Free Essay

Johnny Eng

In:

Submitted By Taimooraliawan
Words 4308
Pages 18
CYBER WARFARE
1. Introduction. Lights flicker and then go down across the city. Frightened people reach for the phone but find there is no dial tone. Fire fighter moving in area but no water available, Miles away in a military base, radar screen blinks off for number of missiles and aircrafts appearing on screen. Confusion grows, tanks begin to move across the streets, all communication systems collapse and people are sitting as blind. What is this all about, it is a cyber-attack acting as a force multiplier.
2. Cyber warfare is an outcome of information age technologies like satellites, electronic mailing system, internet, computers and micro-chips. Advancements in these technologies have converted the planet earth into a global village affecting all facets of human activity including warfare. Cyber warfare can influence all three components of the nation-state: the people, the government, and the military. This is a new paradigm of warfare in which there is no need to send a formation of soldiers or a fleet of warships, instead computer viruses and logic bombs in microprocessor control units and memory chips, may cause a wide spread disruption of every tier of society including military systems.
3. Cyber warfare, which is a new battle concept in the information age, was first used by US forces during the 1991 Persian Gulf War. That effort was primitive and was limited only to the reading of E-mail sent between Iraqi commanders. US Air Force used sophisticated tools during 78-day air campaign against Yugoslavia. By then, the Pentagon was able to infiltrate Belgrade's advanced computer-integrated air defense system and inject false messages and targeting data. The Armed forces and nations around the world are subject to information attacks on a continuous basis, regardless the level and degree of engagement. Defending such attacks from the full range represents one of the nation's most serious defense challenges ever.
4. Aim. To carry out an in depth analysis of the cyber warfare threat envisaged in Pakistan, in civil as well as military spheres, with a view to recommending suitable response measures both at national and military levels.
5. Sequence
a. Part-I. Concept of cyber warfare
b. Part-II. Examples from past and latest trends
c. Part-III. Cyber threat and response
d. Part-IV. Recommendations
e. Conclusion

PART – I
CONCEPT OF CYBER WARFARE
6. Cyber Definitions
a. Information Warfare. Information warfare is actions taken to achieve information superiority in support of national military strategy by affecting adversary’s information systems while defending own.
b. Cyber Warfare. Cyber warfare is a war directed against vital nerve centres of enemy like command, control, communication and weapon system to render them inoperable.
(1) Cyber warfare can also be explained as non-kinetic offensive actions taken to achieve information superiority by affecting enemy information based processes, information systems and computer based networks.
(2) In simple terms it can be defined as a war on the internet
(3) Military use of information war can be also termed as cyber warfare. c. Cyberspace. Cyberspace is the intangible place between computers where information/data momentarily exists on its route from one end of the global network to the other.

