Free Essay

The Bloodless Battle Field

In:

Submitted By mathhater9
Words 1633
Pages 7
The Bloodless Battlefield: Cyber-War

Vernon Pratt
HSM 438
18 July, 2014
Professor Stephanie Lemmon

Digital battle is not only what is found on computer games, it is an all to real and costly form of combat in which the combatants and defenders alike do not suffer physical wounds but the effects of these cyber-battles can be just as deadly as any bullet fired from a gun or bomb dropped from an aircraft. Within this paper three separate cyber-warfare events are reviewed, each event is different from the other only in terms of the consequences, only the consequences were different.
What is “Cyber-Warfare”? One definition of cyber-warfare is, “cyberattacks are so inexpensive and easy to mount, with few fingerprints, they will almost certainly remain a feature of modern warfare.” (Markoff, 2008). Digital battles waged within the digital world of computer systems and the world-wide-web (internet). Cheap, “It costs about 4 cents per machine,” (Markoff, 2008), so cheap that the cost of one armored tank tread (one piece of the entire treack) could finance an entire cyber-war (Markoff, 2008).
The first cyber-warfare event, Estonia 2007: Following the fall/collapse of the Soviet Empire in 1990 formerly USSR controlled nation states returned to autonomous control; Estonia was one of these countries. Being released from Soviet control did not mean that the civilian population wanted to be free from the Russian government and tensions existed between pro-Estonian and pro-Russian citizens; it was these tensions that would inflame and erupt into nationwide civil unrest. The Estonian government tore down a revered military tribute statue that represent communist unknown Soldiers of that region. When anti-Estonian civilians became aware of the statues destruction rioting erupted. But a new form of civil unrest was also unleashed and that was Cyber-Warfare.
Now considered the first use of cyber-warfare on a grand scale Estonia, a country that was the most technologically advanced European country was brought to it’s digital knees by a series of cyber attacks (Landler & Markoff, 2007). For one month Estonian government, communications, and financial computer systems were degraded to a point of failure by denial of service attacks, “Aimed primarily at specific sites and networks, denial-of-service attacks block the access of legitimate users, rendering the entire site or network unavailable.” (IAR, 2014). The cyber-attackers used malware as the means to sustain and propagate the attacks through zombie systems around the world, some of which originated in the United States. One such zombie computer was identified as being within the Russian President, Vladimir Putin’s administration so early accusations were that the Russians were supporting the unrest to undermine the Estonian government.
The attacks lasted for a month, ending as abruptly as they started. Only one hacker was identified but many more are suspected from the very basic hacker to the ultra-sophisticated hacker. The resulting effects of the Estonian cyber-attacks was a “wake up call” for all nation states that their own computer systems are vulnerable and can be exploited in such a manner as to at the very least degrade to utterly destroy those systems control, “The aftermath of a cyber attack can impact anyone that uses the internet, whether it is an individual, business, or government that has been affected.” (Ashmore, 2009, p. 4)

