The Foreign Service Journal, December 2005

Total Page:16

File Type:pdf, Size:1020Kb

The Foreign Service Journal, December 2005 ASSIGNMENT SYSTEM REFORM I AFGHANISTAN’S TROUBLES I OF MICE & MEN SEMIANNUAL SCHOOLS SUPPLEMENT $3.50 / DECEMBER 2005 OREIGN ERVICE FJ O U R N A L S THE MAGAZINE FOR FOREIGN AFFAIRS PROFESSIONALS EXPLORING NEW DIMENSIONS Diplomacy in the Information Age CONTENTS December 2005 Volume 82, No. 12 F OCUS: IT AND D IPLOMACY S CHOOLS S UPPLEMENT 21 / WIRING STATE: A PROGRESS REPORT GOING TO COLLEGE IN AMERICA / 64 Once a technology laggard, the State Department Advice on preparing yourself for the has become an innovator. But the pace must be weirdest culture of all: your own. sustained to truly transform diplomacy. By Francesca Huemer Kelly By Joe Johnson STUDY ABROAD: TAKE THE PLUNGE / 78 29 / THE SUN, THE WORLD AND RFID In some ways, a semester abroad is like an The technology behind e-passports extended vacation. But for most students, promises to dramatically streamline the it’s an experience that encompasses much more. global movement of people and goods. By Brooke Deal By Emily Sopensky SCHOOLS AT A GLANCE / 80 36 / IT COMES OF AGE IN THE MIDDLE EAST Essential data on educational choices. The information revolution is creating a new generation LOST AND FOUND: INTERNATIONAL SCHOOL REUNIONS / 85 in the Middle East that will likely, but not necessarily, Attending an international school can provide not only be more democratic. fond memories but a course for the future. By Jon B. Alterman By Mikkela Thompson 43 / DEFENDING STATE AGAINST ONES AND ZEROS A complete security strategy must embrace not only C OLUMNS D EPARTMENTS robust physical safeguards but also complementary PRESIDENT’S VIEWS / 5 LETTERS / 7 cybersecurity measures. The Foreign Service CYBERNOTES / 12 By Steven E. Roberts as a Political Foil MARKETPLACE / 14 By J. Anthony Holmes BOOKS / 60 INDEX TO ETTER FROM F EATURE L ADVERTISERS / 102 THE EDITOR / 10 AFSA NEWS / 51 / AFGHANISTAN’S TROUBLED By Steven Alan Honley CENTER INSERT PAST AND UNCERTAIN FUTURE SPEAKING OUT / 16 To understand how Afghanistan was transformed Implement Career into a breeding ground for terrorist attacks on the West, Development by Reforming and to help it get back on its feet, we need to know the Assignment System something of its bloody history. By Camille Hill By Arthur Lezin REFLECTIONS / 104 The Mouse Still Roars By James Patterson THE MAGAZINE FOR FOREIGN AFFAIRS PROFESSIONALS OREIGN ERVICE Foreign Service Journal (ISSN 0146-3543), 2101 E Street, N.W., Washington, D.C. 20037-2990 is published FJ O U R N A L S monthly with a combined July/August issue by the American Foreign Service Association, a private, non-profit Editor Editorial Board STEVEN ALAN HONLEY organization. Material appearing herein represents the opinions of the writers and does not necessarily represent Senior Editor TED WILKINSON, the views of the Journal, the Editorial Board or AFSA. Writer queries and submissions are invited, preferably by SUSAN B. MAITRA CHAIRMAN e-mail. Journal subscription: AFSA Members - $13 included in annual dues; others - $40. For foreign surface mail, Associate Editor add $18 per year; foreign airmail, $36 per year. Periodical postage paid at Washington, D.C., and at additional mail- KENT C. BROKENSHIRE SHAWN DORMAN ing offices. Postmaster: Send address changes to Foreign Service Journal, 2101 E Street N.W., Washington, D.C. Ad & Circulation Manager STEPHEN W. BUCK 20037-2990. Indexed by Public Affairs Information Service (PAIS). The Journal is not responsible for unsolicited ED MILTENBERGER ANTHONY S. CHAN Business Manager LILLIAN DEVALCOURT-AYALA manuscripts, photos or illustrations. Advertising inquiries are invited. The appearance of advertisements herein MIKKELA V. T HOMPSON JOSH GLAZEROFF does not imply the endorsement of the services or goods offered. FAX: (202) 338-8244 or (202) 338-6820. Art Director ILLIAM ORDAN E-MAIL: [email protected]. WEB: www.afsa.org. TELEPHONE: (202) 338-4045. © American Foreign Service CARYN SUKO SMITH W W. J Association, 2005. Printed in the U.S.A. Send address changes to AFSA Membership, 2101 E Street N.W., Editorial Interns LAURIE KASSMAN DANIEL ZUSSMAN JOYCE W. N AMDE Washington, D.C. 20037-2990. Printed on 50-percent recycled paper, of which 10 percent is post-consumer waste. CAITLIN STUART KAY WEBB MAYFIELD Advertising Intern CHRISTOPHER L. TEAL WILLEM HOFSTEDE Cover and inside illustration by Valerie Sinclair DECEMBER 2005/FOREIGN SERVICE JOURNAL 3 J. Kirby Simon Foreign Service Trust AN INVITATION TO PROPOSE PROJECTS FOR FUNDING BY THE J. KIRBY SIMON FOREIGN SERVICE TRUST IN 2006 he J. Kirby Simon Foreign Service Trust is a char- children, Venezuela - eyeglasses for the visually itable fund established in the memory of Kirby impaired, Zambia - water well in “day orphanage.” T Simon, a Foreign Service Officer who died in 1995 • Other