Monday, January 27, 2020

Techniques of Spoofing Attacks

Techniques of Spoofing Attacks Spoofing is sending fake address of a transmission to gain entry which is illegal into a secure system. It is creates fake responses or signals in order to keep the session alive and prevent timeouts. It captures, alters, re-transmits a communication stream that can mislead the recipient. Hackers use it to refer especially to the TCP/IP packets of addresses in order to disguise a trusted machine. The term spoofing has spread all over the world. The term spoofing refers to stealing the passwords and personal information of a particular person from the internet. The word spoof came into existence by the British comedian Arthur Roberts in 1852.In the 19th century, Arthur Roberts invented the game spoof and thus the name. This game had the use of tricks and non-sense. The first recorded reference to this game in 1884 refers to its revival. Very soon the word spoof took on the general sense of nonsense and trickery. The word spoof was first recorded in 1889.[4] TYPES: Types of Spoofing covered are as follows: 1. E-Mail Spoofing 2. Caller ID Spoofing 3. SMS Spoofing 4. Website Spoofing 5. DLL Spoofing 6. IP Spoofing 1.1.1 Definitions: 1) E-Mail Spoofing: Basically email spoofing is of the type in which the sender address and other parts of the email are altered so that it appears as if it is sent from a different source 2) Caller id Spoofing: Caller id is the way of making fake calls to other people wherein the number of the sender appears as if he/she is calling from another number. 3) SMS Spoofing: SMS Spoofing allows us to change the name or number of the text messages appear to come from. 4) Website Spoofing: Website Spoofing is a method of misleading the people or perhaps the readers that the website has been made by some other organization or by some other known person. 5) DLL Spoofing: DLL code runs in the context of its host program, it inherits the full capabilities of the programs user with spoofing. 6) IP Spoofing: IP spoofing is the way in which the sender gets unauthorized access to a computer or a network by making it appear that a certain message has come from a trusted machine by spoofing the IP address of that machine. SECTION 2 EMAIL SPOOFING 2.1 INTRODUCTION: This is considered to be one of the most used techniques of spammers and hackers. They spoof their return e-mail addresses. That makes it look as if the mail has come from some other person. This is a form of identity theft, as the person who sends the email acts to be someone else in order to distract the recipient to do something. 2.2 OBJECTIVE: The objective of spoofed mail is to hide the real identity of the sender. This can be done because the Simple Mail Transfer Protocol (SMTP) does not require authentication. A sender can use a fictitious return address or a valid address that belongs to someone else. The mails that are spoofed can be very annoying, irritating and at times dangerous. Having your own address spoofed can be even worse. If the sender or probably the hacker uses our address as the return address, then our inbox may fill with receivers complaints as well as they might report us in the spammers as well. This type of spoofing can be very dangerous. 2.3 MOTIVES: These might be the possible motives of an attacker: 1. This is spam and the person who sends doesnt want to be subjected to anti-spam laws 2. The e-mail constitutes threatening or harassing or some other violation of laws. 3. The e-mail contains a virus or Trojan and the sender believes you are more likely to open it if it appears to be from someone you know 4. The e-mail requests information that you might be willing to give to the person the sender is pretending to be, as part of a social engineering. 2.4 PHISHING: Phishing is associated with Email spoofing. Phishing is the practice of attempting to obtain users credit card or online banking information, often incorporates e-mail spoofing. For example, a phisher may send e-mail that looks as if it comes from the banks or credit cards administrative department, asking the user to log onto a Web page and enter passwords, account numbers, and other personal information. Thereby obtaining the users confidential information.[2] 2.5 WORKING: This is the most easily detected form, in e-mail spoofing it simply sets the display name or from field of outgoing messages to show a name or address other than the actual one from which the message is sent. Most POP e-mail clients allow you to change the text displayed in this field to whatever you want. For example, when you set up a mail account in Outlook Express, you are asked to enter a display name, which can be anything you want, as shown in Figure 2.1. Fig 2.1:ÂÂ  Setting the display name in your e-mail client The name that we set will be displayed in the recipients mail program as the person from whom the mail was sent. We can type anything you like in the field on the following page that asks for your e-mail address. These fields are separate from the field where you enter your account name assigned to you by your ISP. Figure 2.2 shows what the recipient sees in the From field of an e-mail client such as Outlook. Fig.2.2ÂÂ  The recipient sees whatever information you entered When this simplistic method is used, you can tell where the mail originated (for example that it didÂÂ  notÂÂ  come from thewhitehouse.com) by checking the actual mail headers. Many e-mail clients dont show these by default. In Outlook, open the message and then clickÂÂ  View | OptionsÂÂ  to see the headers, as shown in Figure 2.3. Fig 2.3:ÂÂ  Viewing the e-mail headers In this example, you can see that the message actually originated from a computer named XDREAM and was sent from the mail.augustmail.com SMTP server. 