Thursday, January 30, 2020

People today freely use The Internet Essay Example for Free

People today freely use The Internet Essay People today freely use The Internet, E-mail, and Online Messaging to communicate with other people. It’s a great way to talk to loved ones who live far away, conduct business, and just have fun with friends, but there is a downside. People who we don’t know can obtain information about us by tracking e-mails and messages and unless these things are encrypted, everything we write can be pulled up and used against us. That is why people who use the Internet need to be much more aware of their online privacy and security. The Internet started in 1969 by the U. S. overnment. They wanted a communication system that couldn’t be destroyed in the event of an emergency. It consisted of four computers linked together called DARPANET. In the 1970’s people found that they could use this system to send messages between the computers to get to other people. More and more people started using this system and by the end of the 70’s, it was international. The earliest found company to use instant messaging was Mirabilis in November of 1996. Instant messaging is like a telephone conversation done between two people on the computer in real time. Popular companies that have instant messaging are AOL, Yahoo, and NET Messenger Service. E-mail or Electronic Mail is a way of composing, sending, and receiving messages over the computer. E-mail started in 1965, which means it actually began before the Internet and in fact helped start the Internet. First e-mail was used for multiple users to communicate through a mainframe computer. Now even though the government does not have control over the Internet in present day, they can still monitor what individuals are writing especially after September 11th. â€Å"The Sept. 1 terrorists relied heavily on the Internet, and the hijackers appear to have plotted their carnage using Yahoo e-mail. † The FBI believes they can now catch suspected terrorists by looking at suspicious email, but what constitutes suspicious? They have developed a program called Carnivore that looks through e-mail to find suspicious information. But, critics of this are not so sure of it’s benefits becau se it can be used to look for keywords such as â€Å"hijack† in mass amounts of e-mails, and whenever it finds an e-mail or message that has that word the FBI is entitled to read that message. If someone is just asking another person through e-mail about the current terrorist situation will that set off an alarm with the FBI and now that person’s e-mails will be tracked? Very possibly. The PATRIOT (Provide Appropriate Tools Required to Intercept and Obstruct Terrorism) Act provides investigators with more flexibility to pursue interception of e-mail messages, and monitoring of Web surfing and other PC-based communications. But does the general public believe that that government should have the right to look into private e-mails if they could catch a terrorist by doing it? According to a survey of PCWorld. m, â€Å"a total of 60 percent said they had serious concerns about giving the government more access to personal e-mail while 38 percent said they had little or no concern. † While the government and FBI feel that this is a completely legitimate way to weed out the terrorists in America, many others find it a complete invasion of privacy. This isn’t only a government vs. he people issue. As of 2004, â€Å"1 in 5 companies has had employees electronic messages subpoenaed in the course of a lawsuit or regulatory investigation† and â€Å"another 13 percent of 840 companies surveyed this year have battled workplace lawsuits triggered by employee e-mail. This means that private emails being sent while at work can be retrieved and used against a person in a court of law. The right to privacy is completely being revoked in these situations. That is why Americans need to be more aware of how to protect their privacy and there are ways to do this. First is by looking at the actual disclaimers that most people just sign without actually reading. American Online or AOL and Yahoo are two major providers of both e-mail and instant messaging. Looking into what their privacy policies are, you find this. Your AIM information consists of personally identifiable information collected or received about you when you register. Your AIM information may be shared within AOL and its business divisions. Your AIM information, including the contents of your online communications, may be accessed and disclosed in response to legal process (for example, a court order, search warrant or subpoena), or in other circumstances in which AOL has a good faith belief that AIM or AOL are being used for unlawful purposes. AOL may also access or disclose your AIM information when necessary to protect the rights or property of AIM or AOL, or in special cases such as a threat to your safety or that of others. (http://www. aol. com/info/p_privacy. adp. ) Yahoo’s disclaimer is similar saying that â€Å"Yahoo! collects personally identifiable information when you register for a Yahoo! account,† and â€Å"we reasonably believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities. Basically both are stating that, for the most part, our privacies are protected unless there is a need to look at the e-mails or messages being sent. That is a big but though. People should read that and decipher that the government or business we work at could basically make up a story as to why they need to read an email and both of these e-mail companies would have to comply. That really isn’t protecting us. At least we should know ahead of time though that these are the company policies so it shouldn’t come as a surprise if our privacy was breached. This brings us to the concept of encryption. â€Å"Chances are that nobody is watching the data you send out, but unless the information is over a secure (encrypted) connection, you cant be reasonably sure that its safe. † The definition of encryption is â€Å"the process of encoding information in such a way that only the person (or computer) with the key can decode it. † There are different encryption systems, but essentially two computers have secret codes that hold the key to decoding the messages sent between them. So if a message is encrypted, only your friend’s computer will be able to read what you sent to them. Does this type of security interest the common person? It definitely should and is quite easy to obtain. There are messenger services that provide e-mail and instant messaging. One is called Hushmail, which includes encryption enhancements. All you have to do is sign up for it just like you would Yahoo! or AOL and the only downside is that storage space is limited. But the option is out there for people to choose safety over unnecessary storage. Yahoo! nd AOL are the trusted and most used e-mail and instant message companies so most people just subscribe to these two, but really need to research what else is out there in regards to encrypted messaging companies like Hushmail. Customers of AOL though can upgrade to AIM 5. 2, which uses encrypted messages. Yahoo! on the other hand only has a form of encryption. The â€Å"system sends the message unprotected to Yahoos server. The recipient is given a URL to view the document on an SSL-protected web page. † Consumers feel this is a weak link because the message is still being sent without it being secure, but it is a step forward. There are other simple general steps that a consumer should do or at least think about before signing onto an e-mailing system. One is to always know the software that you are downloading onto your computer. Many programs appear to be legitimate, but they really just want to get your information and use it for bad reasons that veer into your personal privacy. Also, if a person shares a computer with many people, like a college library system, that person needs to make sure they clear their passwords and personal information before leaving their seat. And basically people just need to be more suspicious. Even though that’s a bad outlook, if you’re messages are not encrypted, then you need to be more aware of what you’re writing. If you think it could be construed in a negative way, then you shouldn’t send it over an unprotected system that could one-day work against you. In conclusion, â€Å"although companies and other entities operating in the online or electronic commerce environment have a responsibility to ensure the privacy of personally identifiable information online, the Online Privacy Alliance believes that consumers also have a role to play. Consumers should look for privacy policies on the web sites they visit as well as be aware of the various self-enforcement mechanisms currently available. †After the tragedy of September 11th, the government does need to do certain things in order to further protect our country against another attack, but this shouldn’t mean attacking American’s privacy and security. Americans shouldn’t have to live in constant fear of Big Brother looking into our personal letters and messages to loved ones and friends, and also shouldn’t be afraid that some things being said are going to be taken the wrong way. That is the opposite of making us feel more secure and safe because that basically means we’re being attacked from within our own government. Saying that, there are many things that we, as consumers, are responsible for knowing what is out there to give us more security. There is encryption and the big companies out there that provide e-mail and instant messaging are getting on board and providing encrypted programs for us to use. We should also be responsible enough to actually read all disclaimers that we usually don’t bother to read so that we are not shocked when we learn that the government just looked at our private message to someone. It’s hard as one person to fight something like Carnivore, but we can do simple things like read disclaimers, be smart about what e-mail programs we subscribe to and be safe and responsible when we are on the Internet.