Facilities in Poverty Areas: Chile - communal while serving in Taiwan. The Trust is committed to kitchen, Japan - food bank for the poor, Uganda - expanding the opportunities for community service and livestock-raising program. professional fulfillment of active Foreign Service Officers • Project for Animal Care: Egypt - shelter used in and Specialists and their families. humane animal programs. The principal activity of the Trust is to support projects The Trust now invites the submission of proposals for that are initiated and carried out, not in an official capacity support in 2006. It is anticipated that most of the new and not on official time, by Foreign Service personnel or grants will fall within the same funding range as the 2005 members of their families, wherever located. The Trust, awards, and that projects assisted by the Trust will reflect however, will also consider proposals from other U.S. a variety of interests and approaches, some of which are Government employees or members of their families, illustrated by the 2005 grants. regardless of nationality, who are located at American Grants provided by the Trust can be used to support diplomatic posts abroad. several categories of project expenses; the third In 2005 the Trust made its ninth round of grant paragraph of this announcement provides examples. awards, 37 in all, ranging from $505 to $4,327, for a total Grant funds from the Trust, however, cannot be used to of $85,836. These grants support the involvement of pay salaries or other compensation to U.S. Government Foreign Service personnel in the projects briefly listed employees or their family members. Because of the below (further described in a Trust announcement limited resources available to the Trust, it is not in a entitled Grants Awarded in 2005 and available at position to support projects that have reasonable www.kirbysimontrust.org). The grants defray a wide prospects of obtaining full funding from other sources. range of project expenses, including books, food, Nor does the Trust support projects that require more medicines, furniture, computers, sanitary facilities, resources than the Trust and other funders can provide. kitchen equipment, job training machinery and staff The Trustees wish to emphasize that the Trust will costs, excursion costs, supplies for school and provide support for a project operated by a charitable or orphanage renovation and for playgrounds. educational organization only where the Foreign Service- • Educational Projects: Botswana - nature reserve related applicant(s) play an active part in initiating and educational center, Burundi - school for orphaned carrying out the project, apart from fundraising. children; Cambodia - library for local school, Costa Rica A proposal should include a description of the project, - English class for teenage mothers, Iraq - computers for what it is intended to achieve, and the role to be played by girls’ school, Mexico - life-skills training for orphans, the applicant(s); a preliminary plan for disseminating the Swaziland - school for orphans, The Gambia - results of the project; a budget; other available funding, if classroom for a rural school, Zimbabwe - art program for any; and a brief biography of the applicant(s). Proposals street children. should be no longer than five double-spaced pages • Other Projects for Children: Albania - community (exclusive of budget and biographical material). children's playground, Azerbaijan - orphanage building, Applicants should follow the application format available Brazil - computer for children’s center, Brazil - refuge for at www.kirbysimontrust.org/format_for_proposals.html or street children, Chile - playground for abused children, that can be obtained by communicating with the Trust Estonia - beds for orphanage, Ghana - shelter for (see below). orphaned and abandoned children, Israel - inter-cultural Proposals for projects to be funded during calendar summer camp, Lithuania - excursion for residents of a year 2006 must be received by the Trust no later than children’s shelter, Mexico - refuge for homeless children, March 1, 2006. South Africa - safe haven for children in distress, Uruguay - regional softball league. Proposals and inquiries can be sent by mail, fax or • Health-related Projects: Albania - palliative care for e-mail to: cancer patients, Albania - emergency treatment for J. Kirby Simon Foreign Service Trust respiratory failure, Belgium - housing and employment 93 Edgehill Road for mentally handicapped adults, Cambodia - water New Haven, CT 06511 wells in rural village, Colombia - nutritional lunches for FAX: 203-432-0063 under-nourished children, Ghana - sanitary facilities and [email protected] health education for rural school, Morocco - kitchen for the physically
Recommended publications
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Cyber Warfare a “Nuclear Option”?
