Monday, January 27, 2020

Raspberry Pi Foundation DDoS Attack

Raspberry Pi Foundation DDoS Attack E Crime The perfect ‘E Crime’ – The Raspberry Pi Foundation Assessment: The perfect ‘E Crime’ – The Raspberry Pi Foundation Table of Contents 1 Introduction 1.1 Aim 1.2 Methodology 1.3 Justification 2 What is E-Crime? 2.1 Types of E-Crime? 3 The Raspberry Pi Foundation 4 The Attack 5 DoS attacks 5.1 DDoS attacks 5.2 Botnets 5.3 Protocol Attack 5.4 SYN Flood 6 Tools 6.1 High orbit ion cannon 6.1.1 High Orbit Ion Cannon Capabilities 6.2 Apache Killer 7 Defending DDoS 7.1 DDoS Defence System 7.2 DDoS Defence System Benefits 8 Example of a DoS attack 8.1 DoSing a website 8.1.1 The Result 9 Possible Perpetrators 9.1 Threat Agents 9.2 Who are the perpetrators? 10 Conclusion 11 References Figure 1 DDoS Attack Figure 2 High Orbit Ion Cannon Figure 3 Apache Killer Figure 4 DDoS Defence System Figure 5 Command Prompt Figure 6 Low Orbit Ion Cannon ready Figure 7 Low Orbit Ion Cannon attacking Figure 8 Low Orbit Ion Cannon URL Figure 9 Result of a successful DoS on a website 1 Introduction In this report the information will be based around a case study of an e crime against a SME (small-medium enterprise) that has taken place during the past 10 years. The story that has been chosen is the Raspberry Pi Foundation that was hit by DDoS attack on the 7th march 2013. The report will then explain how a cyber-criminal might have conducted this particular crime and try to assess the method and processes they might have used, including the tools, both hardware and software. While discussing tools, the report will show an example of how the tools are used to commit the crimes used from the story. The report will also show how you can defend systems from the attack that was chosen. 1.1 Aim The aim of this report is to demonstrate an understanding of cyber-attacks that are used against small, medium enterprises, and the tools (software and hardware) they use to be able to carry out these attacks. 1.2 Methodology This report was compiled utilising secondary resources, including a variety of books obtained from the library, as well as internet sources such as websites and PDFs. 1.3 Justification E-Crime Wales have documented that a Denial of service attack is one of the most common types of E-crime. (E-Crime Wales, 2012) Denial of service attack was chosen because it’s one of the most common e-Crimes out there, it is also probably one of the easiest attacks to perform, the tools used for this type of are attack are freely available to find and download, easy to use and very powerful. The company chosen was a SME and the attack was done in the last ten years. 2 What is E-Crime? E-Crime is a criminal activity where a computer or computer network is the source, tool, target, or place of a crime. E-Crime is not necessarily just for computing purposes; E-Crime’s can also be crimes such as fraud, theft, blackmail, forgery and embezzlement. E-Crime is quite difficult to become aware of and also punish because of how difficult it is, and also because attackers are able to hack victims thousands of miles away. Due to E-Crime getting a lot bigger and technology is becoming more advanced, new threats are rising very quickly and are also quite difficult for companies and people to react to them. (E-Crime Wales, 2011) 2.1 Types of E-Crime? According to the UK Government, around 87% of small businesses were victims of a security incident in 2013 up 10% and the average cost of a companys worst incident was  £35,000  £65,000 (Gov, 2013) In Wales alone it is estimated that attacks from e-criminals cost the economy around one billion. This includes financial loss, interruption of business, theft of valuable data, identity theft and a lot more caused by unauthorized access to systems. (Prior, N, 2013) Types of E-Crime are as follows: Hardware Theft Identity Theft Phishing Pharming Malware Virus’s Cyber Terrorism 3 The Raspberry Pi Foundation The Raspberry Pi Foundation is charity that was founded in 2006 which is supported by the University of Cambridge Computer Laboratory and Broadcom. The charity is there to promote computer science in schools, and is the developer of the single board computer the Raspberry Pi. In 2011, the Raspberry Pi Foundation developed a single-board computer named the Raspberry Pi. The Foundations goal was to offer two versions, priced at around  £30. The Foundation started accepting orders for the higher priced model on 29 February 2012. (Raspberry,FAQ, 2009) 4 The Attack The main attack was the third attack of out of seven days. The foundation was attacked on the afternoon of the 3rd march, where the site was disrupted for about an hour. The foundation was then again attacked two days later on the 5th march, but nothing happened and the attackers gave up after a few hours, finally on the evening of 7th March 2013, the Raspberry Pi Foundation website was attacked by a nasty Distributed Denial of Service (DDoS) attack. The servers where hit by a SYN flood, a botnet that contained around 1 million nodes. This caused the website to become very slow, especially the forum pages. The website was also down for a few hours. This attack proved to be the worst out of the three attempts. 