Saturday, May 23, 2020

Homer s Odyssey A Greek Hero - 940 Words

Homer’s Odyssey Work Sample Odysseus is not your typical Greek hero. Greek heroes like Achilles and Hercules used purely their physical advantages and enormous strength to overcome their challenges. Odysseus however, in addition to his god-like strength, used his wits and mental horsepower -- which needless to say he had a lot of. This allowed him to get out of some very sticky situations. Odysseus primarily used thought, patience, and clever tricks to overcome obstacles thrown in front of him and his men. In the Epic Homer’s Odyssey, Odysseus used his brains to take a Cyclops’ sight and escape its clutches, defeat the powerful witch Circe with garlic, and destroy tens of suitors attempting to steal his wife Penelope. Cyclopses, as portrayed in ancient Greek literature, are certainly a force to be reckoned with. They stand high over the height of your average Greek hero and have the muscles to rip a man in two like wet tissue paper. The single large eye in the middle of their head gives them enou gh of an in-human look to spark fear in the hearts of whoever is unfortunate enough to encounter one. These few facts about cyclopses would scare any tough Greek hero, but not Odysseus. He has the brains to accompany his muscles that would make a cyclops, assuming he knew about Odysseus, tremble in his dirty, oversized loin-cloth. When confronted by the cyclops Polythemus, Odysseus’s men and even the great Odysseus himself were worried. However, Odysseus had a plan. During theShow MoreRelatedOdysseus Is A Hero?1143 Words   |  5 PagesThe Odyssey by Homer, The character Odysseus is one of the greek heros in this book. He is known as a great hero, because he manages to get through all of these dangerous mission such as : First odysseus makes it alive after travelling for ten years and facing different and more difficult challenges. Odyssey faces dangerous creatures and people. Homer have odysseus pass all theses task and missions to name him one of the great greek gods that ever lived . Some may say Odysseus is not a hero butRead MoreGreek Epics873 Words   |  4 PagesGreek Epics There are some challenges in each history period, and authors will create some heroes in their epics that reflect values of the culture at the time. By studying the hero’s actions and his motivations, it tells the society conditions and the civilization of that history period. Homer; the authors of The Iliad and The Odyssey; and Vergil; the authors of The Aeneid are two of the greatest writers in ancient western civilization. There are heroes in these three literatures to reflectRead MoreThe Bronze And Iron Age Essay2093 Words   |  9 PagesQuestion: 1-What Can Homer tell us about the Bronze and Iron Age The Bronze and Iron Ages were 2 of the main periods in Greek History and Homer can tell us a lot about them. The Bronze Age was all about mixing copper with tin or arsenic to bronze hence it is called the Bronze Age. The Iron Age was when the whole of the east Mediterranean was in crisis. In central Anatolia, the collapse of the Hitties opened the gates to invaders who overran the country. Firstly, let’s talk about Homer- a lot of the worksRead MoreThe Between Greek And Greek Society1318 Words   |  6 Pageswere many forms of heroism. How would you define heroism? What does a true hero consist of? A hero is a common and quite simple term, but is not always easy to define within a character. A hero according to Roman and Greek Society is someone who stands up for their country and fights for their beliefs. Normally a hero is someone who everyone looks up to. Heroes show tremendous amounts of courage and desire to fight for one s country. Arete, known as excellence, is a well defined term in the HellenisticRead MoreComparison Between The Odyssey And The Iliad1068 Words   |  5 Pages In the novel The Odyssey, the author Homer describes an outcry against death; whereas in the Iliad death is portrayed as an accomplishment., Both were in the times that is also known as Before Common Era, or BCE. It is known that Iliad begins 10 years before the great Seige of Troy and eventually the odyssey had begun a couple years after that(Classical Lit). When Homer had written these novels it is clear that they have numerous lines, and Homer had written both. In the novel The IliadRead MoreHomer s Epic Hero, The Odyssey, By Homer1670 Words   |  7 Pagesthe greatest tales of a hero is one of a man returning home after war. King of Ithaca, Odysseus was a Greek champion in the Trojan War. However, he is known best not for his heroic acts during combat, but for his journey back to Ithaca, to his wife and son, in the ten years that follow. In Homer’s epic hero, The Odyssey, the Greek poet tells of Odysseus’s hardships and how he used his heroic traits to overcome them. The myth is told in twenty four books. Odysseus is a hero because of his clevernessRead MoreThe Odyssey By Homer s Odyssey Essay1314 Words   |  6 Pagescentury, The Odyssey, is Homer s epic of Odysseus 10-year struggle to return home after the Trojan War. Odysseus defining character traits, such as nobility, courage, thirst for the glory and the app ealing confidence in his authority dominated the storyline throughout. The many themes of this epic mainly focus around the Greek hero Odysseus however in my essay I will attempt to analyze hospitality. Hospitality shaped an important part of social interactions in The Odyssey. Although Greek society emphasizesRead MoreThe Demeaning Role Of Women In Homers The Odyssey1280 Words   |  6 PagesThe Odyssey is one of two poems written by Homer describing the drama of the Trojan War, more specifically, the catastrophic journey of the hero Odysseus back home. Throughout the tales, female characters exhibit the many and diverse roles of Greek women, and also their significance in a world dominated by immortal beings.   