Thursday, October 31, 2019

Sustainability and Renewable Technologies Essay

Sustainability and Renewable Technologies - Essay Example Trees use energy tapped from the sun to fix carbon in the wood in a natural way and therefore are sustainable so long as harvesting can be done without depleting the woodland resources. Due to its nature wood fuel is virtually carbon neutral as the carbon dioxide emitted from burning is balanced by the carbon absorbed by growing trees. Wood is also a clean and safe compared to other fossil fuels like oil which are harmful to the environment in case of spills. The wood fuel gas is almost smoke free and its ash content is less than 1% which can be reused for other purposes. It will also benefit the social welfare of the entire community in that use of wood would ensure proper management of woodlands and promote local trade. By creating a ready market for wood fuel many jobs would be created to manage and ensure sustainable practice in managing woodland. The main disadvantage of this technology is that it has higher initial capital cost than conventional heating systems but in the build ing’s life-cycle costs. 2.0 Solar Powered Lighting System Use of photovoltaic cells in the building is one of the ways the company could use renewable energy sources for its operation without leaving a carbon foot print. This is because solar power does not consume natural resources, are readily available and are naturally replenished. 2.1 How it works The building is laced with light sensitive cells called the photovoltaic cells that convert light from the sun into electricity. This electricity is then stored in a battery system that is used to power the lighting system and other appliances within the building. A sketch of the system is attached. 2.2 Advantages Using a solar powered lighting system in which solar power is used to generate the electricity for the building’s lighting ensures energy security by reducing dependency on fossil fuel or the national grid. As a result the company will enjoy price stability as photovoltaic cells are installed only once and have lifespan ranging from 20-30 years. With solar power there are no transmission costs as all the energy produced is consumed unlike other sources where the fuels have to be transported. It is therefore ideal even for places that cannot have access to the grid. Cost wise the solar panels are becoming cheaper and more efficient thus ensuring more value for money. It is also a very quite source of energy which is a great advantage of a service oriented company in which communication is key in its operation and a quiet working environment has a great impact. 2.3 Disadvantages Major disadvantage is the high cost of installation; it also requires a large area for installation. This can however be mitigated by incorporating a building design in which photovoltaic cells are positioned for optimal harvesting. The other disadvantage is that efficiency is dependant on the full exposure of the sun and may affect cloudy days. 3.0 Green Roof The company could consider using a green roof for the bu ilding. This is simply having a design that will ensure the entire roof of the proposed building would be covered in vegetation to form a sort of living roof. 3.1 How it works The roof is covered with vegetation that is grown over a waterproofing membrane. The membrane helps to prevent percolation of water and also root

Monday, October 28, 2019

Super Kikay and Her Flying Pagong Essay Example for Free

Super Kikay and Her Flying Pagong Essay The turtle is a magical and gave Kikay the power to save humankind and the sea creatures. It is her duty to protect the ocean deep from the giant small Octopus and its master disciple from getting the magical pearl that gives life to the ocean deep. As a training, Super Kikay fly around their town and try to solve the problems and difficulties of other people. Some of the problems she solve was to help a stuck jeepney get off the mud. She also rescued a girl that almost fall from the ferries wheel and stop the illegal fishers from destroying the ocean by using dynamites to catch fish. After her training, Dong pagong instructed her to get the magical pearl and bring it to their land to prevent the giant octopus from finding it in the ocean. Kikay transforms into Super K and dive into the ocean to get the magical pearl. She easily found the magical pearl but she was also seen by the giant octopus and followed her into the land. When Super K noticed that the giant octopus followed her, she immediately dug a hole to hide the magical pearl but she forgot to bury it. Super K and the giant octopus fight each other. Super K almost defeated the giant octopus but she was easily beaten because the giant octopus fired a black ink on her face and temporarily blinded her giving the octopus time to escape w/ the magical pearl. Super Ks brother was also kidnapped by the giant octopus while she was temporarily blinded. The next morning, Dong pagong told Kikay that she must get the magical pearl from the giant octopus to prevent the fishes from dying. Kikay transformed into Super K again to find the giant octopus and get the magical pearl and also to rescue her younger brother. Horje (the scientist who created the giant octopus) eliminated the giant octopus because he thinks that the giant octopus may be a barricade on his plans (he plans to sell the magical pearl to foreigners for 100,000 million pesos) Super K heard the gun shot that was fired from Horjes gun. She thought that shot her younger brother but later on found out that Horje killed the giant octopus and not her younger brother. After letting her younger brother escaped, she chased Horje until she cornered him. They fought fiercely until she have beaten Horje and get the magical pearl. Super K go back on their town and returned the magical pearl into the ocean. After the returning the magical pearl, the ocean became clean again and all the fishes were happy and thanking Super K for saving them. Dong pagong did not take back the power that she has given to Kikay because he knows that Kikay will use her powers to help humans.