7. Cyber Attack Weapons. Cyber warfare has its weapons which are directed against computer assisted system to activate desired effects. Some of the known cyber weapons which have been used and practiced are:-
a. Logic Bombs. Logic bombs being one of cyber weapon detonated electronically through already installed chips. They remain dormant in enemy computer system until a predetermined time. After which it would come to life and begin disrupting data.
b. HERF (High Energy Radio Frequency). “HERF” stands for “High Energy Radio Frequency” HERF guns are nothing but radio transmitters. They are able to shoot high power radio signals at an electronic target and put it out of action.
c. Electromagnetic Pulse (EMP) Bombs. EMP stands for Electromagnetic Pulse. The source can be a nuclear or a non-nuclear detonation. Detonation of nuclear device in close vicinity of a communication or an electronic equipment will cause wide spread damage in electronic components by inducing heavy current in the circuitry. Beside EMP bomb, short circuit in high tension wires can be a source of non-nuclear EMP. Non-nuclear EMP has same effects as nuclear EMP except less in power.
d. Nano Machines or Fire Ants. Nano machines or fire ants are tiny robots of the size of insects and are solar powered. These are able to see, smell, walk, hear and detonate on command. Unlike viruses, one can use these to attack not only the software but also the hardware of a computer.
e. Microbes. Microbes are another cyber weapon. Which gradually eat away the electronic components once introduced, like bacteria.
f. Computer Viruses. Computer viruses are software programmes, which on entering a computer reproduce and spread like biological viruses. This leads to confusion in the software commands and results in malfunction of the computer. Some of the major computer viruses are:-
(1) Trap Doors. A trap door or back door is a mechanism which is built into a system by its designer. The function of a trap door is to give the designer a way to sneak back into the system.
(2) Worms. A worm is an independent programme. It reproduces by copying itself in full blown fashion from one computer to another, usually over a network.
(3) Trojan Horses. Trojan horse is another important computer virus which is basically a mechanism for disguising a virus or a worm.
(4) Chipping. Chipping is an effective cyber weapon that can easily be configured by the manufacturers so as to malfunction at a pre-designated time or on receiving particular frequency. PART II
EXAMPLES FROM PAST AND LATEST TRENDS
8. Cyber warfare is a reality and not a fiction. It has been used and is being practiced as an important tool of war by advance countries. Few reported examples of the past are:-
a. Experiences in the Gulf War. Two of US powerful information weapons i.e. AWACS and J-STARS allowed United States to collect, analyse and distribute information, and destroy enemy’s information and communication capability. Stealth planes guided with computer con guided Missiles Blinded Saddam by knocking out his command and communication centres. US-Army’s Sand Crab jammers disrupted long range radio links throughout Iraq. The US troops on ground unloaded information from the surveillance aircrafts and satellites instantly and called fire from ships offshore on desired targets.
b. Role of Hackers. According to Pentagon officials, a group of Hackers offered Saddam to disrupt the United State military deployment to Middle East during the Gulf War for one million dollar but Saddam spurned the offer.
c. Latest United State Secret Aircraft. Latest US secret AC “Commando Solo” equipped with latest technology having tremendous capability to jam the Radio and TV Transmission. Commando Solo was extensively used during air campaign and transmitted fake radio reports to Iraqi Soldiers who were eager to listen uncensored news of war.
d. Experience in Haiti. The Pentagon launched a sophisticated media campaign against Haiti’s military regime to restore deposed President Jan Bertrand. CIA sent thousands of E-Mail messages to members of Haiti’s Government, who had personal computers to convince them about their point of view, which ultimately prove to be effective.
e. Intrusion in Bhaba Atomic Research Centre India. After the Indian Nuclear test in May 1998 there had been a great deal of interest in the scientific community regarding claim of detonation of a thermonuclear device. On 7 Jun 98, as reported in international media, that a United State hacker group known as Mill worm hacked into the computer network of Bhaba Atomic Research Centre, and accessed sensitive data concerning the nuclear tests. Although later the Indians tried to cover up this by saying that the information stolen was unclassified yet the damage was done.
f. Indian Army Web Site on Internet. In order to support their own version of the happenings in Kashmir the Indian Army sponsored a web site with the address of “http\:www.indianarmyinkashmir.com” featuring a home page titled “Kashmir a Paradise”. However in October 98 this site was hijacked by some unknown hackers who replaced the material posted on the site and when the site was opened next day, the site was displayed a photographic patchwork of Kashmiri victims under the headlines “Stop the Indians’ and ‘Save Kashmir’.
g. Blocking of Pakistan Government Site. The official web site of Pakistan was hacked by Indian hackers in mar 2002. The most alarming aspect of this hacking was that intrusion was detected after a week time and it took further 10 days to counter it.
Future Trends in Cyber Technology
9. Digitized Battlefield. Plans are underway to link a soldier with the weapons systems and terrain electronically by the year 2010. Such 21st century soldier will have a special helmet fitted with sensors connected to the satellite. He will be able to communicate using his microphone and earphone, see in the dark by using night vision goggles and thermal imaging sensors, along with a heads-up display in front of his eyes to show him where he is on the ground and give him constant intelligent updates.
10. Voice Activated Computers. Silicon chips are now available which recognize the exact frequency spectrum of an individual. Once programmed to the particular voice, it can recognize and consequently trigger any action or device interfaced with it.
11. Nano Technology. Nano Technology will be so small that they could fit into a wrist watch yet so robust that they could help in arriving at quick decisions in most critical situations of battle where human brain normally yields under stress.
12. Some possible scenarios of cyber-attacks can be:-
a. It is through computer malfunctions. Cyber warrior can cause detonation or failure of C4I and military weapon systems, leaving a country vulnerable to conventional or worse WMD attack.
b. With the use of cyber weapons targeted nations are likely to be deprived of communications, financial resources, telephone and electrical supply systems.
c. Internet being widely used can also be used to spread false information or simply disable all the news sources on the internet.
d. Financial accounts and transactions being dependent on computers can be manipulated by cyber warrior resulting zero out financial accounts of the important government or private offices, institutions or persons which result in chaos and confusion.
e. As all transport system is computer based therefore all facilities like aircrafts, railways and air traffic control system can be collapsed by hostile cyber action.
f. Through hacking cyber warrior can change the composition of steel at a mill to make it vulnerable to cracking in extreme hot and cold weather moreover he can manipulate components of a food product, to add some amounts more than the normal, which is large enough to become toxic.
g. Cyber warrior can cause widespread environmental damage through explosions at computer-controlled chemical factories.

