PAPERS in PIDGIN and CREOLE LINGUISTICS No. 3

Total Page:16

File Type:pdf, Size:1020Kb

PAPERS in PIDGIN and CREOLE LINGUISTICS No. 3 PACIFIC LINGUISTICS Series A - No. 65 PAPERS IN PIDGIN AND CREOLE LINGUISTICS No. 3 * CONTRIBUTIONS BY Lois Carrington Jeff Siegel Peter Miihlhiiusler Linda Simons Alan Baxter Joyce Hudson Alan Rumsey Ann Chowning Department of Linguistics Research School of Pacific Studies THE AUSTRALIAN NATIONAL UNIVERSITY Carrington, L., Siegel, J., Mühlhäusler, P., Simons, L., Baxter, A., Hudson, J., Rumsey, A. and Chowning, A. editors. Papers in Pidgin and Creole Linguistics No. 3. A-65, vi + 211 pages. Pacific Linguistics, The Australian National University, 1983. DOI:10.15144/PL-A65.cover ©1983 Pacific Linguistics and/or the author(s). Online edition licensed 2015 CC BY-SA 4.0, with permission of PL. A sealang.net/CRCL initiative. PACIFIC LINGUISTICS is issued through the Linguistic Circle of Canberra and consists of four series: SERIES A - Occasional Papers SERIES B - Monographs SERIES C - Books SERIES D - Special Publications EDITOR: S.A. Wurm ASSOCIATE EDITORS: D.C. Laycock, C.L. Voorhoeve, D.T. Tryon, T.E. Dutton EDITORIAL ADVISERS: B.W. Bender John Lynch University of Hawaii University of Papua New Guinea David Bradley K.A. McElhanon La Trobe University University of Texas A. Capell H.P. McKaughan University of Sydney University of Hawaii Michael G. Clyne P. MUhlhllusler Monash University Linacre College, Oxford S.H. Elbert G.N. O'Grady University of Hawaii University of Victoria, B.C. K.J. Franklin A.K. Pawley Summer Institute of Linguistics University of Auckland W.W. Glover K.L. Pike University of Michigan; Summer Institute of Linguistics Summer Institute of Linguistics G.W. Grace E.C. Polome University of Hawaii University of Texas M.A.K. Halliday Gillian Sankoff University of Sydney University of Pennsylvania E. Haugen W.A.L. Stokhof National Center for Harvard University Language Development, Jakarta; A. Healey University of Leiden Summer Institute of Linguistics E.M. Uhlenbeck L.A. Hercus University of Leiden Australian National University J.W.M. Verhaar Nguyen Elling Liem Gonzaga University, Spokane University of Hawaii All correspondence concerning PACIFIC LINGUISTICS, including orders and subscriptions, should be addressed to: The Secretary PACIFIC LINGUISTICS Department of Linguistics Research School of Pacific Studies The Australian National University G.P.O. Box 4, Canberra, A.C.T. 2601 Australia. Copyright © The Authors First Published 1983 Typeset by Ling Matsay Printed by A.N.U. Printing Service Bound by Adriatic Bookbinders Pty. Ltd. Maps drawn by Manlio Pancino and Suzie Jeffcoat, Cartography, Department of Human Geography, Research School of Pacific Studies, A.N. U. The editors are indebted to the Australian National University for assistance in the production of this series. This publication was made possible by an initial grant from the Hunter Douglas Fund. National Library of Australia Card Number and ISBN 0 85883 305 0 TABLE OF CONTENTS page THE CONTRIBUTORS v LOCATION MAP vi Eyewitness reporting Lois CARRINGTON 1-80 Media Tok Pisin Jeff SIEGEL 81-92 Learning to speak about speaking in a pidgin language Peter MtiHLHAUSLER 93-103 The reality of Sapir's psychological reality of the phoneme Peter MtiHLHAUSLER 105-120 A comparison of the pidgins of the Solomon Islands and Papua New Guinea Linda SIMONS 121-137 Notes on the Pidgin German of Kiautschou Peter MtiHLHAUSLER 139-142 Creole Universals and Kristang (Malacca Creole portuguese) Alan BAXTER 143-160 Transitivity and aspect in the Kriol verb Joyce HUDSON 161-176 On some syntactico-semantic consequences of homophony in north-west Australian Pidgin! Creole English Alan RUMSEY 177-189 Interaction between Pidgin and three West New Britain languages Ann CHOWNING 191-206 iii vi CHINA �USTRALr:A �- -- ---- -- -----------� - --_.