Like countless others, the goddess Calypso’s beauty and elegance could be the cause of circumstances both good and evil. Calypso is remembered most for keeping Odysseus as a prisonerRead MoreKleos in The Odyssey by Homer938 Words   |  4 PagesTHE ODYSSEY Heroic glory occupies a very crucial place in the Indo-European epic tradition, because the Greek society is a shame culture, in which being honoured is one of the primary purposes of people s lives. Hence, the concept of kleos formed an essential part of the bardic tradition which helped the people to maintain the heroic stature of the mythical heroes from generation to generation. This is why, it has got an important place in the Greek epics also. In The Odyssey by Homer alsoRead MoreWhat Is The Importance Of Storytelling In The Odyssey1111 Words   |  5 PagesWoodard Honors 111 9/25/17 Storytelling in the Odyssey The Odyssey is a story made up of stories. Because there is very little action that happens in the present, the presence of storytelling within the Odyssey is something that characterizes it and makes it unique. The spreading of stories serve to form legends and myths that can have the effect of shaping a culture. In addition, since stories were such an important aspect of entertainment in Greek culture, stories also shape the audience, either

Tuesday, May 12, 2020

The Psychological Aspects of The Scarlet Letter - Free Essay Example

Sample details Pages: 2 Words: 643 Downloads: 2 Date added: 2019/05/13 Category Literature Essay Level High school Tags: The Scarlet Letter Essay Did you like this example? The human mind and the morals of any individual person, no matter how good and pure, can usually be swayed by the power of temptation and emotions. Sin, especially, is a significant factor that greatly affects the conscious of human beings. In the novel The Scarlet Letter, sin is portrayed as the fuel that begins the fire. Throughout The Scarlet Letter, Nathaniel Hawthorne exhibits the dark side of the human mind as the scarlet letter, along with hidden secrets, arouses the inner turmoil of the characters, revealed through prominent themes such as madness, vengeance, self-torture, and obsession. In the The Scarlet Letter, Roger Chillingworth’s sole purpose is to exact vengeance on Arthur Dimmesdale, the man whom his wife had an affair with. This task is seen as the center of his life, consuming his time and his energy day by day. His obsession with Dimmesdale not only alters his state of mind and body, but also his morals and conscious. He is described as, â€Å" a man who corrupts himself because he can neither forgive nor forget the corruption of others† (Evans). An example of this is his transformation from being an intellectual, physician, to a hatred filled stalker. Chillingworth is seen looking over Dimmesdale as he sleeps. As he looms over Dimmesdale, and discovers the A on his chest he is fixed with a, â€Å"wild look of wonder, joy, and horror!† as he confirms Dimmesdales identity as the adulterer (Hawthorne 127). Unlike most people, Chillingworth is excited and filled with ecstasy at finding evidence of adultery and sin. Don’t waste time! Our writers will create an original "The Psychological Aspects of The Scarlet Letter" essay for you Create order Another dark event seen in The Scarlet Letter is when Chillingworth shrewdly plays psychological mind games with Dimmesdale in order to further torment his conscious. Chillingworth psychologically tortures Dimmesdale under the guise of being a trusted friend and helper. He even looks loathingly at Dimmesdale when he is not looking, and if he looks back then he schools his features. Chillingworth takes pleasure in making comments that trigger fear and anxiousness in Dimmesdale, poking and prodding him with comments that remind him of his sin. Because of this, Dimmesdale feels a sense of distrust and unease whenever he is present around Chillingworth, but he has no rational or provable reason for his feelings so he is stuck suffering mentally and physically. Chillingworth’s purpose is to, â€Å"exacerbate, rather than relieve, the sufferings of others, especially Dimmesdale† (Evans). Chillingworth adds to the torment Dimmesdale has already been inflicting on himself on a daily basis. Arthur Dimmesdale’s guilt gnaws at him through the entire novel. His self torture is his way of relieving himself from the guilt that constantly plagues his mind. Because of his this he cannot think of anything else. This is an example of Hawthornes use of emotions and events to show its effects on the mind of the guilty. Dimmesdale continually tortures himself but to no relief. He tortures himself not out of worship but, â€Å"rigorously, and until his knees trembled beneath him, as an act of penance† (Hawthorne 134). All of Dimmesdale’s actions are driven through his guilt. He not only physically tortures himself, he also constantly imagines possible consequences of his sin being revealed, rendering him subject to suffering because of his own guilty thoughts. In The Scarlet Letter, Nathaniel Hawthorne displays the dark side of human nature as the characters are influenced by the heated emotions and immoral actions of themselves and others. Most prominently seen in the novel, Roger Chillingworth and Arthur Dimmesdale are seen as the ones who easily succumb and act on these fervent emotions. This leads them to deal with these emotions in various ways, either physically or mentally hurting themselves or others. The characters of The Scarlet Letter are quick to blame and antagonize based only off their own feelings, which throws each of them down a path of deception, wicknedess, and false reasoning.