PART-III
CYBER THREAT AND RESPONSE
13. Indian Cyber Warfare Capabilities. Indian dominance in the computer software and hardware industry and availability of her experts all over the world provides her a great strategic advantage over Pakistan. Cyber warfare being highly guarded field, no first-hand information on the exact Indian capability in this particular field is available as evident from recently established unknown set up at Red Fort in New Delhi relating to cyber aspect undertaking clandestine activities. However under mentioned indicators can provide a fairly good picture of their potential:-
a. A separate information warfare school has been established at Sikanderabad in the Silicon Valley to train army officers to develop software needs of the army.
b. Indian software industry has an annual return exceeding US $ 2 billion. Recently, United States software experts discovered a cyber-scandal where some software backdoors were intentionally left open by Indian software experts to be exploited later.
c. Indian expertise in hacking capabilities renders her the potential to enter or break into our civil as well as military computer systems.
d. Advanced software Indian industry gives her the capability to inject viruses in various computer controlled activities like banking and stock exchanges thereby resulting into industrial espionage. 14. Some of the facts about Indian capabilities in IT field are:-
a. India is being recognized as the cyber giant of tomorrow.
b. India has a brand named information technology (IT) as India Tomorrow.
c. Indians claim that IT is to India, what oil is to Gulf.
d. West acknowledges that India has the potential to become a global superpower in the knowledge economy.
e. In India there will be 2.2 million jobs in IT by year 2008.
f. Overall revenues from the IT sector will be nearly $ 90 billion Dollars including $ 50 billion US dollars in exports by 2010.
g. Out of 26 largest software houses in the world, 16 are in India.
h. Chief executives of more than 50 IT companies of the world are Indians.
j. Software industry contributes 7.5% of the GDP growth of India.
k. Exports in the IT Sector will account for 35% of total exports from India.
15. IT Road Map for Indian Army. The advancement in the field of technology has brought upon a Revolution in Military Affairs (RMA) in the information age. The Ex Indian Army Chief, General V.P. Malik has said, "Cyber war is to the 21st century what blitzkrieg was to the 20th". Indian Army has finalized an IT plan for her forces and the Vision statement for this road map is "To establish a strong information technology infrastructure to act as a force multiplier by incorporating fully automated and networked operational and management information system, complemented by fully information technology literate manpower."
16. In order to implement this vision, the Indian army is undertaking number of steps which are:-
a. Indian Army has established four Institutes of Information Technology. Twenty-five more schools are planned in the coming years.
b. There are currently a number of projects analyzing and designing the army's requirements in specific field like C4I2. Among them are Command, Information and Decision Support System at tactical level, the Battlefield Surveillance System, the Artillery Combat Command and Control System, Data Based Management Systems and Graphic Information System at strategic level.
c. Indian Army is upgrading its communications network to the next generation to enhance security levels.
d. The Army has planned to field a robust network backbone along with establishment of Army Intranet in the near future. The intranet includes MIS network, Army logistics network, Military intelligence network, Army training network and operational information systems.
e. Indian Army has established a tactical communication system (TCS) to link up front line formation right up to battalion level and set up centers for cyber security. This will enable Indian army to listen deep inside the en territory.
f. Indians have established a center of excellence of cyber security in military college of telecommunication engineering, which is training personnel for hacking and anti-hacking measures.
17. IT Status for Pakistan. Before taking over of Dr Atta Ur Rehman as Federal Minister for Science & Technology, Pakistan, virtually, had no IT vision as a need of future. Because of unprecedented importance accorded to IT as global economic arena by present government, it has achieved a substantial leap forward which can be evident from fallowing indicators:-
a. Approval of comprehensive IT policy and action plan in year 2000.
b. Decrease in computer prices for almost 150% and made duty free item.
c. Decrease of internet tariff by almost 500%.
d. Increase of internet users from 0.1 million in Jun 2000 to 5 million in June 2005.
e. Establishment of almost 50 degree and 1200 diploma awarding IT institutions mostly in private sector.
f. Educating almost 10,000 government servants in software as data operators.
g. Producing 10,000 IT graduates per year.
h. Promoting higher education scholarship with a view to create 5000 PhDs by year 2008.
j. Creation of 0.2 million Jobs of computer literate persons.
k. Increase of IT companies from 80 in 1984 to 950 in year 2005.
l. Increase of software exports up to 60 million dollars.

