Tuesday, August 20, 2019
Wireless networks: Security
Wireless networks: Security WIRELESS networks ,due to ease of installation ,cost benefits and the capability of connectivity , hence communication anywhere ,has made it the most popular way of network setup in this 21st century. With increase in the need of mobile systems, the current electronic market has also been flooding with laptops, pdas, RFID devices, healthcare devices and wireless VOIP (Voice over IP) which are WIFI (Wireless Fidelity) enabled. With the 3G (Third Generation) and 4G (Fourth Generation) cellular wireless standards, mobiles phones are also WIFI enabled with very high speed being provided for data upload and download .Nowadays a malls and public areas not mention even cities are WIFI capable, enabling a person to access the internet or even contact a remote server in his office from anywhere in that city or even from his mobile phone while just strolling down the road. But as every good technology has its own drawbacks so does the wireless networks .Just as in the case of wired networks they are also prone to intruder attacks or more commonly known as Wireless hacking thus compromising the networks , security, integrity and privacy. The basic reason for this is when the wireless network was first introduced, it was considered to have security and privacy built into the system while transmitting data. This misconception had basically arisen because wireless system transmitters and receivers used spread spectrum systems which have signals in the wide transmission band. Since the RF(Radio Frequency ) receivers which at that time could only intercept signal in the narrow transmission band these wireless signals were potentially considered in the safe zone .But it did not take long to invent devices that could intercept these wireless signals as well .Hence the integrity of data send over wireless networks could be easily compromised .With the developme nt of technology so has the methods and ways in which a network can be attacked become more vicious . Fig-1: WLAN (Wireless Local Area Network) Security of wireless networks against such vicious attacks is hence the become the priority for the network industry. This is because not all networks are equally secure .The security depends on where this network is used. For example, if the requirement of the wireless is to provide a wireless hotspot in a shopping mall then then the security of this is never concerned with but if its for a corporate they have their own security authentication and user access control implemented in the network. II. WHY WIRELESS networks are prone to attacks? There are number of reasons why wireless networks are prone to malicious attacks .These are the most challenging aspects to eb considered when a secure wireless network has to be established. a) Wireless network are open networks: The reason for this is that there is no physical media protecting these networks .Any packet transmitted and received can be intercepted if the receiver has the same frequency as the transmitter receiver used by h wireless network .There is also a common misconception that if the authentication and encryption are properly used the network will not be compromised .But what about the messages send back and forth before the authentication and encryption comes into play ? b) Distance and Location: The attacker can attack from any distance and location and is only limited by the power of the transmitter .Special devices have been designed which can attack even short distance networks such the Bluetooth c) Identity of the Attacker: Attacker can always remain unidentified because he uses a series of antennas or other compromised networks before reaching the actual target. This makes wireless network attackers very difficult to track. Some of the reasons why such attacks are so common is because of the easy availability of information from none other than the Internet, easy to use cheap technology and of course the motivation to hack . III. wireless hacking step by step To understand the security protocols for wireless networks currently in use, first it is important to understand the methods through which a weak network is attacked by a hacker .These are also known as wireless intrusion methods . A. Enumeration: Also know as network Enumeration, the first and foremost step to hacking which is finding the wireless network. The wireless network could be any specific target or even a random weak network which can be compromised and used to attack other end systems or networks .This feat is achieved by using a network discovery software which are now a days available online in plenty, to name a few are Kismet and Network stumbler . In order to have more information about the network, the packets that are send and received by the network can sniffed using network analyzers also known as sniffers .A large number of information can be obtained by using this including IP address, SSID numbers even sensitive information such as MAC address , type of information and also the other networks that this compromised end system. Yet another problem faced is the use of network mappers which can be used to find he servers that run these compromised networks hence also attacking these servers which could then affect proper functioning and information transfer between these servers and to other networks connected to it . B. Vulnerability Assesment: This is mainly done by the hacker y using a vulnerability scanner .After the hacker has found the network he want to attack he uses this program in order to detect the weakness of the computer , computer systems networks or even applications. After this the intruder decided on the most possible means of entry into the network. C. Means of Entry: IV. TYPES OF THREATS ATTACKS A. Eaves Dropping and Traffic Analysis: This is the form of attack that makes use of the weak encryption of the network .This always compromises the integrity and security of the network .All attacks such as war driving , war chalking ,packet sniffing traffic analysis all fall under this category B. Message Modification: These attacks are mainly used to modify the data that is send across a network .The modification might be giving wrong information or also adding malicious content to the data packet send form one station to another .This compromises the integrity and privacy of the Data . C. Rogue Devices: Theses could be devices such as APS , application software programs which has been compromised by the intruder and made to function according to him/her. Such devices can compromise the integrity of the network as well as the data send across it .These devices can also launch reply attacks and also make the network associated to malicious content websites or information. D. Session Hijacking: This attack occurs after a valid session has been established between two nodes to through the AP.In the attacker poses as a valid AP to the node trying to establish connection and a valid node to the AP .The attacker can then send malicious or false information to the node that the connection has already been established with .The legitimate node believe that the AP has terminated he connection with it . The hacker can then use this connection to get sensitive information from the network or the node . E. Man In the Middle Attacks: This is similar to that of a session hijacking attack but in this case it is a rogue AP that acts as valid client to the legitimate AP and valid AP to the legitimate client .Once this has been established the rogue AP can access all information from the , intercept communication , send malicious information to other clients through this . These are just few of the security threats and attacks in wireless environments .With the advancing technologies there many more possible security threats that can be faced by these networks in the future. V. BASIC REQUIREMENTS IN WIRELESS NETWORK SECURITY With the vulnerability of wireless networks ,security and countering o such malicious attacks have become one of the top priorities addressed by enterprises ,corporate as well as research fields in IT .There are many pints to be considered when the security of a network is concerned the most important f which are : authentication, accountability and encryption . A. Authentication: This is very familiar to anyone using a network in his or her work place or even accessing he email on the internet and the very first step in promoting a secure wireless network . .There many different ways of authentication