Saturday, October 26, 2019

Concepts of Information Security: Politics and Technology

Concepts of Information Security: Politics and Technology The nothing to hide argument has become a very important debate recently. Now, nearly everything we do leaves an electronic trace which along with data mining, can be used to see what we are doing, and even predict our behaviour. With the recently passed Investigatory Powers Act 2016 in the UK (HM Government, 2016), 48 different agencies will have access to communication data, bulk personal data and other information with the purpose of increasing our national security. The acts main aim is to increase security against acts of terrorism, but this comes at the cost of peoples privacy. The most common argument in favour of mass surveillance is that if you have nothing to hide you should have nothing to fear, and if you are acting in an illegal manner than you deserve to be punished, and having this surveillance is there to protect us and our country. Whereas conventional armys movement can be tracked using radar, satellites and drones, terrorists dont have a navy or air force, making this means of gathering information about an attacker irrelevant. Another potential means of gathering information would be inside information, whether it be an informant or someone managing to infiltrate the organisation. However, unlike organised crime, a terrorist attack has the potential to take many lives, and it only takes one successful attack to do so, meaning one successful attack is one too many. Government surveillance can therefore be argued as the best way of protecting a nation as it means conversations can be followed and behaviours can be predicted. (Doyle, 2011). Daniel Solove has said that between the advances in technology and the government surveillance, that there are similarities with George Orwells 1984, and although not as extreme as in the book, it is still possible to track people even if they are just walking around the corner. Along with data mining of information which could be thought of as trivial, the government are predicting whether a person is a terrorist based off purchase histories along with other personal information. Whilst this sounds like it could be useful, what happens when someone is misidentified as a terrorist and added to a no-fly list or arrested? (Doyle, 2011). The European Union has also stated the surveillance on this scale is illegal, and that only targeted information gathering I justified, but with the UK leaving the EU, this will not be a problem for them soon, and will join China and Russia in being a mass surveillance state (Agerholm, 2016). Overall I feel that mass surveillance is not necessary, with targeted surveillance being adequate, and with the lack of a response from the public when this law was first announced, it has shown the government that they can get away with it, and sets a precedent going forward, making me ask the question, When does it stop? When will they have enough information? As much as George Orwells 1984 was a work of fiction, I feel like we are slowly moving in that direction, and if we get there, will there be a way back? Assira CAPTCHA The Asirra CAPTCHA was proposed at ACM CCS 2007 and works by showing the user 12 pictures of cats and dogs, with the user having to select the cat images and none of the dog images. A human can do this within 30 seconds 99.6% of the time, whereas algorithms find it much harder to differentiate between cats and dogs. Basing image classification off colour features gives a 56.9% accuracy, giving an overall probability of 0.2% to solve an Assira CAPTCHA. Assira has a database of over 3,000,000 images of cats and dogs which continues to grow. 13,000 images were collected by having a script which was left to run overnight, that would refresh and download the 12 images from the Assira research page. The images were manually classified into 3 classes of cat, dog and other. A support vector machine(SVM) classifier was used due to having the ability to extract linear combination of features, its predictive power and its scalability. 5-fold cross-validation was used to measure the accuracy of the SVM classifier, with 4 partitions used for training and the last one used to validate the results. The SVM classifier was trained on a combination of colour and texture features. Both the colour and the texture features estimate whether the picture is a cat or dog. An average of the colour and texture features is taken, with a weighting of 1/3 to colour and 2/3 to texture. Images of cats were mapped to the value of 1.0 and dogs to -1.0, meaning if the average returned a positive value, the SVM classifier would predict the image to be of a cat, whilst a negative number would result in a dog. This system resulted in a classifier with 82.7% accuracy, giving a 10.3% probability of breaking the Assira CAPTCHA, which despite being a lot lower than a human, was more than 50 times more successful than the predicted 0.2% for machine vision attacks. Using a token bucket system will greatly help to improve the robustness of the Assira CAPTCHA. Given that a human has a 99.6% success rate, giving a total of 3 attempts before having to complete 2 successful Assira CAPTCHAs greatly reduces the chance of it being broken via machine vision, without reducing the usability for a human too significantly. (Golle, 