-: Location of language areas referred to by the authors TH E CONTRIBUTORS ALAN BAXTER is a research scholar in the Department of Linguistics , Research School of Pacific Studies , Australian National University. LOIS CARRINGTON has had wide experience in teaching English to non-native speakers , in Australia, overseas , and especially in Papua New Guinea. She is now employed in research work in linguistics at the Australian National University, Canberra . ANN CHOWNING is Professor of Anthropology at Victoria University of Wellington , New Zealand; in addition to West New Britain, she has done fieldwork with the Mo lima of Fergusson Island , Milne Bay Province . JOYCE HUDSON is working under the auspices of the Summer Institute of Linguistics , Australian Aborigines Branch . She has worked extensively in the Fitzroy Crossing area of the southern Kimberleys in Western Australia, in Walmajarri and Gooniyandi , as well as in Kriol. PETER MOHLHAUSLER is the University Lecturer in General Linguistics at the University of Oxford and Fellow of Linacre College , Oxford . ALAN RUMSEY is a lecturer in the Department of Anthropology , University of Sydney . LINDA SIMONS is a member of the Summer Institute of Linguistics working in Malaita, Solomon Islands , with the Solomon Islands Translation Advisory Group . JEFF SIEGEL is a research scholar in the Department of Linguistics , Research School of Pacific Studies , Australian National University . v Carrington, L., Siegel, J., Mühlhäusler, P., Simons, L., Baxter, A., Hudson, J., Rumsey, A. and Chowning, A. editors. Papers in Pidgin and Creole Linguistics No. 3. A-65, vi + 211 pages. Pacific Linguistics, The Australian National University, 1983. DOI:10.15144/PL-A65.cover ©1983 Pacific Linguistics and/or the author(s). Online edition licensed 2015 CC BY-SA 4.0, with permission of PL. A sealang.net/CRCL initiative. EYEWITNESS REPORTING Lois Carrington 1.0 INTRODUCTION The body of data presented and described in this paper is a collection of eyewitness reports in Tok Pisin (widely referred to in the past as New Guinea Pidgin and , by the subjects themselves , also called Pidgin) , henceforth TP . The reports were written during class training by post-secondary students at the Administrative co llege1 in Port Moresby , Papua New Guinea , during 1973. The circumstances of the writing and collection of the data require some explanation. To those working intensively in the field of appl ied linguistics it was apparent , in the years immediately before Independence , that studies of TP already made , by Hall (for instance 1943, 1955, 1959) , Wurm (1966, 1969 and 1971, to single out a few) , Laycock (1966 , 1969, 1970b and elsewhere) , Murphy (1966) , Mihalic (1971) and others were forerunners of a necessarily accelerated study of the areal development of TP , historically and functionally (cf. Muhlhausler , 1983a "Learning to speak about speaking in pidgin language", this volume , pp . 93-103) which is , nearly a decade later, still of vital concern, and to serve which still more data are needed . Thus, when the opportunity arose to collect 2 this material it was taken . 1.1 The nature of the reporters The value of the data lies principally in that it was accumulated from a largely homogeneous group of 160 people representing all but one of the main areas of Papua New Guinea, all within a narrow age range , all with much the same educational level and , more interesting , all with an orientation towards a certain type of employment within the community. However , their time as middle to senior level professional public servants was , in 1973, still in the future , and all but a handful were innocent of any 'register' which might be associated with the speech of such professionals (see Muhlhausler 1979a:161f) . Their homogeneity lay not in that, but rather in the level of education obtained , and their ranking within that level : these were not the 'cream ' who were encouraged to go on to senior High School and thence to university, but the next rank of students , 3 who seemed , then , to find their way to agricultural colleges , local government college , forestry colleges , or to the Administrative College (or its twin