Tuesday, October 29, 2019

SCHINDLER'S LIST (1993) Essay Example | Topics and Well Written Essays - 1000 words

SCHINDLER'S LIST (1993) - Essay Example During the time of this movie Jews were being relocated to ghettos and concentration camps during this period. Ghettos were fenced in areas, normally in the rundown section of the Jewish part of town. These ghettos were crowded, dirty due to no running water, and had no food except what was smuggled or rationed. All Jewish property, except for a bag or two was confiscated in the name of the German Third Reich. Businesses, houses, properties, bicycles, radios, money, jewelry, and all other assets had to be turned over, or face the penalty of death. Corruption was normal when dealing with confiscated Jewish property. This was the setting for Schindler and his Jews. The movie begins with a family celebrating Shabbat by lighting candles in color. Then fades to black and white showing Schindler (Liam Neeson) setting in a room with other SS and their dates. Schindler, being a German civilian, came to Crackow, Poland in order to become a war profiteer. As a card carrying NAZI, Schindler was allowed to open a business sponsored by the German Army. The only problem was Schindler did not know how to run a business. Itzhak Stern (Ben Kingsly) comes to his rescue by taking over business tasks after helping finance Schindler’s business through connections in the ghetto. The Jews did not want to turn their gold and possessions over to the SS and never receive anything back. By giving Schindler gold, the Jews gained a place to work and a promise of better rations. Schindler opened a mess kit factory for the Wehrmacht. Itzhak Stern tried to forge as many papers for fellow Jews to be essential to the German war machine. Jews deemed essential were spared from deportation to Auschwitz. Schindler and his employees felt that maybe the factory would help survive until the Russians made it to Krakow. This might have been the case, but Amon goeth (Ralph Fiennes) arrived to build the Plaszow Concentration Camp.