5 DoS attacks DoS refers to â€Å"Denial of service† attack. A DoS attack is an attack that can make a web resource unavailable to its users by flooding the target URL with more requests than the server can handle. That means that regular traffic on the website will be either slowed down or completely interrupted. (Bull Guard, 2012) 5.1 DDoS attacks DDos refers to â€Å"distributed denial of service† attack. A Distributed Denial of Service (DDoS) attack is a DoS attack that comes from more than one source at the same time. A DDoS attack is generated using thousands can be up to hundreds of thousands of zombie machines. The machines used in such attacks are known as â€Å"botnets† in this attack there were around one million nodes in the botnet. The botnets are normally infected with malicious software, so they can be remotely controlled by the attacker. Attackers usually create the denial-of-service by either consuming server bandwidth or impairing the server itself. Targets are normally web servers, DNS servers, application servers, routers, firewalls and Internet bandwidth. (Verisign, 2012) Figure 1 DDoS Attack 5.2 Botnets Criminals use bots to infect large numbers of computers. These computers form a network, or a botnet. Criminals use botnets to send out spam email messages, spread viruses, attack computers and servers, and commit other kinds of crime and fraud. If a computer becomes part of a botnet, then the computer might slow down and maybe unintentionally be helping criminals. (E-CrimeWales, 2011) 5.3 Protocol Attack The attack used against the raspberry pi foundation was a SYN flood from a botnet. This is called a protocol attack. Protocol attacks include attacks such as SYN floods, fragmented packet attacks ETC. These types of attacks target server resources, firewalls and load balancers, and is measured in Packets per second. 5.4 SYN Flood A SYN flood DDoS attack exploits a weakness in the TCP connection sequence which is known as the three way handshake, SYN requests to start a TCP connection with a host must be answered by a SYN-ACK response from that host, and then confirmed by an ACK (ACKnowledge) response from the requester. In a SYN flood attack, the requester sends multiple SYN requests, but sometimes it doesn’t respond to the host’s SYN-ACK response, or sends the SYN requests from a spoofed IP address. Either way, the host system continues to wait for acknowledgement, binding resources until no new connections can be made, and then resulting in a denial of service attack. (Incapsula, 2012) 6 Tools 6.1 High orbit ion cannon Figure 2 High Orbit Ion Cannon (Breeden, J, 2012) The High Orbit Ion Cannon is a tool used mainly by anonymous but also used by other hacktivists. The High Orbit Ion Cannon is an upgrade of the Low Orbit Ion Cannon, but it seems that the High Orbit Ion Cannon is mainly used to just DoS websites instead of servers, which you can do on the Low Orbit Ion Cannon. The High Orbit Ion Cannon is able to use custom scripts to target more than just a website’s home page. Instead of visiting the site from a fake user, the High Orbit Ion Cannon targets sub-pages. So the attackers try to visit the welcome page, help pages, article pages and anything else a victim site has to offer. This method prevents some firewalls from recognising that the website is being attacked. Even if they do detect what’s happening, they will have trouble shutting down because the software is sending multiple fake users to multiple pages within a domain. (Breeden, J, 2012) The High Orbit Ion Cannon is really not that powerful for single users if they want to attack a big organisation, Anonymous say at least 50 people need to attack a big organisation in order to take the website down. In this instance a single user could of used this type of tool to bring down the Raspberry Pi Foundation website for a few hours, mainly because the Foundation wouldn’t have (or very little) Anti DDoS software to have been able to stop the attack. (Breeden, J, 2012) 6.1.1 High Orbit Ion Cannon Capabilities High-speed multi-threaded HTTP Flooding Simultaneously flood up to multiple websites at once Scripted Boosters to handle DDoS counter measures and increase DoS output. Generating Multiple HTTP Header to create the genuine traffic flow scenario. (Avkash, K, 2012) 6.2 Apache Killer Figure 3 Apache Killer (Expert Hacker Home, 2012) Apache killer is a DDOS/DOS tool written in Perl which sends HTTP get requests with multiple byte ranges, these byte rangesoccupya wide variety of portions in the memory space. Byte Range helps browsers or downloading applications to download required parts of files. This helps reduce bandwidth usage. While the script sends dozens of unsorted components in the request header to cause the apacheserver to malfunction. (Rafayhackingarticles, 2012) If the attack is successful the results can be devastating and can end up in rendering the original operating system unusable only if the requests are sent parallel. (Hoffman, S, 2011). 