and many different tools and methods have been used over the years in order.. make the primary process, more reliable and fool prof.Some of the most widely used methods are : a) User name and Password combinations generally defined as something that a person knows. b) Smart Card, RFIDs and Token technologies also known as something that a person has c) Biometric Solutions such as finger printing , retina scanning which can be generally defined as something that a person is or are. Now the reliability of each one of these methods can vary depending on the level on which it has been implemented .In the case very low level authentication s only one kind of method I used to secure the network .One of the weakest forms of authentication can be considered as the use of only ID card or token technologies as if a person looses this , he can compromise the security of the network .Even in the case of username and password the strength of the authentication is only as good as the complexity of the information used as username or even password .People generally prefer to use passwords that are easy to remember but also known to many other people in that organization or even outside One of the much better ways of securing a network through authentication is to use biometric solutions such as fingerprinting or retina scanning .But of course technology has advanced to the extend that even fingerprints or even retinas can be forged .Nowadays a number of methods of combinatio nal methods are used as authentication with high security premises or networks guarded by more than two or three kinds of authentications . B. Accountability After a user has been authenticated to use the network it is important to have t able to track the computer usage of each person using the network so that incase of any foul play the person responsible can be held responsible .When the networks were very small it was very easy f a network administrator to track the usage of each person on a network .But with huge networks, remote access facilities and of course the wireless networks it has become quite a difficult task .AS mentioned earlier , there are many ways in which a hacker can make himself difficult to track down .Many softwares and firmwares have been created which is used in conjecture with the authentication protocols inoder to make the wireless network more secure and robust . C. Encryption: This is the most important step in building and securing a strong wireless network infrastructure .he steps generally followed for this are : a) Methods based on public key infrastructure (PKI) b) Using high bit encryption scheme c) Algorithm used for encryption must be well known and proven to be very unbreakable. Current wireless network security solutions can be classified into three broad categories: a) unencrypted solutions b)encrypted solutions c) combination. In this paper with emphasis as explained in the abstract will eb on encrypted solutions for wireless security. A brief discussion on the unencrypted methods has still been given for basic understanding. I n the case of encryption based security protocols ,a details description is given about the ones that are commonly used in wireless LANS in this paper .After which the latest and developing technologies will be discussed .The three major generations of security as existing today and also cited in many papers ,journals and magazines are as follows : 1) WEP (Wired Equivalent Privacy) 2) WPA (Wi-Fi Protected Access) 3) WPA2 The image below shows the layer in which the wireless network security protocols come into play which is of course the link layer: Fig-1: 802.11 AND OSI MODEL VI. WIRELESS SECURITY UNENCRYPTED A. MAC Registration: This is one of the weakest methods network security..MAC registration was basically used to secure university residential networks as college apartments or dorm rooms. The basic way of doing this is to configure DHCP (Dynamic Host Configuration Protocol) to lease IP address to only a know set of MAC address which can be obtained manually by running automated scripts on a network server so basically any person with a valid registration can enter into the network .Session logs also cannot be generated because of which accounting of the logs become impossible. Last but not the least since this method of securing was basically used for switched and wired networks encryption was never included. B. Firewalls: In this method, network authentication is one through either HTTP( Hyper text Transfer Protocol),HTTPS or telnet .When an authentication requirement is received by the network it is directed to the authentication server .On validating the authentication the firewalls add rules to the IP address provided to that user , This IP address also has timer attached to it in order to indicate the rule time out of this IP address. When executed through HTTPS it is basically a session based as well as a secure process .But any other process which is adapted from a switched wired network firewalls does not provided encryption. C. Wireless Firewall Gateways : One of the most latest as well as considerably fool proof method in unencrypted solutions in Wireless Firewall Gateways or WFGs.This is a single wireless gate way is integrated with firewall, router, web server and DHCP server and its because of all these being in one system that makes WFGS a very secure wireless security solution. When a user connects to the WFG, he/she receives a IP address form the DHCP serve .Then the web server ( HTTPS) asks for a user name and password and this is executed by the PHP ( Hypertext Preprocessor).Address spoofing and unauthorized networks are avoided by PHP as the DHCP logs are constantly compare with the current updated ARP(Address Resolution Protocol).This verifies that the computer that is connect to the network is using he the IP address that has been leased to it by the DHCP server .Then this information is passed on to the authentication server which in turn adds rules to this IP address .Up ne the expiration of the DHCP lease the sessions ar e terminated . The WFGS hence make the authentication and accountably pat f the network more reliable ,But as this is also an unencrypted method it lacks the most important accept of security. VII. WEP-WIRED EQUIVALENT PRIVACY This protocol was written in accordance with the security requirements required for IEE 802.11 wireless LAN protocol .IT is adapted from the wired LAN system and hence the security and privacy provided by it is also equivalent to the security and privacy provided a wired LAN. Through its an optional part of wireless network security, it will give a considerably secure networking environment. The algorithm used in WEP is known as the RC4(Rivest Cipher 4) .In this method a pseudo random number is generated using encryption keys of random lengths .This is then bound with the data bits using a OR(XOR) functionality in order t generate an encrypted data that is then send .Too look at in more in detail : A. Sender Side: The pseudo random number is generated using the 24 bit IV(initialization Vector ) given by the administrator network and also a 40 r 104 bit secret key or WEP key given by the wireless device itself. Which is then added together and passed on to theWEP PRNG (Pseudo Random Number Generator).At the same time the plain text along with an integrity algorithms combined together to form ICV (integrity check value) .The pseudo number and the ICV are then combined together to form a cipher text by sending them through an RC4.This cipher text is then again combined with IV to form the final encrypted message which is then send. Fig-2: WEP SENDER SIDE B. Receiver Side: In the receiver side the message is decrypted in five steps .Firs the preshared key and the encrypted message are added together .The result is then passed through yet another PRNG .The resulting number is passed through an CR4 algorithm and this resulting in retrieving the plain text .This again combines with another integrity algorithm to form a new ICV which is then compared with the previous ICV t check for integrity. Fig-3: WEP RECIEVER SIDE C. Brief Descriptions: a) Initialization Vector : are basically random bit the size f which is generally 24 bits but it also depends on the encryption algorithm .This IV is also send to the receiver side as it is required for decrypting the data send . b) Preshared Key: is more or less like a password .This is basically provided by the network administrator and is shared between the access point and all network users