2.6 PREVENTIVE MEASURES: Although legislation may help to deter some spoofing, most agree that it is a technological problem that requires a technological solution. One way to control spoofing is to use a mechanism that will authenticate or verify the origins of each e-mail message. The Sender Policy Framework (SPF) is an emerging standard by which the owners of domains identify their outgoing mail servers in DNS, and then SMTP servers can check the addresses in the mail headers against that information to determine whether a message contains a spoofed address. The downside is that mail system administrators have to take specific action to publish SPF records for their domains. Users need to implement Simple Authentication and Security Layer (SASL) SMTP for sending mail. Once this is accomplished, administrators can set their domains so that unauthenticated mail sent from them will fail, and the domains name cant be forged. SECTION 3 CALLER ID SPOOFING 3.1. INTRODUCTION: This type of spoofing is all about changing the Caller ID to show any desired unidentifiable number on the persons caller id who receives the call [1]. Caller id spoofing is a way of calling someone without them knowing who actually the person is, by hiding the phone number from their caller id. It is also known as the practice of causing the telephone network to display a number on the recipientsÂÂ  Caller id displayÂÂ  which is not that of the actual originating station. Just asÂÂ  e-mail spoofingÂÂ  can make it appear that a message came from any e-mail address the sender chooses, Caller ID spoofing can make a call appear to have come from any phone number the caller wishes. Because of the high trust people tend to have in the Caller ID system; spoofing can call the systems value into question hence creating problems for various parties associated with it. NAMES OF COMPANIES THAT PROVIDE THE CALLER ID SPOOFING FEATURE: SpoofCard Phone Gangster StealthCard TeleSpoof 3.2 WAY TO MAKE TEXT DISPLAY ON CALLER ID DISPLAY: With the help of the Spoof Card, Stealth Card, TeleSpoof and many more we can make the text show up on the caller id display instead of number. We have to choose some text from the huge list of funny caller id text phrases and that text will be displayed as our phone number. Some texts are shown below in the image. Fig 3.1 Text that can be shown in the caller-id display 3.3 USES: Caller-id spoofing can be used in the following places: Doctor needing to disguise home number so that he doesnt get unwanted calls on his home number Worried spouse wanting to find the truth Calling back an unknown number to find out the unknown identity without revealing original number Hiding your location 3.4 METHOD: Caller ID can be spoofed in many different ways and with different well advanced technologies. The most popular ways of spoofing Caller ID are through the use ofÂÂ  VoIPÂÂ  orÂÂ  PRIÂÂ  lines. Other method is that of coping theÂÂ  Bell 202ÂÂ  FSKÂÂ  signal. This method, calledÂÂ  orange boxing, uses software that generates the audio signal which is then coupled to the telephone line during the call. The object is to deceive the called party into thinking that there is an incomingÂÂ  call waitingÂÂ  call from the spoofed number, when in fact there is no new incoming call. This technique often also involves an accomplice who may provide a secondary voice to complete the illusion of a call-waiting call. Because the orange box cannot truly spoof incoming caller ID prior to answer and relies to a certain extent on the guile of the caller, it is considered as much aÂÂ  social engineeringÂÂ  technique as a technical hack. 3.5 MOTIVES: Sometimes, caller-id spoofing may be justified. There are necessary reasons for modifying the caller ID sent with a call. These can be the possible places where caller-ids are spoofed: Calls that come from a large organization or company, particularly those companies that have many branches, sending the main number is a good option. Consider this example. A hospital might have the primary number 777-2000, and around 250 lines functioning inside the main building, and another 200 at the clinic that is located around 50 miles away. I t may happen that most of the numbers will be in the form of 777-200XX, but it might also happen that many of them have an unrelated and unidentifiable numbers. Therefore if we have all calls come from 777-2000, it lets the call recipients identify that the incoming call is a hospital call. Most of the calling-card companies display Caller IDs of the calling-card user to the call recipients. Many Business owners and dealers use Caller ID spoofing to display their business number on the Caller ID display when they are calling from a place outside the office premises (for example, on a mobile phone). Skype users have an option of assigning a Caller ID number for preventing their outgoing calls from being screened by the called party (Skype Caller ID in the USA is 000123456). Google application Google VoiceÂÂ  displays its users Google Voice number when the users make calls from the service using their landline numbers or mobile phones. Gizmo5ÂÂ  sends the users Gizmo5 SIP number as outbound Caller ID on all calls. Because Gizmo5 IDs are in the format 747NXXXXXX, it is possible to confuse calls made from Gizmo5 with calls made fromÂÂ  area code 747. Fig 3.2. Software for Caller id Spoofing SECTION 4 SMS SPOOFING 4.1 INTRODUCTION: SMS Spoofing allows us to change the name or number of the text messages a recipient would appear to receive. It replaces the number from which the text message is received with alphanumeric text. This type of spoofing has both legitimate and illegitimate applications. The legitimate manner would be setting your name or company name or the product name for or from which the text message is sent. So thereby the text message received will display the name or the company name or the product name and the purpose in the case for e.g. a product (publicising it) would thus be served. The illegitimate way would be when a person or a company would use the name of some other person or name or a product with the intentions of causing losses to the concerned. 4.2 MOTIVES: SMS Spoofing takes place when the user from sending end changes the address information so as to conceal the original address from reaching the user at the receiver end. It is done mostly to impersonate a user who has roamed onto a foreign network, needs to be submitting messages to the home network. Generally these messages are addressed to destinations that are beyond the range of home network with the home SMSC (short messaging service centre) being hijacked hence causing messages to be sent to other network 4.3. IMPACTS: Following are the impacts of this activity: 1) Due to the hijacking of the home SMSC, The home network can bring in termination charges caused by the delivery of these messages to interconnect partners. This is termed as quantifiable revenue leakage. 2) These messages can be of concern to the partners involved. 