7 Defending DDoS There are a number of ways to defend against DDoS attacks: Black-holing or sinkholing: This approach blocks all traffic and diverts it to a black hole, where it is discarded. The downside is that all traffic is discarded good and bad, packet-filtering and rate-limiting measures simply shut everything down, denying access to legitimate users. (ComputerWorld Inc, 2004) Routers and firewalls: Routers can be configured to stop simple ping attacks by filtering nonessential protocols and can also stop invalid IP addresses. However, routers are pretty much useless against a more sophisticated spoof attack and application-level attacks using valid IP addresses. Firewalls can shut down a specific flow associated with an attack, but like routers, they cant perform anti-spoofing. (ComputerWorld Inc, 2004) 7.1 DDoS Defence System Figure 4 DDoS Defence System (Coreo Network Security, 2012) The DDoS Defence System (DDS) prevents DDoS attacks from crippling firewalls, intrusion prevention systems (IPS), switches and targeted web and DNS servers. It stops all types of DDoS attacks and maintains full availability without effecting performance. DDS provides maximum protection for critical IT assets while allowing full access to legitimate users and applications. (Coreo Network Security, 2012) DDS detects and blocks all forms of DDoS attacks, including: Application layer Network layer flooding Specially crafted exploits Reflective Outbound attacks 7.2 DDoS Defence System Benefits Detects and mitigates both traditional network-layer DDoS attacks and more advanced application-layer attacks Protects your network, allowing legitimate communications to pass without delay provides automated real-time defence against identified DDoS attack sources 8 Example of a DoS attack The following attack was performed in a virtual environment using DoS and DDoS software. In the example the DoS tool that was used was the Low Orbit Ion Cannon and Windows server 2008. Figure 5 Command Prompt As you can see in figure 5, it shows a simple IPconfig command to show the IP address for the attack. Figure 6 Low Orbit Ion Cannon ready In Figure 6 you can see that the Low Orbit Ion Cannon is ready to set off. As you can see the Server 2008 IP address has been locked on ready for it to be DoS’ed. Just underneath the address you can see the speed of the attack, the faster it is the more requests that are sent to the server, underneath that it then shows the method, port, thread and timeout for the attack. Figure 7 Low Orbit Ion Cannon attacking As from figure 6 you can see all the things are the same and ready to go. After clicking â€Å"IMMA CHARGIN MAH LAZER† you can see the attack is working by looking at the bottom of Figure 7 where it is showing the number of requests being sent. That number was just after around one minute of the server being attacked, so the amount requested would be a lot higher after around five minutes time which would probably be enough time. The purpose of Dos’ing a server is so that it stops any requests to that server, it sends multiple fake requests to the server stopping anything else being connected to it. 8.1 DoSing a website Figure 8 Low Orbit Ion Cannon URL The Low Orbit Ion Cannon can also be used to DoS a website, by simply typing in the website you want to DoS in the URL tab, click lock on and then fire the cannon. The purpose of DoSing a website is by flooding the target URL with more requests than the server can handle causing the website to crash and to be temporarily unavailable. 8.1.1 The Result Figure 9 Result of a successful DoS on a website If a DoS/DDoS attack is successful on a website then this is normally what you’ll see when you try to access the website, the DoS attack has clearly crashed the website and caused it to offline. 9 Possible Perpetrators The Possible perpetrators could be a number of people or organised crime. Even though there is no evidence from the foundation on who was behind the attack or the location it came. 9.1 Threat Agents The possible threat agents that could have been behind this attack are as follows Employees Government agencies Hacktivists groups e.g. Anonymous Organised criminals 9.2 Who are the perpetrators? From conducting the research there is no evidence of who was behind the attack and where that attack had come from. Looking at the possible threat agents it’s very unlikely that the attack could of come from a government agency or a type of hacktivist group such as anonymous, Lulzsec etc, if the attack came from one of them two types of threat agents the attack could have been a lot more sophisticated and could have caused a lot more damage. The Raspberry Pi Foundation quote that the attacker was probably â€Å" an angry confused kid† which is easy to believe considering the attack was attempted multiple times throughout that week, but its possible that the attack may not be linked to the same person, it could also be the same attacker with help from others to make sure the attack was successful or it could have been another attacker. The foundation says that the attack was probably for financial gain but there is no comment of any data being stolen. 