c) Pseudo Random Number Generator: This basically creating a unique secret key for each packet sends through the network. This is done by using some 5 to at most 13 characters in preshared key and also by using randomly taken characters from IV. d) ICV and Integrated Algorithm: This is used to encrypt the plain text or data and also to create a check value which can be then compared y the receiver side when it generates its own ICV .This is done using CRC (Cyclic Redundancy Code) technique to create a checksum .For WEP, the CRC-32 of the CRC family is used. D. RC4 Algorithm: RC$ algorithm is not only proprietary to WEP .IT can also be called a random generator, stream cipher etc .Developed in RSA laboratories in 1987 , this algorithm uses logical functions to be specific XOR to add the key to the data . Figure 5: RC4 Algorithm E. Drawbacks of WEP: There are many drawbacks associated with the WEP encryptions. There are also programs now available in the market which can easily hack through these encryption leaving the network using WEP vulnerable to malicious attacks: Some of the problems faced by WEP: WEP does not prevent forgery of packets. WEP does not prevent replay attacks. An attacker cans simply record and replay packets as desired and they will be accepted as legitimate WEP uses RC4 improperly. The keys used are very weak, and can be brute-forced on standard computers in hours to minutes, using freely available software. WEP reuses initialization vectors. A variety of available Cryptanalytic methods can decrypt data without knowing the encryption key WEP allows an attacker to undetectably modify a message without knowing the encryption key. Key management is lack and updating is poor Problem in the RC-4 algorithm. Easy forging of authentication messages. VIII. WPA -WIFI PROTECTED ACCESS WPA was developed by the WI-FI alliance to overcome most of the disadvantages of WEP. The advantage for the use is that they do not have t change the hardware when making the change from WEP to WPA. WPA protocol gives a more complex encryption when compared to TKIP and also with the MC in this it also helps to counter against bit flipping which are used by hackers in WEP by using a method known as hashing .The figure below shows the method WPA encryption. Figure 6: WAP Encryption Algorithm (TKIP) As seen it is almost as same as the WEP technique which has been enhanced by using TKIP but a hash is also added before using the RC4 algorithm to generate the PRNG. This duplicates the IV and a copy this is send to the next step .Also the copy is added with the base key in order to generate another special key .This along with the hashed IV is used to generate the sequential key by the RC4.Then this also added to the data or plan text by using the XOR functionality .Then the final message is send and it is decrypted by using the inverse of this process. A. TKIP (Temporal Key Integrity Protocol): The confidentiality and integrity of the network is maintained in WPA by using improved data encryption using TKIP. This is achieved by using a hashing function algorithm and also an additional integrity feature to make sure that the message has not been tampered with The TKIP has about four new algorithms that do various security functions: a) MIC or Micheal: This is a coding system which improves the integrity of the data transfer via WPA .MIC integrity code is basically 64bits long but is divided into 32 bits of little Endean words or least significant bits for example let it be (K0 , K1) .This method is basically used to make that the data does not get forged . b) Countering Replay: There is one particular kind of forgery that cannot me detected by MIC and this is called a replayed packet .Hackers do this by forging a particular packet and then sending it back at another instance of time .In this method each packet send by the network or system will have a sequence number attached to it .This is achieved by reusing the IV field .If the packet received at the receiver has an out of order or a smaller sequencing number as the packet received before this , it is considered as a reply and the packet is hence discarded by the system . c) Key mixing: In WEP a secure key is generated by connecting end to end the base layer which is a 40 bit or 104 bit sequence obtained for the wireless device with the 24 bit IV number obtained from the administrator or the network. In the case of TKIP, the 24 bit base key is replaced by a temporary key which has a limited life time .It changes from one destination to another. This is can be explained in Phase one of the two phases in key mixing. In Phase I, the MAC address of the end system or the wireless router is mixed with the temporary base key .The temporary key hence keeps changing as the packet moves from one destination to another as MAC address for any router gateway or destination will be unique. In Phase II, the per packet sequence key is also encrypted by adding a small cipher using RC4 to it. This keeps the hacker from deciphering the IV or the per packet sequence number. d) Countering Key Collision Attacks or Rekeying : This is basically providing fresh sequence of keys which can then be used by the TKIP algorithm .Temporal keys have already been mentioned which has a limited life time .The other two types f keys provided are the encryption keys and the master keys .The temporal keys are the ones which are used by the TKIP privacy and authentication algorithms . B. Advantages of WPA: The advantage of WPA over WEP can be clearly understood from the above descriptions .Summarising a few: a) Forgeries to the data are avoided by using MIC b) WPA can actively avoid packet replay by the hacker by providing unique sequence number to each packets. c) Key mixing which generates temporal keys that change at every station and also per packet sequence key encryption. d) Rekeying which provides unique keys for that consumed by the various TKIP algorithms. IX. WPA2-WIFI PROTECTED ACCESS 2 WPA 2 is the as the name suggests is a modified version of WPA in which Micheal has be replaced with AES based algorithm known as CCMP instead of TKIP .WPA can operate in two modes: one is the home mode and he enterprise mode .In the home mode all he users are requires to use a 64 bit pass phrase when accessing the network. This is the sort encryption used in wireless routers used at home or even in very small offices. The home version has the same problems which are faced by users of WEP and the original WPA security protocol. The enterprise version is of course for used by larger organisation where security of the network is too valuable to be compromised .This is based on 802.1X wireless architecture , authentication framework know as RADIUS and the another authentication protocol from the EAP ( Extensible Authentication Protocol ) Family which is EAP-TLS and also a secure key . A. 802.1X: Figure 7: 802.1X Authentication Protocol In order to understand the security protocols used in WPA2 it is important know a little bit about the 802.1X architecture for authentication. This was developed in order to overcome many security issues in 802.11b protocol. It provides much better security for transmission of data and its key strength is of course authentication There are three important entities in 802.1x protocol which is the client, authenticator and authentication. a) Client : is the STA(station) in a wireless area network which is trying to access the network ,This station could be fixed , portable or even mobile. It of course requires client software which helps it connect to the network. b) Authenticator: This is yet another name given to an AP (Access Point).This AP receives the signal from the client and send it over to the network which the client requires connection from There are two parts to the AP i.e. the non control port and the control port which is more of a logical partitioning than an actual partition..The non control port receives the signal and check its authentication to see if the particular client is allowed to connect to the network .If the authentication is approved the control port of the AP is opened for the client to connect with the network. c) Authentication: RADIUS (Remote Authentication Dial in User Service) server .This has its own user database table which gives the user that has access to the he network, this makes it easier for the APs as user information database need not be stored in the AP .The authentication in RADIUS is more user based than device based .RADIUS makes the security system