PART – IV
RECOMMENDATIONS
18. After having discussed the various aspects of Cyber Warfare, threat perception and own response, a set of recommendations has been worked out by the panel. The focus of these recommendations will be at national as well as army level.
19. National Level
a. Establishment of Silicon Valley in Pakistan. A Silicon Valley should be established near Karachi or Lahore on the lines of the one in America or Indian Bangalore for research and development of all computer related technology including software and hardware development along with cyber warfare capabilities. It should be based on the lines of One Product one area concept.
b. Establishment of Cyber Institute. Establishment of a Cyber Institute is recommended to create awareness of Cyber warfare in the country, with special focus on organizations using computerized systems for their working. This institute should be tasked to:-
(1) Organize courses, lectures, workshops, seminars and training on the subject of Cyber Warfare for persons responsible to operate and maintain electronic and computer systems in government and private sector.
(2) It should acquire material on the latest trends and developments in the field of Cyber Warfare and disseminate the same to various organizations.
(3) It should organize training on the subject of Cyber Warfare, for personnel responsible to operate and maintain electronic and computer systems in government and private sectors.
(4) Evaluate the enemy capabilities and their vulnerabilities and suggest a suitable offensive and defensive response.
c. Research and Development Facilities through NUST. Creation of Research and development wing is recommended which will undertake research in following fields:-
(1) Effect of computer viruses on own systems.
(2) Silicon eating microbes and its counter measures.
(3) Hacking expertise.
(4) Types of EMP devices and protection against EMP attacks.
(5) Vulnerabilities of logic and time bombs and its counter measures.
(6) Indigenous development of fire wall and other security system.
d. Software Houses. Software houses are basically designed to develop the software for the systems as per the user requirements. Software houses are recommended to:-
(1) Develop software systems and hardware interface units to protect existing systems from Immediate Cyber threat.
(2) Identify, develop and monitor software standards.
e. Indigenous Production. Efforts should be made to enhance the base of indigenous production and development of computer hardware and software systems. In this regard following measures are recommended:-
(1) Incentive should be given to private sector to develop computer technology and manufacture computer related equipment.
(2) Preference should be given to transfer of technology in import of equipment.
(3) Assembling of computer systems by importing computer circuits and chips. These should be put to thorough inspection before assembly.
(4) Development of indigenous electronic chips for computer sensitive installations.
20. Army Level
a. Cyber Cell at GHQ under C4I Directorate. Creation of Cyber Cell at GHQ which should work under C4I Directorate. The expertise of the younger generation i.e. IT expert civ can be of great help. The Cyber Cell should be given a mandate for following: -
(1) To act as a nucleus for Cyber warfare and work out basic policy guidelines and priorities within the Army.
(2) To workout developmental strategy of Cyber Warfare, highlighting vulnerabilities of own systems, its counter measures and how to exploit enemy weak areas.
(3) To evaluate all computerized and computer assisted system used by Army and how to enhance their protection and security arrangement against Cyber threat.
b. Establishment of Army Software Development Board. Basing on the requirements of Army the board should develop the desired software where it can always take assistance of NUST and other IT universities in the country.
c. Awareness in the Army. Most of the modern equipment and weapon system are all computer based. Moreover with the ongoing projects of ADN, OCCS etc our computers dependency will increase manifolds and so is our vulnerability to cyber-attacks. Therefore there is a need to create awareness about this important facet of warfare. In this regard following steps are recommended:-
(1) Cyber warfare as a separate subject should be introduced at PMA and all school of instructor’s especially MCS and college of EME.
(2) Workshops and seminars at corps level should be arranged where qualified speakers in related fields should be invited.
(3) Publication on the subject encompassing all related aspect of cyber warfare be arranged by C4I Directorate and disseminated to all units.
(4) Computer operated vulnerabilities being a pronounced threat be highlighted to all ranks by arranging cadres at formation level by DBS.

CONCLUSION
21. Cyber warfare stands as the predominant form of warfare in the 21st century. It contains opportunities, which if exploited in the right direction will afford max security to the nation. But the serious dangers resulting from ignoring its imp can only be ignored at the peril of the national sovereignty. To prepare army for these challenges our officers must be proficient in computer handling and should have sufficient knowledge and awareness about the latest developments going on in the world moreover we should review our strategy, both at national and army level, to prepare ourselves for future challenges of cyber warfare.

REFERENCES
1. DOD – Cyberspace. Dtic.mil. Retrieved 8 November 2011.
2. Dilanian, Ken. "Cyber-attacks a bigger threat than Al Qaeda, officials say", Los Angeles Times, March 12, 2013
3. Clarke, Richard A. Cyber War, HarperCollins (2010)
4. "Cyberwar: War in the Fifth Domain" Economist, 1 July 2010
5. The Lipman Report, 15 October 2010
6. Clarke, Richard. "China's Cyberassault on America", Wall Street Journal, 15 June 2011
7. Cyberspace and the changing nature of warfare. Strategists must be aware that part of every political and military conflict will take place on the internet, says Kenneth Geers.
8. "Cyberattacks, Terrorism Top U.S. Security Threat Report."
9. Reuters: US concerned power grid vulnerable to cyber-attack. In.reuters.com (9 April 2009). Retrieved 8 November 2011.
10. Xinhua: China denies intruding into the U.S. electrical grid. 9 April 2009
11. 'China threat' theory rejected. China Daily (9 April 2009). Retrieved 8 November 2011.
12. Disconnect electrical grid from Internet, former terror czar Clarke warns. The Raw Story (8 April 2009). Retrieved 8 November 2011.
13. Drogin, Bob (17 February 2010). "In a doomsday cyber attack scenario, answers are unsettling". The Los Angeles Times.
14. Ali, Sarmad (16 February 2010). "Washington Group Tests Security in ‘Cyber ShockWave'". The Wall Street Journal.
15. Cyber ShockWave CNN/BPC wargame: was it a failure? – Computerworld Blogs. Blogs.computerworld.com (17 February 2010). Retrieved 8 November 2011.
16. Andy Lee. 'International Cyber Warfare: Limitations and Possibilities.' Jeju Peace Institute. 1 May 2012. http://jpi.or.kr/contents/?mid=KR1612
17. "Google Attack Is Tip Of Iceberg", McAfee Security Insights, 13 January 2010
18. Government-sponsored cyberattacks on the rise, McAfee says. Networkworld.com (29 November 2007). Retrieved 8 November 2011.
19. ANNUAL REPORT TO CONGRESS Military and Security Developments Involving the People’s Republic of China 2010. (PDF) . Retrieved 8 November 2011.
20. AP: Pentagon takes aim at China cyber threat
21. "The Joint Operating Environment", Report released, 18 February 2010, pp. 34–36
22. "US embassy cables: China uses access to Microsoft source code to help plot cyber warfare, US fears". The Guardian (London). 4 December 2010. Retrieved 31 December 2010.
23. Culture Mandala: The Bulletin of the Centre for East-West Cultural and Economic Studies, Vol. 8, Iss. 1 [October 2008], Art. 2. pp.37 (2008). http://epublications.bond.edu.au/cgi/viewcontent.cgi?article=1110&context=cm (2008). |url= missing title (help). Retrieved January 2013.
24. "China to make mastering cyber warfare A priority (2011).". National Public Radio. (London). Retrieved January 2013.
25. "WASHINGTON, BEIJING IN CYBER-WAR STANDOFF (Feb. 12,2013).". Yahoo News. Retrieved January 2013.
26. "Beware of the bugs: Can cyber attacks on India's critical infrastructure be thwarted?". BusinessToday. Retrieved January 2013.
27. "5 lakh cyber warriors to bolster India's e-defence". Times of India (India). 16 October 2012. Retrieved 18 October 2012.
28. "Stuxnet and the Future of Cyber War". James P. Farwell and Rafal Rohozinski. Retrieved January 2013.
29. Sanger, David E. (1 June 2012). "Obama Order Sped Up Wave of Cyberattacks Against Iran". The New York Times. Retrieved 1 June 2012.
30. "US General: Iran's Cyber War Machine 'A Force To Be Reckoned With'". Business Insider. Retrieved January 2013.
31. http://www.csmonitor.com/USA/2012/0403/Al-Qaeda-rocked-by-apparent-cyberattack.-But-who-did-it/(page)/2
32. Deibert, Ron (2011). "Tracking the emerging arms race in cyberspace". Bulletin of the Atomic Scientists 67 (1). doi:10.1177/0096340210393703.
33. Jim Finkle (3 August 2011). "State actor seen in "enormous" range of cyber attacks". Reuters. Retrieved 3 August 2011.
34. Hacked by 'Pakistan cyber army', CBI website still not restored. Ndtv.com (4 December 2010). Retrieved 8 November 2011.
35. 36 government sites hacked by ‘Indian Cyber Army’ – The Express Tribune. Tribune.com.pk. Retrieved 8 November 2011.
36. Britain faces serious cyber threat, spy agency head warns. The Globe and Mail (13 October 2010). Retrieved 8 November 2011.
37. "War in the fifth domain. Are the mouse and keyboard the new weapons of conflict?". The Economist. 1 July 2010. Retrieved 2 July 2010. "Important thinking about the tactical and legal concepts of cyber-warfare is taking place in a former Soviet barracks in Estonia, now home to NATO’s "centre of excellence" for cyber-defence. It was established in response to what has become known as "Web War 1", a concerted denial-of-service attack on Estonian government, media and bank web servers that was precipitated by the decision to move a Soviet-era war memorial in central Tallinn in 2007."

