Å"No more than a scratch,† the maester said. He wet a cloth in the stream to clean the cut. â€Å"Two of them wear the black,† he told Robb as he worked. Robb glanced over at where Stiv lay sprawled in the stream, his ragged black cloak moving fitfully as the rushing waters tugged at it. â€Å"Deserters from the Night's Watch,† he said grimly. â€Å"They must have been fools, to come so close to Winterfell.† â€Å"Folly and desperation are ofttimes hard to tell apart,† said Maester Luwin. â€Å"Shall we bury them, m'lord?† asked Quent. â€Å"They would not have buried us,† Robb said. â€Å"Hack off their heads, we'll send them back to the Wall. Leave the rest for the carrion crows.† â€Å"And this one?† Quent jerked a thumb toward Osha. Robb walked over to her. She was a head taller than he was, but she dropped to her knees at his approach. â€Å"Give me my life, m'lord of Stark, and I am yours.† â€Å"Mine? What would I do with an oathbreaker?† â€Å"I broke no oaths. Stiv and Wallen flew down off the Wall, not me. The black crows got no place for women.† Theon Greyjoy sauntered closer. â€Å"Give her to the wolves,† he urged Robb. The woman's eyes went to what was left of Hali, and just as quickly away. She shuddered. Even the guardsmen looked queasy. â€Å"She's a woman,† Robb said. â€Å"A wildling,† Bran told him. â€Å"She said they should keep me alive so they could take me to Mance Rayder.† â€Å"Do you have a name?† Robb asked her. â€Å"Osha, as it please the lord,† she muttered sourly. Maester Luwin stood. â€Å"We might do well to question her.† Bran could see the relief on his brother's face. â€Å"As you say, Maester. Wayn, bind her hands. She'll come back to Winterfell with us . . . and live or die by the truths she gives us.†

Friday, August 30, 2019

Opression of African Americans Essay

In the documentary Ethnic Notions directed by Marlon Riggs, illustrates the oppression African Americans have faced during the time of slavery up until the present day. The same forms of oppression blacks faced during slavery is the same type of oppression they faced today, decades after slavery was abolished. These forms of oppression still seen today are evidence that America has not made very little progress in eliminating the inequalities among the white and black Americans. The documentary uses different caricatures to portray African Americans in the wrong light. These characters were suppose to show the way black people looked, and behaved even though none of these characters actually depicted the way black people truly looked or acted. Even though the video focused manly on the way African Americans are perceived by society, it focused on an even bigger issue; the main point of the documentary was to provide evidence that African Americans were better off left in captivity during the times of slavery. Riggs begins the documentary by displaying the images of black caricatures that was introduced during the slavery time period, and explaining how those same caricatures have been seen around the world. Even today those same black caricatures can be seen in people homes, including in the homes of many African Americans. The people portrayed in these characters are all extremely dark with large lips, and very unappealing. Those cartoon caricatures do not in any shape or form bear a resemblance to what black people actually look like. All African Americans do not look exactly the same, but none of them are truly as dark as the caricatures and their lips are not as large and abnormally shaped as seen on the caricatures. Even though black people do not look like these cartoon characters, people still see those old images as a representation of all black people, as if they can not possibly see them looking any different, as if they were meant to look like anything else. The same concept of characterizing a single group of individuals can be observed in the video The Danger of a Single Story. In this video story teller Chimamanda Adichie discusses her experiences as a writer, who only wrote about British and white American people because that was all she knew. She was unaware of people that looked like existed her because she only ever read books about white people so that was all she knew. Then when she moved to America, she experienced the danger of a single story; before anyone got to know they already felt sorry for her and had expected her to act in a certain way. However they were surprised to learn that her life was nothing like the single story they heard about her and all other Africans. Unlike what they expected, Adichie did not live in poverty and she could read and write, and speak English. After arriving in America, Adichie began to really understand the meaning of the dangers of a single story. Instead of her getting angry, she was able to understand why they thought the way they did because just like them she too had developed a single story about a group of people. She understood that if people are only seeing the same images of a group of people over and over again, whether it’s through the media or my word of mouth that eventually that group of people will become what the media writes about them. After showing the images of black people, Riggs further explains the different roles of each of the caricatures. Some of these caricatures and images were during the time of slavery, while others were during the period when slavery had ended. The Mammy caricature was a mother who served the white people. She was portrayed as a fat, unattractive woman who loyally served her white master and his family. She did not complain and she appeared to always be happy, until she went home to her own family. In her own family she was viewed as the controller of males and one who angrily punished her children. The Mammy caricature was nothing like the real mammy, who was actually very pretty and attractive. She was only depicted as fat and ugly, so the she would not appear to be a threat to the white women; who at that time was the only females thought of as beautiful. Just like the Mammy caricature, the Uncle Tom caricature was also perceived as a person who enjoyed working for the white people. He was always seen smiling while playing with the white children, and so helpful to his master. The Mammy and Uncle Tom were never revealed as unhappy people, so people assumed that they were content with being slaves. The Mammy and Uncle Tom figures were not the only people that appeared to be enjoying slavery, but all other slaves seemed to be satisfied with it as well. The images that were being shown all showed the slaves singing and dancing, and smiling but none of those images showed the hardships that slaves faced. Only the positive images were shown to make the outside world believe slavery was okay, and that no harm could come from having slaves. One dance the slaves danced was called the Jim Crow, it was a dance symbolized the way African Americans felt about segregation. The dance was not meant to be any racist term, but yet when the white man came and imitated the dance was when Jim Crow term began a racist statement and when the Jim Crow character was created. A white man named Rice one day so a black man dancing, so he decided to mock this man’s dancing. So Rice put black paint on his face and white paint around his mouth, so he appeared to be a black man impersonating other black people. The use of black paint became known as black face. Black face became the most popular form of entertainment for people to watch. People thought it was funny to watch a white man pretend to be black. Black face became so popular that even black men started participating in black face entertainment. These black men would put black paint on their face even though their faces were already dark, and prance around the stage mimicking their own people. They used black face as a way to make a little extra money since they were not getting enough from the white people. It was not until after slavery ended that these cartoon caricatures started to represent bad images of black people. No longer did the images show slaves as happy people, but instead it depicted African Americans as angry, violent people. Those images were used to conclude that black people were actually better off as slaves, instead of free people. The Pickaninny caricature was a representation of the black children. These kids appeared to be savage like by showing them with no shoes on, and the children were eating by alligators. When people saw these images of the children thought the children were like animals that belonged in the jungle, instead of a part of society. Then there was the Brutal Black Buck caricature that made black people become indentified as brutes. These brutes were savage people who could use any sort of violence to get what they wanted all of people. When different movies were being created, it showed black man looking for a white woman, who was a virgin to raped and abuse. When people kept seeing images like that they started to believe that black people were angry savages; savages not meant to fit in with the rest of society. All of these different caricatures were a representation of all black people. Even though these caricatures were nothing like black people, the rest of society believed these caricatures were an accurate representation of black people. They expected all people of color to act the way those cartoon caricatures did. When people see the happy caricatures that existed during slavery, then to watch the brutal caricatures after slavery ended, they begin to wonder if the abolishment of slavery was really necessary. They start to assume African Americans were the happiest during slavery, so why not resort back to that old tradition.