Wednesday, January 22, 2020

purgatory :: essays research papers

Nothing impure can enter into the Kingdom of God (Revelations 21:27). Every person will have to pay for their sins to "the very last penny" (Luke 12:59). I'll use somewhat of a parable to explain purgatory. God is just per Scripture (John 5:30), correct? Now, let's say you have one man who leads a saintly life and another who leads a sinful life, but sincerely repents of his sins on his death bed. According to Protestants, both these men go straight to heaven after death. Is this just? I would have to answer in the negative. According to Catholic belief, the saintly man would go straight to heaven whereas the repentant man would have to be cleansed through temporal (not eternal) punishment for his sins before entering heaven. Where is this done? He can't be sent to hell because hell is eternal per Scripture (Matthew 25:46; Mark 3:29). There has to be a middle ground so to speak. This "middle" ground is purgatory. We must suffer for our sins just as Christ suffered for them (Romans 8:17; 2 Corinthians 1:5-7). If this suffering is not in this life, it has to be in the next. Protestants say that since purgatory is not mentioned in the Holy Bible, it doesn't exist. But the Holy Trinity is not mentioned in the Bible either yet almost all mainstream Protestant denominations believe in it. Unfortunately, the King James version of the Bible mistakenly omits the Books of Maccabees. These books were decided by the Church Fathers to be inspired of God. The Twelve Apostles used the Septuagint (Greek) canon - almost every single quote from the Old Testament that is cited in the New is from the Septuagint - this canon INCLUDES the First and Second Books of Maccabees (as well as five others). It is clear that praying for the dead to release them from the reparation of their sins is good according to the first Biblical verse quoted at the top of this page.