Similar Documents

Free Essay

Tatcher

...Margaret Thatcher Was a British politician who was the Prime Minister of the United Kingdom from 1979 to 1990 and the Leader of the Conservative Party from 1975 to 1990. She was the longest-serving British Prime Minister of the 20th century and is the only woman to have held the became associated with her uncompromising politics and leadership style. As Prime Minister, she implemented policies that have come to be known Margaret born on 13th October 1925 in Grantham, Lincolnshire, England. Thatcher became a Conservative member of parliament for Finchley in North London in 1959, serving until 1992. According to Jeff (2013), she was a first woman prime minister in Europe and the longest-serving British Prime Minister of the 20th century. Volkery (2013) stated that Soviet journalist called Thatcher as “Iron Lady”. Dominant Personalities Extroversion refers a person is outgoing, sociable, and comfortable talking to new people. I think Thatcher have a high degree of extroversion. She was willing to meet and talk with people that she had not met before. For example, Thatcher was a first foreign visitor meet Ronald Reagan in United States and she received the warmest possible welcome. After the meeting, they formed a very close personal friendship. Moreover, Thatcher also was a sociable leader. In 1982 she was a first British prime minister to visit China for a discussion with Deng Xiaoping about independence of Hong Kong (Cottrell, 1992). Emotional stability refers a person is...

Words: 1906 - Pages: 8

Free Essay

Georgetown Festival 2014

...Georgetown Festival 2014 Name:TAN HAI LUN Student ID: M20O9-0088 Lecturer: Mrs. AISHA MP 211 PR Management& Practice Georgetown Festival 2014 Theme We will create an event on 15 June, Saturday for Georgetown Festival 2014. Our theme will be going for the natural parts of Penang. The title is “Nature, Love Penang”. The event will be held at the Botanic Garden which is a large natural park. We try to present the natural beauty of Penang which let people a chance to look into Penang and let them experience the fresh air and natural view of Penang. We believe that the Botanic Garden is the best place to create this event with its awesome natural environment with fresh air, natural view and lots of beautiful flowers. We tend to introduce people the parts of Penang which different from the culture or heritage of Penang that has been promote many times, we will bring people to recognize a different and simple Penang. Concept People now a day’s always busy on work and study. They seldom got chance to relax themselves. When they free, they mostly will choose to stay at home or go for a drink. They almost forget the best place to rest and release their pressure is back to the natural. So we create the “Natural, Love Penang” event is to tell them that Penang still got place that you can go for spend your time and relax your life. We find that many tourists come to Malaysia travel for its natural beauty. So we got the ideas to create...