Wednesday, May 6, 2020

The Negotiation Strategies In International Business Commerce Essay Free Essays

string(44) " political enterprisers in other countries\." In concern relationships, parties negotiate because they think they can act upon the procedure in such a manner that they can acquire a better trade than merely accepting or rejecting what the other party is offering. Ghauri ( 2003 ) says concern dialogue is a voluntary procedure of spring and take where both parties modify their offers and outlooks in order to come closer to each other. In literature, sometimes â€Å" bargaining † and â€Å" dialogue † are used interchangeably. We will write a custom essay sample on The Negotiation Strategies In International Business Commerce Essay or any similar topic only for you Order Now Negotiation, besides called â€Å" integrative bargaining † , refers to win-win dialogue where both or all parties involved can stop up with every bit good or attractive results. In other words, everyone can win. It is more related to a problem-solving attack, where both parties involved perceive the procedure of dialogue as a procedure to happen a solution to a common job. In integrative bargaining nevertheless, if dialogues are non decently handled, both parties can stop up with a jointly inferior trade. With dialogue, it is possible for both parties to accomplish their aims and one party ‘s addition is non dependent upon the other party ‘s grant. Business dialogue is considered by many writers as being this type of dialogue. The power/dependence relation is another basic feature of all dialogue processes. It is closely related to the existent power relation, which is influenced by the value of the relationship to the parties and their available options. Background factors for illustration the market place – can act upon the power/dependence relation. The ability to command a relationship is related to the sensed power of two parties, their comparative expertness and entree to information. This power is a belongings of the relationship and non an property of the histrion ; in fact, it is closely related to dependance. Therefore, the power relationship is in balance if both parties perceive equal power. The power relationship is imbalanced if one of the parties perceives more power, or if one party is dependent on the other. The dramatic growing of international trade over the last five decennaries has been non merely in footings of volume but in complexness every bit good. International sellers are now more and more concern negotiants, who invariably discuss trades across boundary lines with a assortment of people, runing from consumers to mediators and even rivals. Technology frequently plays a major function in such trades and this could misdirect people into believing that the whole dialogue procedure is chiefly an applied scientists ‘ treatment based on rational and scientific facts. In fact, proficient complexness intermingles with human complexness to render such dialogue processes hard to pull off. A considerable sum of literature is available on dialogues, some of it besides on concern dialogues but the field of international concern dialogues is rather neglected. Strategic Negotiations. Richard Walton etal,1994 identify three primary dialogues schemes. These are â€Å" forcing, † â€Å" fosterage, † and â€Å" flight. † Each represents an overarching form of interaction that characterizes the dialogues. A scheme does non emerge all at one time, but over clip as a consequence of consistent forms of interaction. A forcing scheme by and large involves taking a â€Å" distributive † or win/lose attack to the dialogues, combined with a â€Å" divide and conquer † attack to internal dealingss in the other side, and an attitudinal attack that emphasizes uncertainness and misgiving. By contrast, a fosterage scheme by and large involves taking an â€Å" integrative † or win/win attack to the dialogues, combined with a â€Å" consensus † attack to internal dealingss in both sides, and an attitudinal attack that emphasizes openness and apprehension. â€Å" Escape † is a non-negotiations scheme in w hich one or more parties seek to stop or undersell the relationship. Dietmeyer and Kaplan ( 2004 ) utilize a research-based attack to dialogue that assists gross revenues professionals in making their ain concern ends, while guaranting that their clients run into budget and professional aims as well-going beyond win-win to accomplish true, mensurable concern value for all parties at the negociating tabular array. Power and Diplomacy Power. Susan Strange ( 1998 ) brings out that power accrues to those who can offer or deny security ; those who manage the creative activity of wealth by production ; those who create recognition to let or deny other people to pass today and pay back tomorrow ; those who ( myocardial infarction ) manage the currency in which recognition is denominated ; those who have knowledge ( advanced engineering ) which provides military high quality and laterality in other power constructions. John De La Mothe ( 2002 ) , argues that scientific discipline, engineering and invention have long been cardinal factors in the competitory advantage of states. Today, nevertheless, the new international political economic system is being progressively driven by scientific discipline and engineering in new ways. Integration, globalisation and internationalisation have all become war cries for a series of dynamic procedures in which scientific discipline and engineering are profoundly concerned. As a conse quence, non merely are the policies of â€Å" national † authoritiess being exposed in footings of the bounds of their sovereignty, but scientific discipline and engineering are being progressively implicated in a broad array of public issues – runing from security, privateness, development and economic growing to employment, environment, foreign policy and geopolitics. Clearly, in today ‘s rising universe, the ways in which authoritiess organize their scientific discipline and engineering policy, their scientific discipline and engineering intelligence, and their research advisory constructions and resources matter more today than of all time before. Diplomacy. James Rosenau was one of the first to propose that the domestic and international are someway ‘linked ‘ and elaborated upon what he termed ‘linkage political relations ‘ ( 1969 ) . Scholars concentrating on the regional impact of domestic political relations are Karl Deutsch ( 1957 ) and Ernst Haas ( 1958 ) . Haas high spots two types of ‘spillover. ‘ The first type, functional spillover, occurs when cooperation in certain sectors of the economic system ( or society ) creates technocratic force per unit area for cooperation in bordering sectors, thereby impeling integrating frontward. The 2nd type, political spillover, occurs when ongoing cooperation in certain countries empowers supranational functionaries to move as informal political enterprisers in other countries. You read "The Negotiation Strategies