The second cyber-warfare event, the Russian-Georgian War: Oil, Gas, Natural Resources, all were a reason for Russia to invade the country of Georgia with a coordinated military assault to seize control of Georgia’s rich mineral resources. While the described Russian invasion seems to follow past practice Soviet methods it did vary in one very important aspect, it is considered the first known use of cyber-warfare in conjunction with military air, sea, and ground forces, “This appears to be the first case in history of a coordinated cyberspace domain attack Synchronized with major combat actions in the other warfighting domains (consisting of Land, Air, Sea, and Space). “…” (Hollis, 2010, p. 2). The Russian military initiated a simultaneous cyber attack upon Georgian communications nodes to hamper military defenses and deny the civilian population of real-time information, “"It seems that 54 web sites in Georgia related to communications, finance, and the government were attacked by rogue elements within Russia ... So as tanks and troops were crossing the border and bombers were flying sorties, Georgian citizens could not access web sites for information and instructions.”” (Hollis, 2010, p. 2). The most prevalent cyber-warfare technique employed as distributed denial of service (DDOS) attacks of which not all were originated from military cyber-soldiers, civilian hackers were also involved. Russia’s use of civilian hackers was innovative and effective but it has been determined that this level of cooperation between state and civilian actors is very difficult to achieve which reduces the likelihood of similar future attacks by state actors, “First, for Russia or China to employ their people's patriotic 'hacker militia' to conduct a network attack against a target nation-state, they must engage them first - to motivate and 'sell' them on the concept; steer them toward appropriate targets; synchronize those cyberspace operations with combat activity in the physical realm; and discuss the most effective cyberspace tactics, techniques and procedures (TTPs) to be used.” (Hollis, 2010, p. 5). The result of the Russian invasion was 25,000 civilians displaced and a ceasefire treaty that remains unfulfilled by Russia. Russia gained what it wanted in terms of natural resources but it also proofed a new dimension of warfare. It must be noted that the Russian cyber campaign and the military invasion was very controlled and deliberate, so deliberate that after analyzing the tactics the evidence upholds that Russia’s control implied it could have done much more damage then and could unleash more at any given time; a cyber-bully threat.
The third and last cyber-warfare event, the U.S. State Department Far East Region cyber-attacks 2006: June 2006, U.S. State Department Far East Division was targeted by cyber infiltration malicious code, the exact source of the perpetrator(s) is not known but evidence strongly suggested the originating country was China, “Hackers in China broke into the State Department's computer system in Washington and overseas in search of information, passwords and other data” (Wright, 2006). The U.S. State Department relies heavily upon digital information systems for communications and information archives, “Over our unclassified network, we daily process about 750,000 e-mails and instant messages from our more than 40,000 employees and contractors at 100 domestic and 260 overseas locations.” (Reid, 2007).
The method of infiltration was previously unknown Microsoft program weakness that allowed hackers to imbed malicious code into a legitimate Microsoft document that once activated opened a digital backdoor to the network operating system, also known as a Trojan Horse as it was undetectable. Though the weakness was unknown the State Department’s reliance on digital technologies was recognized as a vulnerability and a cyber protection program was in place, a program that prevents or thwarts cyber attacks daily, “we block 500,000 spam e-mails, intercept 5,100 viruses and detect some 2,000,000 anomalous external probes to our network.” (Reid, 2007).
It was the State Departments early detection that prevented widespread contamination of the entire State Department computer systems, limiting the damage to the originating region. In addition to finding and quarantining the effect region the State Department’s cyber protection program was key to creating a fix or patch for the program weakness through real-time (near instantaneous) information from the government to the computer industries. In the end very little data was corrupted or stolen and there was no loss of communications within or without the State Department.
In conclusion, comparing the three cyber-attacks (Estonian Civil Unrest, Russian Coordinated Cyber-Warfare on Georgia, and the U.S. State Dept. system compromise) I find that Estonia’s highly evolved technologies being brought down by independent users was a warning event; nations who do not heed this event are doomed to future failure. Russia, using a coordinated military and civilian initiated cyber-attack in conjunction with military power has demonstrated just how effective such a tactic can work and they are prepared to use it. Lastly, the attempted infiltration of the U.S. State Department unclassified computer systems represents how a robust and constant cyber-protection program can identify, quarantine, and remedy cyber-attacks before they cause irreversible damage.

Resources:
Taylor, Robert W., Eric Fritsch, John Liederbach, and Thomas Holt. Digital Crime, Digital Terrorism for Ashford University, 2nd Edition. 2011. Pearson Learning Solutions Inc.. Upper Saddle River, NJ.
John Markoff. Before the Gunfire, Cyberattacks. 12 August, 2008. Retrieved from http://www.nytimes.com/2008/08/13/technology/13cyber.html?_r=0
Mark Landler and John Markoff. Digital Fears Emerge After Data Siege in Estonia. 29 May, 2007. Retrieved from http://www.nytimes.com/2007/05/29/technology/29estonia.html?pagewanted=all&_r=0
International Affairs Review (IAR). Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security. 2014. Retrieved from http://www.iar-gwu.org/node/65
William C. Ashmore. Impact of Alleged Russian Cyber Attacks. 2009. Retrieved from http://www.bdcol.ee/files/files/documents/Research/BSDR2009/1_%20Ashmore%20-%20Impact%20of%20Alleged%20Russian%20Cyber%20Attacks%20.pdf
David Hollis. Cyberwar Case Study: Georgia 2008. 2010. Retrieved from http://smallwarsjournal.com/blog/journal/docs-temp/639-hollis.pdf
Donald R. Reid. Response to May-Julyh 2006 Cyber Intrusion on Department of State Computer Network. 19 April, 2007. Retrieved from http://2001-2009.state.gov/m/ds/rls/rm/83256.htm

Robin Wright. State Dept. Probes Computer Attacks. 12 July, 2006. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2006/07/11/AR2006071101032.html