    CYBER WARFARE A “NUCLEAR OPTION”? ANDREW F. KREPINEVICH CYBER WARFARE: A “NUCLEAR OPTION”? BY ANDREW KREPINEVICH 2012 © 2012 Center for Strategic and Budgetary Assessments. All rights reserved. About the Center for Strategic and Budgetary Assessments The Center for Strategic and Budgetary Assessments (CSBA) is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s goal is to enable policymakers to make informed decisions on matters of strategy, secu- rity policy and resource allocation. CSBA provides timely, impartial, and insight- ful analyses to senior decision makers in the executive and legislative branches, as well as to the media and the broader national security community. CSBA encour- ages thoughtful participation in the development of national security strategy and policy, and in the allocation of scarce human and capital resources. CSBA’s analysis and outreach focus on key questions related to existing and emerging threats to US national security. Meeting these challenges will require transforming the national security establishment, and we are devoted to helping achieve this end. About the Author Dr. Andrew F. Krepinevich, Jr. is the President of the Center for Strategic and Budgetary Assessments, which he joined following a 21-year career in the U.S. Army. He has served in the Department of Defense’s Office of Net Assessment, on the personal staff of three secretaries of defense, the National Defense Panel, the Defense Science Board Task Force on Joint Experimentation, and the Defense Policy Board. He is the author of 7 Deadly Scenarios: A Military Futurist Explores War in the 21st Century and The Army and Vietnam.
    [Show full text]
  • Nadzor in Zasebnost V Informacijski Družbi
    Matej Kovačič NADZOR IN ZASEBNOST V INFORMACIJSKI DRUŽBI Filozofski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu Znanstvena knjižnica Fakulteta za družbene vede Ljubljana, 2006 Matej Kovačič NADZOR IN ZASEBNOST V INFORMACIJSKI DRUŽBI Filozofski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu Izdajatelj: Univerza v Ljubljani, Fakulteta za družbene vede Kardeljeva ploščad 5, Ljubljana Zbirka: Znanstvena knjižnica 55 Urednik: dr. Niko Toš Uredniški odbor: dr. Vlado Benko, dr. Zdenko Roter, dr. Tomo Korošec, dr. Vlado Miheljak, dr. Niko Toš Recenzenta: dr. Slavko Splichal dr. Alenka Šelih Likovna oprema: Polona Mesec-Kurdija Lektura: Dora Mali CIP - Kataložni zapis o publikaciji Narodna in univerzitetna knjižnica, Ljubljana 342.721:004.738.5 004.738.5 KOVAČIČ, Matej, 1974- Nadzor in zasebnost v informacijski družbi [Elektronski vir] : filozofski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu / Matej Kovačič. - Ljubljana : Fakulteta za družbene vede, 2006. - (Znanstvena knjižnica / Fakulteta za družbene vede ; 55) Način dostopa (URL): http://dk.fdv.uni-lj.si/eknjige/EK_Kovacic_2006_Nadzor.pdf . - Opis temelji na verziji z dne 19.12.2006 ISBN-10 961-235-261-5 ISBN-13 978-961-235-261-5 230725632 Knjigo je sofinancirala Agencija za raziskovalno dejavnost Republike Slovenije. Knjiga je izdana pod Creative Commons licenco: “Priznanje avtorstva-Nekomercialno-Deljenje pod enakimi pogoji 2.5 Slovenija”. Celotno pravno besedilo licence je dostopno na spletni strani: <http://creativecommons.org/licenses/by-nc-
    [Show full text]
  • Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism
    Journal of Strategic Security Volume 6 Number 5 Volume 6, No. 3, Fall 2013 Supplement: Ninth Annual IAFIE Article 3 Conference: Expanding the Frontiers of Intelligence Education Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Gary Adkins The University of Texas at El Paso Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 1-9 Recommended Citation Adkins, Gary. "Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism." Journal of Strategic Security 6, no. 3 Suppl. (2013): 1-9. This Papers is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism This papers is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/vol6/iss5/ 3 Adkins: Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Gary Adkins Introduction The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Global communication at the speed of light has become a great asset to both businesses and private citizens. However, there is a dark side to the age we live in as it allows terrorist groups to communicate, plan, fund, recruit, and spread their message to the world. Given the relative anonymity the Internet provides, many law enforcement and security agencies investigations are hindered in not only locating would be terrorists but also in disrupting their operations.