Words: 736 - Pages: 3

Free Essay

Humanities

...Valerie Anne M. Eclavea BSID 1-1 1. Salt (2012)- Philip Noyce Classification: Action Appeal: Intellectual Scene: Evelyn Salt (Angelina Jolie) fights for her innocence of the crime of killing the president of Russia. She also embarks on a mission to seek revenge for his husband’s murder and to clear her name of the accusation. The movie aims to get an anticipating and thrilling reaction from the viewers, creating an intellectual appeal to the movie. 2. Rurouni Kenshin Live Action Film (2012)- Keishi Otomo Classification: Action/ Drama Appeal: Emotional and Intellectual Scene: Rurouni Kenshin  (Takeru Satoh) was once known as the notorious Batosai or serial killer. He grew up to be an assassin for the Imperial side killing countless men that would come his way. But after these killings, he made a vow to never kill again. He would turn his sword in the opposite of the blade whenever he comes to battle so no one would receive lethal damages. Ten years later, he finds a home at a failing dojo, only to be caught up in a string of murders related to an opium ring. His commitment to never taking a life is put to the test as the people he’s come to care about are threatened by figures from his past. 3. Dumb and Dumber (1994)-Peter Farelly, Bobby Farelly Classification: Comedy Appeal: Emotional Scene: A pair of intellectually challenged friends named Harry Dunne (Jeff Daniels) and Lloyd Christmas (Jim Carrey) set out on a cross country trip return a briefcase full of money...

Words: 1312 - Pages: 6

Free Essay

Jack Sparrow

...Long Live Jack Sparrow My favorite actor is Johnny Depp. Personally, I haven’t watched too many of his movies but I’ve watched enough to know what an astonishing actor he is. From playing a man with scissors instead of hands, to being a rowdy pirate, to owning a chocolate factory, I believe he’s one of the greatest actors in filmmaking history. The best character he ever portray in a movie in my opinion is Jack Sparrow form the pirates of Caribbean’s. What is it exactly that makes Jack Sparrow so intriguing? For starters it’s Sparrow’s flamboyance and playfulness that made him so popular. Also it helps Johnny Depp's acting skills charmed me. One thing for sure Jack Sparrow is one of the most popular and beloved fictional characters in years. Kids’ love him, adults find him funny, women, well, let’s say he probably doesn’t go unnoticed even if it is quite clear, I think, that he is not the biggest fan of taking a shower every day! He is surely a charmer and most of all a persona that you simply can’t forget just as easily. Jack Sparrow might not be as family-friendly as Indiana Jones was and definitely not as politically correct and as fearless as a guy like Superman. Jack Sparrow is simply a larger than life charmer even in his most wicked moment and he has quite a few of them during his adventures while treasure hunting on the mythical sea. Jack Sparrow was a legendary pirate of the Seven Seas, and the irreverent trickster of the Caribbean. A captain...

Words: 926 - Pages: 4

Free Essay

Sex 101

...On the 21 of May 2013 bob went to a restaurant and sat down and was waiting for the waiter to come serve him any hour went by and still no one had came up to him and asked him what would you like, about a hour and half later the manger comes up to bob and says `hey my name is David and I’m the store manager and I would like u to leave as u won’t be able to afford our food in this restraint’. So bob decide to leave without getting any food, bob felt really powerless with having any money. The next day bob was sitting at the park and trying to get some money so he can eat, as he was looking around he sees David the manager from the restraint yesterday sitting at the tree reading the newspaper and drinking his coffee and then bob thought to himself that he wishes he had a life like that being able to have a job and having money that he could buy food and a nice place to live instead of a cardboard box. Now bob is trying to be successful and get a job but he doesn’t know how to get one, he has started talking to people about giving him a job but they just rejected him because he has no nice cloths and he is very dirty. He has started to try really hard to find some nice clothes so he can find himself a job, so he can get some money and do something with his life. Couple of weeks after bob counted his money that he had got off people to get some new cloths but he only had $10 and that wasn’t enough to get him cloths so he spent that money on food and started thinking of a new way...

Words: 642 - Pages: 3

Free Essay

Two Nations

...dances But the difference is language Or just the bits you got wrong 'Cause we were the ones who invented the language, oi Understated is how we prefer to be That's why I've sold three millions and you've never heard of me The paparazzi shoot me the the girls all loose on me But don't shoot idols, we fight football rivalry The work wac means to cum back home And I wrote the ten wac commandments on my own I was in front of the bloke shooting at the Nas show But they weren't shooting at him it was honor that night though We don't shoot idols happily shoot instead Up my road the police just shot a youth dead 'Cause they guessed he might of been a bit of a terrorist Does this bomb look big in this bag then but we love Biggy, Johnny Cash and Stevie Wonder It's no Biggy we got no cash and its no...