10 Conclusion Throughout the report it shows how frightening it is that any sorts of hacker or hacktivist group are willing to attack anyone. It’s scary to think that even charity websites are vulnerable to attacks. Looking at this attack the foundation is lucky that it wasn’t attacked by a bigger threat agent from a hacktivist group which could have caused a lot more damage. The report also shows how easy it is to get your hands on the tools that are commonly used, how easy they are to use and how powerful they actually are. The examples of the attacks show how powerful the tools can be, the Low Orbit Ion Cannon sends a high amount of requests to servers and websites in a short space of time. 11 References Raspberry, FAQ. (2009). About Us. Available: http://www.raspberrypi.org/about. Last accessed 19/03/2014. E-Crime Wales. (2011). What is e-Crime?. Available: http://www.ecrimewales.com/server.php?show=nav.8856. Last accessed 17/03/2014. Breeden, J. (2012). Hackers new firepower adds firepower to DDOS. Available: http://gcn.com/Articles/2012/10/24/Hackers-new-super-weapon-adds-firepower-to-DDOS.aspx?Page=2. Last accessed 18/03/2014. Expert, Hacker Home. (2012). Latest Methods of DDoS attacks. Available: http://experthackershome.blogspot.co.uk/2012/07/ddos-attacks-in-2012-latest-method-of.html. Last accessed 18/03/2013. E-Crime, Wales. (2011). Botnets Explained. Available: http://www.ecrimewales.com/server.php?show=nav.9390. Last accessed 26/03/2014. Coreo Network Security. (2012). How to stop DDoS Attacks. Available: http://www.corero.com/en/products_and_services/dds. Last accessed 27/03/2014. ComputerWorld Inc. (2004). How to defend against DDoS attacks. Available: http://www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks. Last accessed 27/03/2014. Bull Guard. (2012). What are DoS and DDoS attacks?. Available: http://www.bullguard.com/bullguard-security-center/internet-security/internet-threats/what-are-dos-and-ddos-attacks.aspx. Last accessed 20/03/2014. Verisign. (2012). What is a DDoS attacks?. Available: http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/ddos/ddos-attack/index.xhtml. Last accessed 20/03/2014. Incapsula. (2012). DDoS Attack Types. Available: http://www.incapsula.com/ddos/ddos-attacks. Last accessed 20/03/2014. rafayhackingarticles. (2012). Apache Killer. Available: http://www.rafayhackingarticles.net/2011/08/zero-day-dos-vulnerability-in-apache.html. Last accessed 23/03/2014. Hoffman, S. (2011). Apache Killer Tool Exploits DoS Flaw. Available: http://www.crn.com/news/security/231600200/apache-killer-tool-exploits-dos-flaw.htm. Last accessed 23/03/2014. 1

Sunday, January 19, 2020

The Color of Water Essay

The Color of Water by James McBride was a narrative about a immature male child seeking to calculate out his racial individuality but his female parent would non speak about her yesteryear or what race she was. All James knew was that she was white life in a black power vicinity and that fact terrified him. He thought that to turn up he had to cognize his racial individuality but through all the problem and difficult times he went through he learned that his race did non affair. It was his instruction that was the most of import. Ruth attitude about her race effected James through his childhood and as a immature grownup. she negatively affected his racial development. and Ruth finally clears up his inquiries that he has been deceasing to acquire replies from. Ruth McBride’s attitude toward her ain race affected her boy. James McBride. as both a kid and as a immature grownup. Ruth chiefly looked down on her race because of her male parent. All he care about was money and the shop. he did non care about his ain married woman or household. He besides molested Ruth when she was a immature miss. When James was a immature male child he ever questioned her about race. He wanted to cognize if he was black or white and he besides asked what colour The nazarene was. James mother would non wholly reply his inquiry. She responded stating that James was a human and instruction was all that mattered. and that Jesus was the colour of H2O. As a child. James knew that his female parent was white. and that terrified him. He knew that a white lady life in a black vicinity. besides with black childs. was populating in danger. James truly realized his mother’s danger when Ruth and James were walking place and a adult male came up and stole Ruth’s bag. James figured out how strong and brave or crazy his female parent was when she did non contend the larceny back and all she told James was that it was merely a bag and it did non affair. When James grew up. he thought that Ruth was traveling brainsick. and he didn’t esteem her like he did in the yesteryear. If James would hold known about his mother’s yesteryear. it wouldn’t have change much. He might hold been more excusatory for her but that would be about it. Ruth’s impact on James’s racial development is negative. but she had good purposes. James ne'er knows what his racial background is and that bothers him throughout his life. If he would hold known what his mother’s background was possibly so he would understand himself in his eyes. but it does non take your race to calculate out yourself. it takes larning who you are on the interior. Ruth was seeking to do it a positive impact on his racial development. Ruth knew that race did non affair. it was about what was on the interior of the individual. but James did non understand that construct. Race ne'er concerned him by stating he was non traveling to tie in himself with a individual because of their background but he want to cognize about their race. and Ruth had no attentions about their race. which is a better manner to travel at it. Ruth offers James confusion as he grapples with his racial individuality as a younger male child. but she offers him lucidity as a immature grownup. When James was immature. Ruth