training institution , ASOPA : the Australian School of Pacific Affairs in Mosman, Sydney) . Papers in pidgin and creole linguistics No .3, 1-80. Pacific Linguistics , A-65, 1983. © Lois Carrington 1 Carrington, L. "Eyewitness reporting". In Carrington, L., Siegel, J., Mühlhäusler, P., Simons, L., Baxter, A., Hudson, J., Rumsey, A. and Chowning, A. editors, Papers in Pidgin and Creole Linguistics No. 3. A-65:1-80. Pacific Linguistics, The Australian National University, 1983. DOI:10.15144/PL-A65.1 ©1983 Pacific Linguistics and/or the author(s). Online edition licensed 2015 CC BY-SA 4.0, with permission of PL. A sealang.net/CRCL initiative. 2 LOIS CA RRINGTON The Administrative College 's role, from the early 1960s on, in training Papua New Guineans for positions of responsibility in the rapidly local ising Public Service of the country has been well outlined in prospectuses and other publications . Its founding Principal, David Chenoweth, saw the College as a setting for the training and personal development of the young men and women who will be making a significant contribution to the development of the nation of Papua New Guinea, by going into its Public Service and working to­ gether, with a mutual knowledge and understanding gained thrQugh being at the training centre and engaging in co­ operative work there ... the idea being ... to encourage the development of alert, alive, and responsible Papuan and New Guinean public servants (personal communication, 1970) . There were various categories of student : those on a two-year Diploma in Administration course, various short-term management
Recommended publications
  • Joint Force Quarterly 97
    Issue 97, 2nd Quarter 2020 JOINT FORCE QUARTERLY Broadening Traditional Domains Commercial Satellites and National Security Ulysses S. Grant and the U.S. Navy ISSUE NINETY-SEVEN, 2 ISSUE NINETY-SEVEN, ND QUARTER 2020 Joint Force Quarterly Founded in 1993 • Vol. 97, 2nd Quarter 2020 https://ndupress.ndu.edu GEN Mark A. Milley, USA, Publisher VADM Frederick J. Roegge, USN, President, NDU Editor in Chief Col William T. Eliason, USAF (Ret.), Ph.D. Executive Editor Jeffrey D. Smotherman, Ph.D. Production Editor John J. Church, D.M.A. Internet Publications Editor Joanna E. Seich Copyeditor Andrea L. Connell Associate Editor Jack Godwin, Ph.D. Book Review Editor Brett Swaney Art Director Marco Marchegiani, U.S. Government Publishing Office Advisory Committee Ambassador Erica Barks-Ruggles/College of International Security Affairs; RDML Shoshana S. Chatfield, USN/U.S. Naval War College; Col Thomas J. Gordon, USMC/Marine Corps Command and Staff College; MG Lewis G. Irwin, USAR/Joint Forces Staff College; MG John S. Kem, USA/U.S. Army War College; Cassandra C. Lewis, Ph.D./College of Information and Cyberspace; LTG Michael D. Lundy, USA/U.S. Army Command and General Staff College; LtGen Daniel J. O’Donohue, USMC/The Joint Staff; Brig Gen Evan L. Pettus, USAF/Air Command and Staff College; RDML Cedric E. Pringle, USN/National War College; Brig Gen Kyle W. Robinson, USAF/Dwight D. Eisenhower School for National Security and Resource Strategy; Brig Gen Jeremy T. Sloane, USAF/Air War College; Col Blair J. Sokol, USMC/Marine Corps War College; Lt Gen Glen D. VanHerck, USAF/The Joint Staff Editorial Board Richard K.
    [Show full text]
  • Attracting, Recruiting, and Retaining Successful Cyberspace Operations Officers Cyber Workforce Interview Findings
    C O R P O R A T I O N Attracting, Recruiting, and Retaining Successful Cyberspace Operations Officers Cyber Workforce Interview Findings Chaitra M. Hardison, Leslie Adrienne Payne, John A. Hamm, Angela Clague, Jacqueline Torres, David Schulker, John S. Crown For more information on this publication, visit www.rand.org/t/RR2618 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0101-4 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2019 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface Cybersecurity is one of the most serious economic and national security challenges we face as a nation.