3) It is possible that it comes under the notice of the customer that he is spammed and the message sent maybe of personal, financial or political importance to the concerned person. Therefore, there is a risk that the interconnect partners might threaten to stop the home network from functioning until and unless a suitable remedy is found and properly implemented. Hence, the consequence of this would be that the Home subscribers will be unable to send messages into these networks. 4) While fraudsters generally use spoofed-identities to send messages, there is a risk that these identities may match those of real home subscribers. This implies, that genuine subscribers may be billed for roaming messages they did not send and if this situation does arise, the integrity of the home operators billing will be under scrutiny, with potentially huge impact on the brand itself. This is a major churn risk. 4.4 USES: A person sends a SMS message from an online computer network for lower more competitive pricing, and for the ease of data entry from a full size console. They must spoof their own number in order to properly identify themselves. A sender does not have a mobile phone, and they need to send an SMS from a number that they have provided the receiver in advance as a means to activate an account. 4.5 THREATS: An SMS Spoofing attack is often first detected by an increase in the number of SMS errors encountered during a bill-run. These errors are caused by the spoofed subscriber identities. Operators can respond by blocking different source addresses in their Gateway-MSCs, but fraudsters can change addresses easily to by-pass these measures. If fraudsters move to using source addresses at a major interconnect partner, it may become unfeasible to block these addresses, due to the potential impact on normal interconnect services. SMS Spoofing is a serious threat to mobile operators on several fronts: 1. Mischarging subscribers. 2. Being charged interconnects fees by the hubs. 3. Blocking legitimate traffic in an effort to stop the spoofing. 4. Assigning highly trained and scarce resources to tackle the problem 4.6 EXAMPLES: Messages sent from Google are sent with the Sender ID Google. Skype sends messages from its users with the mobile number they registered with. Note that when a user attempts to reply to the SMS, the local system may or may not allow the replying message to be sent through to the spoofed origin. A user who does not have a mobile phone attempts to sign up for a Foxy tag account, which requires an SMS from a phone number that the user registers with. A dynamically assigned number from an anonymous SMS service will not work because the user is not given the dynamic number in advance to register with. Fig 4.1 this picture above shows the process of sms spoofing. SECTION 5 WEB SPOOFING 5.1 INTRODUCTION: Website spoofing is a type of spoofing which creates a website or web pages that are basically run with the intention to mislead users into believing that the particular website is created by a different group or a different person. Another form of website spoofing is creating false or fake websites that generally have the same appearance and layout as the original website and tricking people into sharing their personal or confidential information with the false Website. The fake websites can have a similar URL as well. Another technique associated with false URL is the use of Cloaked URL.This technique uses methods of domain redirection or URL forwarding which convincingly hides the address of the actual website. Website spoofing is often associated with Phishing. It can also be carried out with the intention of criticizing or making fun of the original website or the website developer or fraud as well.[3] 5.2 CONCEPT: So we can say that web spoofing basically enables an attacker/spoofer to create a shadow copy of the entire World Wide Web. Accesses to this fake Web are monitored through the attackers system, which helps the attacker to keep a watch on all of the victims web-activities. These activities include passwords and personal information (bank account numbers). It can also happen that in the victims name, the attacker sends certain information to the web servers or send any kind of information to the victim in the name of any Web server. Basically, the spoofer controls everything The victim does on the Web. 5.3 CONSEQUENCES: As the spoofer or the attacker has complete control(observing capability as well as modifying capability) over any data that is transmitting from the victim to the web servers and also all the data transactions from the servers to the victim , the attacker can misuse this in many ways. Some of the misusing ways are surveillance and tampering. 5.3.1 Surveillance: The attacker can conveniently spy on the traffic, registering which pages and sites the victim visits or surfs as well as the content of those pages. For example, when the victim fills out a particular form on a particular site, the entered details are transmitted to a server. The attacker can record all these details, along with the response sent back by the server. And as we know, most of the on-line commerce is done using forms; this information can also give the attacker -the account passwords and other valuable data of the victim. This is highly dangerous. Surveillance can be carried out by the spoofer even if the victim has a so called secure connection to the web-server. So basically, even if the victims browser shows the secure-connection icon (usually an image of a lock or a key) . It can be possible that the attacker is still successful in his Surveillance. 5.3.2 Tampering: Surveillance is basically just observing and registering confidential data of the victim. The spoofer can also MODIFY any of the data that may be travelling in either direction between the victim and the servers. This is called Tampering. If there are any forms submitted by the victim to the web servers, the attacker can bring about changes in the data entered. For example, if a person is purchasing a certain product on-line, the spoofer can change the product details, product number, shipping address etc. The attacker can also change the data returned by a Web server, for example by inserting misleadingoffensive material to trick the victim or to cause problems between the victim and the server. Misleadingoffensive material to trick the victim or to cause problems between the victim and the server. 