To what extent is the ‘special relationship’ more myth than reality? Has nuclear cooperation strengthened or weakened the Anglo-American security relationship? For what reasons has Anglo-American military cooperation persisted in the conflicts that have involved these two countries since the end of the Cold War? How much ‘specialness’ was evident during the War on Terror?

The Special Relationship? Anglo-American Security Relations

Choose One Question
1) To what extent is the ‘special relationship’ more myth than reality?

2) ‘The special security relationship has been critically dependent on the relationship between US Presidents and British Prime Ministers’. Discuss in relation to either a) the Cold War or b) post-Cold War periods.

3) ‘Great Britain’s .. attempt to play a separate role – that is, a role apart from Europe, a role based on a “special relationship” with the United States .. is about played out’ (Dean Acheson speech at the West Point Military Academy 5 December 1962). Was this statement accurate in 1962 and is it accurate today?

4) ‘The Suez Crisis was the nadir of the special relationship: the first Gulf War of 1990-91 was the high point’. To what extent do you agree?

5) If the Anglo-American intelligence relationship is so unequal, why has it lasted for so long?

6) Has nuclear cooperation strengthened or weakened the Anglo-American security relationship?

7) For what reasons has Anglo-American military cooperation persisted in the conflicts that have involved these two countries since the end of the Cold War?

8) How much ‘specialness’ was evident during the War on Terror?

How does the churn of USA elections every two years for 435 Representatives and 33 Senators impact American foreign policy?

American foreign policy

How does the churn of USA elections every two years for 435 Representatives and 33 Senators impact American foreign policy?

While the attacks shut down power grids and darkened many people’s night lights, it shone a light on the vulnerabilities of critical infrastructures around the world and in our own country. We wouldn’t feel safe driving on a bridge that had no protection, so why shouldn’t we protect our information highway?

Cyber-Firefighters Shine in the Darkness

On December 23rd, 2015 the cold, Ukrainian night was aglow with winter lights and decorations. As families closed their eyes to fall asleep and have darkness envelop them, darkness began to spread around western Ukraine; the lights went out. 225, 000 people in western Ukraine suddenly lost all electric power and had no idea as to why.

All at once, 103 cities were “completely blacked out,” and parts of 186 cities were left partially in the dark. During this blackout, many of those affected were unable to report their outage. Mystery added weight to the darkness, as call centers at Prykarpattya Oblenergo and another energy provider, Kyivoblenergo, were blocked from receiving calls from customers. The call centers were inundated with thousands of calls all at once from a cryptic source.

Prykarpattya Oblenergo was forced to send out response teams across western Ukraine to manually switch on all of the power generators which had inexplicably switched off. As the Prykarpattya engineers tried to turn the power back on, they discovered that a virus had erased the computers that the engineers use to monitor equipment during such outages. This left the engineers with no way to turn the lights back on through technical means. The engineers were forced to go “old-school” and travel to each station individually. After a few hours, the engineers reached all of the power stations that service the cities, manually flipped on the switches, and there was light again in western Ukraine.  With stories of the turmoil of the crisis in eastern Ukraine reaching the ears of those in the west daily, it was only natural to assume the worst; thoughts like these were not too far off.

Thousands of miles away, a phone rang. An Incident Response Team, the NPPD equivalent of a quick reaction force, prepared to be deployed to assist the Ukrainian government and the power companies in their investigations. Incident Response Teams from the National Cybersecurity and Communications Integration Center (NCCIC)/Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and the U.S. Computer Emergency Readiness Team (US-CERT), all of whom are a part of NPPD, stacked up and deployed to Ukraine to assist in the investigation as part of a U.S. inter-agency team.

Incidents like these, while rare, are a perfect example of the work that NPPD carries out in order to keep cyber systems free and defended from hackers. The Department of Homeland Security’s National Protection and Programs Directorate (NPPD) is tasked, among other things, with protecting the United States’ critical infrastructure, like power grids, from cyber-attacks like this.

America is made up of networks and systems, from communicating and traveling to banking and shopping. Like the highways that move us from place to place, electrical grids and the internet are made up of infrastructure; critically important to people and businesses across the world, these infrastructures have earned the moniker “critical infrastructure.” Not unlike how the infrastructure that transports people from place to place is vulnerable to attacks, the infrastructure that moves information is also at risk from terrorist and cyber-attacks or even natural disasters, like hurricanes or floods. NPPD analysts work 24 hours a day, seven days a week, to monitor these critical infrastructures in order to defend against attacks, with their Incident Response Teams being their equivalent of cyber firefighters.