Thursday, August 29, 2019

What are the health implications of binge drinking for younger people Essay

What are the health implications of binge drinking for younger people aged 15-25 - Essay Example According to the UK Prime Minister’s Strategy Unit evidence, patterns of binge drinking have lead to an increased toll of 22,000 premature deaths costing the country  £20 billion a year; health problems; alcohol related disorders and injuries. Alcohol related illness and injury costs the NHS up to  £1.7 billion annually. The Government’s Strategy Unit research also shows that alcohol related crime, assaults and disorders are incurring a further cost of  £7.3 billion annually (BBC News, online: http://news.bbc.co.uk/1/hi/health/3121440.stm). From these facts and figures from the Government’s Strategy Unit, it is apparent that a study on binge drinking is worthwhile. â€Å"The report also points out that up to 40% of mens drinking sessions now technically qualifies as binge drinking as defined by the Governments sensible drinking guidelines. That means men drinking in excess of the equivalent of four pints of beer (three for women) or eight measures of spirits (six for women) often in short periods of time. Over a typical Saturday night out one can see them drinking three or four times the recommended guidelines. The consequences of drinking will differ from individual to individual and many people understand bingeing to mean deliberately drinking to excess. But on the other hand, this evidence suggests that many may be causing themselves potentially serious harm† (Prime Minister’s Strategy Unit, online: http://www.cabinetoffice.gov.uk/strategy/news/press_releases/2003/030919.asp). In this dissertation, the researcher will specifically look into the health implications of this phenomenon for young binge drinkers. As I will become a staff nurse in about eight months, I may come across young adults who have intoxicated themselves with alcohol and may end up in Accident and Emergency or worse on a liver ward as a result of sustained damage to their liver as a result of excessive binge drinking.

Wednesday, August 28, 2019

Organizational Structure Term Paper Example | Topics and Well Written Essays - 1250 words

Organizational Structure - Term Paper Example Therefore, top managements give particular importance to their organizational structures while planning and implementing business strategies. This paper will analyze the organizational structure of Toyota Motor Corporation (TMC) with specific attention given to its organizational functions and organizational design. Toyota: Organizational Structure Toyota has a unique organizational structure that has assisted the company to dominate the automobile industry throughout its corporate life. As Borowski (2010) points out, the General Meeting of Shareholders is the governing body of Toyota and the shareholders have a voting right in the General Meeting if they hold a minimum amount of shares. Toyota’s executive body is its Board of directors consisting of 26 members. The company’s Board of Directors comprises of the chairman, the vice chairman, the president, 8 executive vice presidents, 13 senior managing directors, an honorary chairman, and a senior advisor. In addition, t here are four committees that belong to the director board, including the Labor-Management Council, the Corporate Philanthropy Committee, the Stock Option Committee, and the Toyota Environmental Committee. The Toyota headquarters manages and coordinates 229 divisions (pp.3-4). Market analysts indicate that Toyota’s organizational structure greatly assists the company to facilitate effective strategic implementation. Referring to the views of Moore (2011), long term-thinking is central to the company’s organizational philosophy. The company management promotes the long-term thinking sometimes even at the expense of short-term financial gains. The author opines that this strategy has significantly benefited the organization to make potential management decisions and to enhance organizational learning (pp.141-143). Toyota’s strong organizational structure aided the company to earn $16.7 billion in profits and 6% sales growth in 2009 in spite of global financial cri sis 2008-09 that had severely hit the global automaking industry. Recently, the TMC has announced some noticeable changes to its organizational structure. As Bloomberg (March 6, 2011) reports, appointment of outside board members is one of the major changes declared by the company. Business unit organization is another change announced. Through this structural change, the company’s automotive business will be split into four distinct units namely Lexus International, Toyota No. 1, Toyota No. 2, and Unit Center. The company believes that this change would well define operations and earning responsibility and would fasten decision making. The TMC has also announced the reorganization of region groups in order to improve its products and services in growing markets. While comparing the organizational structure of General Motors to that of TMC, it seems that GM’s organizational structure is very weak and this issue ended up in the bankruptcy of the GM, the world’s s econd largest automaker. The company delivers its products and services through the seven divisions including Buick, Chevrolet, Cadillac, GMC, Opel, Holden, and Vauxhall. It is identified that the company’s operations are not well coordinated and there is no proper communication mechanism to facilitate up and down information flow across various management levels. As a result of a weaker organizational structure, the GM failed to address operational flaws in a timely

Tuesday, August 27, 2019

Are International institutions effective in solving collective Research Paper

Are International institutions effective in solving collective Problems Case study of Treaty on the Non-Proliferation of Nuclear Weapons and North Korea's Nuclear crisis - Research Paper Example A plan offered by the United States in 1946 also proposed that all nuclear arms and technology come under international control and ownership. However, the post World War efforts did not seem to work out too well and it was later on that countries started to pledge allegiance to the NPT (Non Proliferation Treaty) which kicked off in 1968 and became effective in 1970. A list of around 190 countries are signatory to the treaty. The NPT rests on the premise that the non-nuclear nations would agree to never pursue any sort of acquisition of nuclear arsenal whereas the nuclear weapon state would share the benefits of it with the non-nuclear states. The treaty is reviewed for changes every 5 years and as of now, stands as being extended till an indefinite period. North Korea had the USSR as its strongest communist ally at the time of the cold war. When the cold war came to a close, Soviet Russia had weakened substantially. North Korea, that looked upon it as a security guarantee began to think that now it should itself do something to curb the situation. Therefore, in 1989 the United States, through its intelligence network, found that North Korea which had signed the NPT is in the early stages of building an atomic bomb. In 1992 North Korea allowed a team from the IAEA (International Atomic Energy Commission) to undertake visitors to its nuclear facilities. The inspections seemed to not go as expected and North Korea had blocked the commission from visiting some of its facilities. In 1994 an â€Å"Agreed Framework† was reached between America and North Korea that stated that N. Korea would abandon its nuclear program and the U.S. would provide oil for electricity and better economic ties would be maintained .Also, the atomic plants w ould be replaced with light water nuclear power plants .However, the routine inspections would continue by the IAEA, However in late 2002, George Bush

Monday, August 26, 2019

Emergence of China as a Global Trading Power Essay

Emergence of China as a Global Trading Power - Essay Example When the latest economical growth and development of new emerging countries is discussed, two countries' names emerge from nowhere. These are India and China. The growth in the trade sector of these two countries is surprisingly enormous. If this is partly due to development in the area of science and technology, there is much also that goes for a number of reforms, changes, and redefinition of trade policies and international trade relations. Moreover, there is much on the credit of Chinese distinctive cultural and management practices which makes this country a unique case study (Menkhoff and Gerke, pp. 87-89, 2002). The present paper looks at the issue of the development of China in the business world of the recent times; China is "likely to demand a strong voice in the WTO" due to its major role in present day trade operations (Kennedy, p. 75, 2002). The paper, hence, undertakes extensive research to investigate the causes for the development of China in trade regimes. The paper explicitly brings forward the number of theories of trade which have anyhow any link to the present growth of China in worldwide trade. At the end of the paper, the study analyses the data qualitatively and makes suggestions and recommendation in the light of the causes of trade growth of China. These suggestions and recommendations are meant to contribute to the existing literature of trade theories and development; as well as, they focus to contribute to a broader understanding of Chinese growth. They are also meant to focus those countries which may need to follow China for the economical growth. Trade Theories Reviewed A number of theorists have worked out different theories of trade to cope up with the challenges of trade. These theorists have asked such questions as can help trade to be more profitable, more expedited, more powerful, and so on. This section reviews major trade theories in order to bear a groundwork which is, according to the viewpoint of the present writer, necessary to comprehend China's growth in the recent scenario of trade. Classical economist seem to have defended the Mercantilists' view that the export of a country should be put to as much increase as possible; on the other hand, the imports of that country should be put to as much decrease as possible. According to Grimwade (2000), it was obviously possible only for one country because "one country's export surplus is another country's import deficit" which makes import and export both a requisite function of across-border trade (p. 30). Another objection was made to Mercantilism was that dumping large reserves of gold does not make a country wealthier because gold does not provide the citizens for "goods which could satisfy their wants" (p. 30). Thus, this trend met a death due to its zero-sum philosophy of trade. Next is the comparative advantage. According to this theory (by Smith), differences in costs as the bases for business are identified. To this Grimwade