Similar Documents

Premium Essay

Battle Of Killiecrankie: The Cause Of The Jacobite Uprisings

...academic and political positions, and issued the Declaration of Indulgence allowing Catholics to worship in public. The Scottish parliament was against complete religious tolerance. Following the birth of a son in 1688, Catholic succession was more certain. William of Orange, a Dutch prince was invited to take the throne by England's Protestant leaders. King James fled the country on 23 December, and, in February 1689, the English Parliament declared that, by fleeing, James had abdicated. Parliament then offered the throne jointly to William and Mary. A convention held on 14 March 1689 in Edinburgh decided that the Scottish government would pledge loyalty to William of Orange. The revolution was bloodless but the battle over who was the rightful king did not remain bloodless....

Words: 572 - Pages: 3

Free Essay

Philippines and Wwii

...I. The Philippines and WWII II. II. Japanese Occupation and the Second Philippine Republic III. Battles for Liberation The Philippines and WWII The Philippines and the WWII Philippines prepares for war. On July 26, 1941, Lt. Gen. Douglas MacArthur, Military Adviser to the Philippine commonwealth, was asked by President Theodore Roosevelt to take command of the newly formed United States Armed Forces in the Far East (USAFFE). The Japanese era started December 8, 1941 (10 hours after the bombing on Pearl Harbor, which is the strongest U.S Base in Hawaii) December 10, 1941, the Japanese successfully breached Luzon. December 20, Japanese forces landed in Davao. First Japanese attack in Visayas was on December 18. MacArthur ordered the military supplies of USAFFE to Corregidor and Bataan. On December 23, Gen. MacArthur put into effect the secret military plan WPO-3 (War Plan Orange No.3) On December 24, 1941, President Quezon moved to Corregidor where the Commonwealth Government was transferred. On December 26, Gen. MacArthur declared Manila an “Open City.” On December 30, 1941, President Quezon and VP Osmenia took oath for the second inaugural ceremonies of the Commonwealth. On January 2, 1942, Japanese entered Manila in a bloodless occupation. President Roosevelt ordered President Quezon to go to US to serve as a Philippine government-in-exile. He left Corregidor by submarine on February 20. Heroisms: Mess Sergeant Jose Calugas...

Words: 885 - Pages: 4

Premium Essay

Why Did The South Win The Civil War Essay

...long struggle. Many campaigns, such as the Peninsular campaigned displayed the impressive tactics of generals in both the North and South. The Civil War also became the first “modern war,” utilizing fighting styles, and advances in technology and weapons. Early campaigns in the war sought to win quick, decisive victories that would force the other side to step down. After the Battle of Bull Run, it became apparent to the North that the South would not easily be defeated. The Union's Peninsular Campaign took a slower approach to capturing the Southern city of Richmond. Though technically a victory for the Union, the Peninsular campaign brought a great turn of events for the South. With the South's limited resources a defensive plan was ideal, but the people were eager to take the offensive (Keene, 381). The southerners hoped several early wins would encourage the Union to abandon their mission....

Words: 724 - Pages: 3

Premium Essay

Civil War: The Confederate Flag

...the U.S. flag. So the second flag, named Stainless Banner, was created in 1863 and displayed the current Confederate flag in the content section of the design and the remaining field of the flag was white. The white refers to the “stainless” nature of the flag. Soon, this flag was criticized for looking like a flag of surrender when the wind wasn't blowing thus causing for the creation of the third flag introduced in March of 1865. The Bloodless Banner, which was just the stainless banner with a red vertical bar at the end, marked the end of the flags that were created as official national flags of the Confederacy. However, after the Civil War, attention was shifted to the Confederate Army of Northern Virginia’s battle flag. The Northern Virginia battle flag had 13 stars, one for each state in the Confederacy, in the shape of an ‘X’. This flag became the battle flag of the Confederate army and was used in battle beginning in December 1861 until the fall of the Confederacy. The Confederate army preferred this flag over the other designs because it resembled the Union flag the least out of all the flags conceived. The flag was square in shape and was stretched to a rectangle shape when used across the Confederacy. Quickly, this flag became the most prominent among the Confederate army. The rectangular Battle Flag of Northern Virginia is now commonly referred to as "the Confederate Flag” regardless of the fact that it was never recognized as a national flag of the Confederate army...