Sunday, October 27, 2019

The Current Firewall Technology Computer Science Essay

The Current Firewall Technology Computer Science Essay Currently firewall technology as a specialized engineering solution rather than a scientifically based solution. Currently firewall is classified in to three category packet filtering, proxy server, and stateful firewall. This paper is main focus on the various type of firewall available and their pros and cons. Originally computer network was design for data communication to share the resources. The sharing of resources was bounded between universities. Eventually businesses, corporations, government agencies were begun to use internet. So network become vital part of their institution. Computer networking, however, is not without risks as Howard illustrates in his analysis of over 4000 security incidents on the Internet between 1989 and 1995 [1]. A neutral approach to network protection draws from several other fields, such as physical security, personnel security, operations security, communication security, and social mechanisms. [2] According to definition firewall is a set of mechanisms that can enforce a network domain security policy on communication traffic entering or leaving a network policy domain [3]. In simple word firewall is guard point which gives control point of entry or exit from computer or network. It is a first line of defence and it is also a contact point of the netw ork. It is very important to choose and design firewall to guard inside network from outside attack. Case Study Figure 1: ABC.Ltd network [6] Above figure shows our case study network . Consider a case where company ABC.Ltd want to implement a firewall for their campus design. Company whole network is divided in to three parts, inside network, Demilitarized Zone (DMZ) and outside network. Inside network has ip address 10.1.1.0/24. DMZ is further divided in to two sub section; one is protected DMZ which has ip address 192.168.11.0/24 and dirty DMZ which is dump host whose ip address is 192.168.1.0/24. Dump host is a computer which got nothing important in it. These dump hosts are act as a honey pot which is use to lure attacker so that network security designer know different type of attack and help them to design security policy. DMZ is a zone where company put their services like web services, FTP services etc. Company has remote office which uses secure VPN to connect to the main campus network. There are different type of firewall technology which are packet filtering, proxy server and stateful firewall, Network Address Translation (NAT),Software firewall. Each firewall has their advantages and disadvantages. Rest portion of this paper is describe pro and cons of different firewall. Packet Filtering This is one of the simple types of firewall. This firewall is work on OSI layer 3 and 4.It filter packet by looking at IP address, TCP/UDP port number. It compare the incoming packet against pre define rule configure in to the router. After comparing router make decision to allow or deny the packet [4]. An access list is used to create rule to make decision. Figure shows the working of the packet filtering firewall. Figure 2: Packet Filtering in Router [4] Pros The simplest of the firewall technologies to configure. Only required access list to configure the firewall. Packet filtering capabilities are easily available in many hardware and software routing products, both commercially and they are freely available over the Internet. It is less processor intensive. Adding a filtering rule to a router produces little or no additional performance overhead. It is use for all type of application because it operates at the OSI layer 3 (Network) and layer 4 (Transport) layer. Only one router is required to protect entire network. Cons The packet filter has no intelligent to identify the authenticity of source. A well trained intruder can spoof inside IP address and can fool the firewall as the packet is from inside network. Since filtering rule is configuring manually it add administrative workload. Adding complex rule to the firewall decrease the router performance. In some cases, the filtering is incompatible with certain caching Strategies commonly used for performance enhancement. Some policies cannot readily be enforced by normal packet filtering routers. Example The following example shows how to build basic packet filtering firewall Consider a scenario of company whose inside network is lying in IP address range 10.1.1.0/24. Ethernet 0/1 is inside interface and Ethernet 0/0 is outside interface. To protect against IP spoofing attack following access list policy is configure Access list 100 deny ip 10.1.1.0 0.0.0.255 any log Access list 100 deny ip 127.0.0.0 0.255.255.255 any log Access list 100 deny ip 172.16.0.0 0.15.255.255 any log Access list 100 deny ip 192.168.0.0 0.0.255.255 any log Access list 100 deny ip 224.0.0.0 15.255.255.255 any log Access list 100 deny ip host 255.255.255.255 any log Access list 100 permit ip any 10.1.1.0 0.0.0.255 Interface Ethernet 0/0 Ip access-group 100 in An access list is basic tool to configure for packet filtering. Generally all routers support this tool. Above example is configured and tested on Cisco router. There are free download is available on internet few examples are Tuneup 1.0, Truxtis, Visnetic. Packet filtering firewall is simple in configuring and freely available on internet it is good solution for small business where not much complex firewall implementation is required. In our case study implementation of packet filtering is not a wise solution. A simple reason is it is very cumbersome. Example shows that just to stop ip spoofing we need to configure eight commands. Sometime it is difficult to troubleshoot and manage for network administrator. Application Layer Firewall Application Layer Firewall is also known as a proxy server. According to dictionary meaning of proxy is A person authorized to act for another; an agent or substitute. Same definition is valid for proxy server in network security. Proxy server is a software package install on device and act behalf of protected network which allows or denies access across network [5, 7]. Figure 3: Proxy Server [4] Above figure shows the working of proxy server. Proxy server works at layer 7 of Open System Interconnection (OSI) system model [4]. It intercepts and established the connection behalf of internal host to the outside network. As shown in figure when inside network is trying to connect outside network, application layer firewall which is install on router is intercept the secession and check the request is valid or not. If it is not valid request it discard the packet and if it is a valid request it repackage the request and send it to outside network as the packet is send by itself. When