An Incident Response Team, a team of four to six designated experts in the field of cybersecurity, is always packed with the critical equipment needed for any perceivable task, ready to depart at a moment’s notice to fix any cyber crisis.  The Incident Response Teams, also casually called “Fly Away Teams” are similar to deployable firefighters- but for computer and information systems. They are not always fighting fires or cyber hacks; other times they’re doing the cybersecurity equivalent of talking to kids, testing smoke alarms, and other proactive activities to prevent fires. NPPD and their various teams and subdivisions travel out to different agencies and private businesses to discuss best practices, plan strategies, and teach them to identify potential distribution vectors for malware in order to protect against it and learn how to notice it. If only Prykarpattya Oblenergo followed the lead of another Ukrainian power company, who completed an industry recognized malware search which detected and removed a very specific malware before anything bad had happened. The malware was called BlackEnergy and is well known in the cyber-security realm.

Cybercriminals have been exploiting the BlackEnergy since at least 2007 through various, edited versions. The attack scenario is a simple one. The target, such as a power company or a corporation, receives a phishing email that contains an attachment with a malicious document, for instance a Word document. Once opened, the target ends up infected with BlackEnergy- showing how one small, inadvertent click on something that looks harmless can cause massive software vulnerabilities.

Prykarpattya Oblenergo was the first electricity failure caused by a computer hack according to the U.S. Department of Homeland Security. It would be ignorant to believe that a hack that shuts down a major power grid could only happen in a country like Ukraine. BlackEnergy has been found to be the culprit in a hack to target NATO and, must worrying for those of us here in the United States, even found on systems used by the United States government and on other critical infrastructure. Luckily, the experts at NPPD and Homeland Security were able to discover the intrusion before the malware had a chance to damage, modify, or otherwise disrupt any of the industrial systems or critical infrastructure in the United States, speaking to the success and importance of those that work at NPPD.

NPPD is a lot like television’s Dr. Gregory House, but focused instead on computer viruses rather than those of the body…and hopefully a lot nicer. They are not concerned about who did the hack; they instead seek out the technical issues and focus on how best to formulate a plan to fix the issue for those who come to them for help. In the past, DHS has warned that BlackEnergy has infected various industrial control systems that make up a substantial portion of the critical infrastructure. With the American energy grid becoming increasingly more automated, any American energy company that falls victim to the same kind of attack as the one in Ukraine would be much more hard pressed to quickly turn back on their power grids by hand.

The above situation speaks to the importance of the Department of Homeland Security’s National Protection and Programs Directorate. From diagnostician like computer analysts, to the firefighter like members of the Fly Away teams, NPPD is uniquely positioned and prepared to protect the United States from attacks on our critical infrastructure.

The investigation has not officially named a culprit in the BlackEnergy cyber-attacks. While the attacks shut down power grids and darkened many people’s night lights, it shone a light on the vulnerabilities of critical infrastructures around the world and in our own country. We wouldn’t feel safe driving on a bridge that had no protection, so why shouldn’t we protect our information highway?

What are the most important challenges facing US international dominance? Are this primarily or ?

US international dominance

What are the most important challenges facing US international dominance? Are this primarily domestic or international?

To what extent do borders operate as a form of violence in world politics? Are ethics too anthropocentric? Discuss in relation to climate change and our duties, if any, to non-humans.

Borders operate as a form of violence in world politics

To what extent do borders operate as a form of violence in world politics? Are ethics too anthropocentric? Discuss in relation to climate change and our duties, if any, to non-humans.

What is the relevant literature to your topic? How have other scholars answered your research questions? Why is your work contributing new and/or important ideas to this literature? Based on your review of the existing literature, what do you expect to find?

Research: extent and impact of fake news and misinformation in Kurdistan region of iraq

Paper should include the following sections (Add subheadings and other sections if need be):
Title page
Your title page should include: title of the project, student name. Choose a short title which gives a clear idea of what your project is about.
Abstract
An Abstract is a succinct summary of your research. It should represent why and how you did what you did, and what the results and implications are. This shouldn’t exceed 300 words.
Contents Page
The contents pages will show the structure of the dissertation. Any imbalance in space devoted to different sections of content will become clear. This is a useful way to check if you need to join sections or create new or sub-sections.

Introduction
Introduce your topic. Why is it interesting? How did you arrive at this topic? State your research questions. State your central findings in your thesis statement.

Research Question
State your research question.
Literature review
What is the relevant literature to your topic?
How have other scholars answered your research questions?
Why is your work contributing new and/or important ideas to this literature?
Based on your review of the existing literature, what do you expect to find? These are your hypotheses. Your

Instructions
Methodology
How will you answer your questions?
Depending on your method, this section will take different forms. Are you analyzing documents or data? How are you collecting this data? This section should be very detailed, especially in your first draft. It’s better to include too much explanation of how you’ve conducted your original research, and then cut it later.