would reply any of her inquiries and that bothered him but he knew non to force her to her bound or he would acquire the belt. He does non cognize what half of his race is. he know he was black from his male parent but knew nil about his mother’s race. Ruth was non ashamed to be a Jew. but she did non back up Judaism because of her male parent. Tateh. She was non concealing the fact that she was a Jew from James but she did non desire to believe about everything that she ran off from when she left Suffolk. Virginia and her household. more significantly her female parent. Hudis Shilksy. When James turns into the immature grownup he finds out that cognizing your race does non assist you in life like a good instruction does. Even though he has learned this Ruth starts to explicate his inquiries about race to him. In the narrative The Color of Water. James has unanswered inquiries as a kid. At the terminal of the book James learns about Ruth’s race and he finds out his racial individuality. James besides finds out God’s colour. He is the colour of H2O and H2O is neither. black or white. Ruth had harmful memories when she was a Jew because of her male parent and when he might her first hubby. Dennis. she changed her religion and found felicity. Ruth’s race affected Ruth which subsequently on affected her boy James negatively. Her angry about her yesteryear led to James’s confusion about his ain racial individuality. but subsequently on got all his inquiries answered.

Friday, January 10, 2020

The Great Train Robbery and The Phantom Carriage: Editing Comparison

Drawing on the evidence provided by a sequence notation, show how editing functions narratively and expressively in one sequence from either Broken Blossoms (1919) or The Phantom Carriage (1921) and comment on the ways in which this differs from The Great Train Robbery (1903). The Great Train Robbery and The Phantom Carriage are both considered as one of the key creative movies ever made in history. The Phantom Carriage was very well known for showcasing it’s advanced narrative construction with flashbacks within flashbacks. The Phantom Carriage would have had technological advantages over The Great Train Robbery since it was made eighteen years after. Hence, both their editing methods are substantially different. Having made a notation on one of the sequences from The Phantom Carriage, the narrative functions of the editing styles between the two will be discussed while the differences are highlighted. To start with, both the movies consisted of interesting cinematographic elements that allowed the editors to the cut the movie in the most creative way. For a first narration film, The Great Train Robbery managed to introduce many interesting editing techniques. There were multiple location changes, camera movements and the introduction to the style of cross cutting was also impressive. The Phantom Carriage also consisted of many interesting techniques such as the use of various shots from different angles, camera movement and the display of a title card to express the narrative. The sequence chosen from The Phantom Carriage is the beginning to part three, which starts off with a black fade to colour transition. This transition automatically communicates a time change within the narrative. We are then shown an establishing outdoor shot, of a man dressed in a suit, walking out of a tall door that is closed by another man who seemed to look like a guard. This shot re-establishes the location as the outside of a jail due to its features such as tall doors, the presence of a guard, brick walls and then a tall building with corridor openings behind the brick wall, which is revealed after the camera pans slightly to the left as the man walks towards the camera. The man then looks to the left and exits the frame where the next cut is ade. As the cut is made before the man completely exits the frame, as audience, we expect it to be a match cut; instead it is a jump cut that cuts into the man running into one of the houses in the street. Although this marks a transition in time and space, it makes the audience curious on where the narrative had gone from when he left the jail, to when he got to the h ouse. However compared to The Great Train Robbery, the narrative in The Phantom Carriage is still stronger as although there was a jump cut, the audiences were able to see the man leave the jail and enter the house. The element of continuity in action expressed the narrative better. The scene in The Great Train Robbery, where the operator runs to the nearby dancehall to inform the others of the incident, the audiences are not shown the operators journey to the dance hall at all; instead the operator looks as if he is getting up to inform the others and then a jump cut is made to the ballroom where the people are dancing. We can then see another man enter the room; at first we would think that it is the operator but it is somebody else. Due to the lack of continuity, it could confuse the audience on what the narrative is. As the operator later joins the crowd and informs the crowd of the incident, with the help of their exaggerated reaction to the situation, the narrative is made clearer. ‘In both narrative and non-narrative films, editing is a crucial strategy for ordering space and time. Two or more images