In International Business Commerce Essay" in category "Essay examples" In order to pull off complex technocratic issues more efficacio usly, rational authoritiess must depute discretion to experts, Judgess and administrative officials, thereby making powerful new supranational histrions with an involvement in cooperation. Graham Allison in Essence of Decision: Explaining the Cuban Missile Crisis ( 1971 ) excessively, speaks of an ‘overlap ‘ between international and domestic political relations. In State Power and the Structure of International Trade, Krasner argues that that openness in the universe economic system is most likely to happen â€Å" during periods when a hegemonic province is in its dominance † . Equally long as the province ‘s technological lead is increasing, its leading will comprehend economic advantages to openness, since openness will spread out markets for the merchandises of its technologically sophisticated industries. The hegemon will besides derive politically, since the â€Å" chance costs of closing † will be low, comparative to those confronting smaller and poorer provinces. Conversely, when several big, unevenly developed provinces coexist, Krasner predicts that the more backward provinces will happen openness economically and politically dearly-won and will therefore resist it. Greater trade closing will, hence, consequence ( Keohane 1997 ) . Like Gilpin before him, Krasner excessively stresses on the influence of the Ã¢â‚¬Ë œ strength ‘ of the province on international trade. The important point is the correlativity between what occurs within a province is related to what occurs beyond province boundaries. Robert Putnam in Diplomacy and Domestic Politicss: The Logic of Two Level Games ( 1988 ) argues that domestic constructions and diplomatic negotiations are endlessly entangled and says that the negotiant is under force per unit area to accommodate domestic and international struggles. Putnam ‘s work challenges the ‘level of analysis ‘ attack to analyzing international dealingss which stresses the importance of sorting informations under three bunchs: the systemic, national and the person ( Singer 1961 ) . Mayer ( 1991 ) develops a theoretical account to research the deductions of domestic political divisions for international strategic battle in international trade. He explores the topic by handling international trade as a game and placing the participants and analyzing how they play. The observation that there are several overlapping games being played, a few of them being strategic and others non, is important. Policies such as duty, quotas, and export and produc tion subsidies are the tools used by the participants to derive an advantage in the international strategic trade game ( Krugman 1986 ) . Work on ‘strategic trade policy ‘ physiques on game theoretical theoretical accounts which analyse how provinces use trade policies to leverage their economic public presentation. India and Nanotechnology ( The literature study included, amongst others, a perusing of one-year studies of GOI MOD, DST, CSIR, TIFAC, CII ; back issues ( app 3years ) of Business universe, New Scientist, Hindu Businessline and Business Today. ) GOI enterprises include DST launched Nano Science and Technology Initiative ( NSTI ) with an allotment of Rs. 1000 crore, Government has spent about Rs. 250 crore, over the past five old ages to advance R A ; D in the country of nanotechnology. 100 research undertakings on the synthesis and assembly of ceramic nanoparticles, nano tubings, nano wires, nanoporous solids, and DNA french friess have been supported by the Government. CII Enterprises have resulted in ; India-UK Joint Economic and Trade Cooperation, Indo-US High Technology Cooperation Group ( HTCG ) , Nanotechnology partnership with Taiwan, a figure of Nanotechnology Conclaves, Nanotechnology Cluster-CMTI, Jharkhand Nanotechnology Initiative, West Bengal Nano Park etc. CII is working closely with the Government of India on US India High-Technology Cooperation Group ( HTCG ) formed on November 2002. The HTCG acts to ease and advance bilateral high-technology trade. The focal point countries of the nucleus group include Information Technology, Defense, Life Sciences and Nanotechnology. Gaining the potency of nanotechnology, HTCG working group on Nanotechnology is formed to ease seamless flow of cognition between both the states and joint development undertakings affecting industries. The Confederation of Indian Industry ( CII ) has put together a 10-point action program to authorise Indian industry to come out with commercial nanotechnology merchandises, which it believes will drive the hereafter of industry worldwide. The action program includes awareness creative activity, preparation and accomplishments development, engineering facilitation and networking and easing collaborative undertakings. The Nano Science and Technology Consortium works to make a platform conducive for the growing, publicity and partnering in the field of Nano Science and Technology taking together industries, faculty members and authorities through consultative, consultative and educative procedures which will supply growing platform for organisations, faculty members and authoritiess for tackling the Nano potency at Global degree. Companies like Samsung have already entered the Indian market with a scope of merchandises utilizing nanotechnology such as icebox, rinsing machine and air-cooler. Samsung uses nano-silver in assorted composings in its merchandise scope. Further, companies like Tata Steel, Tata Chemicals, Mahindra A ; Mahindra, Nicholas Piramal and Intel have invested around $ 250 million in the domestic market towards this terminal. Yash Nanotech has inked understandings with IIT Mumbai, NCL Pune and the Jawaharlal Nehru Centre of Advanced Research, Bangalore, to set about planetary contract research and set up nanotech fabrication installations. Civil Applications. These can be grouped under four caputs, viz. , sensing, including imagination, detectors and detector webs for the sensing of pathogens and chemicals ; protection, including decontamination equipment and filters, and personal protection ; designation, including anti-counterfeiting and hallmark, forensics, quantum cryptanalysis and the market for forgery and gray goods ; social impacts, including current regulative and ethical models, possible impacts on moralss and human rights, and public perceptual experience. Application in the field of medical specialty is one of the most absorbing countries that include new malignant neoplastic disease therapies, drug bringing systems, and biomaterials for implants or prosthetic device or diagnostic tools, which are under development or already in market. An of import country of application of nanotechnology includes fresh drug bringing techniques, which are quicker A ; less hazardous, compared to the costs of developing new drugs. Military Applications. These besides flow out from civil applications in countries like ; higher public