2008) Impact of Artificial Gummy Fingers on Fingerprint Systems Biometrics is a form of single factor authentication used to identify someone. Fingerprints are one of the most common forms of biometric authentication, with them being used for PCs, smart cards and portable devices. Silicone fingers as well as inked fingerprints on paper where tested before the experiment, finding that all capacitive sensors and some optical sensors rejected the silicone finger, and the inked paper was accepted on one of the systems. A fingerprint system captures data from the finger via a sensing device, extracts features from the data and encrypts it, then stores this information as a template with some personal information. When someone then uses the system, the scan is compared to the database of stored finger data and outputs an acceptance results if there is a matching template. The sensor detects the difference between ridges and valleys of the fingerprint, with optical sensors detecting the difference in reflection, whilst a capacitive sensor detects the difference in capacitance. There are several different attacks that can be performed against a fingerprint system including a criminal forcing the live finger to be used on the scanner, an attack against the authentication system with an unregistered finger, the use of a severed fingertip, a genetic clone of the registered finger or an artificial clone of the finger. To make an artificial finger an impression must first be made of the live finger. The impression of the fingerprint is a mirror reflection of the live finger, meaning the impression can be used as a mould to make the artificial finger. It can also be done by capturing the image of a residual fingerprint with a digital microscope and then making a mould to make the artificial finger which is made from gelatine. Both types of gummy fingers were accepted by the 11 different fingerprint systems used in the experiment, with varying probabilities between 67% and 100%. The number of samples was too small in this experiment to compare the different types of fingerprint systems, but there is enough evidence to show that gummy fingers can bypass this type of biometric security. (Matsumoto, T., Matsumoto, H., Yamada, K. and Hoshino, S, 2002) The best way to improve security would be multi-factor authentication. A finger print falls under the something I am category, so taking something from the something I own category, such as a key fob or card, along with the something I know category, such as a password means that if one of these protective measures is compromised, there are still two other factors an attacker must take into consideration before being able to access the information they are trying to acquire. FREAK SSL/TLS Vulnerability The Factoring RSA Export Keys (FREAK) vulnerability in Secure Socket Layer (SSL) and its successor Transport Layer Security (TLS) was discovered in March 2015 by Karthikeyan Bhargavan and his research team. TLS and SSL are protocols which were designed for secure data transfer between a client and a server through authentication, encryption and integrity. (Muscat, I. 2016), (Caballero, J., Bodden, E. and Athanasopoulos, E. 2016). The vulnerability allows for a man-in-the-middle attack through an implementation error. The vulnerability was due to a US law which restricted RSA public key sizes to 512 bytes. SSL and TLS used ciphersuites with weak keys which were marked eligible for export. If a client is tryhing to connect to a trusted server, the man-in-the-middle attacker can replace the ciphersuite with an RSA_EXPORT ciphersuite of the message sent from the client to the server. The server then responds, and again, the attacker replaces the ciphersuite with an RSA ciphersuite which gets forwarded to the client. The server then sends a strong, 2048 bits, RSA public key which the client receives. The server then sends a ServerKeyExchange message with a weak, 512-bit RSA public key. The client responds with its ClientKeyExchange, ClientCSS and ClientFinished message, which the attacker can use to find the private key. The attacker can then decrypt the pre-master secret from the Client-KeyExchange. The attacker then sends a ServerFinished message to complete the handshake. This works because of a bug in a state machine composition, the message is not rejected and is silently accepted, and the servers strong public key is replaced with the weak public key in the ServerKeyExchange. (Beurdouche, B., Bhargavan, K., et al. 2015). In order to protect against this attack, server administrators would have to remove all RSA export cipher suites from their accepted cipher suite collection. Installing a browser that doesnt support RSA export cipher suites is the best way for clients to protect themselves against FREAK attacks. (Caballero, J., Bodden, E. and Athanasopoulos, E. 2016). DDoS Attacks Distributed Denial of Service (DDoS) attacks are relatively simple, but can be extremely powerful. They are the most advanced form of DoS attacks. They work via packet streams from different sources. The attacks make use of large numbers of coordinated hosts to overrun a critical resource of the target. Depending on the scale of the attack, or the measures put in place to prevent such an attack, the victim could suffer damages from system shutdown, to total loss of service. They are so strong