Theoretical Framework
Connect your research with a political theory and discuss the framework of the research in accordance to that theory.
Analysis
This should be where you create charts from PSPP or SPSS in regards to the findings from your survey and analyze the data presented.

Argumentation
What did your research reveal? Discussion of your research findings and analysis? How do your findings compare with your expectations? How do your findings answer your research questions? In a theoretical project you should make a concrete argument drawing upon evidence (case studies, data etc.)

Solution
You can merge this section with any other section.. you can decide what is more appropriate Come up with possible solutions to counter fake news in terms of the last question from the survey. Present possible solutions from each aspect of the options (for example how politicians can help, how social media companies can help and the role each play etc..)

Conclusion

Instructions
What contributions does this research make to the research in Public Policy, Security Studies and/or International Relations? Based on your findings, what future research do you think would shed more light on your research questions?

How does those policies affect canada prairies? since the western Canada is rich of its resources. especially Alberta with its oil. Is it fair for the western Canada?

Industry in western Canada

“Despite their complaints, the Western Provinces have always received fair and equal treatment from the rest of Canada.” What to do with the oil industry in western Canada, because the federal government passed carbon taxes and other environmental policy.

Additional question to answer: How does those policies affect canada prairies? since the western Canada is rich of its resources. especially Alberta with its oil. Is it fair for the western Canada?

instructions:
– Notes bib chicago citation style
– 6 sources from journals or books
– 12 point font
– follow proper essay style and structure
– do not use 1st person pronouns

You don’t have to take sides. Could be neutral, somewhere in between. Whether you’re pro to the west or the federal government of Canada. One side could be more right than the other. Do not plagiarize. do not use previous works. the work will be checked with Turnitin school database before being submitted.

Explain the strengths and weaknesses of Obama’s attempts to change US foreign policy and was the need. Explain US views as a Great Super power and the importance they see in foreign policy and tap into the concept of “US hegemony”.

To what extent did President Barack Obama manage to change the direction of US foreign policy?

Essay MUST be referenced in Harvard Referencing! This essay is like a project like essay, that brings knowledge, content, materials and ideas through out the whole course. This essay will be answering a change or continuity question. it is important to note that when answering the question. The essay needs to be argued through the Morphogenetic Approach and via the EPISTEME ANALYICAL MODEL TO EXPLAIN ARGUMENT IN ESSAY. Guidance on how to answer this questions through these modules will be attached in the files of “Writing your essay USFP”, “essay structure” and “Actors, factors, Structures” This essay needs to have an introduction that shows the understanding the of question and what is looking to be answered, the introduction should explain the strengths and weaknesses of Obama’s attempts to change US foreign policy and was the need. Explain US views as a Great Super power and the importance they see in foreign policy and tap into the concept of “US hegemony”. The essay should state arguments for and against the question whether or not Obama was successful, did he bring change into US foreign police, enabling a pivot or turning point is US politics and foreign policy or was it just continuity from previous work from his predecessors, like Bush. Thank you.

While the attacks shut down power grids and darkened many people’s night lights, it shone a light on the vulnerabilities of critical infrastructures around the world and in our own country. We wouldn’t feel safe driving on a bridge that had no protection, so why shouldn’t we protect our information highway?

Cyber-Firefighters Shine in the Darkness

On December 23rd, 2015 the cold, Ukrainian night was aglow with winter lights and decorations. As families closed their eyes to fall asleep and have darkness envelop them, darkness began to spread around western Ukraine; the lights went out. 225, 000 people in western Ukraine suddenly lost all electric power and had no idea as to why.

All at once, 103 cities were “completely blacked out,” and parts of 186 cities were left partially in the dark. During this blackout, many of those affected were unable to report their outage. Mystery added weight to the darkness, as call centers at Prykarpattya Oblenergo and another energy provider, Kyivoblenergo, were blocked from receiving calls from customers. The call centers were inundated with thousands of calls all at once from a cryptic source.

Prykarpattya Oblenergo was forced to send out response teams across western Ukraine to manually switch on all of the power generators which had inexplicably switched off. As the Prykarpattya engineers tried to turn the power back on, they discovered that a virus had erased the computers that the engineers use to monitor equipment during such outages. This left the engineers with no way to turn the lights back on through technical means. The engineers were forced to go “old-school” and travel to each station individually. After a few hours, the engineers reached all of the power stations that service the cities, manually flipped on the switches, and there was light again in western Ukraine.  With stories of the turmoil of the crisis in eastern Ukraine reaching the ears of those in the west daily, it was only natural to assume the worst; thoughts like these were not too far off.