5.3.3 Using the Web: It is not really difficult to spoof the entire World Wide Web, even though it might seem to be difficult. The attacker does not really have to store all the contents of the Web. The Web in its entirety is available on-line; so the spoofers server just has to fetch the required page or pages from the real Web whenever it needs to provide a copy of that page on the false Web. 5.4 Working of the attack: For this attack to work, the main duty of the attacker is to sit between the victim and the rest of the Web. This arrangement of sitting between the victim and the web is called a man in the middle attack. 5.5 Method: One of the most frequently used methods for web spoofing is URL Rewriting. 5.5.1 Url Rewriting Once the attacker fetches the real document, the attacker rewrites all of the URLs in the document into the same special form by same spoofing technique. Then the attackers server provides the rewritten page to the victims browser. This is how URL rewriting is used for spoofing. 5.6 Protection: Web spoofing is one of the most dangerous and undetectable security attacks that can be carried out in the web-world today. But of course, there are certain preventive measures that can be taken: 5.6.1 Short-term protection: These are the steps to follow for short term protection: a) Disable JavaScript in your browser so the spoofer wont be able to hide the evidence of the attack; b) Your browsers location line should always be visible; c) Observe URLs displayed on your browsers location line, and make sure that the URLs always point to the server you think youre connected to. 5.6.2 Long-term protection: There is no fully satisfactory long-term solution to this problem. But few things that can be done: a) Changing browsers can help, so they always display the location line. But the users have to know how to recognise the correct URLs. b) Using improved Secured-connection indicators. Fig 5.1.The picture above gives an idea of how web spoofing is done SECTION 6 DLL SPOOFING Dynamic Link Libraries or DLL are software object modules, or libraries, linked into a program while it is running DLLs are a feature that allows programs to share common codes so as to help developers to make programs easily and efficiently.DLLs are extensively used in newer versions of Windows. Fig 6.1.This picture above is hardware id DLL 6.1 INTRODUCTION: DLL code runs in the context of its host program, it inherits the full capabilities of the programs user with spoofing. The DLL spoof causes a legitimate program to load a DLL with a Trojan horse instead of legitimate DLL. DLL spoofing can occur even if the legitimate DLL is beyond the attackers reach. Since when a program loads DLLs it searches through a sequence of directories looking for the required DLL. Spoofing occurs when the attacker succeeds in inserting the infected DLL-file in one of those directory in such a way that program finds it before it finds the legitimate DLL of the same name. Hence even if the file is write-protected or the attacker doesnt have access to the directory which contains the legitimate DLL then also he can attack the program. Whenever a user runs a program there occurs a linking algorithm which is used to find the file that holds the DLL. Usually it is the one with DLL suffix. Linking algorithm searches through three different categories: 1. Programs directory: It is the directory which holds programs file. 2. System directory: Contains a series of entries. As we have discussed earlier to spoof the user only needs to insert an infected or malicious DLL file into the working directory. If the infected DLL file has the same name as the legitimate DLL then the algorithm will link the fake DLL file to the otherwise trusted program. The infected DLL can then create a new process. It runs in the full capabilities of the user who runs the, it perform the task and request the original DLL file as asked by the user so as not to arouse suspicion. With the help of fake DLL the attacker can now do whatever task he want which is under the capabilities of the fake DLL. Among the three above mentioned directories, the program directory and the system directory are most vulnerable as the location is predefined. But in the case of working directory this task is hard to perform as the directory is set by the program only and hence its directory is unknown to the user. Fig 6.2 dependency walker 6.2. WORKING OF ATTACK: This is where the social engineering skills come into play. The attacker tries to convince the user to open a simple file. This simple file can be a image too and can be located at any remote place like http://. Now the victim (in this case our user) tries to open that file (in this case the image) through a preinstalled software on his machine like a image viewer. Now this image viewer is vulnerable by the binary planting attack. Now the image viewer may require a DLL file to load dynamically. As the full path name gas not been specified before hand, image viewer will give instructions to Microsoft Windows to search for the required DLL file in a particular order. Directories in order: Working directory The system directory The 16-bit system directory Windows directory Current directory Directories which are listed in PATH environment variables Usually Current directory is the directory in which the image viewer file is stored. Now the attacker has control over one of the directories which windows search for, and hence he will be able to place a malicious copy of the dll in that directory. In such a case the application will load and run the malicious DLL without verification. And now the attacker has gained full control of the affected machine, and now he will be able to perform all the unwanted actions on the machine such as hack into the existing account, create a new account, access important files on specific directories and more. In such a case web securities like firewall has become an essential instrument to block and prevent the downloading of such malicious files from a remote network location. 