Sunday, August 25, 2019

MGT302 - Org. Behavior and Teamwork CA Essay Example | Topics and Well Written Essays - 750 words - 1

MGT302 - Org. Behavior and Teamwork CA - Essay Example Unfortunately, it takes a certain mix of educated thought processes and considerations to be able to make the best decision that would apply to a given situation. The article entitled, â€Å"Herb’s Concoction (and Martha’s Dilemma): The Case of the Deadly Fertilizer,† Customer Affairs Department personnel Martha Wang needs to decide on how to handle information from a customer complaint claiming that the best-selling product of their company, Herb’s Garden, allegedly caused the death of the customer’s animal. Thus, Martha needs to make what is called a non-programmed decision. Non-programmed decisions are so unique and important that they require conscious thinking, information gathering, and careful consideration of alternatives. This is in contrast with programmed decisions which occur frequently enough that one already develops an automated response to them. . Martha faces quite a dilemma in this case. First, she herself has had a previous experience that is similar to the issue being raised by the customer. However, when she addressed this issue to upper management, it was simply dismissed as being a case of an overreacting customer. Furthermore, the company’s owner personally requested Martha to take care of the situation. in such a crucial situation, individuals may be overwhelmed by the pressure that they face. Therefore, Martha must carefully analyze the situation and weigh all alternatives to come up with the best option. Furthermore, in turning decision making into a more manageable affair, Bauer and Erdogan (2005) suggest that one asks the following questions: For Martha, the necessary first step would be to do some background research. She could try to look into the company’s history in terms of customer feedback, especially concerning the particular product which is Herb’s Special Fertilizer Mix. If she feels that there is indeed sufficient customer complaints similar to the one brought up by the client that

Saturday, August 24, 2019

The Objective Validity of Certain Moral Values Essay

The Objective Validity of Certain Moral Values - Essay Example A woman, for instance, has right not to be raped. She is the owner of her body, this is the most intimate item that any person can own, and to suffer sexual assaults or violations is reprehensible. Some have argued, based on different cultural values, that a husband ought to be able to rape his wife. A legal arrangement, however, is no moral basis for overcoming the moral right that a woman has to protect her own body from unwanted actions. This situation can be contrasted with certain types of justifiable homicide; to be sure, there are situations where the killing of another human being may be justified in terms of self-defense. There is no such competing moral value, such as the self-preservation of one's life, in the case of rape. It is wrong in all instances. It is objectively wrong because the right to control the sexual use of one's body is a predominant moral right, and any moral standard prohibiting the rape of a woman is objectively valid in all situations. Moreover, there are certain ethnic rights which deserve protection in all situations. An ethnic group, for example, has a moral right not to be targeted for genocide. This is to be distinguished from conflicts or wars in which armed combat results in death.

Friday, August 23, 2019

Research paper on mapreduce Example | Topics and Well Written Essays - 750 words

On mapreduce - Research Paper Example Reduce collects relevant parts from the locations where the map function occurred and return the result to HDFS. IBM defines MapReduce based on its association with Hadoop (IBM 1). The company affirms that MapReduce denotes two distinct roles performed by Hadoop programs. The initial role pertains to map job. It engages data and changes it into another set by breaking down individual aspects into value pairs (IBM 1). Reduce job engages the output generated by a map and engages it to produces smaller value pairs. Based on IBM definition, it is clear that MapReduce is a popular programming technology that allows the use of many computers in order to process huge amount of data. It helps in coordinating tasks in order to avoid issues such as input problems and harmonization delays. One can perform various tasks such as data mining and graph processing using this concept. The concept is popular in industries and conducting complex researches. An example of commonly use MapReduce implementations is Hadoop. Vianna, Almeida & Kuno (1) further define Map Reduce based on its sorting process. The authors indicate that when one has many sets of records and he needs to sort or process them in a specific order, he may use MapReduce. MapReduce is an invention that allows an individual to use Mappers that have sorting keys that dive the data set based on the values associated with them. Vianna, Almeida & Kuno (1) further define MapReduce as a process involving the combination all the sorted data. This concept is usually applied in data analysis. The authors provide an example of MapReduce as used in data filtering. They indicate that when one has sets of records that require arrangements to ensure they meet a certain condition, he can filter them using MapReduce. For instance, one can filter the records using Mappers which produce transformed versions of the

Is the green movement sincere or just a popular fad Essay

Is the green movement sincere or just a popular fad - Essay Example They do not have any positive impact to the movement. Consumers and environmentalist have difficulties in differentiating retailers who are sincere in environmental matters and those who are acting in pretence. There seem to be a number of people who are not genuine in the green movement. This leaves one with the question whether green has to be accompanied with pretence. However, insecurity has been sighted as the major reason of pretentiousness in the green movement. He said that people get pretentious to hide their insecurities. For example, if one doubts their own greenness, then it is obvious that others are conscious about their effort in making the environment green (Miller, 2010). Another thing that makes the green movement a fad is the fact that people are out to looking good without doing anything constructive. They instead embark on criticizing effort of other people who are working towards a green environment. They want to cover their insensitive lifestyles so that they cannot be questioned. This can be said to be an intimidating the intellectuals. Going green is a very important innovation to the environment. However, it got some elements of fad that need to be eliminated for it to be successful. The first is that people should stop labelling. Instead of going around telling people that they are environmentalist; let their actions tell of it. The second one is to be confident about the environment. Understanding the importance of a healthy environment will enable people to be confident of the environment (Miller, 2010).The third is to remove from our minds the notion that one can go green only by buying something. On the contrary, going green can be achieved in many other ways other than purchasing products. Last but not least, one should consider himself as part of the solution. This ensures that every person feels responsible and accountable for what happens to our environment. This is regardless of our gender, religion,