    [Show full text]
  • NAVY Safety & Occupational Health Manual OPNAV M-5100.23 of 5 Jun
    OPNAV M-5100.23 5 Jun 2020 NAVY SAFETY AND OCCUPATIONAL HEALTH MANUAL THIS PAGE INTENTIONALLY LEFT BLANK THIS PAGE INTENTIONALLY LEFT BLANK OPNAV M-5100.23 5 Jun 2020 TABLE OF CONTENTS SECTION A. SAFETY MANAGEMENT SYSTEM Chapter 1. INTRODUCTION A0101. Purpose……………………………………………………………………..... A1-2 A0102. Scope and Applicability……………………………………………………… A1-2 A0103. Definition of Terms………………………………………………………….. A1-4 A0104. Background…………………………………………………………………... A1-4 A0105. Discussion……………………………………………………………………. A1-5 A0106. Introduction to the Navy SMS Framework………………………………….. A1-6 A0107. Responsibilities………………………………………………………………. A1-7 Chapter 2. POLICY AND ORGANIZATIONAL COMMITMENT A0201. Introduction………………………………………………………………….. A2-1 A0202. Methodology………………………………………………………………… A2-1 A0203. Organizational Commitment and Accountability…………………………… A2-3 A0204. Appointment of SMS Personnel……………………………………………… A2-4 Chapter 3. RISK MANAGEMENT A0301. Introduction………………………………………………………………….. A3-1 A0302. Methodology………………………………………………………………… A3-1 A0303. Error Tolerance……………………………………………………………… A3-1 A0304. Principles…………………………………………………………………..... A3-2 A0305. Requirements………………………………………………………………… A3-3 Chapter 4. ASSURANCE A0401. Introduction………………………………………………………………….. A4-1 A0402. Methodology………………………………………………………………… A4-1 A0403. Requirements……………………………………………………..................... A4-1 A0404. Continuous Improvement………………………………………………….… A4-2 A0405. Management Review……………………………………………………….... A4-2 Chapter 5. PROMOTION A0501. Introduction………………………………………………………………….. A5-1
    [Show full text]
  • EDAI SIABO: an ETHNOGRAPHIC STUDY of a PAPUAN MYTH Nigel
    520 Mary-Jane Mountain ------------- , J.A. PETERSON, I. ALLISON, and U. RADOK (eds), 1976.The Equatorial Glaciers of New Guinea. Rotterdam, A.A. Balkema. HUGHES, Philip, Marjorie SULLIVAN, and D.YOK, 1991. Human-induced Erosion in a Highlands Catchment in Papua New Guinea: the Prehistoric and Contemporary Records.Zeitschrift fūr Geomorphologie, N.F. Suppl.Bd, 227-39. MAJNEP, Ian Saem, and Ralph BULMER, 1977.Birds of my Kalam Country. Auckland, Oxford University Press. MENZIES, John I. 1977. Fossil and Sub-fossil Fruit Bats from the Mountains of New Guinea.Australian Journal of Zoology, 25:329-36. MOUNTAIN, Mary-Jane, 1979. The Rescue of the Ancestors in Papua New Guinea.Institute of Archaeology Bulletin, 16:63-80, University of London. ------------- , 1983. Preliminary Report of Excavations at Nombe Rockshelter, Simbu Province, Papua New Guinea. Journal of the Indo-Pacific Prehistory Association, 4:84-99. ------------- , 1990. Taphonomic Aspects of Faunal Analysis from Nombe Rockshelter, Highlands of Papua New Guinea, in Su Solomon, Iain Davidson, and Di Watson (eds),Problem Solving in Taphonomy: Archaeological and Palaeontological Studies from Europe, Africa and Oceania. 2.Tempus St Lucia, Anthropological Museum, University of Queensland. PETERSON, Jean T., 1981. Game, Farming, and Inter-ethnic Relations in Northeastern Luzon, Philippines.Human Ecology, 9(1): 1-22. PLANE, Mike D., 1967a. Stratigraphy and Vertebrate Fauna of the Otibanda Formation, New Guinea.Bulletin of the Bureau of Mineral Resources Geology and Geophysics, Australia 86:1-64. ------------- , 1967b. Two New Diprotodontids from the Otibanda Formation, New Guinea.Bulletin of the Bureau of Mineral Resources Geology and Geophysics, Australia 87:105-28 ------------- , 1972.