6.3 TARGETS: The easiest and the most obvious targets for DLL spoofing are the machines running on windows. As here the registry has not been properly updated with a safe-search order for loading DLLs. The safe-search order is not an issue for the PCs running on XP as there are few infectious program and registries which point to fake DLLs or the DLLs which do not even exist. Such program or entries are the real cause of spoofing in the case of XP. Trojans, web caches and email are some of the ways in which codes are placed in the file system. Since obviously having a misconfigured programs or the search path does not mean that the machine will start running malicious code. As we know this breach is more harmful then the DLL spoof as ordinary user can easily place malicious file in the current folder like in Shared Documents. So when another user with privileged rights opens the document in the same directory, then this directory will become the Current Directory for the machine it will search for the DLLs before the system directory and hence allowing the ordinary user to operate the machine with privileged rights. Now one may ask that simply placing the DLL in the shared directory or a web cache will not allow it to be loaded, for the DLLs to be loaded they must be kept in either of system directory, the application directory or a path provided by the application that tries to load the DLL. So the answer is that being able to write to system and application file space already implies administrator privileges so there would be no need for DLL spoofing. Hence it arises the need of online security against the spoofing and accessing to administrator privileges. Now one may ask that simply placing the DLL in the shared directory or a web cache will not allow it to be loaded, for the DLLs to be loaded they must be kept in either of system directory, the application directory or a path provided by the application that tries to load the DLL. So the answer is that being able to write to system and application file space already implies administrator privileges so there would be no need for DLL spoofing. Hence arises the need of online security against the spoofing and accessing to administrator privileges. 6.4 PROTECTION: Microsoft Windows install auxiliary services like FTP server, telnet and web server which are not critical. If those services which are not needed by the administrator are removed then the threat is reduced at once. Microsoft, which we already know seems to have greatest problem with spoofing, tries to solve this problem using their Microsoft Authenticode Certificates. Well Microsoft needs to update DLLs continuously as outdated DLL could be dangerous in this world of hackers.Now the question arises that how we know that this DLLs are updated. Microsoft solved this problem with Microsoft 2000, by digitally signing the drivers by Windows Hardware Quality Lab(WHQL) tests. The drivers that passed were given a Microsoft digital signature. As mentioned earlier, in the present time this signing is done with Microsoft Authenticode Certificates. An authorized signer is used for these purpose which is known as thwarted. In present time many designers came up with a variety of tamper resistance. They concluded that even though a particular approach may seem effective, only Microsoft would have the resources, scope and platform control to make it practical . Here are two concepts which contain handling of drivers: Protected Path: Specifically known as PVP (Protected Video Path) and PUMA (Protected User Mode Audio). These are the mechanism used to support DRM (Digital Rights Management) rules about safe content presentations. Protected Environment: It is a kernel mechanism to ensure that kernel-mode drivers are safe for protected contents. These drivers should be signed by Microsoft and must implement specific security functions. All the kernel-mode drivers should be signed to ensure there safe origin and also that they are not tampered with. New mechanisms like OCP (Output Content Protection) are used in the versions after Windows Vista. Though at higher level OCPs Protected Path and Protected Environment make sense but it includes great complexity, management process and supporting infrastructure. Also implementation of OCP means device drivers get numerous new security responsibilities. Going back to DLL, a new complexity is revocation. Authorization is not useful unless it can be revoked when a compromise is discovered. For this Microsoft runs a revocation infrastructure that distributes a Microsoft Global Revocation List to identify no longer authorized driver software. Software revocation is problematic because of potential effect on users who may suddenly be unable to play content through no fault of their own. So revocation is likely to occur well, only after updates are distributed. So we have seen that after all the measures used by Microsoft, there is a long window of content vulnerability SECTION 7 IP SPOOFING 7.1 INTRODUCTION: IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the p

Sunday, January 19, 2020

Campus Security †Research paper Essay

Campus security is an ever-growing concern throughout the United States. Parents want their children to be safe while continuing their education away from home and students want to feel and be safe while living on campus. The University of Maryland at College Park has had a constant battle with campus security as incidences have increased on and around campus. The University of Maryland is located between Washington D.C. and Baltimore, a â€Å"hotspot†, concentrated with high levels of criminal activity. In 2002 there were 17 sex offenses, 9 robberies, 12 aggravated assaults, 140 burglaries, 86 motor vehicle thefts, 136 drug related arrests, and 9 illegal weapons possession arrests on Maryland’s campus (UMD Crime Statistics). These statistics represent only on campus incidents and have varied tremendously over the past three years. Statistics would be much higher if they included areas around campus. Variations over the years can be attributed to increase in police presence, as well as many security precautions implemented over the past years. Universities have taken many precautions to battle crime on and around campus. â€Å"One of the newest techno-trends on American college and university campuses is tipping campus police to illicit activity by filling out online forms posted on the department’s World Wide Web page† (Campus Crimes†¦). Colleges such as Duke University, the University of Georgia, and MIT have already implemented such programs and have been very successful (Campus Crimes†¦). Narcotics activity and burglaries have seen significant reductions. Students and criminals participating in illicit activities now have to be fearful of other peers who may â€Å"rat† on them. There