Words: 427 - Pages: 2

Free Essay

14 Movies Analyzed and Reviewed

...Out of Africa is a good example of great cinematography. The story is somewhat of a love story. Personally, I found the story line to be okay at best. But, I always get captivated at the filming. The entire movie was shot on location in Kenya; and while more difficult to do it paid off in this movie. You get so caught up in looking at the scenery, that the slow advancement of the plot can be tolerated. There is a great scene where Robert Redford and Meryl Streep are out and there is a lion looking their way. He tells her not to worry because he will protect her. The next second, a lion heads their way, and she has one chance to shoot. Of course, she doesn’t miss. But the way this scene is filmed, you feel like you are there; you can see how you feel safe, and all at once, it changes. The movie also makes good use of three-dimensional arrangement of people. There are many scenes where there are several people in one scene. But, the way they are arranged makes it easy to look at and get a good sense of what Africa feels like. I would also mention that the costumes help to have a realistic feel of Africa. Meryl is in chinos and light-weighted cotton tops most of the time. This movie could be turned into a Banana Republic advertisement; and, that is exactly the feel costumes should have for a movie. 007 Casino Royale was a good continuation of the Bond series. This is the start of Bond’s career as a 007 agent. It had elements for the old Bond fans, as well as for the newcomers...

Words: 4814 - Pages: 20

Premium Essay

Johny Cash Bio

...Johnny Cash Amanda B. Boone McKendree University Johnny Cash Johnny Cash was born in Arkansas and the 4th of 7 children. He was originally named J R Cash because his parents did not know what to name him however, when he entered the Air Force they would not allow him to use initials. Religion and music were very much a part of Johnny’s upbringing. His mother was a devout Pentecostal who often sang hymns to Johnny. Knowing her sons love of music, she eventually scrapped up the money for him to have singing lessons, but after three lessons the teacher instructed Johnny not to deviate from his natural voice. (The Biography Channel) In the Air Force is when he began to play music again. Johnny Cash originally intended to sing gospel music when trying for a music contract and was told they were no longer looking to sign gospel singers. Although he did not give up gospel music all together Hillbilly rock, outlaw, gospel, and country are all the music genres that Johnny contributed to. He is best known for his bass baritone voice that is like no other, not to mention known as the man in black. Johnny only wore black to every show because his first gig; he wore a black t-shirt and jeans and thought it to bring him luck. (The Biography Channel) After leaving the Air Force, Johnny married Vivian Liberto and had four daughters. Alcohol and drugs, not to mention a hectic touring schedule eventually led to Vivian filing for divorce. During one of his tours, he toured with...

Words: 587 - Pages: 3

Free Essay

A Definition of Anglo-American Folk Music: Past to Present

...allowed music to travel vast distances and have an enormous audience, which was never before possible. This allowed for single artists, like Jimmie Rogers and Bill Monroe, to become well known and produce iconic tracks that would be recorded as the traditional music of America. The lyrics that were used during this early America by these European migrating immigrants where about stories of freedom, life, and a search for identity. This became a significant part of the culture of the developing American people, who used this new form of media to identify themselves (historically and culturally). Since then, Anglo-American folk music has been identified as a strong source of inspiration from well known artists throughout history, such as Johnny Cash, Roy Orbison, Carl Perkins, Elvis Presley, and Hank Williams, just to name a few ("Introduction to Anglo-American Folk Music”). Today, though international country singers, traditional Anglo-American folk music can be...

Words: 347 - Pages: 2

Free Essay

Freak Show

...“Don’t go in there” the little girl said in a quiet voice. I looked at her & asked, “Well why stay out here? I’m just going to see the show…” She stopped me as I was finishing my sentence “It’s not just an ordinary freak show, you’re going to die! He’s here and you’re never going to survive him, he’s more powerful than anyone alive. Once you die here you can never leave! Your spirit gets trapped!” I tried to ask her who “he” was but she disappeared. It must have been part of the act. My friend and I drove up from Georgia to Tennessee just see the biggest freak show in the USA. We walked up to the ticket box and asked for two tickets. As we were walking into the arena I saw the little girl again, but this time she was yelling at a couple to leave. I started to walk to her, she turned, looked at me, and disappeared again. Charlie & I found our seats after about a half hour of searching. We have front row seats, right in front of all the action. As we sat down we realized everyone had popcorn, cotton candy, & soda so I told Charlie that I would go get us our snacks while she saves our seats. As I was walking there were “freaks” everywhere doing tricks for little kids & their parents. I got so caught up in all the tricks I didn't have much time left to get us snacks, so I rushed to the concessions grabbed our snacks & rushed back to our seats. I gave the snacks to Charlie so I could take my seat. As I sat down the show began. There were clowns walking through...

Words: 916 - Pages: 4

Free Essay

Tim Burton

...Cinema Review: Director Tim Burton Tim Burton is one of the most unique visionary directors in Hollywood, defining a new genre of film with his twisted imagination. Besides the similarity of having been made by the same director, there are also many other similarities between his films. For example, his film style is able to be seen clearly throughout the films, Edward Scissorhands (1991), Corpse Bride (2005) and Sweeney Todd: The Demon Barber of Fleet Street (2007). All three of these movies showing Burton’s easily identifiable film style. The characteristics that are similar across these films are the flashbacks, the actors and actresses, the characters, the use of costume, makeup and lighting. Similarities can also be seen through the themes and genres including, German Expression and fantasy. Burton incorporates characters in his films that no one would encounter in real life, such as you would never find a ghost who wants to marry a human in real life or someone who is able to chop hedges with his scissorhands. His films are characteristically quirky and unusual, however somehow making it relatable and identifiable which make them so popular with the audience. One style that Tim Burton’s films are strongly influenced is the German Expressionism codes and conventions. This foreign film style is an artistic genre that originated in Europe in the 1920s and is broadly defined as the rejection of Western conventions (Darsa, 2013). The artist’s impression of reality...