more scalable and manageable. Figure 8: EAP/RADIUS Message Exchange B. EAP (Extended Authentication Protocol): The key management protocol used in WAP2 is the EAP (Extended Authentication Protocol).It can also be called as EAPOW (EAP over wireless).Since there are many versions of this protocols in the EAP family it will advisable to choose the EAP protocol which is very best suited for that particular network .The diagram and the steps following it will describe how a suitable EAP can be selected for that network : a) Step1: By checking the previous communication records of the node using a network analyser program, it can be easily detected if any malicious or considerably compromising packets has been send to other nodes or received from to her nodes to this node . b) Step 2: By checking the previous logs for the authentication protocols used, the most commonly used authentication protocol used and the most successful authentication protocol can be understood. Figure 9: EAP Authentication with Method Selection Mechanism c) Step 3: The specifications of the node itself have to be understood such as the operating system used the hardware software even the certificate availability of the node. After all this has been examined the following steps can be run in order to determine and execute the most suitable EAP authentication protocol: 1. Start 2. if (communication_record available) then read communication_record; if(any_suspicious_packets_from_the_other_node) then abort authentication; go to 5; else if (authentication record available) then read authentication record; if (successful authentication available) then read current_node_resources; if (current_node_resources comply with last_successful_method) then method = last_successful_method; go to 4; else if (current_node_resources comply with most_successful_method) then method = most_successful_method; go to 4; else go to 3; else go to 3; else go to 3; else go to 3; 3. read current_node_resources; execute method_selection(current_node_resources); 4. execute authentication_process; 5.End X. RSN-ROBUST SECURITY NETWORKS RSN was developed with reference to IEEE 802.11i wireless protocol .This connection can provide security from very moderate level to high level encryption schemes .The main entities of a 802.11i is same as that of 802.1x protocol which is the STA (Client), AP and the AS (authentication server).RSN uses TKIP or CCMP is used for confidentiality and integrity protection of the data while EAP is used as the authentication protocol. RSN is a link layer security i.e it provides encryption from one wireless station to its AP to from one wireless station to another..It does not provided end to end security IT can only be used for wireless networks and in the case of hybrid networks only the wireless part of the network . The following are the features of secure network that are supported by RSN ( WRITE REFERENCE NUMBER HERE) : a) Enhanced user authentication mechanisms b) Cryptographic key management c) Data Confidentiality d) Data Origin and Authentication Integrity e) Replay Protection. A. Phases of RSN: RSN protocol functioning can be divided in the five distinct phases .The figure as well as the steps will describe the phases in brief: a) Discovery Phase: This can also be called as Network and Security Capability discovery of the AP.In this phase the AP advertises that it uses IEE 802.11i security policy .An STA which wishes to communicate to a WLAN using this protocol will up n receiving this advertisement communicate with the AP .The AP gives an option to the STA on the cipher suite and authentication mechanism it wishes to use during the communication with the wireless network. Figure 9: Security States of RSN b) Authentication Phase: Also known as Authentication and Association Phase .In the authentication phase, the AP uses its non control part to check the authentication proved by the STA with the AS .Any other data other than the authentication data is blocked by the AP until the AS return with the message that the authentication provided by the STA is valid .During this phase the client has no direct connection with the RADIUS server . c) Key Generation and Distribution: During this phase cryptographic keys are generated by both the AP and the STA. Communication only takes place between the AP and STA during this phase. d) Protected Data Transfer Phase: This phase as the name suggest is during which data is transferred through and from the STA that initiated .the connection through the AP to the STA on the other end of the network. e) Connection Termination Phase: Again as the name suggests the data exchanged is purely between the AP and the STA to tear down the connection
Monday, August 19, 2019
From Roswell to Dreamland :: essays papers
From Roswell to Dreamland Are we alone in the universe? This has been a common question in modern day. It is very difficult to prove that extraterrestrials exist. However, the evidence to prove that the earth has been visited is very convincing. The Roswell incident in 1947 is one event that proves the existence of extraterrestrials. Another piece of important evidence that proves the existence of UFO's is Bob Lazars testimony of his experience working in the US secret base at Area 51. The earth has been visited by intelligent life because of the witnesses and evidence behind the story of Roswell and Area 51. On July 2nd, 1947, Jim Ragsdale was camping on a three day weekend when he saw an object "as bright as a welding torch" pass through the sky and strike the ground a few miles away. Corporal E.L Pyles saw the same thing from a military compound just outside of town. Shortly after, William Brazel found strange pieces of wreckage on his massive ranch 75 miles outside of Roswell. The newspapers were already running the story Jim Ragsdale and Corporal Pyles told of the bright light in the sky, so William knew that he had found wreckage of a "flying saucer." On July 6th, he drove to Roswell with some of the debris and he showed it to the Chaves County Sheriff, George Wilcox. After examining the debris, Sheriff Wilcox contacted Major Jesse Marcel at The Roswell Army Air Field. Marcel and is commanding officer Colonel William Blanchard both inspected the debris. They both agreed that it was nothing like they had seen before, and went to the ranch to collect more of the debris. On July 8th, Marcell and Blanchard returned with two carloads of debris. The wreckage was then flown to Fort Worth Army Air Field. At noon on July 8th 1947, Blanchard ordered a press release telling the country that the army had found remains of a crashed flying saucer. Only a few hours later, General Clemence McMullen in Washington spoke by telephone with Colonel Thomas Dubose in Fort Worth, and told him to "squash" the saucer story, create a cover story, and immediately send some of the debris to Washington. Later that evening, a press conference was held in which they announced that what had crashed was a weather balloon and not a flying saucer. All of the debris, including one very large piece that appeared to still be operable, was collected and never seen again.
Sunday, August 18, 2019
Break Free From the Product Life Cycle Essay -- essays research papers
Kotler, P. (2003). Positioning and Differentiating Break Free From the Product Life Cycle Youngme Moon Harvard Business Review Summary A company must differentiate itself from others during the product life cycle by creating an image that demands attention and fosters unique brand awareness. Louis Vuitton is a company that continuously rejuvenates itself and has maintained a highly coveted brand for 150 years. A $1,000 monogrammed Louis Vuitton handbag is in such demand that it has spawned a multi-million dollar market of counterfeit products, most commonly referred to as ââ¬Å"knock-offs.