Words: 1234 - Pages: 5

Premium Essay

A Mind After War

...the war was lost in that the Vietcong drove out the United States. War can do many things to the minds of soldiers. Some believe that war is important because it can bring peace. This however can be at the loss of the sanity and minds of the soldiers at war. Frederick Downs retells his personal experience in “The Killing Zone,” and how a mind can be transformed through war and pressure. These effects can cause many to lose their mind and who they are as a person. Downs gives a direct reflection of his personal experience and how he physically, but more importantly mentally changed. Downs entered into battle at the age of 23. He was states that he was mentally confident and physically ready for the battle he was about to face. (pg. 15) Going in he thought he was prepared and many soldiers receive training and think they are prepared for everything out there. When one goes into battle thinking they are ready it is great for moral and spirit among the company. Downs was fresh out of Officer Candidacy School. He was cream of the crop and ready for action. As soon as he steps foot in Vietnam on September 1967 he begins to have doubt. “Everything was lit up. I wondered when the mortars would start dropping in” (pg. 16) On his first night he is confused about the procedures that the Americans use at night and makes him already scared of what is to come. Already Downs is living in fear and stress. “Too pent up to sleep, I lay on the cot staring through the screened upper half of the...

Words: 1280 - Pages: 6

Premium Essay

Joan Of Arc Qualities

...Even before moving into Burgundy to assault Saint-Pierre-le Moutier and La Charite, she ignored warnings about the coming winter. This aggressiveness served her well on June 18th, 1429, at the Battle of Patay where she pushed her commanders to pursue and fight the English. After several successful sieges, the French rode their momentum to gain the open-field victory, an arena where the English were previously dominant. Again, at Lagny on March, 29, 1430, Joan’s cavalry charged a force of 300-400 Burgundians three times, putting most “to the sword” and capturing the rest. A month and a half later at Choisy-au-Bac, Joan had led several assaults against Burgundians, but their cannons were too powerful and she retreated. Finally, on the morning of May 23rd, Joan arrived at Compiegne. The Burgundians arrived with a force that “to this date there was no power with a stronger or more numerous gunpowder arsenal.” Joan aggressively led her cavalry out in a charge. After some skirmishes, the Burgundians captured her. These last two battles show how Joan’s aggressiveness worked against her and instead of having a positive impact; it effected her and the troops negatively. She appeared to have no notion of defense when she entered Compiegne, because she immediately charged out of the city when the Burgundians arrived. Compiegne was not a weak city and its citizens...

Words: 1876 - Pages: 8

Premium Essay

The Importance of the Nco

...Enlisted, Non-Commissioned Officers, and Staff Non-Commissioned Officers. As Marines move up the ladder his or her responsibility and contribution to the mission increases. This also means that those who have earned higher rank have a special responsibility to look out for the welfare of their subordinates. Traditionally, officers and noncommissioned officers of the Marine Corps wear a scarlet red stripe on their dress blue trousers to commemorate the courage and tenacious fighting of the men who battled before Chapultepec in the Mexican War. In the Corps, this stripe is more commonly known as the Blood Stripe. But how many realize that the battle at Chapultepec took place during one of the least bloody conflicts in the annals of U.S. Marine Corps history? Interestingly, more Marines were killed or wounded during the “Mayaguez Incident” battle with Khmer Rouge forces at Koh Tang Island, Cambodia, on May 14, 1975, than during the entire Mexican War. How many active duty Marines today remember the Marines of 2nd Battalion, 9th Marines, and the human cost of the Koh Tang helicopter assault that closed America’s longest war in Southeast Asia? Until the Mexican War when the Marines stormed the steps of Chapultepec more Marines were killed or wounded during another conflict in American history often forgotten, the War of 1812. The death of any Marine who willingly sacrificed his or her...

Words: 1725 - Pages: 7

Premium Essay

Cold War History Ia

...Robbie Alwood HOA 21 November 2011 Word Count: 1563 The Role of Economic issues in the Development of the Cold War A: Plan of Investigation: To simplify the causes of the Cold War the many issues that were contributing factors can be grouped into three major realms political ideological disputes, economic motives, and the struggle each country had to become the most dominant super power. At first glance it may not seem likely that a war, even a relatively calm and bloodless one such as the Cold War, could possibly be fueled by economic motives, but unfortunately money and trade are often the leading forces in determining whether or not to enter a war with a rival nation. In the case of the Cold War economic incentives were clearing present. The Soviets and the United States differ in their even in their economic ideology, the Soviets were looking to expand their totalitarian regime and needed an economic policy to fit that and closed trade open trade for fear that idea of democracy would spread through commerce from the west; while the United States was known for supporting free and open trade among all nations. The most important question being, what were the economics issues that lead to Cold War and to completely answer this question one must look at primary and secondary sources of evidence that show economic differences of each country which may have lead to the Cold War. The policies taken and economic ideologies of each of the Soviets and the United States...