Thursday, August 22, 2019

The Issues Concerning Identity Theft Essay Example for Free

The Issues Concerning Identity Theft Essay Abstract â€Å"Identity theft has been around since the Internet became more than just the stuff of science fiction. The benefits of being in the Network has been undisputed but it has its drawbacks especially recently†. The increasing sophistication of hacking technology and the ever-widening use of web-based communication have made the danger of identity theft loom even larger in the horizon. Recent statistics illustrate just how serious the situation is with cyber criminals increasingly focusing on small companies and individuals, who are considered soft targets. Countermeasures are fighting a losing battle and experts state that individual vigilance is the only really effective way of stemming the flood. Introduction There was a movie in 1992 starring Robert Redford and Ben Kingsley, called â€Å"Sneakers.† They played the parts of college computer geeks who managed to hack into a government computer system as a sort of teenage prank and got caught. Later in the movie, the character of Ben Kingsley becomes a high-powered high-tech executive determined to rule the world with the use of information technology that could hack into any system in the world. At the time of the movie, such scenarios were the stuff of science fiction, but that is precisely the situation today. The dependence on cyber infrastructure has become so ingrained into everyday life that vulnerability to attacks takes on new dimensions. The consequences of this vulnerability are far-reaching, as indeed information has become the new currency in this fast-paced, Web-based world. But ensuring the security of digital information is fraught with difficulty, as hackers and programmers are coming up with smarter and more destructive ways to wreak havoc with both public and private networks. One type of malware that illustrates the increasing sophistication of malicious code uses a JavaScript tool called NeoSploit. It can attack a system using seven distinct exploits that could be customized depending on the specific weakness of the system it is currently attacking. It is double obfuscated so that it easily evades most automated detection. It is a â€Å"smart† bug and adaptable as well. [33] The concept of identity theft is not new. Anybody with a computer and access to the Internet have been warned never to reveal personal information to unverified sources and to keep avoid financial transactions online unless the site is vouched for a by a reliable verification site. But identity theft is so much more, and recently, there has been a disturbing rise in incidents of identity theft beginning in 2004. The threat to networks has become more complex, as illustrated by the distributed denial-of-service attacks in 2000 and the 2001 CodeRed worm. [30] The cost to consumers and businesses of identity theft is significant. According to the Federal Trade Commission, it has been maintained at more than $50 billion in the US alone. [18] Such occurrences are not only occurring in the US, however. In South Africa, Standard Bank local and foreign clients were choused out of thousands of rands by a Trojan installed in public internet cafà ©s which captured bank information. In France, a 2005 report described how terrorists routinely used stolen identities forged onto false identity documents. [26] The effect of such security breakdowns on e-commerce is particularly horrendous. Such enterprises rely on the trust and confidence of their clients that their confidence will be secure during online transactions. It only takes one instance of invasion for clients to shy away from doing further business. This paper investigates the issues pertaining to the technology behind identity theft, the countermeasures being enacted to prevent it and the current unresolved problems. Requirement Analysis To more fully appreciate the problem, a definition of identity theft may be in order. Identity theft was first coined as part of the Identity Theft and Assumption Deterrence Act of 1998, better known as ID Theft Act. It is defined as a criminal act to: â€Å" †¦knowingly transfer or use, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law.†[1] Because of the increasing sophistication of ID theft techniques, the US Federal Trade Commission felt it incumbent to provide more specific definitions of what constitutes an â€Å"identity† or â€Å"identifying information†, to wit: â€Å"(a) The term ‘identity theft’ means a fraud committed or attempted using the identifying information of another person without lawful authority. (b) The term ‘identifying information’ means any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual, including any (1) Name, Social Security number, date of birth, official state- or government-issued driver’s license or identification number, alien registration number, government passport number, employer or taxpayer identification number. (2) Unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation. (3) Unique electronic identification number, address, or routing code. (4) Telecommunication identifying information or access device.†[1] Looking at what comprises identity, it seems highly possible that at one point any one using the Internet or a private network will disclose one or more of the data above on a daily basis because it is almost impossible to go through a typical day without at least once using a network application such as an ATM machine or logging on to an e-mail service. Going to a hospital or school and it is highly likely an RFID is required in some form, whether as a school ID or a medical card. Schools are especially vulnerable to attack because security is not particularly high on the list of priorities for school districts working with a budget. The benefits that accrue from digital technology in the school setting is massive, but there has been no corresponding enthusiasm for establishing even the most basic of security measures. The fact is, cases such as the schools in California and Florida in which students themselves hack into the unsecured database for a prank or for profit, or the Ohio student who accidentally deleted student records which had not been backed up, are not unusual. Some of the most iconic movies are about tech savvy students who pull a fast one on uptight school administrators or against terrorists. However, in real life, security breaches for academic and medical records of students are carry consequences just as serious as those for government and corporate information. [43] It is not surprising that with the rapid digitization of information databases in all sectors, there are more and more incidents reported of some type of invasion. In 200 Techniques used in Identity Theft Physical methods computer and backup theft direct access to information dumpster diving, or searching trash theft of a purse or wallet mail theft and interception shoulder surfing skimming dishonest or mistreated employees telemarketing and fake telephone calls Internet-based methods hacking and unauthorized access phishing, or the use of spam and mirror sites pharming, or interception between an IP address and the target server. redirectors advance-fee fraud or 419 fraud fake IRS form keylogging and password stealing There has been such emphasis on Internet-related security breaches that the fact escapes most people that identity theft can happen physically as well as over the Ethernet. According to the Identity Theft Resource Center, there were more than 300 breaches in security in companies involving the loss of data storage tapes that contained the information of more than 20 million people in 2006. However, cyber-crimes is much harder to prevent because it can be done off-site and insiduously. It is also harder to detect because often the theft is done in small batches. Source: http://www.eset.eu/press_release_threats_march McAfee Avert Labs recently released a report called â€Å"Identity Theft† that identified keylogging, malware that keeps track of keystrokes to capture passwords and other sensitive information, as the tool being increasingly used to perpetrate identity theft. The report also tracked the occurrence of phishing attacks which increased 250% from January 2004 to May 2006. [26] In March 2007, ESET reported that the top malware threat was the Trojan keylogging malware called   Win32/PSW.Agent.NCC, followed by Win32/Netsky.Q or simply Netsky P, which has the power to replicate and to spread itself as an attachment through e-mail. In third place is Trojan Win32/TrojanDowloader.Agent.AWF which is used to download malware that creates botnets that in turn creates spam and disruption-of-service attacks. [4] The use of Internet Relay Chat (IRC) bots, a string of codes or independent program that attaches to the IRC channel of a system and appears to be just another user, by hackers has been developed to be transmitted through IM, mass mailing and peer-to-peer communication. While useful for managing channels, maintaining access lists, and providing access to databases, it has become dangerous in the hands of malicious users, who activate the bots to infect and reside in systems with a view of passing on confidential and sensitive