presentation platforms ( aircraft, ships, bombers, boats and orbiters ) , enhanced feeling through more sensitive and selective detectors, enhanced human public presentation, information laterality through enhanced information engineering, improved battleground casualty direction, lower life rhythm costs with improved stuffs, coatings, and condition-based care etc. Stake holders. The assorted interest holders include ; authoritiess, Industry, Entrepreneurs, R A ; D, Institutions, Academic Research Institutions, and Society. Case Studies. These can be subdivided into those which pertain to PSUs, R A ; D constitutions and Defense and the private sector endeavors. The private sector industries which can be studied for dialogues ensuing in assorted types of partnerships/JVs/MOUs/TOTs etc. are listed below: – Measuring devices A ; equipments: Bharat Heavy Electrical Ltd, Icon Analytical equipment. Ltd. , Veeco.Health Care: Dabur Research Foundation, Bharat Biotech International Ltd. , Ranbaxy Laboratories Ltd. Materials processing: Tata Chemicals, Pune. Reliance India Limited. Car: Mahindra A ; Mahindra, Tata Motors, United Nanotechnologies Pvt. Ltd. Electronics: Bharat Electronics Ltd, SemIndia Systems, Samtel India. How to cite The Negotiation Strategies In International Business Commerce Essay, Essay examples

Friday, May 1, 2020

9

9-11 could have been avoided if the Secret Service Essay s would have done their WorkPreceding the terrible events on September 11th, 2001, the American Secret Services have made many mistakes in regard to the possibility of preventing 9-11. The Secret Services, mainly the CIA and the FBI, have made a great lot of mistakes. After an initial meeting in Kuala Lumpur, Malaysia, where eight terrorists met, the CIA (Central Intelligence Agency) let go of them after their meeting, assuming it was unimportant . After the attack on the USS Cole in 2000 they changed their minds, now coming to the conclusion that major agreements regarding the Cole as well as regarding the WTC (World Trade Center) were made in Malaysia. However, it was too late. As the year 2001 approached and warnings accumulated, they still did not react. The September 11th-attacks could have been avoided if the Secret Services would not have been hindered in their work by higher authorities and if they would have cooperated/shared their findings. Mistakes long before 9-11After the 1996 crash of TWA flight 800, 31 urgent proposals by a White House commission were proposed. The Los Angeles Times:The White House Commission on Aviation Safety and Security, created in 1996 after TWA Flight 800 crashed off Long Island, N.Y., recommended 31 steps that it said were urgently needed to provide a multilayered security system at the nations airports The Federal Aviation Administration expressed support for the proposals, which ranged from security inspections at airports to tighter screening of mail parcels, and the Clinton administration vowed to rigorously monitor the changes. But by Sept. 11, most of the proposals had been watered down by industry lobbying or were bogged down in bureaucracy, a Times review found. This was not at all done; according to Larry Klayman, CEO of Judicial Watch (a Washington-based legal organization aimed at fighting the corruption in state and Government):During the last eight years of scandal during the Cl inton administration, and the first eight months of the Bush Administration, reports this morning confirm that little to nothing was done to secure our nations airports and transportation systems as a wholedespite warnings. Instead, cosmetic reform of education, social security, taxes, and other less important issues were given precedence. In addition, the American people were led to believe that appropriate anti-terrorist counter measures were being taken. Instead of telling the truth so the problems could be addressed, politicians painted a rosy picture in order to be elected and re-elected. After this missal of an urgent proposal, there are also some other interesting facts about the secret services, especially the CIA. At first, they did not even take UBL (Osama bin Laden, utilizing the FBI-spelling and -abbreviation) serious, although he wrote a 20-page Fatwa and clearly said: I predict a bad day for America in near future (Mai 28th 1998)So they knew from early on that UBL was planning an attack on the US. In fact, he planned that from even earlier than early, as he was only brought into connection with serious terrorism after the 1993 WTC-bombing. For example, in 1993 material found on a hard drive taken from a computer of one of the imprisoned in connection with the WTC bombing included a letter saying: This time our calculations were too rough. We promise you, next time we will be very precise. The WTC will continue being on our list of targets. The agents also had to realize that future attacks could as well be suicide missions: For your information: Our army has more than one hundred and fifty suicide soldiers at disposal. from then on the CIA knew that there would be a sure second time. From the moment of the September 11th attacks, high-ranking federal officials insisted that the terrorists method of operation surprised them. Many stick to that story. Actually, elements of the hijacking plan were known to the FBI (Federal Bureau of Investigation) a s early as 1995 and, if coupled with current information, might have uncovered the plot (Chicago Sun Times)They the CIA found details of the plan in a computer seized in an apartment used by three men who were part of Bin Ladens al Qaeda network. It provided for 11 planes to be exploded simultaneously by bombs with time fuses placed on board, but also in an alternative form for several planes flying to the United States to be hijacked and flown into civilian targets. Among targets mentioned was the World Trade Center in New York, which was destroyed in the September 11 terror attacks in the United States that killed thousands. (Die Welt) This plan was called Project Bojinka Bojinka means big bang in Serbo-Croatian. In further detail, Yousef had developed mini-bombs which can easily be passed through airport security checks. Several people were to plant the mini-bombs on two to three planes after each other. The terrorists wanted to leave the plane on the stopover and board another p lane and again plant the bomb under their seat. This plot emerged once again in the 1997 trial against Ramzi Yousef, the person who had come up with the plan described above, and Abdul Murad, both al-Qaeda members, and the latter the organizing terrorist of the 1993 WTC bombing. The FBI and CIA knew of the plan at the latest from this point. With no connection to the trial Yousef boasted about his plans on the flight from Pakistan to the US in February 1995 to Secret agent Brian Parr and CIA-agent Charles Stern. They confirmed this in court later on: The plans not only targeted the CIA but also other government buildings in Washington, including the Pentagon. The Insight Magazine managed