â⬠The demand is so high for these knock-off products that LVMH Moet Hennessy, owner of the brand, has a special team that works with international police organizations. Last year there were 6,000 raids by police, resulting in the arrest of nearly 1,000 counterfeiters (LV, 2005). The LV logo has become an icon in the designer luggage, handbags and accessories market. The words Louis Vuitton are the code for describing an internationally recognized and exclusive fashion empire. LVMH Moet Hennessyââ¬â¢s target market is aimed at women aged between 18-35 who have a love of fine design, and the taste for tradition and luxury. Louis Vuitton has maintained its lead in fashion through clever advertising in magazines like ââ¬Å"Vogueâ⬠with print ads that focus on LV logo products as chic. In recent years the company has expanded is product line into ready-to-wear, shoes, watches and jewelry. Since 1998, Marc Jacobs has provided the artistic direction to develop and market these new collections. Tapping actress/singer Jennifer Lopez as a model was another key move in skewing younger and getting some zest in print ads. Clearly LVMH Moet Hennessyââ¬â¢s market strategy is its high-quality and high-priced image which is promoted via elaborate packaging, exclusive distribution, and status symbol advertising. This ability to differentiate themselves from the crowded designer marketing place is why they continue to be highly successful and have significantly extended the product life cycle. Relationship/Reference to the Text Our text discusses the product life cycle and how companies must position and differentiate their market offerings throughout the cycle. Youngme Moon points out ââ¬Å"thereââ¬â¢s nothing inevitable about the product life cycle. Marketers are disrupting it by rede... ...o find ways to train the next generation of consumers (2005). Branding is 100% human emotion and everything else is just dressed up as rationality to give people permission to act on their emotions. Women (or their spouses--like me) are not buying a Louis Vuitton hand bag, they are buying prestige and the ability to demonstrate to others they are different and have achieved a certain level of status. Some will call it the snob factor, others just chic taste. Regardless of your social views of designer products, Louis Vuitton continues to differentiate themselves in the designer market. It constantly looks for ways to extend the product life cycle through innovative new products and advertising strategies to keep the brand highly recognized and coveted. References Kotler, P. (2003). Positioning and Differentiating the Market Offering Through the Product Life Cycle, Marketing Management, pp. 307-343 Moon, Y. (2005). Break Free From the Product Life Cycle Marketplace à à à à à Harvard Business Review, May 2005, pp. 87-94 Vogue (2003) http://www.vogue.com.au Alexandria: FPC Living Louis Vuitton Magazine Online (2005). http://www.vuitton.com/
Saturday, August 17, 2019
Karla Ann Marlingââ¬â¢s book ââ¬ÅAs Seen on TVââ¬Â Essay
Karla Ann Marlingââ¬â¢s book ââ¬Å"As Seen on TVâ⬠addresses the perception television had on shaping the fashion and cultural persona of everyday life in the United States during the 1950ââ¬â¢s. She presents this phenomenon as a cultural chain reaction that occurred in response to Christian Dior releasing his new line of clothing right around the same time as President Ike Eisenhowerââ¬â¢s inauguration, one of the first major TV events of the Decade.à As noted in her book, when she says, ââ¬Å"Ikeââ¬â¢s 1953 inauguration was one of the first big TV events of the decade. The cameras caught every detail of.â⬠Eisenhowerââ¬â¢s costume: the mink coat, the silly hat worn over bangs, the suit with the nipped-in waist and flared hipline, the charm bracelet, and high heels that pinched (Marling, 1994).â⬠Of course for the President himself, Christian Dior new line would have no significant effect on the culture or American society, but through his Wife Mamie Eisenhower wearing a dress by the infamous designer as well as wearing more stylish accessories like high heels, and pearls, it introduced a major shift in how women would dress, there on out, and the style itself became known as ââ¬Å"The New Look.â⬠à In essence it slight freed-up sexual repression of the 1950ââ¬â¢s and became representative of a lifestyle, so that they could be completely turned on their head in the 60ââ¬â¢s during the explosion of the feminist movement. Christian Dior designed what became known as the ââ¬Å"hour Glassâ⬠shape, by using different padded linings as the author notes. The molded, hourglass hap was achieved through a variety of means: padding hidden in the lining of jackets to accentuate the swelling of the hips; boning, stays, or other constricting devices built into waistlines; and an internal framework composed of layers of tulle, organza, silk pongee, and a new ââ¬Å"miracle fabricâ⬠-nylonâ⬠,1994â⬠. In response to this the author notes that ââ¬Å"It could be argued, of course, that the woman inside was irrelevant to the dress, that she was the victim of fashion, enslaved and oppressed by her own dinner gown.â⬠à This represents many of the counter arguments presented by men who opposed changes being introduced to society by the fashion industry.à This also represents much of the conflict of the reading.à The author goes on to present a quote by acclaimed 1950ââ¬â¢s psychoanalyst Edmund Bergler when he says, the fashions industry is a ââ¬Å"gigantic unconscious hoaxâ⬠perpetrated on women by homosexual men who wanted to make them look ridiculous (Marling, 1994).â⬠In sum, the author closes her piece by pointing out how there is still to this day controversy over how much authorship can be placed on Christian Dior for the creation of ââ¬Å"The New Look.â⬠à It is seen as a culturally defining moment in history, which would eventually give way to the admiration of glamour that was bestowed upon such figures as Jackie O, Marilyn Monroe, and Elizabeth Taylor. It also represents a slight window into the modern era and its obsession with fashion to the likes of which as produced such irreverent iconic figures as Lady Gaga, who could arguably be pegged as the child of Christian Dior and Mamie Eisenhower, 1953. Karla Ann Marlingââ¬â¢s book (1994). ââ¬Å"As seen on TVââ¬
Walmart Stores Inc.
Management Control Systems Assignment Case study: A) Wal-Mart Stores, Inc. , Case 1-2, Page no. 31 B) Vershire Company, Case 4-1, Page no. 145 Case A) Wal-Mart Stores, Inc. Question 1. What is Wal-Martââ¬â¢s strategy? What is the basis on which Wal-Mart builds its competitive advantage? Answer? Wal-Martââ¬â¢s Strategy is a. Winning strategy of Wal-Mart is based on selling branded products at a low cost. b. Marketing strategy of Wal-Mart is ââ¬Å"Everyday low pricesâ⬠is to pull in customers everyday. c. Saturation strategy of Wal-Mart is for the store expansion. The standards was to be able to drive from a distribution centre to store within a day.And a distribution centre was strategically planned so that it eventually serve 150-200 stores within a dayââ¬â¢s drive. d. Bulk strategy of Wal-Mart is for purchasing branded products at bulk can help to drive hard bargain which help Wal-Mart to sell the products at low prices. These are the main basic policies which Wal-Mar t follows to become worldââ¬â¢s largest retailer. On the basis of selling branded products at low cost and everyday low prices at Wal-Mart store and also continuously following the above strartegies helps Wal-Mart builds its competitive advantage over other retail stores to pull in more customers everyday.Question 2. How do Wal-Martââ¬â¢s control systems help execute the firmââ¬â¢s strategy? Answer? The Wal-Martââ¬â¢s control systems help execute the firmââ¬â¢s strategy is given below, â⬠¢The Information Technology- The IT that powered Wal-Martââ¬â¢s supply chain and logistics was the most powerful. Therefore it pursuads its suppliers to adapt latest supply chain technologies like RFID- which increases monitoring and management of the inventory. â⬠¢Each distribution center 24 operated hours a day using laser-guided conveyer belts and cross-docking techniques that received goods on one side and simultaneously filling orders on other side. The Wal-Mart had la rgest privately owned satellite communication network in US and broadcasted television. â⬠¢Each store constituted an investment centre and was evaluated on its profits relative to its inventory investments. â⬠¢The data from ââ¬Å"outstandingâ⬠performers among 5300 stores were used to improve operations in ââ¬Å"problemâ⬠stores. â⬠¢For the employees loyalty and dedication- the Wal-Mart offers Profit sharing for the employees who spends at least one year and who worked at least 1000 hours. Several policies that help Wal-Mart to execute the firmââ¬â¢s strategy such as- incentive bonuses, a discounted stock purchase plan, promotion from within, pay rises based on performance not on seniority basis, open door policy . â⬠¢Wal-Mart had implemented a satellite network system that allowed information to be shared between companies wide network of stores, distribution centers and suppliers. By following these above mentioned control systems it help to execute the Wal-Martââ¬â¢s strategy.