information. It is difficult to detect and to clean because the bot is configured to disable anti-virus software and firewalls. Moreover, bots can edit registry entries to hide its presence. [44] Avenues used for Identity Theft Credit Card Fraud Individuals find themselves victims of credit card fraud when they transact with smaller merchants online merchants that utilize generic shopping cart software and failing to keep up with the latest software security patches. Web-based vulnerabilities, which provide cyber-criminals the soft patches in which to invade and infiltrate, is found in many different Web-based applications because of the failure to be vigilant. One example is that of Cellhut.com which uses third party Website security provider Hackersafe which is supposed to have passedthe FBI/SANS Internet Security Test. But experts are circumspect regarding the effectiveness of these tests as evidenced by the number of reports of fraud, which is actually only a part of the actual number of cases that actually occur. Small online companies are not required to report all incidents, making statistical data difficult to gather. [17] E-mail as a gateway In 2003, the number of spam or jank mail outstripped the number of legitimate e-mail in corporate America, indicating an unrelenting onslaught on computer defenses. Malicious code such as SoBig, Mimail, and Yaha, which wreaked havoc on personal computers and servers alike,   was disseminated through e-mail. As a reaction, companies allocated 8.2% of corporate budgets were earmarked for cyber-security but the economic lure for hackers have made them more inventive and devious as well. Phishing, the art of deceiving unwary users with cleverly disguised e-mail, has become the fastest-growing non-violent crimes against banks. One sneaky example was that of Swen, an e-mail virus that masquerades as a Microsoft security fix, complete to the last detail so that it looks authentic. The unwary unleashes the virus in the system when the message is opened or previewed. It then breaks down firewalls and antivirus, leaving the system open to infiltration. Instant Messaging, Instant Invasion Instant Messaging or IM has also become popular of late because it is, well, instant. Many companies believe they have increased productivity significantly with the use of Yahoo Messenger, Skype, MSN Messenger and AOL Messenger. However, these may bring more than messages into the picture. IM allows users not only to exchange messages but to transfer files as well, which may have malware or a virus riding on it. It also provides backdoor access to hackers because IM bypasses firewalls and gateway perimeter scans. The peer-to-peer network is especially open to exploitation because of this bypass, and the worms spread rapidly, testing at 10 to 20 seconds in some tests. Some antivirus software that work on the desktop level have some success in catching these worms, but only in restricted cases. Another way for hackers to open a portal is to hijack the connection using a man-in-the-middle attack and impersonate the hijacked user. The hacker is then in a position of trust and may solicit information from the unsuspecting person on the other end. The use of a network sniffer could also steal information from an open portal during an instant messaging session, and a trojan is not even needed. This is especially dangerous in a corporate network. [37] Voice-over-Internet Protocol (VoIP) The use of VoIP has the potential security risk as that of most data streams. While it may seem to be much like a telephone service, the architecture for VoIP is not the same as the conventional telephone line, where security is more established and any interception will require a physical presence on the specific telephone wire or PBX. VoIP transmits the voice as a data stream, similar to that of any other web-based application, and is vulnerable to the same kind of invasion or interception. The defense against such invasion is through the same combination of firewalls, antivirus and   encryption. [23] Because VoIP is comparatively new, it is still in its early stages of development, and has not excited the same attention for identity thieves as other forms of data exchange, although there are some spyware the specifically targets VoIP. Cookies Cookies are normally written by a website into the computer’s harddisk to store personal data about the user relevant to the application which stores the text-only code. Flaws in the generation of the cookie identity has been identified by Security researcher Michal Zalewski as potentially vulnerable to hacker attack because the overwrite protection feature can easily be bypassed and allow malware to remotely plant user information on another persons computer that can be accessed remotely when the user visits specific websites. [35] Malware is more than just malicious in that it is motivated by economic gain rather than any kind of grudge or misdirected sense of humor. A more appropriate term for these economic-driven malicous software is spyware. Spyware is much more focused and quite destructive because it can reside in a system for weeks or even months before it is discovered. Aside from the fact that transmits confidential information to its creator, it also slows down computers if enough of them reside in the system, even disbling some applications from working at all. There is loss of productivity as well as information. Sometimes it is simply annoying, popping up as adware or altering the home page to redirect the browser to specific websites. It sometimes masquerades as an end-user license agreement and most users just click on it as a matter of course, inadvertently allowing the spyware to be embedded in   the system. Whichever form it takes, it cuts down on productivity, uses up RAM and CPU resources. [27] Many IT professionals consider spyware the top security threat as revealed by a WatchGuard Technologies survey in 2005. Consequently, anti-spyware software is also on the rise, making it the top security technology for 2005. Since people make money from it, it is most likely that hackers would bring it up to the level of a serious enterprise. Particularly vulnerable are banks and financial institutions, such as PayPal, which was targeted by a variation of the Mimail worm. The pathogen redirected the user to a false PayPal verification window which then asked for sensitive financial information. PayPal had hitherto enjoyed a reputation for reliability, so the potential to victimize a large number of people makes the strategy particularly effective. The tendency to use a few core applications is another reason hackers are so effective: they only need to focus on circumventing the security of a few systems to ensure a good haul. [25]One of these core applications is Microsoft’s Windows. The vulnerabilities of these products are more numerous than ever, mostly because its widespread use has made it the target of concentration for   many hackers. And though improvements in the security features in the products have managed to deflect more than 100,000 variants of the malware circulating, it requires more vigilance on the part of the caretaker to maintain the system to the leading edge of the available updates and security patches.   [36] There has even been evidence that cyber-criminals have become loosely organized, expert hackers working together with spammers and fraudsters to extend the sophistication and reach of the attacks on peer-to-peer networks. The focus is now on compromising integrity rather than the random destruction of files and networks. The treasure in this hunt is for information, and since there is no immediate, discernible damage, it is only when the credit card bills come in or the security system springs an alarm that the invasion becomes apparent. In the instances that a pathogen succeeds in infiltrating a good system, more damage is done than its predecessor, and true to the nature of its name, the virus appears never to completely die, but rather to go into stasis, just waiting for the next improved bug to re-activate it in an evolved state, such as the Phatbot in 2004 which exploit known and newly-discovered vulnerabilities in multi-frontal attacks. [36] Profile of a Cyber Criminal [26] Organized crime groups The involvement of organized crime groups has served to coalesce otherwise individual hackers. The motive for the involvement is not only profit but to establish a supply of readily available identities to be used in the course of their criminal activities. Terrorists It has been established that terrorists use various identities to avoid detection by government agencies that are on the alert for their appearance in under their true identities. They acquire employment and obtain financing for their activities. One instance was reported in Spain where a terrorist cell made purchases with the use of stolen credit cards and used fake passports and travel documents to open legitimate bank accounts to finance their operations. Petty criminals These are the freelancers, out to make easy money and with no other motive but money. [26] Literature Survey of Solutions Research grants In 2002, $877 million in government grants were earmarked to fund the Cyber Security Research and Development Act and H.R. 3400, the Networking and Information Technology Advancement Act that would beef up the network security of vital infrastructure. The ATT Foundation has also made contribution by providing grants in 2004 to the University of Texas at Dallas and Syracuse University to support cybersecurity research. Similarly, National Institute of Standards and Technology gave a grant to George Mason University School of Laws National Center for Technology Law and James Madison University in Harrisonburg, Va. to collaborate on what is know as the Critical Infrastructure Protection Project. â€Å"The project is aimed at providing outreach and education, serve as a pool of knowledge, and development of special programs for small businesses and information sharing†.   [41] However, the grants are part of a reaction to 9/11, which seeks to promote research in counterterrorirsm and national security. The problem of identity theft is much closer to home, or at least need not be on the scale of national security. Generally, identity theft can occur to as small as the scale of a home computer. A report by Internet security solutions provider Preventon has shown that in the UK, approximately 67% of   the surveyed consumers manage their own security software, mostly anti-virus, firewalls or anti-spyware software. However, only 22% considered â€Å"phishing† a serious threat to their security. New Products For financial call centers, a product has been developed by EMC’s Security Division called the RSA[R] Adaptive Authentication for Phone, which seeks to provide a reliable authentication protocol for telephone banking as required by the Federal Financial Institutions Examination Councils Authentication in the Internet Banking Environment guidance. It is an offshoot of the RSA Adaptive Authentication for Web in use by 35 of the largest financial institutions and banks in the world. The system makes use of the voice biometric solution based on Vocent technology and Nuance’s voiceprint engine. It is designed to conduct a risk-based assessment by analyzing voiceprint and user behavior based on predetermined parameters during retail and commercial banking transactions. Aside from the technology, users of the product will also have access to the database of the RSA eFraudNetwork community which has fraudster profiles. [10] There has been some opinion that an overlap approach may be more effective, where a combination of firewalls, intruder protection and detection and vulnerability testing be used in concert instead of isolation. [25] A software that goes one step further is PCImmunity, which is designed to combine the security features of Norton, McAfee, SpyBot, SpySweeper, Ad-Aware, ZoneAlarm, Avast, and AVG while supplementing them with a restart feature in cases where one or more of the active applications is deactivated by a hacker or virus. One of its maintenance features is the automatic update of these software and the daily scans of anti-spyware software. [14] Two projects that are geared towards anticipating industrial-grade security measures for VoIP has been initiated by the VoIP Security Alliance, or VOIPSA, which aims to establish a â€Å"threat taxonomy† and and a list of VoIP security requirements These protocols will be of particular use for session border controllers, or SBCs, which serves as an intermediary between the unique architecture of VoIP and web-based protocol that would otherwise be incompatible with VoIP. VoIP with SBC    Source: http://www.cisco.com/warp/public/cc/general/bulletin/software/general/3001_pp/3001_p24.jpg Other functions of the SBC is to enable network address translation, VoIP peering and compliance with   the Communications Assistance for Law Enforcement Act.   Security-wise, SBCs as the â€Å"man-in-the-middle,† is theoretically in a good position as the front-liner for any unauthorized access or interception. SBCs also serve to mask the presence of VoIP systems and softswitches and other devices. However, the integrity of its security features has yet to be rigorously tested. [40] The JavaScript malware that confounds most automated detection needs special treatment, using decoding tools such as NJS, SpiderMonkey or Rhino which separates the malware from the browser tool at the command-line level after cleaning up the HTML. It decodes in layers until the malware is completely stripped of its code. The tools are based on JavaScript and designed to be a re-entrant. It is not guaranteed, however, because such tools have limitations and it is only a matter of time before hackers find a way around it as well. [33] Another breakthrough that is a double-edged sword is a framework being developed by security expert Roelof Temmingh called Evolution. Though still in its infancy, the framework can be used as both a hacker’s tool as well as a security application. What it does is to use any identity information and extract other hidden data. For example, it can transform a domain into e-mail addresses and telephone numbers with the use of the Whois domain name lookup service, so hackers need only one type of information to get a whole slew of information. It can also identify targets for client-side attacks and war-dialing ranges. In the interest of security, however, Evolution can be invaluable in various ways. It can be used as a footprinting to identify phishing sites and identify alliances with weak security postures. In the long run, however, Evolution can be used to illustrate the future capabilities of hackers and research to pro-actively counteract such developments would be of immense benefit. [33] The important development from a security standpoint is that many companies are finally coming to terms with the magnitude of the battle before them. In a conference in Phoenix, the focus was on new products that were designed to renew the onslaught on incidents of phishing, adware and spyware spurred on by Web 2.0. Products such as NewsGator Hosted Solution allows companies to put an RSS aggregator in their websites, eliminating the need to get feed directly from the original content originator. For security compliance, LogLogic produced the appliance-based solution LogLogic 3 r2 that allows tracking of Microsoft Exchange log activity to identify security risks. [16] One product with added features was announced recently by Barracuda Networks which helps identify spam messages even if it is being sent by an apparently innocuous e-mail address. The Spam Firewall e-mail security appliance is now able to analyze sender behavior, facilitating reputation analysis. When a previously normal nehaving e-mail address suddenly stars unloading massive amounts of email, it is presumed that it has been infected by a botnet and turned into a spam server. [20] DIY Security Protocols With the rise of DIY security came the development of self-help websites that provide security tips and information as well as recommended freeware for downloads. One such website is the Gibson Research Corp. website (www.grc.com) headed by Steve Gibson. He provides three suggestions: Stealth or hide seldom-used ports, of which a typical system has 65,000 for an internet scanner to exploit. Disconnect services not in use, which Windows provides and connects by default but which only represents a vulnerability. Bind only the modem to the TCP/IP. Windows binds all network resources to the Internet by default as well, such as a shared printer, which is unnecessary and potentially dangerous. Among Gibson’s offerings that have provided some security is Shields Up! and LeakTest scans, and Gibsons DCOMbobulator, Shoot the Messenger, Socket-Lock, UnPlug n Pray and Xpdite make security a little tighter.   Another website that may bear investigation is The Human Firewall (www.humanfirewall.org) which focuses more on companies. [36] In IM, the best way to prevent identity and other information theft is to use an IM service that allow encryption. Unnecessary file tranfers via IM should also be restricted. Another suggestion is the use of Really Simple Syndication (RSS) as an alternative to joining an e-mailing list. The RSS feed is secure because here is no need for an e-mail address, it merely gets the desired material from the feed’s server. It makes the inbox and spam mail easier to manage as well as reducing the risk of spyware infiltration. [31] To confound IRC bots, McAfee experts suggests the use of IRC servers in constructing and IRC honeypot and a network sniffer. The sniffer identifies the IRC channel used by the malicious bot and the IRC honeypot routes all IRC channels to pass through it and an outbound query is allowed. A rogue bot will try to home into the attacker’s IRC server and the honeypot then issues commands to unistall the bot. [44] Enterpise Security Governance On the executive level, the Carnegie Mellon Software Engineering Institute (SEI) reports in â€Å"Governing for Enterprise Security† that the need to address information security as an enterprise-level governance concern is paramount. It identified several characteristics that define a company that employes governance in enterprice security: Security is given the same importance as other aspects of business; Security is part of the organization’s strategic planning cycle; Security is