Previous+Classes




 * Rule 10 **: The price of a successful attack is a constructive alternative. Avoid being trapped by an opponent or an interviewer who says, “Okay, what would you do?”
 * A) discuss a real world example of this **


 * Saul Alinsky's rule 10 for the radicals reminded me of World War II, when the United States attacked Japan. United States need for victory over Japan lead them to construct an effective plan that would ensure America’s victory over Japan. Since, Japan was not expecting America to act so strongly, the United States army had an upper hand in their plan for a surprise nuclear attack. The need for success led United States to attack Japan very callously, where the people of Japan paid the price. **


 * As rule 10 for the radicals states: “avoid being trapped by an opponent”, the United States did exactly that and acheived success by defeating Japan. After the nuclear attack it was ****guaranteed that Japan would retreat, because they had already suffered such a big loss. Hiroshima was chosen for the attack because of its economic and military significance. United States military had done their research when chosing their point of attack that would harm Japan to the desired extent. Nigasaki was an alternative after Hiroshima, because America did not want to leave any chance for failure. Rule 10 applies flawlessly to the actions that led to America's attack on Japan. **


 * DPI **
 * How should it be handled? **
 * ... or, if it shouldn't be done, then what instead? **


 * Deep packet inspection, according to 'Office of the Privacy Commissioner of Canada' is a technological tool used by network providers to ensure integrity within the networks ** [[file:///C:/Users/aman/Documents/CCT208_Assignment%202%20Revision.docx#_edn1|[i]]] **. It also states that “DPI technology has the capability to look into the content of messages sent over the internet – enabling third parties to draw inference about users’ personal lives, interests, purchasing habits and other activities.” ** [[file:///C:/Users/aman/Documents/CCT208_Assignment%202%20Revision.docx#_edn2|[ii]]] **DPI allows certain individuals to monitor every users’ network activity, denying one their freedom of expression. **


 * Since, the network providers fail to mention the third party in their policies, it denies one their rights. A user should be made aware of the networks actions to safe guard their system before signing an agreement. DPI has been developed to protect the people from illegal and harmful actions through the network, which is why the users should not have a problem if they are not committing a crime of any sort. However it is only reasonable that a user knows that they are being watched. Some may argue that it is a violation of their privacy rights; however the network needs to be under surveillance in order to protect the people, especially the children from the illegal activities conducted online. It is important that the users are made aware of how they are under surveillance and the involvement of any other parties besides for the network provider. **

 []  []