outside network response the request proxy server repackaged the response and sends it back to the original inside network. In some case proxy server block all connection from outside network and allowed only inside network to go outside. The only traffic is allowed from outside is the response from outside network to inside network. In some case both inbound and outbound traffic is allowed but under strict observation [4, 5, 7]. Example A good example, and the one we probably see the most, is a web proxy. When configured to use a proxy, your web browser contacts the proxy server for each web access instead of going directly to the target server on the internet. The proxy server then turns around and makes the real request of the web server. The proxy server gets the response, and then passes it back to you. Another example is proxy server is Tibia proxy which is game proxy server. Tibia is a popular multiplayer online computer game hosted on Internet servers. To play Tibia requires establishing a network connection to TCP port 7171 on the server. Depending on your network setup and your Internet Service Provider (ISP), your direct connection to the Tibia server and ability to play the game may be blocked by a network firewall or proxy server. Setting up a Tibia proxy avoids this common connection problem. A Tibia proxy is a special Internet server (separate from the game server) that does not require a port 7171 connection. Instead, the Tibia proxy server will accept requests on alternative network ports (such as port 80) that will typically not be restricted by firewalls / proxies. The Tibia proxy, in turn, makes its own direct connection to the game server (on port 7171) and translates messages between the Tibia server and your client in real time to allow game play [8]. Pros Act as an intermediary between outside network and protected network. It prevent direction connection between source and destination It is application aware firewall so that it can analyzes application inside the payload Support user level authentication It able to log the traffic and can do user level authentication Cons It is processor intensive so it is slower than packet filtering Need to configure internal client about proxy server Sometime it does not support all type of application. For example Sling Player 2.0 does not supported by proxy server. It is single point failure. Proxy server is install on device so if that device gets compromised then whole security compromised. Stateful Packet Filtering Figure 4: Stateful Firewall [4] In the mid-1990s, packet filters and proxy servers were the two technologies used to build firewall systems. As the number of applications that needed to pass through firewalls increased, proxy server vendors could not keep up with the development of new proxy servers. On the other hand, packet filtering also could not support the dynamic nature of the many modern applications. Thus, a new technology was born [4, 11]. Stateful packet filtering is a combination of packet filtering and application level gateway firewall [11]. It contains advantages of both. It is also refer as a application aware firewall. Stateful firewall not only examines IP header information but also up to application layer information for better inspection. The working of stateful firewall is as follow. When host from inside network send a packet to outside network it check authorization of the network and if it is authorized then it allow the packet outside the network and maintain state table. State table is a table which keep track of the active network connection which is TCP secession or UDP communication passing across it. This is also called as saving of state. When destination network respond to the initial request it compare the response with the information saved in state table to allow or denied the packet [11]. Example Cisco Adaptive Security Appliances in short Cisco ASA [9], Cisco PIX firewall, Check Point [10] are example of stateful firewall. Pros It work at network level and transport level but also at application layer It is not a processor intensive as proxy server Temporarily open the outside port so it reduces the possibility of attack that work against static packet filtering. Because of the state table it is faster than application layer gateway Support almost all the services. Cons It allows direct connection to inside host once the request to enter the network is granted. An attacker may exploit the vulnerability of that host and poison the network. It required skill knowledge of different type of traffic and attacks Network Address Translation This is one of the simplest methods to protect inside network. Network Address Translation (NAT) is quite similar to the packet filtering. When it configure on router it translate internal private network to outside public network. It maintain translation table so when reply come from outside to inside it send back to correct host. There are three type of NAT static NAT, dynamic NAT, port address translation (PAT) [12]. Pros It is very simple to configure It hide private network behind one public IP address Unlikely proxy server it does not requires any configuration on inside host. Cons It is difficult to troubleshoot end-to-end NAT cause problem when Virtual Private Network (VPN) is configured Like packet filter firewall it work at network and transport level of OSI model so it translate packet based on ip address Personal Firewall The personal firewall is an application which is install on computer to protect personal computer from different virus and different kind of attack [13]. It allow or deny request from computer based on configure policies. Many personal firewall like does intrusion detection. An example of this type firewall is Host Base Intrusion Prevention (HIPS) which block the communication if it finds any suspicious activity [14]. Pros Prompt user for outgoing connection Allow user to control which application is permitted to connect interne od LAN Dose auditing for all user of the computer Tell user that application is attempting to connect internet and gives information about destination server with which application want to connect It dose virus scanning automatically every day and remove them Cons It is an application running on host so it gives some load on CPU If system get affected by malware or spyware, it can modify the firewall cause security issue Recommendation By looking at different type of firewall and comparing their advantages and drawback we can conclude that stateful firewall is good solution for our scenario. The product like Cisco ASA or Check Point is ideal to guard against different type of attack. They also does intrusion detection and prevention and can virtualized these firewall which save cost of buying extra firewall.