can be linked to imply spatial and temporal relations to the viewer’. The Phantom Carriage consisted of a variety of shots from different angles that denoted the narrative over to the audience. In contrast, The Great Train Robbery did not show any one sequence from various angles. Most scenes were shown from one angle and the set looked theatrical, almost like a black box theatre where the camera is the fourth wall. However, the narrative in The Great Train Robbery was very quick and easy to understand as each cut meant a scene change. A lot more happened between cuts in The Great Train robbery than in The Phantom Carriage. Therefore if somebody missed a cut from The Great Train Robbery, compared to The Phantom Carriage, it would have been more difficult for the person to understand what had occurred. The variety of shots in The Phantom Carriage meant that, even if somebody missed couple of shots, they would still be able to understand the plot. Also, having a variety of shots, allowed the audience to feel more connected to the movie, as they were able to analyse the situation from different angles. ‘ In the classic narrative system, editing is governed by the requirements of verisimilitude, hence the characteristics in any one film sequence of establish ing shot, closer shots that direct the gaze of the spectator to elements of action to be read as significant, followed by further long shots to re-establish spatial relations. ’ The element of continuity is significant in making the movie appear as real as possible. A variety of shots were used to give the continuity effect in The Phantom Carriage. In the second shot from the sequence, it is established that the man is walking on the street and is about to walk into a house. We then see a mid shot of the man going up the stairs followed by a close up of the object he is looking at. We are then taken back to a mid shot of him looking down. The movements between the shots are cut and matched perfectly, meeting the requirements of verisimilitude. The Great Train Robbery also had interesting moving background that set the scene without having to explain where the location was. For example, the way the background moved, while the thieves were robbing, made the narrative clearer by explaining the robbery that was happening in the train. This explained the title of the movie while expressing the narrative across. However, there were continuity issues, such as the differences between the speeds of the background movement between scenes. For example, after the robbing scene, the scene cuts to a robber climbing the engine of the train. This is an outdoor scene and the movement of the train in the background suggested that the robbery happened while the train was moving. Compared to the previous shot, the speed in which the train moved has noticeably decreased, making the background movements in between the scenes look like a jump cut. Continuing on with the sequence, the next cut is made when the audience first sees an empty stairway, where the sequence has an added vignette effect to he frame. We then see the man quickly running up the stairs in the continuing movement from the previous frame. The vignette effect made it seem like someone was observing the man’s actions through a keyhole or peep hole from another room. We are then shown the man’s attempt in trying to get into the room using various eye-line matches between him and the doormat. The vignette effect still makes it seem like it was from a p erson’s point of view, as the effect disappears as soon the camera position changes in the next cut. The next cut is a reverse angle shot that follows the 180-degree rule of the man walking into the room with the continuing movement from the previous shot. Perfect continuity plays a crucial part here as from the moment he got up from the stairs to where he got in to the room; all the cuts were perfectly matched with his movements. In contrast, there were no eye line matches or point of view shots in The Great Train Robbery. Most of The Great Train Robbery’s frames seemed like a theatrical stage where the actors entered in from either sides and left through those sides. When the next cut is made, the vignette effect disappears denoting that the other vignette shots were definitely from someone’s point of view. We then see the character walk into the room through a door. The camera is placed facing the door towards the left of the frame making sure that both the doors are in the frame. As the character walks in, the camera pans to the right to include the door on the right in the frame. At this point, we are able to see all the three doors in the frame. This moment is a key moment as this shows the importance in including the all doors in the frame. Having a door on the frame always brings in an idea of suspense, in finding out on the ways in which the objects behind the door is going to influence the narrative of the story. We then see the character run into the room, as expected the next cut is made where the physical action of the character running into the room is completed. This smooth match cut looked almost perfect since there were no absence of continuity in the movement expressed by the character. This helped strengthen the way the narrative was expressed, as we were able to understand that the character