Tuesday, January 14, 2020

Resume

Developing departmental staff assessments, policy papers, directives, management policies, standards, and procedures involving the NRC protective force programs, protection program planning and Site and Security Plans. Conduct evaluations and inspections to ensure that Department facilities comply with established security standards and to determine the needs for adjustments or upgrades to the level of uniformed protection provided Conduct security inspections and security analyses of facilities involved in special program security test and evaluation programs. Identifies the necessary changes regarding policy, procedures, training and standards from inspections, surveys, and audits of the site.Results: Responsible for the training and instruction with established guidelines, standards in support of the nationally developed training programs regulated by the Nuclear Regulatory Commission. Serving as one of Facility Security Officers in support of the security education, safeguard and administering self-inspections in support of the NRC Serving as one of the Security Technical Representative on Installation Access Control Systems I ark closely with contractors and other security professionals for security clearance and access within a regulated nuclear facility. Accountable for the continues evaluation of all the protective measures and procedures governed by both the NRC and Industry. I review and evaluate all access control systems and security systems.Work with security senior management, in making recommendations on the modifications and improvements in order to enhance physical security and increase the efficiency with in the nuclear facility. Control multi-disciplinary security training program and provide and train on government and industry standards which includes identifying the need for facility protection along with the development and maintaining the protection. Department of the Army, Fort Believe, Virginia Police Supervisor (Lieutenant) Directory of Emergency Services 1 11201 0 to 04/201 1 Supervised the training, and development of subordinate police officers and other assigned staff.Acts as first responder to all types of emergencies or volatile situations such as terrorist attacks, hostage/barricaded situations, mob threats, vehicle accidents, robberies, hazardous material incidents, and other emergencies. Assisted officers by providing interpretation of departmental policies and procedures. Performed as the leader of the tactical response team and assisted in training newly hired officers. Directed activities of personnel engaged in preparing budget proposals, maintaining police records, and recruiting staff. Results: Took relevant steps to establish new policies and procedures by maintaining and setting new standards.Commended on my abilities to revived proactive measures in ensuring and monitoring the department's budget and spending habits. Awarded for my abilities to maintain a positive relationship with the communit y while enforcing the policies, regulations and law. CSS Army – ASPICS-E (U. S. Army Corrections Facility-Europe)/ Anaheim, Germany. Senior Corrections Supervisor, 08/2006 to 07/2010. Managed operations of a 146-bed, medium custody, joint-SE;CE corrections facility. Supervised facilities operations, physical security, safekeeping, custody and control of confined prisoners and staff of 100. Coordinated Security efforts across the organization, including Information Technology, Human Resources, Communications, Legal and Facilities Management.Developed internal management controls to identify resource requirements related to security, forwarded recommendations, corrected problem areas and conducting annual facility reviews. Maintained facility records and prepared daily reports and correspondence. Provide data entry into the security management system. Provided leadership with tracking all projects daily administrative duties. Oversee and provide a continuity of security for agi lity, personnel, visitor control, document control and equipment for all Special project Security matters. Results: Directed accreditation process with American Correctional Association, receiving overall rating of 98. 9 percent for its operation and physical security of the facility. Earned the USAF-See's highest rating. Was the first of five facilities in the U. S.Army's Corrections Command to receive USAF-See's national and its only CA international accreditation. IIS Army – Co 701 SST Military Police Battalion/ Fort Leonard Wood, MO. Military Police and Corrections Committee Chief/ Instructor/Writer, 08/2001 to 08/2006. Provided administrative, logistical, personnel and training support to staff and students of U. S. Army Military Police School. Maintained use of two buildings, video equipment, communication systems, classrooms, audio-visual equipment and ammunition valued in excess of MM. Prepare correspondence, reports, and documents related to security duties in a arti culate, perceptive, and tactful way.