Words: 1199 - Pages: 5

Free Essay

Doc Holiday

...bDoc Holliday 1 Doc Holliday Doc Holliday Holliday's dental school graduation photo, age 20, 1872 Born John Henry HollidayAugust 14, 1851Griffin, Georgia, U.S. Died November 8, 1887 (aged 36)Glenwood Springs, Colorado, U.S. Education Graduated from Pennsylvania College of Dental Surgery in 1872 at age 20 Occupation Dentist, Professional gambler, Gunfighter Known for Arizona War *Gunfight at the O.K. Corral *Earp Vendetta Ride John Henry "Doc" Holliday (August 14, 1851 – November 8, 1887) was an American gambler, gunfighter and dentist of the American Old West, who is usually remembered for his friendship with Wyatt Earp and his involvement in the Gunfight at the O.K. Corral. Early life and education "Doc" Holliday was born in Griffin, Georgia, to Henry Burroughs Holliday and Alice Jane Holliday (née McKey).[1] His father served in the Mexican–American War and the Civil War.[2] His family baptized him at the First Presbyterian Church in 1852.[3] In 1864 his family moved to Valdosta, Georgia.[3] Holliday's mother died of tuberculosis on September 16, 1866, when he was 15 years old.[1] Three months later his father married Rachel Martin. While in Valdosta, he attended the Valdosta Institute,[3] where he received a strong classical secondary education in rhetoric, grammar, mathematics, history, and languages – principally Latin, but also French and some Ancient Greek.[3] Autographed photo of Holliday taken in 1879 in Prescott...

Words: 6757 - Pages: 28

Free Essay

Paper

...Vanna White v. Samsung Electronics America, Inc. (1992) United States Court of Appeals, 9th Circuit Background: The Plaintiff is Vanna White, a popular game hostess of the famous TV show “Wheel of Fortune” and has gained popularity by marketing her image to various advertisers. White brings suit against Samsung for an advertisement for Samsung VCRs (videocassette recorders) where the ad depicted a robot, dressed in a wig, gown, and jewelry that resembled her hair and dress. The robot posed next to a game board that closely resembled the Wheel of Fortune game show set, in a stance that imitates her signature pose on the game show. Samsung has also acknowledged that the ad is known as the “Vanna White” ad. White claims infringement of several individual property rights (right to privacy, under Section 3344 of the California Civil Code*, right of publicity, and trademark infringement), claiming she did not consent to the ads and was not paid for it. But the district court granted summary judgment against White. White appeals. (*Any person who knowingly uses another's name, voice, signature, photograph, or likeness, in any manner, on or in products, merchandise, or goods, or for purposes of advertising or selling, or soliciting purchases of, products, merchandise, goods or services, without such person's prior consent, or, in the case of a minor, the prior consent of his parent or legal guardian, shall be liable for any damages sustained by...

Words: 936 - Pages: 4

Premium Essay

Does Tim Burton Use Cinematic Techniques In Edward Scissorhands

...Tim Burton is one of the most innovative, creative, and successful directors to have ever come out of Hollywood. To reach this title, Burton creates and uses a unique style. Burton’s style consists of taking happy fairy tales and emphasizing the sinister effects in them. All the while, still making the films kid-friendly. Furthermore, Burton creates his main protagonist as an outcast, for example, Edward in Edward Scissorhands and Wonka in Charlie and the Chocolate Factory, to show how being different is a good thing because both characters still came out very successful. Tim Burton uses cinematic techniques to show that the outcast in society can be one of the most creative or talented individuals in society if given a chance. Tim Burton, in Edward Scissorhands, uses a close up on Edward’s hands to show and emphasize how different he is and how much potential he has. For example, when Peg first approaches the mansion, the audience sees beautiful sculptures that have been created by Edward. Then, Peg enters the mansion and meets Edward, who she then takes home. During his stay, Edward has so much success with making sculptures and cutting hair that Peg and Edward think about opening a hair salon. At this point, the audience wonders if Edward will be accepted into society because Burton portrays Edward as a monster. Therefore, the audience is hopeful that he will still be accepted because of his accomplishments. In Charlie and the Chocolate Factory, Burton uses long shots to accentuate...

Words: 542 - Pages: 3

Premium Essay

Ichabod Crane Compare And Contrast

...what's different? Van winkle and ichabod crane are similar in many ways. They both live in a village and spend a lot of time with the villager children. Van winkle spends time with the children and plays games with them. and ichabod crane teaches the children and gives them edication. They both learn a lot from spending time with the children of the village. Ichabod crane does NOT believe in ghosts, he mocks the children and adults who do believe in ghosts. They try to convince him that the headless horseman does exist. eventually after a few scares he starts to freak out. Van winkle on the other hand had no problem with ghosts but he did have a few with the devil. The devil makes...

Words: 267 - Pages: 2