couldn’t find what he desired. The next match cut was also equally effective as the cut made matched his action. There is an interesting mirror element to the way this short sequence from when the character came into the room, until when he walked out of the room was shot and cut. As he walks into the room, the camera pans slightly to the right as he enters the room on his left. This match cut of him going in and out of the room is perfect due to it’s element of continuity. The cut matches the shot to its initial camera position that was used when the character walked into the room initially. Similar to the way the camera panned to the right as he walked into the room on his left, the camera pans slightly to the left, back to its original position as he walked out of the room. He then knocks on the opposite neighbour’s door; as soon as he knocks a lady opens the door immediately. It is interesting how quick she opened the door, as this confirms the discussion on the vignette effect denoting the shot as a point of view. The camera was probably positioned by the door, and low angled shots such as the one looking down at the doormat and back up at the man shows that the camera is representing someone’s eyes. The restriction of view due the shot being a close-up with the added the vignette effect makes it almost look like someone was peeking through either a keyhole or a peephole. The use of point of view angle would connect the audience to the movie in a deeper level, as they are able to view the actor from another actor’s perspective. In terms of mise-en-scenes used; the setting, the actors’ performance and costumes were a lot more exaggerated and unnatural in The Great Train Robbery compared to The Phantom Carriage. Due to this reason, The Great Train Robbery lacked the sense of realism in comparison. Due to the variety of cuts, it is easier for The Phantom Carriage to express emotions and denote the narrative through subtle acting, natural setting and simple costumes as the audiences are able to see more and close into the actors. With The Great Train Robbery, if the elements were not exaggerated, the moments may go unnoticed leading to the narrative being conveyed as unclear to the audience. Although both the movies have significant differences in terms of the way it was shot and cut, The Great Train Robbery can be considered as an impressive work due to its ability in showing a difficult narrative in such a short time. Although its narrative was mainly expressed using its establishing shot, we were still able to understand the narrative without the help of title cards that was used in The Phantom Carriage as the main tool in expressing its narrative.

Thursday, January 2, 2020

Immigration - 1700 Words

Increasing the security of the borders in The United States became top priority following the terrorist attacks of September 11, 2001. In 2002, 22 federal agencies were united to form The Department of Homeland Security to oversee the security of the country within and outside its borders. US Custom Border Protection (CBP) is an agency/department of The Department of Homeland Security that perform inspections in border and ports of entry. CBP officers and agents welcome all legitimate travelers and trade while preventing the entry of terrorists and their weapons. CBP law enforcement professionals enforce U.S. law, stopping narcotics, agricultural pests and smuggled goods from entering the country. They also identify and arrest travelers†¦show more content†¦Benner said. It was the first time cocaine had been seized in connection with a tunnel operation, the authorities said. (By Liam Dillon and Ian Lovett Published: October 31, 2013) It is clear why the breach of security on the southern border is of concern to both governments as well as to citizens of US and Mexico. The Department of Homeland Security (DHS) is working to secure the border by ensuring that an effective combination of staffing, technology, and infrastructure is utilized to protect the more than 8,000 miles of land and maritime areas along both the northern and southern borders, however the current system in place needs urgent changes in order to secure the borders and move forward to target all illicit activities that take place on the border. The next step will be redirect the attention and work on the effects that it brings to citizens of the countries involved. It is easy to think only on the effects that it brings to United States but also for Mexico it has a negative impact. It is often assumed that illegal immigrants are all Mexican citizens crossing the border however this statement is not a fact. Mexico is being used as a bridge by illega l immigration immigrating to United States from neighbor countries such as Guatemala, Honduras, El Salvador, Costa Rica, and Peru. The federal government, the DHS and agencies involved in securing our borders need to create a comprehensive plan to guarantee the DHS gainsShow MoreRelatedImmigration And Immigration Of Australia1276 Words   |  6 Pagescomprising about 3.1 million males and 2.8 million females (Queensland Govt., n.d). More than 599 000 people have arrived under humanitarian programs, initially as displaced persons and more recently as refugees. Statistics from the Department of Immigration and Citizenship reported that during this