Friday, October 25, 2019

To Kill a Mockingbird: Character Analysis of Jem and Scout Essay

To Kill a Mockingbird: Character Analysis of Jem and Scout   Ã‚  Ã‚  Ã‚  Ã‚  Imagine just two young kids maturing within a matter of years. Imagine that same two kids, experiencing or understanding things that they aren’t meant to at a young age. Jem and Scout were just like that. They have experienced many things that they shouldn’t have at their age. Scout on the other hand, seems to be the one maturing the most. Throughout this whole essay, you will learn about Jem and Scout’s attributes, personality, and how alike or different they are from each other.   Ã‚  Ã‚  Ã‚  Ã‚   Jem and Scout are two siblings. They love to have fun, be with their father, and try to understand many things that are going in their lives. An example is Scout. She is a very unusual little girl, she is unusually smart and unusually worries about the goodness of evil and mankind. â€Å"I think there’s just one kind of folks. Folks.† The quote illustrates that Scout thinks that, everyone in the world is the same. Even though their skin colors or their lifestyles are different, they are all the same. Jem is a boy who is not without hope. He is also like Scout, although he has some doubts over what Scout may think. â€Å"If there’s just one kind of folks, why can’t they get along with each other? If they’re all alike, why do they get out of their way to despise each other?† What Jem is trying to say in the quote is that, if people are all the same, why do they still discriminate each other? Jem and Scout are two siblings who just want t...

