Thursday, February 13, 2020

W2 DQ Assignment Example | Topics and Well Written Essays - 500 words

W2 DQ - Assignment Example This intervention in diplomacy happened from the highest levels, with no less than Powell and Armitage, the highest and most key officials in the US defense establishment, intervening and securing the guarantees of no less than President Musharraf that he would, with all the might of his position, stop the infiltration. Having secured this, the US officials then turned around and made public the pledge to the Indian government, while they were in India. This one maneuver is said to be responsible for the gradual de-escalation of the conflict and the averting of what could have been a deadly turn of events between the two countries. One can see from this episode that while the diplomatic intervention was quite late, having arrived when the two parties were already on a tension level that was dangerously close to a full-scale war, America as the third party had within its means to diffuse the tension, and act as a superpower and disinterested party to which both Pakistan and India can turn to as a kind of referee. There is no lack of political will, at least on the part off the United States, and at least in this one instance. Though it came a bit late, this one incident can be looked at as a kind of reminder that if needed, at least the US can be counted on to rise to the occasion again. Elsewhere too we see that the US was also instrumental in trying to apply the lessons from the Cold War by trying to get the two countries to participate in CSBMs, or Confidence and Security Building Measures (Nayak and Kepron, 2006, pp. 13-22; Khan, 2002). On one level, the analogy of the Pakistan-India relations with that of the US and Soviet Union are valid, to the point where theories on deterrence, and dealing with the paradox known as â€Å"stability-instability† as it applies to the two South Asian countries. The literature is expanding, and is being used as reference to deal with the complex dilemmas facing India and Pakistan, as far as deterrence

Saturday, February 1, 2020

The process of gathering forensic evidence Essay

The process of gathering forensic evidence - Essay Example Electronic data is also fragile like any other type of data so any data that is to be preserved has to undergo a given protocol to make it safe. The expert should ensure that the data is not damaged and that computer virus does not affect the data. This can be done by storing data in a computer that is well protected from any virus and at the same time has a secure system that gives access to only stakeholders who can come up with the password. Once its location has been known the data has to be collected by the experts. They have to go to the virtually stored data get it and record it in the prepared storage device that had been preserved for its storage and that has minimum potential of destroying the data. When collecting the data various data collection tools are required to enable the process. This is the part where the experts sit down and examine the data that had been collected. This is the stage where they are able to know if the data has been tampered with after they have done all this then they have to give the go ahead for the writing of the report. This is a computer hardware toolkit that is used in the performance of very detailed digital examination of forensic evidence. It is built using ubuntu software and is able to combine witness experience to come up with a witness format that is used in hand with advanced forensic format. The software’s that are used to make the device is sleuth kit which is a kit used to make file systems for analysis. The device has the capability of taking fingerprints through a touch screen and storing it in the computer memory. This tool helps forensic experts to secure and examine raw data disks. It also has the capability of handling multiple file systems as well as come up with the format for the evidence that has been made. The tool also has the capability of placing strict deadlines to the data and how to work on it. In order to see all visible traffics, the tool is able to