Words: 1751 - Pages: 8

Free Essay

Naxal Literature

...polite, highly civilized ... So when he kills, it is a necessary killing.’ Mahasweta Devi (2002, p.XXII) It would of course be a truism to say that we live in an increasingly violent world. Various populations live terror stricken lives, occupied by foreign powers, or fearing militant attacks – to mention just two easily observed realities. To put it somewhat differently, different political agents, different agents seeking to change or perpetuate the ordering of society, seem to be increasingly reaching out to violence as a tool for achieving their purposes. India, the primary concern of this paper, too, is convulsed by an increasing spiral of violence. Kashmir remains one of the most heavily militarised zones in the world1; pitched battles continue to be fought in the ‘North-East’; Hindu2 and Muslim extremists carry out terrorist strikes in the country; and the CPI-Maoists3, one of over thirty underground Communist parties waging war against the Indian state4, is met by a Government that arms civilians to fight them5 and also sends in various security forces for its ‘Operation Green Hunt’. The list could go on for some time. And this without considering the fact that all major political parties in India work with their own goons, and/or are associated with some. Yet, in political debates in various news channels or opinion pieces in newspapers one hardly finds anyone advocating violence. Put like this, this may appear absurd, but of course there is an obvious explanation...

Words: 1761 - Pages: 8

Free Essay

Energy Savings

...Advances in technology can bring about dramatic changes in military operations, often termed revolutions in military affairs or RMAs. Such technology-driven changes in military operations are not merely a recent phenomenon: they have been occurring since the dawn of history, they will continue to occur in the future, and they will continue to bestow a military advantage on the first nation to develop and use them. Accordingly, it is important to the continued vitality and robustness of the U.S. defense posture for the DoD R&D community to be aware of technology developments that could revolutionize military operations in the future, and for the U.S. military services to be on the lookout for revolutionary ways in which to employ those technologies in warfare. This report examines the history of past RMAs, to see what can be learned from them regarding the challenge confronting the DoD today, when it has set out on a concerted effort to bring about a technology-driven transformation of the U.S. military to achieve the operational goals outlined in Joint Vision 2010. Among its many findings are three of particular note: * RMAs are rarely brought about by dominant players (such as the U.S. military is today). * For a dominant player to bring about an RMA requires a receptive organizational climate, fostering a continually refined vision of how war may change in the future and encouraging vigorous debate regarding the future of the organization; senior officers with traditional...

Words: 3503 - Pages: 15

Free Essay

Janan

...leaders 1 comment Posted in Leaders from History | 1 comment I must confess that I have a bit of thing about Napoleon. A quick check on Amazon will show you (reassuringly, perhaps, for me) that I am not alone. There are a lot of books about Napoleon. If you are a student of leadership, then you come up against Napoleon like a student of modern art comes up against Picasso. There is simply no way around the man. But why? Firstly, Napoleon had a very large canvass to work on. The French revolution was a truly remarkable event. It began as an essentially liberal revolution, but was hijacked (as revolutions so often are) by homicidal fanatics: Robespierre and his fellow Jacobins. When Napoleon seized power in a nearly botched but nevertheless bloodless and generally welcomed coup, he became the leader of a nation that was beset on all sides by the old monarchies of Europe, desperate to snuff out this terrifying, king-killing, unthinkable republic in its midst. The French people were equally desperate to retain their new and bitterly hard-won freedoms from the essentially feudal rule of the Bourbon kings and the Ancien Régime. A significant sector of society was also keen to keep its hands on the financial benefits that they had accrued by buying up, at a very good price, the lands and estates previously owned by the monarch, the aristocracy and the church. Napoleon found himself at the head of nation that was predisposed to welcome his proven military skills, which could be usefully deployed...