    [Show full text]
  • Share — Copy and Redistribute the Material in Any Medium Or Format
    Attribution-NonCommercial-NoDerivs 2.0 KOREA You are free to : Share — copy and redistribute the material in any medium or format Under the follwing terms : Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. NonCommercial — You may not use the material for commercial purposes. NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material. You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation. This is a human-readable summary of (and not a substitute for) the license. Disclaimer 국제학석사학위논문 Wired For War: An Analysis of United States Cyber Security Against a Rising China 하이테크 전쟁: 중국의 부상에 대응하는 미국의 사이버 안보에 관한 연구 2017년 8월 서울대학교 국제대학원 국제학과 국제협력 전공 에멧 존슨 Wired For War: An Analysis of United States Cybersecurity Against a Rising China 하이테크 전쟁: 중국의 부상에 대응하는 미국의 사이버 안보에 관한 연구 Thesis By Emmett Johnson Graduate Program in International Cooperation In Fulfillment of the Requirements For The Degree of Master in International Studies August 2017 Graduate School of International Studies Seoul National University Seoul, Republic of Korea Abstract Wired For War: An Analysis of United States Cyber Security Against a Rising China The United States hegemony is challenged by China. With China’s economic and military rise, it is inevitable a power transition will take place.
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • WORLD WAR C : Understanding Nation-State Motives Behind Today’S Advanced Cyber Attacks
    REPORT WORLD WAR C : Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks Authors: Kenneth Geers, Darien Kindlund, Ned Moran, Rob Rachwald SECURITY REIMAGINED World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks CONTENTS Executive Summary ............................................................................................................................................................................................................................................................................................................... 3 Introduction ............................................................................................................................................................................................................................................................................................................................................... 4 A Word of Warning ................................................................................................................................................................................................................................................................................................................. 5 The FireEye Perspective ...........................................................................................................................................................................................................................................................................................
    [Show full text]
  • The Question of State Sponsored Cyber Terrorism and Espionage Student Officer
    st th The Hague International Model United Nations Qatar 2020 | 21 ​ – 24 ​ of January 2020 ​ ​ ​ ​ ​ Forum: The Security Council Issue: The Question of State sponsored cyber terrorism and espionage Student Officer: Sebastian Santoni Position: President Introduction On the 27th of April 2007, Estonia experienced the first of a series of cyber attacks which would go on to shape laws, policies, and attitudes within and outside its borders. The country was bombarded by thousands of independent actors, resulting in the complete loss of most internet services for three weeks. The Estonian parliament, banks and media were all targeted in the midst of political disagreements with Russia. Although not the first incident of cyber terrorism, this was definitely one of the most destructive, managing to make an entire country go offline. In response, the world’s first ever regulations concerning actions in cyberspace were drafted, hoping to prevent such incidents from occurring in the future. However, incidents of cyber terrorism and espionage continued and remain a major threat to international security. Not only can they create mistrust and paranoia between nations, but also paralyse the organizations and resources core to their economic, social and political stability. This is especially true when such acts are initiated by countries and their related bodies, placing the world’s most sophisticated technology in the wrong hands. As members of the United Nations, it is the responsibility of countries to use their resources, voices and cooperation to strengthen international cyber security and work towards a world where state-sponsored cyber terrorism and espionage are void. Organizations such as the Kaspersky Lab and the Cooperative Cyber Defence Center of Excellence have made strides toward combating the issue, although they are restricted by an acute lack of relevant treaties and laws.
    [Show full text]
  • Understanding Cyberwarfare Lessons from the Russia-Georgia War
    Understanding Cyberwarfare Lessons from the Russia-Georgia War Sarah P. White March 20, 2018 Understanding Cyberwarfare: Lessons from the Russia-Georgia War Capt. Sarah P. “Sally” White is a cyberspace operations officer in the US Army. She is currently pursuing her PhD in the Harvard Department of Government, where her research interests include military innovation and comparative cyberspace doctrine. She has served in the 82nd Airborne Division and the 780th Military Intelligence Brigade (Cyber). Following graduate school, she will serve as an instructor in the West Point Department of Social Sciences. Understanding Cyberwarfare: Lessons from the Russia-Georgia War Cyberattacks had become an established tool attacks, with the highest levels of online of statecraft by the time they were used against activity coinciding with the Russian invasion of the Republic of Georgia in the summer of South Ossetia on August 8, 9, and 10.3 Even the 2008, albeit one without a legal framework and National Bank of Georgia had to suspend all 4 whose long-term implications remained poorly electronic services from August 8–19. While 1 understood. Nevertheless, the war between there is strong political and circumstantial Russia and Georgia that took place in August of evidence that the attacks were encouraged by that year was remarkable for its inclusion of a the Russian state, definitive technical series of large-scale, overt cyberspace attacks attribution—and thus definitive legal that were relatively well synchronized with culpability—have remained elusive. conventional military operations. Conducted The cyberattacks had little effect on by an army of patriotic citizen hackers, the conventional forces and were not decisive to 5 cyber campaign consisted of distributed denial the outcome of the conflict, but they of service (DDoS) attacks and website nevertheless offer significant lessons on the defacements that were similar in nature but character of modern warfare for scholars of different in method to what had occurred in conflict and military studies.