due to not trying to break the system hey are attacking, meaning traditional security mechanisms arent effective, instead causing damage through lethal traffic. When performing an attack, the attacker must select agents to perform the attack. The machines need to have a vulnerability that allows the attacker to gain access with enough resources for the attack. Then the attack must find vulnerabilities in the security of the agents machines to put in the malicious code. The attacker then communicates with handlers to see what agents are running and when to upgrade them. After all of this is done, the attack can commence. There are several different types of DDoS attacks, some of which include: Flood attacks send large amounts of IP traffic to a victim, congesting the bandwidth of the system. Depending on the volume of packets sent, the target can experience reduced system speeds, to crashing the system. Amplification attacks exploit the broadcast IP address found on most routers to amplify and reflect the attack, sending messages to a broadcast IP address. The router sends the packets to all the IP addresses within the broadcast address range. A reflector attack requires a set of predetermined reflectors. These can simply be scattered on the internet. The reflected packets are normal with a legitimate source and cannot be filtered. Protocol exploit attacks use a specific feature or implementation bug of some protocol on the victims system to consume excess resources. Malformed packet attacks use incorrectly formed IP packets and are sent to the victim to crash the system. There are two classifications for DDoS defence. The first one is based on activity deployed. Intrusion prevention aims to stop the attack from being launched in the first place. Intrusion detection means a host computer and network can guard themselves against being a source of an attack as well as being a victim. Intrusion tolerance and mitigation accepts that it is not possible to fully prevent or stop DDoS attacks, so aims to minimise the damage caused by them. Intrusion response identifies the attack sources and blocks its traffic. The second classification splits the DDoS defence into three categories. Most systems designed to fight DDoS attacks have been designed for the victim network as they suffer the greatest impact of an attack. Intermediate network defence is more effective, as they can handle the attack traffic easily and trace back to the attackers. Source network mechanisms aim to stop attacks before they enter the internet. (Douligeris, C. and Mitrokotsa, A. 2004) Wireless networks are easier to attack than wired networks, with DoS attacks by scrambling the bands of frequency that are used. The best way of defending both bandwidth depletion attacks and resource depletion attacks is to design a defence mechanism that detects and responds to the attack. A proposed technique to defending the attacks is the use of a flow monitoring table at each node. By monitoring the previous sending rates with the current rate, they can detect an attack if both rates become the same, in which case the packets from those nodes are discarded. (Arunmozhi, S.A. and Venkataramani, Y. 2011) Bibliography Agerholm, H. (2016) Snoopers charter dealt blow after EUs highest court rules indiscriminate government retention of emails is illegal. Available at: http://www.independent.co.uk/news/uk/politics/snoopers-charter-eu-court-ruling-illegal-investigatory-powers-act-emails-david-davis-a7488041.html (Accessed: 22 December 2016). Arunmozhi, S.A. and Venkataramani, Y. (2011) DDoS attack and defense scheme in wireless ad hoc networks, International Journal of Network Security Its Applications, 3(3), pp. 182-187. doi: 10.5121/ijnsa.2011.3312. Beurdouche, B., Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P.-Y. and Zinzindohoue, J.K. (2015) A messy state of the union: Taming the composite state machines of TLS, 2015 IEEE Symposium on Security and Privacy, . doi: 10.1109/sp.2015.39. Caballero, J., Bodden, E. and Athanasopoulos, E. (2016) Engineering secure software and systems: 8th international symposium, ESSoS .. Available at: https://books.google.co.uk/books?id=j6vWCwAAQBAJpg=PA125dq=FREAK+SSL/TLS+Vulnerabilityhl=ensa=Xved=0ahUKEwjlkuXEr8TRAhWhKMAKHQWMBjMQ6AEIOjAB#v=onepageq=FREAK%20SSL%2FTLS%20Vulnerabilityf=false (Accessed: 15 January 2017). Douligeris, C. and Mitrokotsa, A. (2004) DDoS attacks and defense mechanisms: Classification and state-of-the-art, Computer Networks, 44(5), pp. 643-666. doi: 10.1016/j.comnet.2003.10.003. Doyle, T. (2011) Daniel J. Solove, nothing to hide: The false tradeoff between privacy and security, The Journal of Value Inquiry, 46(1), pp. 107-112. doi: 10.1007/s10790-011-9303-z. Golle, P. (2008) Machine learning attacks against the Asirra CAPTCHA, Proceedings of the 15th ACM conference on Computer and communications security CCS 08, . doi: 10.1145/1455770.1455838. Investigatory Powers Act 2016 2016, c. Available at: http://www.legislation.gov.uk/ukpga/2016/25/pdfs/ukpga_20160025_en.pdf (Accessed: 22 December 2016). Matsumoto, T., Matsumoto, H., Yamada, K. and Hoshino, S. (2002) Impact of artificial gummy fingers on fingerprint systems, , pp. 275-289. doi: 10.1117/12.462719. Muscat, I. (2016) Web vulnerabilities: Identifying patterns and remedies, Network Security, 2016(2), pp. 5-10. doi: 10.1016/s1353-4858(16)30016-2.