to get copies of Murads interrogation by the Philippine police, codenamed Blue Marlin. Murad said that he planned to board the plane as a normal passenger. He then would take control of the cockpit and (flying himself) ram the plane into the Pentagon. He would neither use a bomb or explosives. He just needed to get a pistol onboard the aircraft. T his Blue Marlin paper seemed like a blueprint of what happened seven years later. The report indicating that UBL was continuing Bojinka was that young and convinced al-Qaeda members were taking flight training in the US. This should have resulted in an intensive watch over the flight schools in which they were trained however nothing happened.. Zacarias Moussaoui, another al-Qaeda terrorist, was taken notice of after his flight trainer told the FBI he wanted to learn how to fly a 747, but did want to learn takeoffs or landings. Zacarias Moussaoui (Zac) traveled with a French passport. On request the French authorities answered that Zac probably was a terrorist connected to UBL. Reuters reported the following about Zac: The FBI arrested an Islamic militant in Boston last month and received French intelligence reports linking him to Saudi-born dissident Osama bin Laden but apparently did not act on them Furthermore the French authorities informed the Americans that Zac was most likely trained in Afghanistan but the American did nothing. French Secret Services, accor ding to Jean-Charles Brisard, informed their American colleagues that Zac, the so-called 20th hijacker, has connections to the al-Qaeda and the Americans, once again, did not react to this information. This flight trainer training Zac called the FBI several times trying to find an agent willing to react to his information: He suspected Zac having connections to al-Qaeda which was later proved and told the FBI of the apparent possibility of using a 747 with full tanks as a bomb. He told them: Do you realize a 747 loaded with fuel can be used as a bomb? Foregoing these calls Zac attracted lots of attention in the flying school. He said he came from France, but when the instructor tried to speak French to Zac, he became very evasive of his background. There was discussion about how much fuel was on board a 747-400 and how much damage that could cause if it hit anything. Despite of the urges in the flight school, a FBI-agent from Minnesota and from the French authorities, the FBI-HQ ref used further investigations until 9-11 This FBI-agent in Minnesota, Dave Rapp, was visited by a Mr. Atlas shortly before. He drove Zac from Oklahoma to the school in Minneapolis. He said that Zac thinks it is allowed to kill civilians who hurt Muslims and that he approves it if Muslims die in such attacks as Martyrs. However, the US Government actively prevented further investigations. The FBI-agents in Minneapolis regarded Zac as a dangerous terrorist and applied for a specific search warrant for counter-espionage in order to evaluate Zacs computer. This was denied because high-rank FBI-agents did not see enough evidence for a link between al-Qaeda. Even after the French secret service showed the broad connection between al-Qaeda and Zac to the FBI, they still blocked further investigations. The final decision (until 9-11) remained No. The official reasoning for this was, according to ABC News, the lack of evidence of a connection between Zac and a known terrorist organization. Now, after 9-11, Zac handed in requests to be heard by the US Congress as well as by a Grand Jury in regard to 9-11 He claims he has information which proves that the US government wanted the attacks to happen. His applications were repeatedly rejected. Furthermore, in August 1998 the CIA received a report saying that an Arabian group is planning to fly a plane packed with explosives into the World Trade Center, however they did not react. They passed this report onto the FBI, where nothing happened either, however CIA-experts did not regard it as necessary to indicate the FBI that future plane hijackers could as well be suicide missions. The FBI as well as the FAA declined this plan immediately and said this was undoable. So the FBI advised the FAA (Federal Aviation Association) not to pass this memo onto the airlines in order to avoid panic. However, the fact that the FAA was not informed about this change in strategy of the terrorists was to prove as a big mistake. It resulted in the airlines still advising the crew to meet the demands of the hijackers to avoid escalation. Due to these accumulating warnings DCI (Director of Central Intelligence; Director of CIA) George Tenet wrote a burning memorandum on Dec. 4th 1998: We are in a war. I will not spare staff nor any other resources in this war, not in the CIA nor in the other American secret services. With his burning memorandum to his executives and heads of departments he tried to secure himself to all sides in retrospect. He dexterously covered up the mistakes of his authority by causing the impression that such a brutal and never-done-before terrorist attacks (on the two US-embassies in East Africa) could not have been fought by the CIA with their means at disposal. Tenet did not have any actions follow his plan. The relations between FBI and CIA were rather cold and competitive, after the FBI uncovered a mole within the CIA, This was not cooperation anymore; they saw each other as competitors, one wins, the other one looses. The CIA thought that the FBI should rather care about car theft and leave their fingers off espionage defense or even terrorism. Due to this competitive thinking information was kept from each other, like the case of al-Mihdhar: The inland authorities were not informed that a dangerous terrorist (al-Mihdhar) ran around with a valid US-Visa the CIA kept this information for themselves. Totally independent from the above, a young Arab rushed into the FBI-agency in Newark, NJ, in April 2000. He told the puzzled agent that he just came from a al-Qaeda training camp in Pakistan, where he was not only taught how to handle firearms but also how to hijack planes. Now he was expected to meet with five or six people in the US to together carry such an operation through. One of the hijackers would be a trained pilot, he said, who would fly the plane to Afghanistan. If that wouldnt be possible they should blow the plane up. The FBI-agent thought the man would be lying and did a Polygraph-test. The detector showed the man was not lying. Nonetheless, the agent simply wrote a protocol and left the case. Mohammed Atta, Ziad Jarrah and Marwan al-Shehhi all had their US-Visa by May 2000 to train at flight schools, while at least al-Shehhi was watched by the CIA over over a year now. In July 2000 al-Hazmis Visa is about to expire. He, who has been in the states for a while now, applied at the INS to extend it on July 7th, 2000. Although he was long saved in the NSA-computer as a member of the al-Qaeda and although the CIA knew of his stay in the US he did not need to fear anything. The intelligence services