considered an integral part of all enterprise functions; Key executives and network staff alike have an appreciation of the responsibilities and issues involved in network security. Because of the prevalence of confidentiality breaches in the corporate world and the high costs involved in such breaches, an enterprise with a strong, healthy respect and care for the security of the information in their care but still with the ability to communicate efficiently and effectively with their clients will come across as a company that can be relied on and trusted. [29] ATT’s Research Labs president Hossein Eslambolchi agrees that security cannot be an afterthought, and states that the state of network security is so pathetic that hackers can bring down a whole network with very little effort. [13] Government Initiatives The US government has come to realize the real threat of security and information breach, especially when it involves government agencies. Several intitiatives deal with ensuring vigilance in both public and private enterprises that deal with network security. E-Government Act 2002, a privacy assessment mandate that is designed to protect the personal information of citizens who volunteer their data on government sites, is touted as one of the most significant privacy guidelines. The aim of the mandate is to ease the government into e-government, overcome resistance to change and to emphasize the need for cyber-security and privacy as well as coordination concerns. [21] Another government mandate is the Health Insurance Portability and Accountability Act of 1996 (HIPAA) which came into effect in April 2005 which regulates the use of e-mail and other Internet-based communications by health professionals in efforts to secure sensitive medical information. The guidelines are particularly focused on some key points that may arise in a clinician-patient communication. The rule of thumb is that the e-mail is mos probably not secure, and ealth professionals should not solicit confidential patient information via email, nor should patients supply such information. If it is absolutely imperative, the guidelines require tat such e-mail be encoded and encrypted. In cases of sharing benchmarking information and statistical data, it would be advisable to take out pertinent patient information as much as possible. There are 18 HIPAA Patient Identifiers that should be taken out, a list available on the HIPAA website (www.hipaa.org). [3] With regard to schools, some efforts at the district levels are being made to establish some security guidelines to protect the integrity of school records. The Consortium for School Networking, together with the Mass Networks Education Partnership in Allston, Mass., has produced the Cyber Security for a Digital District program (www. securedistrict.cosn.org) which provides administrators with an outline of what constitutes a secure database. [43] However, cost is still a major consideration for many school districts, one that has no immediate solution unless administrators and school boards alike are convinced of the importance of cyber-security in the schools. There have been some suggestions that law enforcement agencies take a more offensive take on cyber criminals and ISPs that host such activities, but this move is fraught with legal and ethical issues. Cyber crime is difficult to pin down because it is nealy amorphous in character. Unless it is proven without doubt that such a person or ISP is knowingly involved in the commission of cyber crimes such as identity theft, any law enforcement actions against what may prove to be an innocent party who may in turn be victims themselves would be ineffective. A recent development has been an unprecedented move by the US District Court in Alexandria, Va. On behalf of Project Honey Pot of anti-spam company Unspam Technologies, a $1 billion lawsuit was filed against spammers as well as those who harvest e-mail addresses for spammers. The lawsuit is the first and largest of its kind made possible by the efforts of members of Project Honey Pot who have been able to gather enough data to prosecute the alleged perpetrators with the use of the honey pot software, which identifies spam mail and IP addresses of the e-mail harvesters. The gathered data will enable prosecutors to subpoena ISP records for the involved IP addresses and its owners. The results of this litigation could well provide cyber criminals at least a pause in their activities. [28] Outstanding Issues One of main problems with countering unauthorized invasions is the lack of government spending on network security. Moreover, universities are churning out an inadequate supply of graduates with enough knowledge in network security to come up with practical and effective counters to what hackers can come up with. According to National Academy of Engineering (NAE) president William Wulf, there are perhaps about 200 serious computer security researchers in the US. Academic research is also notoriously slow in coming out with publications, much too slow to be of practical use in the rapid development of cyber-crime. Much of the brain drain is due to the demand of private enterprises, which pays a lot better than academic research, for talent to staff short-term projects that has nothing to do with security research. Purdue University Professor Eugene Spafford characterizes the attitude to security issues as most people view insurance. Software Engineering Institute’s Timothy J. Shimeall agrees as senior technical staff member of its Networked Systems Survivability Program. Not enough attention and resources is being devoted to security issues until it becomes a problem. For those who are involved in academic research in security, most are theoretical, with little or no practical basis, according to Columbia University computer science professor Salvatore J. Stolfo. [30] Another issue that has yet to be addressed is the management of the distributed-computing environment, in which the traditional, centralized concept of a security perimeter, known as the Orange Book architecture of the US Department of Defense’s Trusted Computer System Evaluation Criteria, is of little use. What is needed is long-term, systemic, non-theoretical view of the problem, rather than disaster management and short-term product cycle thinking. A survey, called the Risk of Sharing, of 300 companies in the US, UK and Australia revealed gaps in the business communications process due mainly to lack of process auditability, inadvertent exposure of confidential data, review cycle inaccuracies and resource loss through dealing with spam, amendments and approvals. [5] It has also been observed that many companies fail to make full use of the security softwar they already possess, and the reason for this appears to be data overload. When security software provides audit information for instances of attempts at invasion, it spews out a lot of information, much of it extraneous. Systems analysts must figure out which are the significant entries out of thousands of entries, and some companies resourt to outsourcing the work. [25] Conclusion The story of infected networks and compromised information has become all too familiar, a state of affairs that has begun to make itself felt with a vengeance. Of particular concern is the increasing number of incidents of identity theft. It is of concern to the individuals and corporations that are directly affected by it, but it is also a matter of national security, especially since the onslaught of terrorist attacks on the US. One side of the hackers economics is selling of legitimate identities to identified individuals who are persona non grata in the US. Identity theft is should thus be a priority for individuals, business entities and government agencies alike. Efforts by researchers to come up with defensive foils to stem the malware tide have met with mixed success as each step to successfully battling existing threats is countered by newer, more sophisticated and more dangerous threats. The economics behind the hacking industry has become huge as the world becomes more and more enmeshed in the cyber world, and the opportunities for profit is increasing as more and more industries are hooking up. However, the benefits of being connected still outweighs the drawbacks and the key to maintaining equilibrium is vigilance. On the far end of the security spectrum is government agencies that exact compliance for security regulations to deter cyber crime. Businesses follow suit as required because it is also to their benefit to do so, although many small companies have resistance because they have yet to feel the squeeze of an all-out hack attack. Big enterprises are more in the picture because they are bigger targets, although hackers are migrating more and more to softer targets whose resistance to regulations make them more vulnerable to attack. On the other end of the spectrum is the individual user, whether in the office or home setting. It is the responsibility of each user to be aware of the dangers, whether they are hooked up to local area network with the potential to infect from two to 50 other terminals because of a security suite that lacks maintenance, or the home user with an address book full of friends and family which has the potential of spreading malware with the ease of a click of a mouse. The tools to combat malicious cyber crime is available but users need to be educated about their responsibilities. Users need to be vigilant about their computer use, with their e-mails, with their IM sessions, even with their browsing behavior. As Uncle Ben said to Peter Parker, â€Å"with great power comes great responsibility.