Thursday, October 24, 2019

Compare Lamb to the Slaughter and The Speckled Band Essay -- English L

Murder mysteries - Compare Lamb to the Slaughter and The Speckled Band. Murder mysteries all have a similar plot consisting of a body, a motive, a weapon, a suspect, an alibi, and detectives. Viewers and readers expect this in the text, Lamb to the Slaughter and The Speckled Band are no exception. The structures of the two stories are very different, with The Speckled Band story unfolding in chronological order, finding out the murderer right at the end, however in the Lamb to the Slaughter, the murderer is known at the beginning of the story. The two stories are seen from two different points of view, first-person narrator in The Speckled Band as Dr Watson character within the story and therefore limited in understanding and the all-knowing third-person narrator or omniscient in Lamb to the Slaughter as the narrator stands outside the story itself and guide the reader's understanding of characters and the significance of their story. Most murder mysteries have the typical victims, murderers, and detectives; this is especially true in the older murder mysteries by Sir Arthur Conan Doyle. The Speckled Band has a typical detective, the famous detective being Sherlock Holmes with his deer stalker hat and pipe always deep in thought about the investigation "his arms folded, his hat pulled down over his eyes, and his chin sunk upon his breast, buried in the deepest thought". But in the Lamb to the Slaughter the detectives are so foolish and naives, a complete contrast to Sherlock Holmes. Sherlock Holmes comes across as a typical fictional detective. In addition Miss Stoner, in The Speckled Band is a typical victim, vulnerable, anxious, weak and scared. She say's " It is not cold which makes me shive... ...ir Arthur Conan Doyle story is set in a period of over 100 years ago. Both of the murders are set in the family home. In the Lamb to the Slaughter, "The room was warm and clean, the curtains drawn, the two table lamps alight." "The bedrooms in this wing are on the ground floor, the sitting-rooms being in the central block of the building," describes the house of Dr Roylott in The Speckled Band. From my perspective I think that the Sir Arthur Conan Doyle story, The Speckled Band is the most successful out of the two, as the author made the main character, Sherlock Holmes such an intriguing and interesting character, which draws the audience in. He leaves the reader in suspense until the end of the story until the murderer is revealed. Sir Arthur Conan Doyle's stories are so well-know due to the stories being turned into films and shown on the television.