still had not put him out for search. Neither the FBI, the INS nor the State Department knew that a dangerous terrorist was in the States since seven months. And as al-Hazmis name was neither listed in NAILS (National Automated Immigration Lookout System) of the INS (Immigration and Naturalization Service) nor in TIPOFF of the State department, the INS-official in charge did not see a reason to decline an extension of the visa, let alone alarm the FBI. Al-Hazmi received a new visa, v alid until January 2001. The Meeting in Kuala Lumpur, MalaysiaKhalid al-Mihdhar, Yazid Sufaat, Nawaf al-Hazmi (whose name was not fully known back then), Khalid Sheikh Mohammed (KSM), Hambali (full name unknown) and Ramzi Binalshibh met in Kuala Lumpur, Malaysia in January 2000. KSM was one of the highest people in the al-Qaeda. These six and two other young Arabs met in an apartment, under intense surveillance by the CIA and the Malaysian secret service. At that time, the names of two of the attendees were unknown to the CIA However, the CIA does not even inform the NSA (National Security Agency) about the surveillance operation in Malaysia. This would have helped the CIA tremendously, as two of the people the CIA did not know about were already in the huge NSA-computers. When the meeting was over, the CIA decided to see the matter as done., assuming the meeting was unimportant. Their Malaysian colleagues seemed to foresee that this was the biggest mistake in the CIA-history. US officials have stated that t hey only realized the meeting was important in the summer of 2001, but the presence of Mohammed should have proved the meetings importance. Unemployment EssayIn the middle of march 2001 al-Hazmis brother, Salim, traveled into the US. Although he, as well as his brother Nawaf, was saved in the NSA database, he entered the US without any difficulties. Their data was still not in the police computers: Nawaf al-Hazmi, as said before long saved at the NSA, was caught in a speed trap on April 1st 2001 on Interstate 40. He was stopped and had to show ID, license and registration. Over his radio the officer asked if there is anything against the driver. Al-Hazmis name was entered in the computer. Nevertheless nothing against him could be found, as the CIA still did not inform local police authorities that he is a dangerous, searched-for terrorist. So al-Hazmi simply got a ticket for speeding and can drive off. At the same time these computer errors occur, an ally of the Western powers pleads for help: Ahmed Massoud is in the European parliament in Strasbourg, France, on April 4th 2001. He asks the world powers to help him fight the Taliban. He also clearly states that al-Qaedas plans are not restricted to Afghanistan: If president Bush does not help us, he says in Strasbourg in front of an armada of reporters, these terrorists will cause great harm in the USA and Europe. Al-Mihdhar was meanwhile very well known to the CIA. They had a copy of his passport since 1 years. The fact that the young Saudi had a valid visa for the US and traveled into the latter didnt really seem to bother the CIA-agents. At least they did not regard it as necessary to pass this information onto the FBI or other inland authorities. In Jeddah in Saudi-Arabia, al-Mihdhar applied for an extension of his visa. As his name is neither listed in the TIPOFF- nor in the CLASS-database (Consular Lookout and Support System), he got a new visa valid until October 3rd 2001. When news that KSM has traveled into and out of the US like a normal tourist reaches the CIA-HQ in Langley, they could not really believe this. On the other hand the report was so detailed and concerning that they decided to at least verify it. After all KSM was meant to have brought trained al-Qaeda-members into the US, where they immediately contacted fighters already there and preparing an attack, according to the report. KSM himself is said to have boasted that he, a searched-for terrorist, has entered and left the US several times without any problems. CIA-note: If that really is KSM, we have, one, a serious threat, and, two, a good chance of getting him. The report is passed onto the FBI, were it is unnoticed. Tenet, at the end of June, sent out an express inquiry to the twenty partner-intelligence services with a list of known al-Qaeda terrorists and asked them to, if possible, arrest them. A similar list with, among others, the names of al-Mihdhar and al-Hazmi, was not made for the police authorities in the USA. Apparently the CIA did not want to open the possibility for outsiders to realize the momentous errors made in the CIA. Tenet also frequently calls Tom Pickard, the new boss of the FBI after Freeh retired in June, and asked him if he has anything on the more than frequent warnings of al-Qaeda attacks. Pickard can only answer no; although there were papers in his authority which are going to shock the whole country and which will bring discredit upon the FBI for its ignorance. Pickard, too, realized the immediate threat by terrorism and asked for more money for the CTC (Counterterrorism Center) at the start of August. Ashcroft thought this whole terrorism-thing was simple panic-mon gering and did not answer the memo until September 10th with a simple No. The FBI-agents in Minneapolis, having arrested Zac for a simple Visa-violation, agree to hold him for 7 days instead of the usual 24 hours because of an expired visa. Agent Rapp already took into account to simply deport him to France, as he was traveling with a French passport. However, they first wanted to try to use FISA (Foreign Intelligence Surveillance Act) for special cases. Of 12,000 applications only one was declined. However, for the next three days nothing happened. Rapp, in the meantime, questioned himself with some obvious questions: Why should plane hijackers learn to fly planes themselves? And why did the other terrorist write his testament? The only possible answers werent very pleasant. Rapp found it absurd that he cannot take a closer look at Zacs computer and notebook although the apparent and urgent threat. In Washington everyone played safe now in regard to the case from far Minneapolis they contacted several FBI-lawyers who all say there is not enough of a conne ction between Zac and the al-Qaeda. The problem for the FBI-lawyers is that the new boss, Pickard, just came from the Ministry of Justice and was known for his lawfulness: The law cannot be bent for any reason. Under Freeh the law was not taken that seriously and such a search warrant was granted quickly. For Rapp this was against common sense: There is a man who apparently plans to hijack a plane and Rapp is not allowed to take a look at his computer and notebook. Regarding the many warnings without any concrete details, Tenet advised the whole CIA to look through their documents and look for all open questions on August 21st, 2001. Through this the information about the meeting in Kuala Lumpur was brought up again. This job coincidentally was given to a FBI-agent working