Thursday, October 24, 2019

Education Essays – Educational Lottery

Is it truly the harder you work the further you get in instruction or is it an â€Å" educational lottery † whereby your academic hereafter is pre-determined before birth.AbstractionThis paper aims to look at the extent that the instruction system in the UK can best be regarded as a meritocracy based on difficult work and diligence or a societal lottery whereby pupils are channeled into socially pre-determined functions and degrees of accomplishment. In order to organize my research in a manner that is commensurate with methodological and expositional unity I will try to prove my hypothesis through a typical thesis-antithesis-synthesis construction ; detailing foremost the history environing province instruction, secondly the assorted strains of Liberal teaching method that assert its meritocratic character and thirdly how Marxist and Neo-Conservative theory refutes this and positions province run instruction as a mechanism of societal control and work force filtering. Throughout I will put these theoretical impressions into a current political context utilizing a assortment of beginnings that includes informations refering the sum of preschool topographic points available to kids in interior metropolis and hapless countries, the educational disparities between the races and genders and the degrees of Higher instruction support that is allocated by organic structures such as the AHRC. I will besides do usage of the many authorities documents and paperss that have been published since 1997.Introduction: State Run – State IssuesThe Introduction to this paper will concentrate on the peculiar jobs and issues that arise when instruction is inducted into the province. The modern instruction system, in Britain, can be said to hold begun with theElementary Education Actof 1870 ( Haralambos and Holborn, 2004 ; Curtis and Boultwood, 1967 ) , it was this Act that foremost advocated a system of school boards that oversaw the course of study and teaching method of local schools and led finally to theFisher Actof 1918 that made school compulsory ( McKibbin, 1998 ) . The recent authorities paperssYoung person Matters( 2005 ) and the model for theNational Skills Academy( 2005 ) represent what is a changeless hostility in British pedagogical policy ; on the one manus asseverating the primacy of a Liberal educational foundation and on the other the demand to bring forth a work force for all the assorted degrees of employment strata. This subdivision of the paper will analyze this hostility as it manifests itself in current authorities thought, pulling on these two recent policy paperss every bit good as other cardinal beginnings ( Salisbury and Riddell, 2000 ; Cole, 2000 ; Smithers and Robinson, 2000 ; Levinson, 1999 ) . It is hoped that this debut will give a house anchoring in current Government policy and will besides supply a stable footing for the treatment to come.Chapter One: The Liberal IdealThis chapter will supply the thesis component of my paper and will take the signifier of an expounding upon Liberal educational theory and how it is reflected in the modern system. In many ways the Government’sYoung person Matters( 2005 ) papers can be seen as an entry point into such Broad theory that centres around impressions originally developed by John Dewey in the early portion of the 20th century ( Dewey, 2005 ; Dewey, 2000 etc. ) . This point of view non merely asserts the intrinsic value of instruction but besides sees advancement as a merchandise of difficult work and diligence irrespective of gender, category or race ( DfES, 2005: 9 ) . Commensurate with this argument is the review of the three-party system of instruction that comprised of grammar, secondary modern and proficient colleges and that formed the footing of the work of Halsey, Floud and Anderson ( 1961 ) . In order to prove such theories I will analyze Government statistics on non merely exam consequences ( DfES, 2004 ) but besides the National Curriculum appraisals ( DfES, 2005 [ Provisional ] ) , Student Loan information ( DfES, 2005 ) , Higher Education Grants ( DfES, 2005 ) and a host of other Government published documents that assert the proliferation of what I have termed the ‘Liberal Ideal’ . This chapter aims, through a treatment of Broad policy, to foreground the extent that current instruction system does so intend that the harder you work to foster you acquire.Chapter Two: The Education MachineThis chapter aims to take a contrary place to predating one and therefore supply the antithesis to the thesis. Through an expounding of the theoretical model of Marxism and Conservatism I will measure the extent that the British instruction system is designed to ease the proliferation of an political orientation that places the creative activity of a work force above the wants of single pupils to stay in instruction. Under such a impression, the instruction system does so go a lottery, based upon pre-determined factors like category, race and gender. The theoretical base for this chapter will be drawn from such surveies as Paul WillisLearning to Labor( 1978 ) , Bowles and Gintis’ surveySchooling in Capitalist America( 1976 ) and the Neo-Marxist theories of Glenn Rikowski ( 1997, 2001 ) . I will besides, nevertheless do some reference of the functionalist ethos ( Durkheim, 1982 ; Giddens, 1971 ; Black, 1961 etc. ) that sees the instruction systems as carry throughing avitaldemand in the economic system of an industrial society by supplying a graded work force ; a construct that can be seen to be reflected in both the Conservative policies of the 1980s and the Blair administration’sNational Skills Academy( 2005 ) . In order to put such impressions into context I will look in peculiar at the support given to those pupils wishing to go to Higher educational constitutions ( such as the grants awarded to graduate students from organic structures such as the AHRC ) and the Government’s new committedness to supplying non-academic preparation to immature people via the new apprenticeship strategy ( Learning and Skills Council, 2005 ) .DecisionsMy decisions will be drawn from non merely the theoretical base of this paper but besides the research information in the signifier of confirming statistics. The construction I have chosen to construct this paper around offers us ample chance to analyze the theoretical base and the current state of affairs in tandem ; puting the Government’s ain instruction defining policy within the context of sociological theory and the empirical information. It is hoped that it is in the combination of these three elements that I shall be able to to the full pro ve my research hypothesis and pull worthwhile decisions.MentionsBowles, Samuel and Gintis ( 1976 ) ,Schooling in Capitalist America,( London: Routledge )Cole, Mike ( 2000 ) ,Education, Equality and Human Rights, ( London: Falmer Press )Curtis, S.J. and Boultwood, M. ( 1967 ) ,An Introductory History of English Education Since 1800, ( London: University Tutorial Press )Department of Education ( 2005 ) ,Young person Matters, ( London: HMSO )Department of Education, ( 2005a ) ,National Skills AcademyModel, ( London: HMSO )Dewey, John ( 2000 ) ,Experience and Nature, ( London: Capital of delaware )Dewey, John ( 2005 ) ,Democracy and Education, ( London: Digireads )Durkheim, Emile ( 1982 ) ,The Rules of Sociological Method and Selected Texts on Sociology and its Method, ( London: Macmillan )Giddens, Anthony ( 1977 ) ,Capitalism and Modern Social Theory: An Analysis of the Writings of Marx, Durkheim and Max Weber, ( Cambridge: Cambridge University Press )Halsey, A.H, Floud, J and Anderson , C.A ( 1961 ) ,Education, Economy and Society, ( London: The Free Press )Haralambos, M and Holborn, M ( 2004 ) ,Sociology: Subjects and Positions, ( London: Collins )Levinson, Meira ( 1999 ) ,The Demands of Liberal Education, ( Oxford: Oxford University Press )McKibbin, Ross ( 1998 ) ,Classs and Cultures in England 1918-1951, ( Oxford: Oxford University Press )Rikowski, Glenn ( 1997 ) , â€Å"Scorched Earth: preliminary to reconstructing Marxist instruction theory† , published inBritish Journal of Sociology of Education, Vol. 18.Rikowski, Glenn ( 2001 ) ,The Battle in Seattle: Its Significance for Education, ( London: Tufnell Press )Salibsury, Jane and Riddell, Sheila ( 2000 ) ,Gender, Policy and Educational Change: Switching Agendas in the UK and Europe, ( London: Routledge )Smithers, Alan and Robinson, Pamela ( 2000 ) ,Further Education Re-Formed, ( London: Falmer Press )Willis, Paul ( 1978 ) ,Learning to Labor, ( London: Arena ) Web sites hypertext transfer protocol: //www.apprenticeships.org.uk/hypertext transfer protocol: //www.bbc.co.ukhypertext transfer protocol: //www.dfes.gov.uk/hypertext transfer protocol: //www.homeoffice.gov.uk/hypertext transfer protocol: //www.statistics.gov.uk