Friday, August 16, 2019
Iranian Revolution and Persepolis Booklet Conventions Essay
High and Low cultures are terms given to value the quality of the text. Low culture text is usually the text written for entertainment and pleasure and does not encourage complex reflection and thoughts . Comics are considered as a Low culture and comics and graphic novel are similar to each other but graphic novel are not considered to be Low culture. High culture text is written to encourage complex reflection and thought. High culture are usually full of literary features while low culture has low literary features. Text with high culture also called privileged text and text with low culture is called marginalized . 2- Everyone has his own way of thinking, if three people read a book they will think differently and will have different opinions about it thatââ¬â¢s why we respond to the text is shaped by our ideology because everyone understand it from a different perspective. The same thing happens when different people read a graphic novel , they all have different opinions and ideas and they discuss it some people may change their opinions after they heard someoneââ¬â¢s else opinion ,thatââ¬â¢s how it changes our beliefs, attitudes and values toward literature 3- Symbols in a Graphic novel are easy to understand cause most of the are colours , body language , objects and clothing etc.. .In Persepolis Satrapi has made it different than any other graphic novels , she made no colours only black and white and this is a symbol of something that happened in the past . 4- Satrapi choose to write Persepolis in form of a graphic novel to tell her story ,because she want us to understand what she understands .She is writing her story so she wants us to feel how it feels to grow up during a revolution and a war , and how it feels to move from your country to a different one having a new life she wants us to feel what she felt and she actually succeeded at it Style and Literary Traditions: Persepolis is more bildungsroman than a memoir, because Satrapi didnââ¬â¢t only want to tell the story of her childhood but she wanted to show the way she lived in Iran at the time of the Islamic revolution, also she wanted to show how she grew morally, socially and spiritually making herself an example of how a young girls grew up at this time and bildungsroman is when protagonist must progress from childhood to adulthood, leave home to undergo a journey, and develop a more mature understanding of his or her self. Satrapi also shows how is feels for a young girl to grow up during a Revolution and live in Iran while it was at war with Iraq, those young girls saw communists getting shot and killed by the shah army and hearing stories about political prisoners being tortured during the revolution and saw planes blowing up buildings and other events too. Although it was horrible but Satrapi use a satirical tone sometimes when talking to the revolution guardians Literary Features: Satrapi has been able to manipulate the literary features well though it is a graphic novel which sometimes authors find it hard to use the literary features. Satrapi has used alot of symbols and one of the most important symbol was ââ¬Å" the veil ââ¬Å" which shows the rebellious side of Satrapi and that she was against wearing it but the Islamic government said it is obligatory for women and girls to wear veil. She has also been hyperbole about it Satrapi has used many allusions; most of them are people some are rebellious figures like : Che Guevara, Fidel Castro , they symbolize how a young generation is forced to become revolutionary even though they know little about the turmoil they fight , most of the allusion are about being rebellion and the war. Unlike other writers, Marjane Satrapi has it a little easier because she is able to literally show us what she wants us to see , and the Major thing about persepolis is that it has no colours itââ¬â¢s all black and white to give the story a more ancient feel, she wants us to see that all of this has already occurred. Moreover, the simplicity of her images allows her to demonstrate that this time in her life was not a great one, and that most of it is blurry. Perhaps the lack of color also signifies how somber that time was. Furthermore, she usually draws herself in the background, this shows how inferior she unworthy of being at the same level of men. As she gets older in the novel, she starts to show herself more, it is almost as if she is starting to believe that she is finally getting to the level of men. She begins to talk more to people, and not only speaks her thoughts to herself. Themes: Any young woman growing up is going to face struggles especially during her adolescence. However, to grow up in the midst of the Iranian revolution is undoubtedly a life changing experience. In a society where one certain religion is forced upon you, and where you go, what you wear, who you see, and all that you do is restricted, it is clearly difficult to accept. Especially to a determined and independent young lady such as Marjane Satrapi. In Persepolis one of the most important themes of the novel is government and society and its role in determining the sequence of events that Satrapiââ¬â¢s life takes on such as in the first chapter veils are forced on the women of Iran. In Persepolis Satrapi has used many themes and as mentioned one of the most important themes is government and society. The Iranian society after the revolution was forced to do what their government tells them like wearing the veil and this is also connected to the theocracy and dictatorship theme that the Islamic government turned into a dictatorship , dictatorship was not only with the government but also in Satrapiââ¬â¢s house she calls her mother a ââ¬Å" the dictator â⬠¦ guardian of the revolution of the house The government played a big role in 1980ââ¬â¢s Iran by implementing new laws and restricting old freedoms, whoever does obey is either sent to jail and tortured or being executed and a lot of people where being executed for doing things forbidden by Islam ,the government used Islam as a cover to do whatever they want without people questioning them. Even though the Islamic government prevented partying and drinking, people went to illegal parties and drank wine this is considered as an act of rebellion which is also a theme. Rebellion is also a major theme in Persepolis, rebellion is not only against a government it can also be rebellion to what people say. Satrapi uses cigarettes as a symbol of rebellion, she want to show that she can do whatever men can do because at this time in Iran there were feminism. Moreover , Satrapi uses more rebellion figures to support her rebellion theme like Che Guevara, Fidel Castro and Trotsky they are a symbol for freedom Iran was in an outer war with Iraq and internal war against Iranians. Those are the best words that could describe what is happening inside Iran in that time, the army was fight the Iraqââ¬â¢s and was also killing communists and people that have a secular thoughts. Although, the kids of the lower class are sent to war to fight for their country, but before they are sent, they are given this golden key which sybolizes the riches and wealth they will have if they go into war for their country. Not having much, these kids end up joining the army being promised these dreams that never happen. While on the other hand the higher classes are partying and enjoying themselves, not doing anything to protect their country, but only themselves. Isnââ¬â¢t that sad. Also in the case of Marjane her maid doesnââ¬â¢t sit with her and her parents had a cadillac showing that they were wealthy, but Marjane didnââ¬â¢ like the idea of that. If you are a powerful person that has a lot of money, or if you were a king, you were part of the high class people. If you are poor or a peasant, you are considered to be in the lower class. What also exists is a middle class who refers to those who can make enough money to dress properly and own certain things that peasants canââ¬â¢t. Being a part of the middle class doesnââ¬â¢t make you a high class person because you donââ¬â¢t have power and donââ¬â¢t have a fortune, but itââ¬â¢s enough for good living Martyrdom was also a major theme in Persepolis since the war started and Satrapi describes it ââ¬Å"To die a martyr is to inject blood into the veins of society.â⬠Marjane reflects that the regime depends on the war to retain its political control of the country. A million people lose their lives in the war. The regime becomes more repressive and seeks to stop ââ¬Å"the enemy withinâ⬠by arresting and executing those that defy its rule. Heroism is also a theme which is connected to Persepolis where Satrapi symbolizes the political prisoners that were tortured and executed as heroes and when she found out that her uncle Anoosh was tortured too ,she thought of him as a hero At this time in Iran the social classes was also a major theme in the novel mostly all social classes were unequal and this wasnââ¬â¢t fair to Marjane at some points. She comes to learn that if you are not in the same social class as someone else, you are not able to marry them. Also, higher social classes were treated better and were paid more attention to, other than the lower class people. There was a specific part of the book where some kids asked Marjane if she had any ââ¬Å"star warsâ⬠toys, and she didnââ¬â¢t. All little Marjane had were some boring books to offer them. Persepolis is very powerful and informative. It showed the history of Iranââ¬â¢s civil war and revolution and the fall of the Shah. When someone would say the word ââ¬Å"Iranâ⬠people would think of oil, criminals, and communist. they never knew that they would be able to relate Iran to family, love, peace, hope, Michael Jackson. It has definitely given a new meaning behind the word ââ¬Å"Iran.â⬠It has also given a new outlook of the people of Iran.