    [Show full text]
  • Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم
    Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم اﻻنسيابية Prepared by Omar Mejbel Hammad Aljouani ((401320142)) Supervisor Dr. Hebah H. O. Nasereddin Dr. Abdulkareem O. Ibadi Master Thesis Submitted in Partial Fulfillment of the Requirements of the Master Degree in Computer Science Department of Computer Science Faculty of Information Technology Middle East University Amman - Jordan January - 2016 II ((بسم هللا الرحمن الرحيم(( ّ يَ ْر ف عَََللاَهَا ّل ذي نََآ مَ هنواَ م ْن هك ْمََ وَا ّلَ ذي نََ} ه ه ْ ْ {أَوتواَال عل مََ دَ ر جات ))صدق هللا العظيم(( II III IV Acknowledgment I utilize this opportunity to thank everyone helped me reach this stage and everyone who encourage me during performing this thesis. I want to thank Dr. Hebah H. O. Nasereddin for her guidance and supervision during writing this thesis. Extended thanks are also for my family and friends who encourage me during writing this thesis. I also want to thank everyone who believes that the knowledge is right for everyone. The greatest thank ever to assistant prof. Abdulkareem O. Ibadi, the head of software engineering department at Baghdad College for economic sciences. V Dedication اهدي خﻻصة جهدي العلمي المتواضع الى : قرة عيني الرسول محمد عليه افضل الصﻻة واتم التسليم ...... وطني العراق الجريح .................................... اخي الشهيد الحاضر الغائب صهيب ................... والدي ووالدتي واختي رفاق دربي ومسيرتي ............... كل من كان له بصمة بجهدي العلمي هذا............. كل الشهداء الذين استشهدوا برصاص الغدر والخيانة ...... كل من كان يدعي لي ويوجهني ويتمنى لي الخير ......... جامعة بغداد أخص بها كلية التربية ابن الهيثم ....... اﻻعدادية المركزية للبنين .................. VI Table of Contents AUTHORIZATION STATEMENT ..........................................................
    [Show full text]
  • ECES Duration : 4 Days
    ECES Duration : 4 Days. 1 Introduction and History of Cryptography What is Cryptography? History Mono-Alphabet Substitution Caesar Cipher Atbash Cipher ROT 13 Scytale Single Substitution Weaknesses Multi-Alphabet Substitution Cipher Disk Vigenère Cipher Vigenère Cipher: Example Breaking the Vigenère Cipher Playfair The ADFGVX cipher The Enigma Machine CrypTool 2 Symmetric Cryptography & Hashes Symmetric Cryptography Information Theory Information Theory Cryptography Concepts Kerckhoffs's Principle Substitution Transposition Substitution and Transposition Binary M ath Binary AND Binary OR Binary XOR Block Cipher vs. Stream Cipher Symmetric Block Cipher Algorithms Basic Facts of the Feistel Function The Feistel Function A Simple View of a Single Round Unbalanced Feistel Cipher DES 3DES DESx Whitening AES AES General Overview AES Specifics Blowfish Serpent Twofish Skipjack IDEA Symmetric Algorithm Methods Electronic Codebook (ECB) Cipher-Block Chaining (CBC) Propagating Cipher-Block Chaining (PCBC) Cipher Feedback (CFB) Output Feedback (OFB) Counter (CTR) Initialisation Vector (IV) Symmetric Stream Ciphers Example of Symmetric Stream Ciphers: RC4 Example of Symmetric Stream Ciphers: FISH Example of Symmetric Stream Ciphers: PIKE Hash Hash – Salt MD5 The MD5 Algorithm MD6 Secure Hash Algorithm (SHA) Fork 256 RIPEMD – 160 GOST Tiger CryptoBench 3 Number Theory and Asymmetric Cryptography Asymmetric Encryption Basic Number Facts Prime Numbers Co-Prime Eulers Totient
    [Show full text]
  • List of Agents by County for the Web
    List of Agents By County for the Web Agent (Full) Services for Web Run Date: 10/1/2021 Run Time: 7:05:44 AM ADAMS COUNTY Name Street Address City State Zip Code Phone 194 IMPORTS INC 680 HANOVER PIKE LITTLESTOWN PA 17340 717-359-7752 30 WEST AUTO SALES INC 1980 CHAMBERSBURG RD GETTYSBURG PA 17325 717-334-3300 97 AUTO SALES 4931 BALTIMORE PIKE LITTLESTOWN PA 17340 717-359-9536 AAA CENTRAL PENN 1275 YORK RD GETTYSBURG PA 17325 717-334-1155 A & A AUTO SALVAGE INC 1680 CHAMBERSBURG RD GETTYSBURG PA 17325 717-334-3905 A & C USED AUTO 131 FLICKINGER RD GETTYSBURG PA 17325 717-334-0777 ADAMIK INSURANCE AGENCY INC 5356 BALTIMORE PIKE # A LITTLESTOWN PA 17340 717-359-7744 A & D BUSINESS SERVICES LLC 12 WATER ST FAIRFIELD PA 17320 - 8252 717-457-0551 ADELA TOVAR CAMPUZANO DBA MANZOS 190 PARK ST ASPERS PA 17304 - 9602 717-778-1773 MOTORS 500 MAIN STREET ALLENWRENCH AUTOMOTIVE YORK SPRINGS PA 17372 717-528-4134 PO BOX 325 AMIG AUTO AND TRUCK SALES 4919 YORK RD NEW OXFORD PA 17350 717-624-8814 AUTOS ARE US AUTO SALES LLC 631A W KING ST ABBOTTSTOWN PA 17301 717-259-9950 BANKERTS AUTO SALES 3001 HANOVER PIKE HANOVER PA 17331 717-632-8464 BATTLEFIELD MOTORCYCLES INC 21 CAVALRY FIELD RD GETTYSBURG PA 17325 717-337-9005 BERLINS LLC 130 E KING ST EAST BERLIN PA 17316 717-619-7725 Page 1 of 536 List of Agents By County for the Web Run Date: 10/1/2021 Run Time: 7:05:44 AM ADAMS COUNTY Name Street Address City State Zip Code Phone BERMEJO AUTO SALES LLC 4467 YORK RD NEW OXFORD PA 17350 717-624-2424 BETTY DIANE SHIPLEY 1155 700 RD NEW OXFORD PA 17350 -- BOWERS