Thousands of miles away, a phone rang. An Incident Response Team, the NPPD equivalent of a quick reaction force, prepared to be deployed to assist the Ukrainian government and the power companies in their investigations. Incident Response Teams from the National Cybersecurity and Communications Integration Center (NCCIC)/Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and the U.S. Computer Emergency Readiness Team (US-CERT), all of whom are a part of NPPD, stacked up and deployed to Ukraine to assist in the investigation as part of a U.S. inter-agency team.

Incidents like these, while rare, are a perfect example of the work that NPPD carries out in order to keep cyber systems free and defended from hackers. The Department of Homeland Security’s National Protection and Programs Directorate (NPPD) is tasked, among other things, with protecting the United States’ critical infrastructure, like power grids, from cyber-attacks like this.

America is made up of networks and systems, from communicating and traveling to banking and shopping. Like the highways that move us from place to place, electrical grids and the internet are made up of infrastructure; critically important to people and businesses across the world, these infrastructures have earned the moniker “critical infrastructure.” Not unlike how the infrastructure that transports people from place to place is vulnerable to attacks, the infrastructure that moves information is also at risk from terrorist and cyber-attacks or even natural disasters, like hurricanes or floods. NPPD analysts work 24 hours a day, seven days a week, to monitor these critical infrastructures in order to defend against attacks, with their Incident Response Teams being their equivalent of cyber firefighters.

An Incident Response Team, a team of four to six designated experts in the field of cybersecurity, is always packed with the critical equipment needed for any perceivable task, ready to depart at a moment’s notice to fix any cyber crisis.  The Incident Response Teams, also casually called “Fly Away Teams” are similar to deployable firefighters- but for computer and information systems. They are not always fighting fires or cyber hacks; other times they’re doing the cybersecurity equivalent of talking to kids, testing smoke alarms, and other proactive activities to prevent fires. NPPD and their various teams and subdivisions travel out to different agencies and private businesses to discuss best practices, plan strategies, and teach them to identify potential distribution vectors for malware in order to protect against it and learn how to notice it. If only Prykarpattya Oblenergo followed the lead of another Ukrainian power company, who completed an industry recognized malware search which detected and removed a very specific malware before anything bad had happened. The malware was called BlackEnergy and is well known in the cyber-security realm.

Cybercriminals have been exploiting the BlackEnergy since at least 2007 through various, edited versions. The attack scenario is a simple one. The target, such as a power company or a corporation, receives a phishing email that contains an attachment with a malicious document, for instance a Word document. Once opened, the target ends up infected with BlackEnergy- showing how one small, inadvertent click on something that looks harmless can cause massive software vulnerabilities.

Prykarpattya Oblenergo was the first electricity failure caused by a computer hack according to the U.S. Department of Homeland Security. It would be ignorant to believe that a hack that shuts down a major power grid could only happen in a country like Ukraine. BlackEnergy has been found to be the culprit in a hack to target NATO and, must worrying for those of us here in the United States, even found on systems used by the United States government and on other critical infrastructure. Luckily, the experts at NPPD and Homeland Security were able to discover the intrusion before the malware had a chance to damage, modify, or otherwise disrupt any of the industrial systems or critical infrastructure in the United States, speaking to the success and importance of those that work at NPPD.

NPPD is a lot like television’s Dr. Gregory House, but focused instead on computer viruses rather than those of the body…and hopefully a lot nicer. They are not concerned about who did the hack; they instead seek out the technical issues and focus on how best to formulate a plan to fix the issue for those who come to them for help. In the past, DHS has warned that BlackEnergy has infected various industrial control systems that make up a substantial portion of the critical infrastructure. With the American energy grid becoming increasingly more automated, any American energy company that falls victim to the same kind of attack as the one in Ukraine would be much more hard pressed to quickly turn back on their power grids by hand.

The above situation speaks to the importance of the Department of Homeland Security’s National Protection and Programs Directorate. From diagnostician like computer analysts, to the firefighter like members of the Fly Away teams, NPPD is uniquely positioned and prepared to protect the United States from attacks on our critical infrastructure.

The investigation has not officially named a culprit in the BlackEnergy cyber-attacks. While the attacks shut down power grids and darkened many people’s night lights, it shone a light on the vulnerabilities of critical infrastructures around the world and in our own country. We wouldn’t feel safe driving on a bridge that had no protection, so why shouldn’t we protect our information highway?

Why (and in which historical conjecture) does discriminating representation of South Asians and Arabs be produced and reproduced in the media. Discuss how terror attacks in the US by people of colour are given more attention versus terror attacks by Caucasians. Must have 5 scholarly sources

Why is there discriminatory representation of Muslims in the Media

Why (and in which historical conjecture) does discriminating representation of South Asians and Arabs be produced and reproduced in the media. Discuss how terror attacks in the US by people of colour are given more attention versus terror attacks by Caucasians. Must have 5 scholarly sources