Thursday, August 15, 2019
Foundation and Empire 9. On Trantor
The stars were as thick as weeds in an unkempt field, and for the first time, Lathan Devers found the figures to the right of the decimal point of prime importance in calculating the cuts through the hyper-regions. There was a claustrophobic sensation about the necessity for leaps of not more than a light-year. There was a frightening harshness about a sky which glittered unbrokenly in every direction. It was being lost in a sea of radiation. And in the center of an open cluster of ten thousand stars, whose light tore to shreds the feebly encircling darkness, there circled the huge Imperial planet, Trantor. But it was more than a planet; it was the living pulse beat of an Empire of twenty million stellar systems. It had only one, function, administration; one purpose, government; and one manufactured product, law. The entire world was one functional distortion. There was no living object on its surface hut man, his pets, and his parasites. No blade of grass or fragment of uncovered soil could be found outside the hundred square miles of the Imperial Palace. No fresh water outside the Palace grounds existed but in the vast underground cisterns that held the water supply of a world. The lustrous, indestructible, incorruptible metal that was the unbroken surface of the planet was the foundation of the huge, metal structures that mazed the planet. They were structures connected by causeways; laced by corridors; cubbyholed by offices; basemented by the huge retail centers that covered square miles; penthoused by the glittering amusement world that sparkled into life each night. One could walk around the world of Trantor and never leave that one conglomerate building, nor see the city. A fleet of ships greater in number than all the war fleets the Empire had ever supported landed their cargoes on Trantor each day to feed the forty billions of humans who gave nothing in exchange but the fulfillment of the necessity of untangling the myriads of threads that spiraled into the central administration of the most complex government Humanity had ever known. Twenty agricultural worlds were the granary of Trantor. A universe was its servant. Tightly held by the huge metal arms on either side, the trade ship was gently lowered down the huge ramp that led to the hangar. Already Devers had fumed his way through the manifold complications of a world conceived in paper work and dedicated to the principle of the form-in-quadruplicate. There had been the preliminary halt in space, where the first of what had grown into a hundred questionnaires had been filled out. There were the hundred cross-examinations, the routine administration of a simple Probe, the photographing of the ship, the Characteristic-Analysis of the two men, and the subsequent recording of the same, the search for contraband, the payment of the entry tax ââ¬â and finally the question of the identity cards and visitor's visa. Ducem Barr was a Siwennian and subject of the Emperor, but Lathan Devers was an unknown without the requisite documents. The official in charge at the moment was devastated with sorrow, but Devers could not enter. In fact, he would have to be held for official investigation. From somewhere a hundred credits in crisp, new bills backed by the estates of Lord Brodrig made their appearance, and changed bands quietly. The official hemmed importantly and the devastation of his sorrow was assuaged. A new form made its appearance from the appropriate pigeonhole. It was filled out rapidly and efficiently, with the Devers characteristic thereto formally and properly attached. The two men, trader and patrician, entered Siwenna. In the hangar, the trade ship was another vessel to be cached, photographed, recorded, contents noted, identity cards of passengers facsimiled, and for which a suitable fee was paid, recorded, and receipted. And then Devers was on a huge terrace under the bright white sun, along which women chattered, children shrieked, and men sipped drinks languidly and listened to the huge televisors blaring out the news of the Empire. Barr paid a requisite number of iridium coins and appropriated the uppermost member of a pile of newspapers. It was the Trantor Imperial News, official organ of the government. In the back of the news room, there was the soft clicking noise of additional editions being printed in long-distance sympathy with the busy machines at the Imperial News offices ten thousand miles away by corridor ââ¬â six thousand by air-machine ââ¬â just as ten million sets of copies were being likewise printed at that moment in ten million other news rooms all over the planet. Barr glanced at the headlines and said softly, ââ¬Å"What shall we do first?â⬠Devers tried to shake himself out of his depression. He was in a universe far removed from his own, on a world that weighted him down with its intricacy, among people whose doings were incomprehensible and whose language was nearly so. The gleaming metallic towers that surrounded him and continued onwards in never-ending multiplicity to beyond the horizon oppressed him; the whole busy, unheeding life of a world-metropolis cast him into the horrible gloom of isolation and pygmyish unimportance. He said, ââ¬Å"I better leave it to you, doc.â⬠Barr was calm, low-voice. ââ¬Å"I tried to tell you, but it's hard to believe without seeing for yourself, I know that. Do you know how many people want to see the Emperor every day? About one million. Do you know how many he sees? About ten. We'll have to work through the civil service, and that makes it harder. But we can't afford the aristocracy.â⬠ââ¬Å"We have almost one hundred thousand.â⬠ââ¬Å"A single Peer of the Realm would cost us that, and it would take at least three or four to form an adequate bridge to the Emperor. It may take fifty chief commissioners and senior supervisors to do the same, but they would cost us only a hundred apiece perhaps. I'll do the talking. In the first place, they wouldn't understand your accent, and in the second, you don't know the etiquette of Imperial bribery. It's an art, I assure you. Ah!â⬠The third page of the Imperial News had what he wanted and he passed the paper to Devers. Devers read slowly. The vocabulary was strange, but he understood. He looked up, and his eyes were dark with concern. He slapped the news sheet angrily with the back of his hand. ââ¬Å"You think this can be trusted?â⬠ââ¬Å"Within limits,â⬠replied Barr, calmly. ââ¬Å"It's highly improbable that the Foundation fleet was wiped out. They've probably reported that several times already, if they've gone by the usual war-reporting technique of a world capital far from the actual scene of fighting. What it means, though, is that Riose has won another battle, which would be none-too-unexpected. It says he's captured Loris. Is that the capital planet of the Kingdom of Loris?â⬠ââ¬Å"Yes,â⬠brooded Devers, ââ¬Å"or of what used to be the Kingdom of Loris. And it's not twenty parsecs from the Foundation. Doc, we've got to work fast.â⬠Barr shrugged, ââ¬Å"You can't go fast on Trantor. If you try, you'll end up at the point of an atom-blaster, most likely.â⬠ââ¬Å"How long will it take?â⬠ââ¬Å"A month, if we're lucky. A month, and our hundred thousand credits ââ¬â if even that will suffice. And that is providing the Emperor does not take it into his head in the meantime to travel to the Summer Planets, where he sees no petitioners at all.