in the CTC. After reading the information he connected two important pieces of information: the fact that al-Mihdhar had a visa even at the time of the meeting in Malaysia, and that with Nawaf al-Hazmi another terrorist who attended the meeting had a valid US-visa. With the help of a INS-official also working for the CTC, they found out that both of them have entered the US several times since, and both were in the US at that time. They were stunned that this information has been known to the CIA since eighteen months. Finally the CTC decided to do what they should have done months earlier: Notify the FBI, the INS and customs that both of these terrorists needed to be put on the wanted lists. The CIA sent out a CIR (Central Intelligence Report) out to all other intelligence services and authorities on August 23rd, 2001. This asked to put al-Mihdhar, al-Hazmi and two other attendees of the Malaysia-meeting on wanted lists. The CIA recommended rejecting them from entering the States. They didnt mention that the two mentioned above were long in the States already. The CIA still tried to cover its momentous mistakes up. Special Agent Rapp was meanwhile fed up with the endless waiting. He called a colleague in the RFU (Radical Fundamentalism Unit) in Washington and asked him about the state of things. The answer was only that Rapp only made everyone crazy with his Moussaoui. Rapp replies: Im making every crazy in the HQ because I want to prevent that Moussaoui gets control over a plane and flies into the World Trade Center with it!In the FBI-agency in New York the agents wanted to try everything possible to track down al-Mihdhar, now that they know of his danger. They asked for reinforcements. These were declined with a ridiculous reason: The search for al-Mihdhar was started due to intelligence (CIA) information. That was not allowed, according to the NSLU (National Security Law Unit). The law states a clear border between police and intelligence findings. These borders had to be strictly honored. The New Yorker-FBI-agent was totally startled. It is bad enough that the CIA only informed the other au thorities about the entry of dangerous terrorist months late. Now the FBI was not allowed to search for a wanted terrorist who had his fingers in the attack on the Cole, who could walk around freely in the United States and is probably planning another attack. He wrote an email to his superiors in Washington: Some day someone will die never mind law-borders -, and the public will not understand why we were not more effective and used all our resources to find solutions to certain problems. Lets hope, that the NSLU will back their decisions then too, especially because our biggest threat, UBL, gains the most protection out of this!In the morning of September 11th, the terrorists checked in at Portland Airport, Maine. For twenty days, the whole country was searched for al-Hazmi and al-Mihdhar. Nonetheless, their tickets and passports were issued with their real names. They passed security etc. without any problems. On the morning of the eleventh of September, 2001, two planes hit the World Trade Center in New York City, which, when collapsing, killed more than 2,750 people. One plane hit the Pentagon, killing 186 people. Another plane crashed in Pennsylvania after a passenger revolt against the hijackers, killing 44 people. Shortly after the attack Rapp got the permission to search Zacs belongings. After his computer and notebook were evaluated they could proceed fast. Although they were under high pressure, they could not resist and attached a warning sent out before the attacks to every email they send to the HQ, because more and more their anger and certainty was growing, that they could maybe have prevented the attack here in Minneapolis. Aboard Air Force One, Ari Fleischer gave a first briefing of the press. Replying to the question Were there any warnings known to the president?, he falsely answered No. In a conference of the NSC (National Security Council), to which Tenet is connected through phone, he had strong evidence for once. On the passenger list of AA 77 which flew into the Pentagon he could identify three people long known the CIA: Nawaf and Salim al-Hazmi as well as Khalid al-Mihdhar. Tenet didnt mention since when the CIA knew of the trio, neither did he talk about the CIAs knowledge that at least two of the three entered the US twenty months ago. Without knowing anything on the background or details, the members of the NSC knew that someone badly messed something up. FBI-director Robert Mueller, only in place since one week, didnt even try to make the impression the FBI knew something: The FBI does not have a clue how the hijackers could get control over the planes. We did not receive any according info rmation from the CIA. However, I cannot surely say that there were no possibilities to investigate indications which would maybe have lead to the hijackers early on. Tenet mentions to Bush that the al-Qaeda did have its headquarters in Afghanistan, but was active worldwide, on all continents. We have a 60-country-problem, he told Bush, to show the dimensions of the operation of extinguishing the al-Qaeda. Bush, who rarely traveled outside of his country before his presidency, is not impressed and replied: Lets shoot them off one after theother. There is an evident pattern visible here: The al-Qaeda-suspected were under extensive surveillance, they actively prepared a terrorist attack and yet they could enter, leave and travel within the United States without any restrictions even though watchlists with their names existed. Nobody stopped them, never mind the fact that they were traveling with passports and tickets with their real names. That should have alerted lots of computers at the passport controls and at the check-in counters, when ones passports magnetic strip is scanned. In conclusion, one can definitely say that the September 11th-attacks could have been avoided if the Secret Services would not have been hindered in their work by higher authorities in their agencies and if they would have cooperated / shared their findings. Many inexplicable events have taken place, clearly showing that the intelligence services made many mistakes of which many are so easy to avoid. The fact that the CIA and FBI see each other as competitors instead of partners is purely shocking and unacceptable. Additionally, some of the terrorists were on several wanted- and watchlists. This should have caused lots of trouble for them traveling under their real name. In spite of this it did not. Why? Why? That is the big question. Why? And How? These are the most important questions, still be unanswered, and will probably stay like that for a long time. The final bitter realization is: The deaths of 2,752 people could have been prevented. In American Cold War movies, the KGB (the USSR-intelligence) is bad, a dark mesh of something, while the US-intelligence is the good side, the light and transparent secret service on your side. Maybe it isnt