are, however, downsides to such tactics. False accusations could become a problem. So far, of the 100 universities already using such technology â€Å"90 percent of the information received over the university’s campus police Web site has been ‘significant'† (Campus Crimes†¦). In efforts to reduce students walking alone at night, many universities have implemented night ride programs (Safety and Security). These are curb-to-curb security services, where a campus shuttle bus transports students from one location to another. The University of Maryland offers such a service called N.I.T.E. Ride. N.I.T.E. Ride runs from 5:30pm to 7:30am during fall and spring semesters (Safety and Security). This program combined with the universities safety escort services provides students with opportunities to avoid harmful situations (Safety and Security). However, although many schools offer such programs, they do not allow enough funding to fully equip such safety programs. Many students are unable to get through to the operator, thus end up walking home alone. More shuttles and operators are needed during peek hours, such as weekends and Thursdays. The N.I.T.E. Ride program is an effective means to avoid harmful situations when the program is fully funded. Otherwise, students tend to walk home alone and put themselves in harms way. The University of Maryland also offers an excellent bus system. Students, instead of walking alone at night, can seek the safety of the bus (Policies, Programs, Services). The University of Maryland’s Circuit and Courtyard Express provide safe and dependable rides to various key locations on campus. Not only are students protected from crime, but also are encouraged to ride the bus instead of driving home under the influence. The bus system has dramatically decreased rapes and robberies. Having an alternative ride home also lowers student’s fear of crime by lowering at risk situations. Maryland has also placed blue light emergency phones around campus (Safety and Security). â€Å"Emergency phones provide a direct line to the police throughout the campus both inside and outside many academic buildings and residence halls. These phones are either yellow or encased within a blue cylindrical column and are marked Emergency. Frequently they have blue lights overhead making their locations easier to find. Individuals may contact campus police directly and without charge by activating the phone. This notifies an emergency dispatcher, via a computer, of the caller’s exact location† (Policies, Programs, Services). These phones are used to deter potential victimizations as well as provide a means for communication in  case of an emergency (Safety and Security). The emergency phones may not lower crime rates, but they do lower student’s fear of crime. The installation of video surveillance is another means to combat crime on campus. Throughout the nation universities have been installing cameras to record and monitor specific areas. The University of Maryland initiated this effort in 1996 by installing dozens of cameras in parking lots, garages, high traffic pedestrian areas, isolated areas, and by ATM machines (Schultz). Although the effects of video surveillance to reduce crime have not been established, fear of crime by students has dropped. Cameras are very effective in aiding police dispatchers about crime scenes but rarely catch crimes in action (Schultz). Some students feel that funds would be better spent on police surveillance (Schultz). These students believe criminals will just wear masks or commit crimes where there are no cameras (Schultz). Video surveillance can also be used to aid in criminal investigations. By placing cameras at the entrances and exits to campuses and buildings, police can record license plates as well as faces later used for identification. Although video surveillance may be a useful tool for law enforcement, it is still extremely controversial. Many students feel that surveillance is an infringement on privacy. It can be scary that â€Å"big brother† knows when and where you are at all times. Universities around the globe have offered several programs to students in order to educate and prevent students from placing themselves in at-risk situations. The University of Maryland offers many programs to prevent victimization. One huge program sweeping the nation is Rape Aggression Defense (RAD). RAD is the â€Å"fastest growing and largest women’s self-defense program in the country. This program has structured, consistent curriculum, of easy-to-teach, easy-to-learn techniques that have realistic and practical application† (Policies, Programs, Services). The University also provides personal security presentations as well as sexual assault awareness programs. Services to victims are offered through campus as well as Prince George’s Hospital. The Victim Advocate is a service that â€Å"provides support and referral to victims of sexual assault, sexual harassment, stalking, and partner violence† (Policies, Programs, Services). Prince George’s Hospital  will treat victims of sexual assault and rape as well as provide information, counseling, and companionship (Policies, Programs, Services). There is always a trained nurse on hand that is capable of collecting evidence for future prosecutions (Policies, Programs, Services). Students also should be aware of date rape drugs (Fitzgerald). Never leave glasses unattended and always attend parties in groups (Fitzgerald). Policing is always a vital part to campus safety. The University police provide numerous services to students. Emergency responses to crimes are quickly answered and acted upon (Policies, Programs, Services). Officers provide foot patrol, as well as patrol with marked and unmarked police cars, motorcycles, and bicycles (Policies, Programs, Services). The campus police also relay crime data to the state, FBI, as well as other police agencies (Policies, Programs, Services). Relaying information is an important tool in compiling information to develop the UCR and other crime fighting statistics. The University also has a Crime Investigation Unit (CIU) that â€Å"is responsible for criminal investigations, criminal intelligence, crime analysis, and victim/witness assistance coordination† (Policies, Programs, Services). Over 100 student police aids help campus police in providing a safe environment (Policies, Programs, Services). â€Å"Student Police Aids are non-sworn, unarmed