    [Show full text]
  • CHOICE an D SOCIAL NETWORKS in by Margaret Mase
    LANGUAGE CHOICE AND SOCIAL NETWORKS IN HANUABADA by Margaret Mase A thesis submitted in fulfilment of the requirements for the degree of Master of Education Faculty of Education , Northern Territory University August, 1995 This thesis is dedicated to the people of Banuabada NOflTtiEnN TEflfHTOrlY UNIVERSITY L!Or.�RY Northern Territory University Faculty of Education To the best of my knowledge and belief the work in this thesis is original, except as acknowledged in the text, and the material has not been submitted in whole or in part for a degree at this or any other university. Signed: ... Margaret Mase Date: 24 August 1995 i TABLE OF CONTENTS Chapter Page 1 Introduction 1.1 The study: a brief description ...••...•••..••.. 1 1.2 Location of the study .......................... 2 1.3 Background : languages in contact ••••........••. 11 1.4 Statement of the problem and questions arising • 16 2 Review of literature 2.1 Introduction to the review ...........•••...•.•. 21 2.2 Language choice and language shift ..••.•....... 22 2.3 Lan9uage maintenance and language ecology ...... 31 2.4 Soc�al networks ..................•............• 41 2.5 Patterns of variation and network structure .... 46 3 Methodology 3.1 Aims and objectives .... ............. ....... .. 49 3. 2 Data collection . • • . • . • . 49 3. 3 Data analysis . 63 3.4 Ethical concerns ...........•.•.........•......• 66 3.5 Limitations of the study ..•.........•..•....... 67 4 Main research findings , Part 1 4.1 Importance of Motu and other languages •.•.••... 70 4.2 Languages spoken at home ................•..•... 71 4.3 Languages used at school .................•..... 75 4.4 Languages used at work ......................... 78 4.5 Languages used in the city ..•..........•.••.••• 79 4.6 Languages spoken in the church ..•..••......•..
    [Show full text]
  • Small Unmanned Aerial System Adversary Capabilities
    Small Unmanned Aerial System Adversary Capabilities BRADLEY WILSON, SHANE TIERNEY, BRENDAN TOLAND, RACHEL M. BURNS, COLBY PEYTON STEINER, CHRISTOPHER SCOTT ADAMS, MICHAEL NIXON, RAZA KHAN, MICHELLE D. ZIEGLER, JAN OSBURG, IKE CHANG HS AC HOMELAND SECURITY OPERATIONAL ANALYSIS CENTER An FFRDC operated by the RAND Corporation under contract with DHS Published in 2020 Preface This report describes current and projected performance capabilities and limitations of small unmanned aerial systems (sUASs), also known as drones. Specifically, it provides a component-level assessment of sUAS technologies. The analysis captured the potential capabilities and limitations of these platforms, with the results of the analysis intended to help the program office inform strategic policy and investment decisions to counter UAS threats to prevent strategic surprise. This document is intended to be updated at least annually by the U.S. Department of Homeland Security Science and Technology Directorate’s Program Executive Office for Unmanned Aerial Systems. This research was sponsored by the U.S. Department of Homeland Security (DHS) Science and Technology Directorate and conducted within the Acquisition and Development Program of the Homeland Security Operational Analysis Center (HSOAC) federally funded research and development center (FFRDC). About the Homeland Security Operational Analysis Center The Homeland Security Act of 2002 (Section 305 of Public Law 107-296, as codified at 6 U.S.C. § 185) authorizes the Secretary of Homeland Security, acting through the Under Secretary for Science and Technology, to establish one or more FFRDCs to pro- vide independent analysis of homeland security issues. The RAND Corporation oper- ates HSOAC as an FFRDC for DHS under contract HSHQDC-16-D-00007.