Wednesday, October 23, 2019

Uniforms vs No Uniforms

Students at schools with enforced dress codes behave better than students at schools without enforced dress codes. They tend to be more educated, have more discipline, and have better manners than those students without enforced dress codes. Students with enforced dress codes tend to be more educated than those students who go to schools without enforced dress codes because they tend to attend school more. According to research, students that have uniforms have better attendance because they don't have to worry about what they are wearing to school because everyone is wearing the same style of clothing. No one is there to criticize them about how their shirt is ugly or how their shoes don't match what they're wearing. One of the reasons why students don't go to school is because they don't have the right clothes to fit in or be cool and they don't want to get bullied by the â€Å"cool† kids. Another reason why students with enforced dress codes are more educated is because since everyone is wearing the same thing, they aren't worried about who is wearing what. Since they don't have that on their minds, they have more time to worry about their education and pay more attention in class. Many students like to gossip about what others are wearing. It may be in a positive way or in a negative way. But either way, the have their minds occupied on something other than their classwork. Students who go to a school with enforced dress code are more likely to focus on their education because they are going to school to learn, not to worry about who is wearing the latest clothes trend. Students tend to be more disciplined if they attend schools that enforce dress codes because they have more order at their school. These students are ordered to follow a certain dress code and it is up to them if they want to respect authority or not. Those who choose to listen and go to schools with enforced dress codes are obviously more disciplined than those who don't go to dress code enforced schools. These students don't really get into fights or talk back to their teachers. These students tend to be more respectful to teachers and students because they are willing to follow all of the school's rules. They listen to teachers and set good examples. It is said that kids are better behaved when they are dressed neatly and modestly. Students that attend dress code enforced schools have more manners and class than those students that don't go to dress code enforced schools. The reason why these students have more class is because they know how to dress respectively. They don't go around town in shorts or pants that hang below their underpants. They aren't the type of people that wear chest revealing shirts. These students are very respectful and show a lot of class. Schools that enforce dress codes tend to have fewer fights occur on their campus. Their students are better behaved and have more manners than students that go to a school where they don't enforce dress codes. According to research, a lot of fights start out because a student made fun of another student's clothes. Well, if schools were stricter on what students were allowed to wear and maybe make the students wear uniforms, these fight would never occur. There was a boy named Johnny who was very smart. He never got anything lower than a A in any of his classes. He was also very athletic and enjoyed playing sports. You would think that everything was going well for him except for the fact that Johnny had no friends. You see, the kids at school didn't want to be friends with him because of the way he dressed. His parents couldn't afford to buy him clothes that were â€Å"in† so he didn't fit in with the â€Å"cool† kids. The kids at school were too embarrassed to be seen talking to Johnny, so they just avoided him. Johnny was always getting picked on. The kids at school would often call him names and drop his books in the hallway to seem cool and fit in with the other kids who were doing it. Even though Johnny was very athletic, he was always the last one to be picked when playing a sport. Johnny became very lonely and depressed because as a kid, he never had any friends. He started slacking in school, no longer getting â€Å"A's†. He began to get â€Å"C's† and â€Å"D's† with a few occasional â€Å"F's†. He began to skip classes so that he wouldn't have to go through the whole bullying situation. He stopped playing sports for they just didn't bring him much joy anymore. One day when Johnny was at the mall, he saw the pair of Levi's that everyone was wearing to school on a mannequin in a store window. He went in the store and tried them on. He loved the way that he looked in them and thought that if he wore them to school, some of the kids would think that he was cool and possibly be friends with him. But when he flipped over the price tag and saw that the jeans cost $39. 9, his hopes went down. He could never afford to buy forty dollar jeans. Then an idea came to mind. He thought that if he stole the jeans without anyone noticing, then he could have them without paying for them. So Johnny walked out of the store with the jeans on hoping that no one would notice. Unfortunately, Johnny got caught. Security called his parents in and Johnny got scolded by security. They told him the consequences of stealing and how he could end up in jail. When his parents got there, they asked Johnny why he stole the pants and he told them the truth. When they realized what was going on, they transferred him to a school where the kids had to wear uniforms. Johnny realized how great his new peers were and loved the fact that no one was making fun of him because of his style of clothing. At the new school, Johnny became his usual self again, getting straight â€Å"A's† and playing sports. The only difference was that he now had a lot of friends. Therefore, students who attend schools that enforce dress codes are better behaved than students who go to schools that don't enforce dress codes. These students dress better, have better manners, and they show a lot of discipline. Unlike students who attend schools that don't enforce dress codes who have no discipline what-so-ever and who dress like they don't even care that they are going to school. Overall, education is very important and should be taken very seriously. Students should behave and be respectful to all peers and teachers. If students tend to behave better with enforced dress codes, than all schools should enforce dress codes. After all, how we dress does matter and it affects our performance very much.

Tuesday, October 22, 2019

Destructive Electromagnetism essays

Destructive Electromagnetism essays Electromagnetism exists everywhere. When people drive, walk, or even go to the beach. However, due to the extreme complexity of the topic, electromagnetism has proven to be a subject studied by those who are crafty and willing enough to explore the domain. The ideas of electricity start from simple objects such as springs, coils and magnets that simply created a current for some sort of affect to either start or light some object. Now these theories have expanded to a point where our everyday lives are affected by it. When people start their cars for example, a magnet turned by a flywheel generates current through coils to help ignite the cars electrical system. In short, electromagnetism exists everywhere in our everyday lives. There are many examples of electromagnetism effecting technical objects of todays society. One particular example would be radar devices used for tracking ships, cars, or even submarines. The ideas of sending out a signal composed of a wave of certain frequency and wavelength returned at a certain time can be used to find objects or map out underwater territory. Use of similar techniques allows for policemen to radar speeds of drive-by cars. Although, crafty engineers have created stealth devices that are able to mask their speed by accepting the radar beam and by scrambling it via frequency changes or simply send the same signal back at a delayed time thus justifying a slower speed. This is just a mere fraction of the uses of electromagnetism. Another possible use for electromagnetism would be on the vile side of destruction. There are many aspects of electromagnetism. One of the fiercest uses is as a weapon. EM guns, tanks, and devices are harmful and more dangerous than normal guns and missiles due to their non-ballistic style of weaponry. Unfortunately, this horrendous idea is true. Dates as far back as 1940 have shown that EM guns h ...