student employees who work part-time for the department. They are provided training and equipment, and act as additional eyes and ears for campus police† (Policies, Programs, Services). Student police Aids are responsible for special event security as well as security around campus (Policies, Programs, Services). These aids have designated foot and bicycle patrols in parking garages and various high-risk areas around campus (Policies, Programs, Services). Aids are also stationed at entrances and exits of campus during late hours. As cars drive onto campus, students record and question inc-coming visitors. These actions deter criminals as well as car thieves. Their license plate numbers are written down and they must have a legitimate destination or student identification in order to gain access to the campus. Awareness is possibly the best solution to crime prevention. â€Å"In 1990, Congress passed the Campus and Securities Act† (Safety by the Numbers). This act requires that any university receiving federal funding to â€Å"disclose campus crime statistics and provide students with information about the schools safety policies† (Safety by the Numbers). By disclosing information, students and parents become aware of any possible crime problem. Students, consequently, can take preventive measures to ensure their safety. Potential students might also elect to go to schools with safer campuses. This places additional pressure on federally funded universities to tighten their campus security. Universities that acquire a reputation as being unsafe often lose student enrollment. â€Å"The 1998 amendments to the Campus Security Act added more categories of crime statistics that schools must disclose. Arson and manslaughter have been added to the list of offenses, which already included murder, sexual assault, robbery, aggravated assault, burglary and motor-vehicle theft† (Safety by the Numbers). Schools, however, are not currently required to disclose crimes that occur near campus. Often, statistics are distorted and under-represent true crime (Safety by the Numbers). The key to protection in your dorm room and in an off-campus housing is vigilantism. Always be aware of your surroundings and lock your door at night. Most campuses have installed swipe cards at all entrances, hallways, doorways, and elevators to prevent unauthorized users from gaining access to the building. These swipe cards provide much needed security. In order to gain access someone must let you into the building. â€Å"Additionally, doors with card readers are also equipped with prop monitors that cause a horn to sound in the event a door is propped open or not securely closed and latched† (Policies, Programs, Services). Having RA’s on duty in lobbies of all buildings deters suspicious and unwanted visitors. These RAs can report any shady activity as well as provide emergency assistance. There are numerous ways universities and colleges can combat crime and upgrade campus security. Through online tipping, night ride programs, adequate bus systems, emergency phones, video surveillance, prevention, rape, and victimization programs, policing, awareness, and swipe cards  schools can provide increased campus security.

Saturday, January 11, 2020

Compare and Contrast the Chinese and Russian Revolutions

China and Russia had various similarities and differences during the early 20th century. They were different in the aspect of goals as Russia was highly concerned in making everyone literate to experience the works of Marx, Lenin and Stalin personally while neither the Chinese communist party nor the Kuomintang cared much about literacy for the masses. Another differences was the characterization of the Russian revolution by World war 1 leading to the revolt against a ruling Tsar while China, was not affected by the war was more of a civil war between the nationalists and Mao’s peasants.Even so, both nations ended up with Communist revolutions, following the proletariat ruling belief. During the early 20th century, the Russian revolutionaries wanted all its people to be literate as to experience by reading the works of Karl Marx, Lenin and Stain first hand. Overall they were very successful in increasing the literacy rate in general. This was possible because immediately after the revolution, education was greatly overhauled in the spending on popular education.Free eduction was ordered for all children from the ages of three to sixteen years old as well as the duplication of schools within the first two years. Coeducation was also imposed as to get rid of sex discrimination and for the welfare of the whole society. However in China, the revolution did not really care about teaching and education for their citizens but rather focused primarily on replacing the existing system of government and its ruler with one headed up by the leader of the revolution, Mao Ze Dong.Another difference between the Russian and Chinese revolution was that the Russian revolution was influenced a lot by the first world war, while the Chinese revolution was untouched by it and still fought for the same beliefs as the Russian revolution. The Russian revolution was highlighted by the overthrow of Nicholas II which was brought on by the end of the first world war. Differently, th e Chinese revolution was not affected by the first world war and was sparked by the Marxist ideas of the working class being able to rule.Even though the first world war was not a cause of the revolution, Mao Ze Dong’s peasant army and Chiang Kai’s nationalist army still fought until Mao’s forces defeated the nationalists in 1949. The major similarity between the Russian revolution and the Chinese revolution would be that both revolutions made the path for the nations to become Communists. They were both led by charismatic leaders Lenin and Mao Ze Dong, who were able to unite the people into the revolution.Both had similar goals and outcomes as they both aimed for the working class, Proletariats, to rule against the ruling class. Both revolutions also aimed to establishing a state ownership in their countries as well as removing any kind of inequalities within the nation. Both ending up as communist nations, the Russian revolution and the Chinese revolution were shaped by different sparks and aimed to reach its goals through different methods but strived for a similar goal inspired by the Marxist ideas of the Proletariat class to rule.