    [Show full text]
  • APPENDIX ALCOTT, Louisa May
    APPENDIX ALCOTT, Louisa May. American. Born in Germantown, Pennsylvania, 29 November 1832; daughter of the philosopher Amos Bronson Alcott. Educated at home, with instruction from Thoreau, Emerson, and Theodore Parker. Teacher; army nurse during the Civil War; seamstress; domestic servant. Edited the children's magazine Merry's Museum in the 1860's. Died 6 March 1888. PUBLICATIONS FOR CHILDREN Fiction Flower Fables. Boston, Briggs, 1855. The Rose Family: A Fairy Tale. Boston, Redpath, 1864. Morning-Glories and Other Stories, illustrated by Elizabeth Greene. New York, Carleton, 1867. Three Proverb Stories. Boston. Loring, 1868. Kitty's Class Day. Boston, Loring, 1868. Aunt Kipp. Boston, Loring, 1868. Psyche's Art. Boston, Loring, 1868. Little Women; or, Meg, Jo, Beth, and Amy, illustrated by Mary Alcott. Boston. Roberts. 2 vols., 1868-69; as Little Women and Good Wives, London, Sampson Low, 2 vols .. 1871. An Old-Fashioned Girl. Boston, Roberts, and London, Sampson Low, 1870. Will's Wonder Book. Boston, Fuller, 1870. Little Men: Life at Pluff?field with Jo 's Boys. Boston, Roberts, and London. Sampson Low, 1871. Aunt Jo's Scrap-Bag: My Boys, Shawl-Straps, Cupid and Chow-Chow, My Girls, Jimmy's Cruise in the Pinafore, An Old-Fashioned Thanksgiving. Boston. Roberts. and London, Sampson Low, 6 vols., 1872-82. Eight Cousins; or, The Aunt-Hill. Boston, Roberts, and London, Sampson Low. 1875. Rose in Bloom: A Sequel to "Eight Cousins." Boston, Roberts, 1876. Under the Lilacs. London, Sampson Low, 1877; Boston, Roberts, 1878. Meadow Blossoms. New York, Crowell, 1879. Water Cresses. New York, Crowell, 1879. Jack and Jill: A Village Story.
    [Show full text]
  • Cassette Books, CMLS,P.O
    DOCUMENT RESUME ED 319 210 EC 230 900 TITLE Cassette ,looks. INSTITUTION Library of Congress, Washington, D.C. National Library Service for the Blind and Physically Handicapped. PUB DATE 8E) NOTE 422p. AVAILABLE FROMCassette Books, CMLS,P.O. Box 9150, M(tabourne, FL 32902-9150. PUB TYPE Reference Materials Directories/Catalogs (132) --- Reference Materials Bibliographies (131) EDRS PRICE MF01/PC17 Plus Postage. DESCRIPTORS Adults; *Audiotape Recordings; *Blindness; Books; *Physical Disabilities; Secondary Education; *Talking Books ABSTRACT This catalog lists cassette books produced by the National Library Service for the Blind and Physically Handicapped during 1989. Books are listed alphabetically within subject categories ander nonfiction and fiction headings. Nonfiction categories include: animals and wildlife, the arts, bestsellers, biography, blindness and physical handicaps, business andeconomics, career and job training, communication arts, consumerism, cooking and food, crime, diet and nutrition, education, government and politics, hobbies, humor, journalism and the media, literature, marriage and family, medicine and health, music, occult, philosophy, poetry, psychology, religion and inspiration, science and technology, social science, space, sports and recreation, stage and screen, traveland adventure, United States history, war, the West, women, and world history. Fiction categories includer adventure, bestsellers, classics, contemporary fiction, detective and mystery, espionage, family, fantasy, gothic, historical fiction,
    [Show full text]