â⬠ââ¬Å"But the Foundation-ââ¬Å" ââ¬Å"-Will take care of itself, as heretofore. Come, there's the question of dinner. I'm hungry. And afterwards, the evening is ours and we may as well use it. We shall never see Trantor or any world like it again, you know.â⬠The Home Commissioner of the Outer Provinces spread his pudgy hands helplessly and peered at the petitioners with owlish nearsightedness. ââ¬Å"But the Emperor is indisposed, gentlemen. It is really useless to take the matter to my superior. His Imperial Majesty has seen no one in a week.â⬠ââ¬Å"He will see us,â⬠said Barr, with an affectation of confidence. ââ¬Å"It is but a question of seeing a member of the staff of the Privy Secretary.â⬠ââ¬Å"Impossible,â⬠said the commissioner emphatically. ââ¬Å"It would be the worth of my job to attempt that. Now if you could but be more explicit concerning the nature of your business. I'm willing to help you, understand, but naturally I want something less vague, something I can present to my superior as reason for taking the matter further.â⬠ââ¬Å"If my business were such that it could be told to any but the highest,â⬠suggested Barr, smoothly, ââ¬Å"it would scarcely be important enough to rate audience with His Imperial Majesty. I propose that you take a chance. I might remind you that if His Imperial Majesty attaches the importance to our business which we guarantee that he will, you will stand certain to receive the honors you will deserve for helping us now.â⬠ââ¬Å"Yes, but-â⬠and the commissioner shrugged, wordlessly. ââ¬Å"It's a chance,â⬠agreed Barr. ââ¬Å"Naturally, a risk should have its compensation. It is a rather great favor to ask you, but we have already been greatly obliged with your kindness in offering us this opportunity to explain our problem. But if you would allow us to express our gratitude just slightly by-ââ¬Å" Devers scowled. He had heard this speech with its slight variations twenty times in the past month. It ended, as always, in a quick shift of the half-hidden bills. But the epilogue differed here. Usually the bills vanished immediately; here they remained in plain view, while slowly the commissioner counted them, inspecting them front and back as he did so. There was a subtle change in his voice. ââ¬Å"Backed by the Privy Secretary, hey? Good money!â⬠ââ¬Å"To get back to the subject-â⬠urged Barr. ââ¬Å"No, but wait,â⬠interrupted the commissioner, ââ¬Å"let us go back by easy stages. I really do wish to know what your business can be. This money, it is fresh and new, and you must have a good deal, for it strikes me that you have seen other officials before me. Come, now, what about it?â⬠Barr said, ââ¬Å"I don't see what you are driving at.â⬠ââ¬Å"Why, see here, it might be proven that you are upon the planet illegally, since the Identification and Entry Cards of your silent friend are certainly inadequate. He is not a subject of the Emperor.â⬠ââ¬Å"I deny that.â⬠ââ¬Å"It doesn't matter that you do,â⬠said the commissioner, with sudden bluntness. ââ¬Å"The official who signed his Cards for the sum of a hundred credits has confessed ââ¬â under pressure ââ¬â and we know more of you than you think.â⬠ââ¬Å"If you are hinting, sir, that the sum we have asked you to accept is inadequate in view of the risks-ââ¬Å" The commissioner smiled. ââ¬Å"On the contrary, it is more than adequate.â⬠He tossed the bills aside. ââ¬Å"To return to what I was saying, it is the Emperor himself who has become interested in your case. Is it not true, sirs, that you have recently been guests of General Riose? Is it not true that you have escaped from the midst of his army with, to put it mildly, astonishing ease? Is it not true that you possess a small fortune in bills backed by Lord Brodrig's estates? In short, is it not true that you are a pair of spies and assassins sent here to ââ¬â Well, you shall tell us yourself who paid you and for what!â⬠ââ¬Å"Do you know,â⬠said Barr, with silky anger, ââ¬Å"I deny the right of a petty commissioner to accuse us of crimes. We will leave.â⬠ââ¬Å"You will not leave.â⬠The commissioner arose, and his eyes no longer seemed near-sighted. ââ¬Å"You need answer no question now; that will be reserved for a later ââ¬â and more forceful ââ¬â time. Nor am I a commissioner; I am a Lieutenant of the Imperial Police. You are under arrest.â⬠There was a glitteringly efficient blast-gun in his fist as he smiled. ââ¬Å"There are greater men than you under arrest this day. It is a hornet's nest we are cleaning up.â⬠Devers snarled and reached slowly for his own gun. The lieutenant of police smiled more broadly and squeezed the contacts. The blasting line of force struck Devers' chest in an accurate blaze of destruction ââ¬â that bounced harmlessly off his personal shield in sparkling spicules of light. Devers shot in turn, and the lieutenant's head fell from off an upper torso that had disappeared. It was still smiling as it lay in the jag of sunshine which entered through the new-made hole in the wall. It was through the back entrance that they left. Devers said huskily, ââ¬Å"Quickly to the ship. They'll have the alarm out in no time.â⬠He cursed in a ferocious whisper. ââ¬Å"It's another plan that's backfired. I could swear the space fiend himself is against me.â⬠It was in the open that they became aware of the jabbering crowds that surrounded the huge televisors. They had no time to wait; the disconnected roaring words that reached them, they disregarded. But Barr snatched a copy of the Imperial News before diving into the huge barn of the hangar, where the ship lifted hastily through a giant cavity burnt fiercely into the roof. ââ¬Å"Can you get away from them?â⬠asked Barr. Ten ships of the traffic-police wildly followed the runaway craft that had burst out of the lawful, radio-beamed Path of Leaving, and then broken every speed law in creation. Further behind still, sleek vessels of the Secret Service were lifting in pursuit of a carefully described ship manned by two thoroughly identified murderers. ââ¬Å"Watch me,â⬠said Devers, and savagely shifted into hyperspace two thousand miles above the surface of Trantor. The shift, so near a planetary mass, meant unconsciousness for Barr and a fearful haze of pain for Devers, but light-years further, space above them was clear. Devers' somber pride in his ship burst to the surface. He said, ââ¬Å"There's not an Imperial ship that could follow me anywhere.â⬠And then, bitterly, ââ¬Å"But there is nowhere left to run to for us, and we can't fight their weight. What's there to do? What can anyone do?â⬠Barr moved feebly on his cot. The effect of the hypershift had not yet worn off, and each of his muscles ached. He said, ââ¬Å"No one has to do anything. It's all over. Here!â⬠He passed the copy of the Imperial News that he still clutched, and the headlines were enough for the trader. ââ¬Å"Recalled and arrested ââ¬â Riose and Brodrig,â⬠Devers muttered. He stared blankly at Barr. ââ¬Å"Why?â⬠ââ¬Å"The story doesn't say, but what does it matter? The war with the Foundation is over, and at this moment, Siwenna is revolting. Read the story and see.â⬠His voice was drifting off. ââ¬Å"We'll stop in some of the provinces and find out the later details. If you don't mind, I'll go to sleep now.â⬠And he did. In grasshopper jumps of increasing magnitude, the trade ship was spanning the Galaxy in its return to the Foundation.
Subscribe to:
Posts (Atom)