same period in Australia, approximately 1.6 million migrants arrived between October 1945 and 30 June 1960, about 1.3 million in the 1960s, about 960,000 in the 1970s, about 1.1 million in the 1980s, overRead MoreImmigration And The Issue Of Immigration982 Words   |  4 PagesMy current event is on the issue of Immigration and Refugees t hat is going on in our society. Immigrants have been the back bone of what made America great. This country is supposed to be the land of opportunity. For the people that come here that is all that they hear. Wanting a fresh start from whatever country they came from. The NASW (2015) said that â€Å"Immigration has increased rapidly in the 1990s, with more than 13 million people moved to the United States† (p.176). Immigrants and Refugees isRead MoreImmigration : What Is Immigration?1271 Words   |  6 PagesWhat is Immigration? So the topic i picked for my final will be Immigration. In my word, immigration is the act to move on. When people move from one country to another it’s called immigration. If you think about it, we are like birds. Birds or animals move home from home in the winter to keep warm. Animals migrates so they can keep warm. Many immigrants plan to live in the new country for a long period of time. They want to become citizens of the new country. The number of people who immigrateRead MoreImmigration And Illegal Immigration1106 Words   |  5 PagesImmigration has played an important role throughout American history. What fundamentally sets America apart from other nations is the foundation that it was created by immigrants seeking a better life for themselves and their children (Camarota Zeigler, 2016). During times of economic growth, laborers have been imported, and deported during recessions (Flores, 2016). An average of 1.1 million immigrants relocate to the United States ann ually (Storesletten, 2000). US Customs and Border Control officialsRead MoreImmigration And Globalization1734 Words   |  7 PagesIntroduction How does immigration impact an individual’s likelihood to identify with a national identity, or a larger global identity? Does immigration, a component of globalization, impact one identity more than another? These questions are increasingly relevant with the well-documented rise of European nationalist parties, but there are still questions about whether these are empirically connected phenomena. Immigration, a facet of globalization, is widely discussed, as well as other impactsRead MoreImmigration : Perceptions Of Immigration893 Words   |  4 PagesPerceptions of Immigration Many people around the world have to move to different countries for different situations. Some of them have to move because their parents were transferred by their work. Others are moving because they want to live in another country. There are other people that move because they are looking for new opportunities to succeed or because they are escaping because of violet reasons in their countries. This process of moving from one country to another is called immigration. This wordRead MoreImmigration Into Canada4080 Words   |  17 PagesImmigration Into Canada Abstract This paper is concerned with the recent wave of Hong Kong immigrants into Vancouver. The stage is set for this discussion by first explaining some background behind Canadian immigration policy and then discussing the history of Chinese immigrants in Vancouver. From these discussions we are informed that Canadian immigration policy was historically ethnocentric and only began to change in the late 1960s. It was at this point that we see a more multicultural groupRead MoreThe Immigration Problem Of Immigration1735 Words   |  7 Pagesbetween criminal law and immigration law has become increasingly blurred. In many jurisdictions around the world, undocumented immigration was long considered a civil offence in which violation resulted in fines and deportation. Now, however, illegal crossings are often treated as criminal violations carrying overly punitive consequences such as incarceration in harsh detention centers. The ever-evolving assortment of laws and enforcement measures concerning immigration, as well as negative rhetoricRead MoreThe Problem Of Immigration And Immigration1940 Words   |  8 Pageswill examine the problem of Immigration and Immigration Law. I will first discuss what Immigration Law is and how it works, then I will define the number one problem of immigration laws, â€Å"illegal immigration† and why it’s so important to follow procedures. It will also address the consequences after violating the law s. Next the paper discusses three policy solutions to the problems of illegal immigration: Legalization of Immigrants, Strengthen Border Security, and Immigration Amnesty. The paper willRead MoreImmigration And The Debate On Immigration Essay1448 Words   |  6 Pagesin the debate was about immigration. Every year, thousands of immigrants come to the United States, some document and some undocumented. They have different reasons for wanting to come to America, whether it is for jobs, the policies and laws of the United States, the economy, or even refugees from countries which are going through a civil war. There are many different opinions on immigration and what to do with illegal immigrants. Many citizens believe that taxes increase due to illegal immigrants