Words: 6177 - Pages: 25

Free Essay

Defeating the Enemies Will

...Defeating the Enemy’s Will: The Psychological Foundations of Maneuver Warfare DAVID A. GROSSMAN The will to fight is at the nub of all defeat mechanisms … One should always look for a way to break the enemy’s will and capacity to resist. Brig. Gen. Huba Wass de Czege Defeating the enemy’s will. That is the essence of maneuver warfare, that you defeat the enemy’s will to fight rather than his ability to fight. But how do you defeat a man’s mind? We can measure and precisely quantify the mechanics of defeating the enemy’s ability to fight, and it is this tangible, mathematical quality that makes attacking the enemy’s physical ability to fight so much more attractive than attacking the enemy’s psychological will to fight. At some level none of us can truly be comfortable when we dwell on the fact that our destiny as soldiers and military leaders ultimately depends on something as nebulous and unquantifiable as an enemy’s “will,” and we are tempted to ignore such aspects of warfare. But somewhere in the back of our minds, a still, small voice reminds us that ultimately the paths of victory run not through machinery and material, but through the hearts and minds of human beings. So what is the foundation of the will to fight and kill in combat and what are the vulnerable points in this foundation? In short: what are the psychological underpinnings of maneuver warfare? To answer these questions, students of maneuver warfare must truly understand, as we have never understood before...

Words: 17523 - Pages: 71

Premium Essay

Hitler

...AU/ACSC/0609H/97-03 A MILITARY LEADERSHIP ANALYSIS OF ADOLF HITLER A Research Paper Presented To Dr. Richard Muller Air Command and Staff College In Partial Fulfillment of the Graduation Requirements of ACSC by Major Paul A. Braunbeck, Jr. March 1997 Distribution A: Approved for public release; distribution is unlimited Disclaimer The views expressed in this academic research paper are those of the author and do not reflect the official policy or position of the US government or the Department of Defense. ii Contents Page DISCLAIMER ................................................................................................................ ii PREFACE ...................................................................................................................... iv ABSTRACT.................................................................................................................... v HITLER’S POLITICAL DECISION MAKING PROCESS.............................................1 Personality and Goals..................................................................................................1 Hitler’s Grand Strategy?..............................................................................................3 HITLER AS A MILITARY LEADER.............................................................................9 Strengths........................................................................................

Words: 10450 - Pages: 42

Premium Essay

Leadership

...AU/ACSC/0609H/97-03 A MILITARY LEADERSHIP ANALYSIS OF ADOLF HITLER A Research Paper Presented To Dr. Richard Muller Air Command and Staff College In Partial Fulfillment of the Graduation Requirements of ACSC by Major Paul A. Braunbeck, Jr. March 1997 Distribution A: Approved for public release; distribution is unlimited Disclaimer The views expressed in this academic research paper are those of the author and do not reflect the official policy or position of the US government or the Department of Defense. ii Contents Page DISCLAIMER ................................................................................................................ ii PREFACE ...................................................................................................................... iv ABSTRACT.................................................................................................................... v HITLER’S POLITICAL DECISION MAKING PROCESS.............................................1 Personality and Goals..................................................................................................1 Hitler’s Grand Strategy?..............................................................................................3 HITLER AS A MILITARY LEADER.............................................................................9 Strengths........................................................................................

Words: 10450 - Pages: 42

Free Essay

The Paper Which Is Here

...-CD Aeschylus The seven against Thebes of Aeschylus ?CO O -co Presented to the library of the UNIVERSITY OF TORONTO by Mr. Edgar Stone J£Vf<- J£ The Nelson Playbooks Edited by JOHN HAMPDEN, M.A. THE SEVEN AGAINST THEBES No. 304 THE VILLAGE DRAMA SOCIETY In association with the British Drama League The Society sends out sets of plays for selecand gives advice on questions of production. It will arrange Drama Schools, and provides Lecturers and Adjudicators. The Costume Department makes a speciality of beautiful and accurate historical costume, tion, taking into account not only stage lighting for indoor plays, but distance and daylight on outWell-known portraits have door performances. The department been copied in many instances. can now undertake to dress Pageants, Mystery plays, Shakespeare, Restoration, Eighteenth Century, and early Nineteenth Century plays, as well as Greek drama. Further particulars may be had from : The Hon. 274 Secretary, Village Drama Society, New Cross Road, London, S.E.14. The Seven Against Thebes of iEschylus RENDERED INTO ENGLISH VERSE BY EDWYN BEVAN AUTHOR OF "THE HOUSE OF SELEUCUS" THOMAS NELSON AND SONS, Ltd. LONDON AND EDINBURGH LIBRARY ( All rights in this translation ai-e reserved 3§ PREFACE Out of the old festivals of the wine-god, Dionysos, in which songs had been sung by a chorus, dealing with stories of the legendary past, there was developed at Athens, in the fifth century B.C., the drama,...

Words: 15869 - Pages: 64