Wednesday, October 23, 2019

Throwaway Confidential Informants Essay

The article, â€Å"The Throwaways†, by Sarah Stillman, is an account of confidential informants being used as inexpensive and off the record pawns in the drug war. A confidential informant is a person who has been caught for a crime, usually illegal narcotics, and has been offered to have their slate wiped clean or their punishment reduced if they help bust a higher up criminal. The police treat these informants as if they are nothing else but a tool to catch the criminals at the top of the food chain. The police do not stop to think that the informants are often productive people in society, even if they decide to partake drug use. I have a close friend who was asked to be an informant after being busted with just a small amount of marijuana. I strongly advised against this for his safety, and my friend instead had to spend nearly four thousand dollars on a lawyer. It is unjust and immoral for police officers to use these people with no formal guarantee that their charges will be dropped, as well as putting them in extremely dangerous situations. â€Å"The Throwaways† is an article about four young confidential informants who had their lives cut short because they decided to cooperate with law enforcement and help bust drug dealers. Every single informant’s fate led 6 feet underground. Rachel Hoffman was a twenty-three year old girl who had plans to go to culinary school and open a new type of rehabilitation center. Rachel was found dead the next day fifty miles from where the cops were supposed to be tracking her every move. Lebron Gaither testified against a man in court and was then ordered to try and buy narcotics from the same man he had just testified against; he was tortured, shot with a handgun as well as a shotgun, ran over by a car, and then dragged by a chain into the woods. Shelly Hilliard was caught with a half ounce of pot, threatened with prison, and agreed to be an informant. Hilliard’s body was found on fire beneath a mattress on a service road. The last informant in the article, Jeremy Mclean, agreed to be an informant because he did not want to bring disgrace to his family name. The police continued to make Jeremy bust drug dealers until he helped lead to the arrest of a heroin trafficker. The officers said that the heroin trafficker, William Vance Reagan, Jr., was harmless and not to worry. Reagan shot Jeremy in the back of the neck 3 times and once in the face. He was sentenced to life in prison without parole (Stillman). Narcotics officers use informants  as a disposable tool to get to people, or places that they cannot get to alone. According to the article, over eighty percent of drug busts involve informants (Stillman 38). There are usually no contracts and the informants have to trust that the officers will keep their word. I think that this is insane and it endangers the lives of mostly young people who have their entire life ahead of them. At the time, the opportunity to be a confidential informant and having all of their charges dropped seems like a better option than time in jail or huge fines. It is too dangerous to bust a drug dealer. The word would get out that they got arrested, and the informant would be the number one suspect. I have a close friend who was smoking pot at a Wiz Khalifa concert in his car before going in, because he had been told that there were cops inside and that the security guards searched you before you went in. While smoking he saw two men walking up by his car, one a big strong white man and the other a smaller African American man. As they walked past his car, he took a sip of his drink because his throat burned slightly from the smoke. The two men saw him do this, pointed at his car and walked off. My friend felt that something was wrong because of the way they pointed at the car, so he got out to go into the concert. The next thing he knew, both of those men had chased him down and were interrogating him about what he had been drinking. He did not look stoned, because he had put in eye drops and said he wasn’t drinking anything but a coke. The men pulled out their badges and fifteen other cops circled around him. They reached in his pocket, took out his keys and unlawfully searched his car, because he had been seen drinking a coke. When they found marijuana in the car, they were surprised. They didn’t read him his Miranda rights nor have probable cause to search the car. The smaller African American man asked my friend to step aside and asked him if he knew where he could get an ounce or more of pot. He said yes and then he offered for him to be an informant, he gave him his number and said to call him J. The man said that this is how it would go down if he agreed; J would give my friend money and he would walk in and buy a gram of pot, walk out and give J the marijuana. Then a couple days later he would have to introduce J to the dealers and they would both buy some marijuana. Then J would attempt to get over an ounce of pot. After a couple weeks passed, the police would come to the dealer’s house and arrest him. My friend could have had his charges dropped completely. Although he could have  also ended up like Jeremy and perform more sting operations, or even worse dead. There are no contracts, it is completely based on the cop’s word and that is a huge problem. You never know what could set a person off and make them mad enough to kill you. For example; in a neighborhood near mine a drug dealer shot and killed four teenagers because they did not pay him for two grams of weed worth forty dollars. I think that using confidential informants at all should be outlawed due to the excessive risk in every situation, but I am very biased because of my friend. The current law regarding informants requires special training for the officers, t he informant’s age and emotional state to be considered, and for the level of risk to be taken into account. (Stillman 47) There are still no real guidelines, just certain things that the officers must consider. There either needs to be much more strict guidelines, such as the informant must be a legal adult, or the use of confidential informants should be made completely illegal. The tragic stories that are presented in this article should be enough for anyone with a conscience to know that the use of informants is wrong. The police use informants as a cheap way to bust dealers by scaring the people into cooperating. I have a personal experience in my life that impacts my opinion on the use of informants. My friend could have been killed while doing the law enforcement’s dirty work, because he decided to smoke a small amount of marijuana. The decision to become a confidential informant should not be one of the last decisions a person must make in his or her life. It should be completely illegal for trained police officers to endanger the lives of citizens by offering them to be an informant. I believe police officers should protect and serve, that means not aiding the deaths of ordinary people. Works Cited Stillman, Sarah. â€Å"Re: The Throwaways.† New Yorker. N.p., 17 Sept. 2012. Web. 27 Sept. 2012. . â€Å"Marijuana-arrests.com.† Marijuana-arrests.com. N.p., n.d. Web. 25 Sept. 2012.