    [Show full text]
  • PIKE: Peer Intermediaries for Key Establishment in Sensor Networks
    PIKE: Peer Intermediaries for Key Establishment in Sensor Networks Haowen Chan Adrian Perrig Carnegie Mellon University Carnegie Mellon University 5000 Forbes Avenue 5000 Forbes Avenue Pittsburgh, PA 15221, USA Pittsburgh, PA 15221, USA Email: [email protected] Email: [email protected] Abstract— The establishment of shared cryptographic keys where the communication load is focused around the base between communicating neighbor nodes in sensor networks is a station. As the nodes closest to the base station are obliged to challenging problem due to the unsuitability of asymmetric key forward most of the communications between the base station cryptography for these resource-constrained platforms. A range of symmetric-key distribution protocols exist, but these protocols and the rest of the sensor network, they expend battery energy do not scale effectively to large sensor networks. For a given level at a higher rate, thus often shortening the lifetime of the of security, each protocol incurs a linearly increasing overhead network. This focused communication load is proportional to in either communication cost per node or memory per node. We the total number of nodes in the network. Furthermore, the describe Peer Intermediaries for Key Establishment (PIKE), a base station can become a rich target for compromise, since it class of key-establishment protocols that involves using one or more sensor nodes as a trusted intermediary to facilitate key represents a single point of failure which can break the security establishment. We show that, unlike existing key-establishment of the entire network. The highly focused communication protocols, both the communication and memory overheads of pattern also allows an adversary to easily perform traffic PIKE protocols scale sub-linearly (O(pn)) with the number of analysis to locate the base station for compromise.
    [Show full text]
  • Security Policy: Key Variable Loader (KVL) 4000 PIKE
    Security Policy: Key Variable Loader (KVL) 4000 PIKE Cryptographic module used in Motorola’s Key Variable Loader (KVL) 4000 keyloader. Version: R01.00.03 Date: August 2, 2010 Non-Proprietary Security Policy: KVL 4000 PIKE Page 1 of 23 Table of Contents 1. INTRODUCTION ............................................................................................................................................................... 3 1.1. SCOPE ............................................................................................................................................................................. 3 1.2. DEFINITIONS ................................................................................................................................................................ 3 1.3. OVERVIEW .................................................................................................................................................................... 4 1.4. KVL 4000 PIKE IMPLEMENTATION ....................................................................................................................... 4 1.5. KVL 4000 PIKE HARDWARE / FIRMWARE VERSION NUMBERS ................................................................... 4 1.6. KVL 4000 PIKE CRYPTOGRAPHIC BOUNDARY .................................................................................................. 4 1.7. PORTS AND INTERFACES ........................................................................................................................................
    [Show full text]
  • View of Other Algorithms Such As Blowfish, Twofish, and Skipjack • Hashing Algorithms Including MD5, MD6, SHA, Gost, RIPMD 256 and Others
    ProTech Professional Technical Services, Inc. EC-Council Certified Encryption Specialist (ECES) Course Summary Description The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced: • Overview of other algorithms such as Blowfish, Twofish, and Skipjack • Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others. • Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA. • Significant concepts such as diffusion, confusion, and Kerkchoff’s principle. Course Outline Course Participants will also be provided a practical application of the following: • How to set up a VPN • Encrypt a drive • Hands-on experience with steganography • Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA. Objectives By the end of this course, students will learn: • Types of Encryption Standards and their • Correct and incorrect deployment of differences encryption technologies • How to select the best standard for your • Common mistakes made in organization implementing encryption technologies • How to enhance your pen-testing • Best practices when implementing knowledge in encryption encryption technologies Topics • Introduction and History of Cryptography • Applications of Cryptography • Symmetric Cryptography & Hashes • Cryptanalysis • Number Theory and Asymmetric Cryptography Audience Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select.
    [Show full text]