Thursday, January 2, 2020

Income Distribution and Economic Growth in LDCs Essay

Income Distribution and Economic Growth in LDCs INTRODUCTION In recent years, one of the major concerns of economic development is the study of poverty, the income distribution and growth in the less developed countries (LDC’s) or Third World countries. Economists from all over the world have been doing researches and studies on how to induce a growth in those underdeveloped countries. However, countries differentiate in historical backgrounds, cultural believes and natural resources. As a result, the government would implement different strategies to attain a much fairer distribution of income among the society. The relationship between the income distribution and growth in the LDC’s is a significant factor that would affect†¦show more content†¦The major concern of the policies would be the approach to provide human basic needs (HBN) for each and every one of the people in the country. In nearly all of the LDC’s, majority of the people are living under absolute poverty. This means that they are not able to provide a standard level of living for themselves. Different policies to improve the income inequality and also procure an economic growth include land reform, redistribution of saving and investment, education for all, progressive taxation, public expenditures from tax revenues and birth control. Some people think that there existed a trade-off between growth and equity. They think that distributing income too equally would undermine incentives and thus lower everyones income. They believed that the rich needed special encouragement to save and invest more in order to cause a growth in the economy. Recent evidence suggests that this conventional wisdom is wrong. Many economies in Asia - Hong Kong, Indonesia, Malaysia, the Republic of Korea, Singapore, Taiwan (province of China) and Thailand - have had both rapid growth and relatively low inequality. â€Å"Between 1960 and 1993 the East Asian economies,Show MoreRelatedImportance of Human Capital in Economicdevelopment1858 Words   |  8 PagesROLE IN ECONOMIC DEVELOPMENT: 1. Introduction: The modern economists are of the view that natural resources i...e forest minerals, climate, water power etc. play in important role in the economic development of an country. A country which has abundant natural resources is in position to development more  rapidly than a country which is deficient in such resources. They here how ere emphasize that the presence of abundant resources is not a sufficient condition of economic growth. PhysicalRead MoreImportance of Human Capital in Economicdevelopment1851 Words   |  8 PagesIT’S ROLE IN ECONOMIC DEVELOPMENT: 1. Introduction: The modern economists are of the view that natural resources i...e forest minerals, climate, water power etc. play in important role in the economic development of an country. A country which has abundant natural resources is in position to development more  rapidly than a country which is deficient in such resources. They here how ere emphasize that the presence of abundant resources is not a sufficient condition of economic growth. Physical facturesRead MoreRural Urban Migration Is An Inevitable Component Of The Development Process1548 Words   |  7 Pagesthe absence of extensive industrialization, led to the emergence of illegal settlements and shanty towns, discuss the relationship between urbanization, poverty and development; and use a case study to illustrate the effects of rapid urbanization in LDC’s. Rural-urban migration occurs at varying rates in every country. This paper focuses on the process of rural-urban migration and its influence on urbanization in developing countries. It presents arguments in support of the proposal that rural-urbanRead More The Impacts ofTransnational Corporations on Less Developed Countries2517 Words   |  11 Pages The issue of the impacts transnational corporations have on less developed countries has been a controversial and much disputed subject within the field of economics and development studies. Researchers using various models such as the Rostow Development model, Harrod Domar model and the Neoclassical Theory Model, have studied these impacts and have tried to come to a conclusion to this issue. Researchers have also conducted many case studies in order to investigate in depth factors contributingRead MoreLimitations of the Hecksher Ohlin Theory2414 Words   |  10 Pages Influences of potential domestic market failure, such as labour market, fails to function properly, deviating from free trade can sometime help reduce the consequences of this malfunctioning Trade policy is dominated by considerations of income distribution, as policies are often determined by competition among political parties try to attract as many votes as possible, leading to the adoption of policies that may be beneficial for the voter, but not the country on a trading perspective. PotentialRead MoreDevelopment and Globalisation Essay7740 Words   |  31 Pagesand Globalisation Development A process of social and economic advancement in terms of the quality of human life. Development can involve can involve economic, demographic, social political and cultural changes. Development is a term that can be used in many different contexts whether it is social, economical, political etc. However generally development refers to an improvement in certain areas: †¢ Economic o An increase in the country’s economy with a shift fromRead MoreFinal Project on Mnc8557 Words   |  35 Pages THANKS TO ALL!!! Table of Contents Acknowledgement 4 International business 9 Definition 9 MULTInational COORPORATIONS 9 Definition 9 Introduction 10 History 10 Terminologies 12 Why business become multinational 13 Larger Market: 13 Growth and Expansion: 13 Optimization of Resources: 13 Co-operation Need To Compete: 13 Economies of Scale: 13 Stages of evOlution 14 1. Export Stage 14 2. Foreign Production Stage 14 DFI versus Licensing 14 Licensing 14 Direct Investment 14 3Read MoreGlobal Pharmaceutical Industry Analysis7049 Words   |  29 Pagesproducts, a result of which the market for ‘branded generics emerged. The top 10 firms and their particulars are provided in the table below. Rank 2008 Company Country Total Revenues(USD millions) Healthcare RD 2006(USD millions) Net income/ (loss) 2006(USD millions) Employees 2006 1 Novartis Switzerland 53,324 7,125 11,053 138,000 2 Pfizer USA 48,371 7,599 19,337 122,200 3 Bayer Germany 44,200 1,791 6,450 106,200 4 GlaxoSmithKline United Kingdom 42,813 6,373 10,135 106Read MoreCxc Mutipe Choice Questions13016 Words   |  53 PagesCXC SOCIAL STUDIES QUESTIONS MULTIPLE CHOICE The main reason for the origin of the Caribbean Community is: a) The need for economic cooperation b) The formation of Carifta c) The existence of one type of people d) The maintenance of the University of the West Indies. The first Heads of Government Conference was held in: a) August, 1962 b) May, 1961 c) July, 1963 d) July, 1974. The four countries that attended the first Heads of Government Conference were: a) Jamaica, Guyana, Grenada and