† Being interconnected has unleashed great power, and the responsibility to harness this power for the common good is very much in the hands of each user. Acknowledgment References â€Å"Bill authorizes $877 million for cyber security research.† Communications Today. December 7, 2001. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0BMD/is_228_7/ai_80639935 â€Å"CinTel develops a network security solution that enables content filtering proxy.† EDP Weekly IT Monitor. August 8, 2005. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0GZQ/is_30_46/ai_n14939952 â€Å"Do your e-mails comply with new security regs? HIPAA regs cover security and confidentiality.† HealthCare Benchmarks and Quality Improvement. May 2005. Retrieved April 26, 2007 from http://findarticles.com/p/articles/mi_m0NUZ/is_5_12/ai_n13759944 â€Å"Global threat trends in March 2007.† com. April 3, 2007. Retrieved April 27, 2007 from http://www.eset.eu/press_release_threats_march â€Å"New research uncovers security and audit risks.† International Journal of Micrographics Optical Technology. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_qa4077/is_200501/ai_n1363351 â€Å"Organisations fear network security threats from Instant Messaging.† Internet Business News. October 3, 2005. Retrieved April 27, 2007 from   http://findarticles.com/p/articles/mi_m0BNG/is_2005_Oct_3/ai_n15658965 â€Å"Research by prevention reveals UK home PC user are turning to DIY security.† Internet Business News. July 6, 2005. Retrieved April 26, 2007 from http://findarticles.com/p/articles/mi_m0BNG/is_2005_July_6/ai_n14724817 â€Å"RSA survey reveals online security concerns.† Internet Business News. August 22, 2005. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0BNG/is_2005_August_22/ai_n14924483 â€Å"Security appliance protects consumer data with encryption.† ThomasNet, Incorporated. February 27, 2007. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0PIL/is_2007_March_19/ai_n18727208 â€Å"Security system strengthens phone authentication processes.† Product News Network. November 13, 2006. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0PIL/is_2006_Nov_13/ai_n16836088 â€Å"Security.† Telecom Asia. August 2003. Retrieved April 26, 2007 from http://findarticles.com/p/articles/mi_m0FGI/is_8_14/ai_108312261 â€Å"Security.† Telecom Asia. December 2004. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0FGI/is_12_15/ai_n9481318 â€Å"Security.† Telecom Asia. June 2005. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0FGI/is_6_16/ai_n16879846 â€Å"Software automates and maintains PC security programs.† Product News Network. September 28, 2005. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0PIL/is_2005_Sept_28/ai_n15636236 A paper that is focused on a current security research issue of your own choosing. â€Å"RSS network optimization, fraud prevention tools take demo stage.† eWEEK.com. February 6, 2006. Retrieved April 27, 2007 from http://www.eweek.com/article2/0,1759,1920117,00.asp?kc=EWNKT0209KTX1K0100440 â€Å"ID thieves turn sights on smaller e-businesses: for online shoppers, security seals no guarantee that hackerts aren’t watching.† Washingtonpost.com. September 28, 2006. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0NTQ/is_2006_Sept_28/ai_n16753298 â€Å"Can ID theft be solved with more regulation?† eWEEK.com. February 8, 2007. Retrieved April 26, 2007 from http://www.eweek.com/article2/0,1895,2092459,00.asp Prince. â€Å"Report shows spike in online identity theft.† eWEEK.com. January 16, 2007. Retrieved April 27, 2007 from http://www.eweek.com/article2/0,1895,2084453,00.asp [20]  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   C. Garretson. â€Å"Barracuda Networks enhances reputation analysis technology with behavior data.† Network World. April 17, 2007. Retrieved April 27, 2007 from http://www.networkworld.com/news/2007/041707-barracuda-e-mail-security-appliance-profiling.html Webb. â€Å"Government IT Review.† Washingtonpost.com. October 2, 2003. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0NTQ/is_2003_Oct_2/ai_108454056 Chandler. â€Å"Storage services for data security: big business byte for enlightened operators.† Telecommunications Americas. August 2005. Retrieved April 26, 2007 from http://findarticles.com/p/articles/mi_m0NUH/is_9_39/ai_n15631277 Khun, T. Walsh and S. Fries. â€Å"Security considerations for Voice over IP systems.† January 2005. National Institute of Standards and Technology, Gaithersburg, MD 20899-8930. Sweeney. â€Å"Focus turns to network security: while many consider the telecoms infrastructure a vulnerable target for terrorists, the more immediate threats are attacks by individual hackers and authors of malicious code, which are presenting new security challenges for service providers.† Telecom Asia. January 2005. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0FGI/is_1_16/ai_n9772934 Shein. â€Å"Spy vs. spy: companies are spending billions on network security, but staying ahead of hackers may be a pipe dream.† CFO: Magazine for Senior Financial Executives. February 2004. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m3870/is_2_20/ai_113051525 Paget. â€Å"Identity theft.† McAfee Avert Labs. December 15, 2006. Retrieved April 27, 2007 from www.mcafee.com McPartlin. â€Å"Somebodys watching you: spyware has come in from the cold to become corporate Americas top security threat.† CFO: Magazine for Senior Financial Executives. Summer 2005. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m3870/is_9_21/ai_n15787661 Vijayan. â€Å"E-mail harvesters hit with $1 billion antispam lawsuit.† Computerworld. April 26, 2007. Retrieved April 27, 2007 from http://www.networkworld.com/news/2007/042607-e-mail-harvesters-hit-with-1b.html Whitley. â€Å"Report stresses security governance.† Internal Auditor. October 2005. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m4153/is_5_62/ai_n15763501 [30]  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   L. Paulson. â€Å"Wanted: More Network-Security Graduates and Research.† Computer Science at the University of Virginia. February 1, 2002. Retrieved April 27, 2007 from http://www.cs.virginia.edu/csnews/show.php?artID=79 Seltzer. â€Å"Security watch: Windows wireless threat†¦not.† PC Magazine. January 2006. Retrieved April 26, 2007 from http://findarticles.com/p/articles/mi_zdpcm/is_200601/ai_n16015170 Seltzer. â€Å"Security Watch: Windows, Firefox, Winamp, all report flaws.† PC Magazine. February 2006. Retrieved April 26, 2007 from http://findarticles.com/p/articles/mi_zdpcm/is_200602/ai_n16043071 Vaas. â€Å"Tools will help personalize ID theft by 2010.† eWEEK.com. April 19, 2007. Retrieved April 27, 2007 from http://www.eweek.com/article2/0,1895,2115879,00.asp Vaas. †JavaScript attacks get slicker.† eWEEK.com. April 18, 2007. Retrieved April 27, 2007 from http://www.eweek.com/article2/0,1895,2115638,00.asp Hines. â€Å"Cookie holes expose browsers.† eWEEK.com. January 31, 2006. Retrieved April 27, 2007 from http://www.eweek.com/article2/0,1895,1917283,00.asp Hogan. â€Å"Not-so-good fellas: keep the bad guys at bay with these steps to improve your companys computer security.† Entrepreneur. June 2004. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0DTI/is_6_32/ai_n6055133 Hindocha. â€Å"Instant insecurity: security issues of instant messaging.† Security Focus. January 13, 2003. Retrieved April 27, 2007 from http://www.securityfocus.com/infocus/1657 Roberts. â€Å"FBI computer crime survey finds widespread attacks.† eWEEK.com. January 20, 2006. Retrieved April 27, 2007 from http://www.eweek.com/article2/0,1895,1913633,00.asp Roberts. â€Å"IBM predicts 2006 security threat trends.† eWEEK.com. January 23, 2006. Retrieved April 27, 2007 from http://www.eweek.com/article2/0,1895,1913864,00.asp Poe. â€Å"VoIP industry moves to bolster network security: new group to define requirements.† America’s Network. May 2005. Retrieved April 26, 2007 from http://findarticles.com/p/articles/mi_m0DUJ/is_5_109/ai_n15622587 Roach. â€Å"Cybersecurity research at two schools gets boost from ATT Foundation.† Black Issues in Higher Education. July 1, 2004. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0DXK/is_10_21/ai_n6145384 Roach. â€Å"Virginia universities team up on nations cyber security; focus on public policy and law gives research effort unique focus.† Black Issues in Higher Education. June 20, 2002. Retrieved April 26, 2007 from http://findarticles.com/p/articles/mi_m0DXK/is_9_19/ai_89077199 Lafee. â€Å"Cyber security at the distriCt level: are you ready to prevent unlawful, unauthorized or simply misguided use of your technology?† School Administrator. April 2005. Retrieved April 27, 2007 from http://findarticles.com/p/articles/mi_m0JSD/is_4_62/ai_n13667747 Thomas and N. Jyoti. â€Å"Defeating IRC bots on the internal network.† McAfee Avert Labs. February 6, 2007. Retrieved April 27, 2007 from www.virusbtn.com