.

Tuesday, April 2, 2019

Christmas and Chinese New Year Festival | Comparison

Christmas and Chinese youthful course of study Festival Comparison after(prenominal) researching some(prenominal) Christmas and the Chinese newfound division Festival, interesting similarities surrounded by the two unique celebrations came into fruition. For instance, both contain tralatitious meals, pre displaces, feasts, decorations, songs, poems, God(s), kinsfolk lore, and argon family oriented occasions. When disc everyplaceing similarities, thither were in addition perceptible differences between the two, such as the eon of year, and the significance of the occasion within their single cultures. This paper will be showcasing both Christmas, and the Chinese unfermented year Festival in terms of their notes, as intimately as the similarities and differences they both shargon.Christmas is a religious celebratory holi twenty-four hour period, which embraces the birth of Jesus Christ. Christmas Eve takes settle on December 24th, the twenty-four hour period before J esus Christ is born. This is the day where family members gather for a festive meal, which in atomic number 7 the States, usually lie ins of a long turkey, mashed potatoes, stuffing, vege disheartens, gravy and wine. It is significant to know that unlike cultures whitethorn prey diametric meals. According to Wikipedia.org, In Poland, traditional Christmas Eve meals complicate one and only(a)(a) or more of the side by side(p) foods Golabki filled with Kasza, Pierogi, Borscht, fish soup, carp, and pickled Herring. Krupnik is sometimes drunk after dinner,1 and In the Republic of Macedonia and Bulgaria, a coin is hidden in a bread loaf and the host breaks a constitution of the loaf at the dinner table for each member of the fellowship it is believed that the one who gets the piece of bread with the coin will be rosy in the forthcoming year. The dinner is according to the rules of fasting fish, baked beans, sauerkraut, walnuts and trigger- capable wine are common. The dess ert may consist of apples and dried fruits plums, dates, figs. The table is usually not cleared after the dinner and until the next morning, to go steady some food for the holly spirits a custom which probably take afters from ethnical pre-Christian times.2 Also, there are umteen another(prenominal) families whom may attend mass or choose to divine fast3on this day, as a means to spare back on the night before Jesus birth. It is historic to know that non-religious individuals may also celebrate Christmas as well, whom primarily centre on the family, feasting, and endow free aspect of Christmas. Some may view Santa Claus, a unreal figure, to be more important than Jesus Christ. Santa Claus is cognise for travelling crosswise the world on December 24th, from the unification Pole, delivering presents to the becoming minorren, while the gentle children receive a lump of coal. Hence, Santas list for delivering gifts to children is called the naughty or nice list. Santa Cla function riseates from St. Nicholas, whom tried to help others while inspiring his virtues. Legends of his unselfish giving spread all over northeastern Europe, and accounts of his heroic deeds mix with regional folklore. Eventually, the image of the stately saint was transformed onto an almost incomprehensible being, one know for rewarding the good and punishing the bad.4 How Santa Clauss name came to be in North the States was cod to Dutch immigrants whom presented Sinterklaas ( mean St. Nicholas) to the colonies. In their excitement, m both English-speaking children uttered the name so chop-chop that Sinterklaas sounded like Santy Claus. later on years of mispronunciation, the name evolved into Santa Claus.5 December 25th is the day where Jesus Christ, know to many Christians as their savior, is born. This is the day where a few individuals will charge up legion(predicate) decorations, although many will decorate in advance. Examples of decorations employ for Chris tmas are miniature size nativity scene figures, stockings, wreaths, ornaments, candles, mistletoes, garlands, poinsettias, Christmas lights and most importantly, the Christmas tree. The origin of the tree is credited to Saint Boniface (circa 722) who stopped a child from becoming a pitying sacrifice to a pagan graven image by striking down the oak tree destined for use as the stake. A fir tree sprang up in its mastermind and he declared it a holy tree and instructed the faithful to rock one to their homes and surround it with love and gifts.6 Ultimately, the shading of numerous cultures is how Santa Claus, as well as the numerous traditions on Christmas Eve and Day, came to be.The Chinese New course of study Festival is a major holiday, which has been celebrated in mainland China for many centuries, taking place on the second New Moon after the winter solstice.7 It is significant to know that this festival is also celebrated in other countries by its Chinese inhabitants, whil e various foreigners have been known to set officipate in the festivities as well. During this coming year, 2010, the Chinese will be celebrating the year of the tiger, the archetypical day being on February 14th. According to tales and legends, the outgrowth of Chinese New form started with the mesh against a mythical zoology called the Nien (Chinese ?pinyin nin). Nien would come on the first day of New course of study to devour livestock, crops, and even villagers, especially children. To protect themselves, the villagers would put food in front of their doors at the beginning of every year.8 The Chinese not solitary(prenominal) use food as a means to protect themselves from Nian, only if they also released firecrackers, and wore red attire. Hence, the color red is strongly used end-to-end the festival, such as clothing, decorations, envelopes, sweets, gifts, etc. When families come together, they will feast on meat, noodles, rice, dumplings, mandarin oranges, sweets, and so forth. Before the feast, which takes place on the Eve of Chinese New form, red envelopes with money inside and gifts should have already been distri hardlyed amongst family members, and children. The Chinese New course of instruction consists of fifteen days, with the majority of the days each signifying diverse customs and actions. For instance, The first day of the Lunar New twelvemonth is the take of the gods of the heavens and earth. umpteen people abstain from meat on the first day of the new year because it is believed that this will ensure long and happy lives for them,9 The fifth day is called Po Woo. On that day people term of enlistment home to welcome the God of Wealth. No one visits families and friends on the fifth day because it will bring both parties bad luck,10 the seventh day of the New Year is the day for farmers to display their produce. These farmers rile a imbibition from seven types of vegetables to celebrate the occasion. The seventh day is also considered the birthday of human beings. Noodles are eaten to promote longevity and raw fish for success,11 and on the tenth through the 12th are days that friends and relatives should be invited for dinner. After so much rich food, on the 13th day you should have unanalyzable rice congee and mustard greens (choi sum) to cleanse the system.12 These are bonny a few of the customs that the Chinese celebrate throughout their New Year Festival. It is also the tradition that every family thoroughly cleans the house to trail away any ill-fortune in hopes to make way for good designate(postnominal) luck. Windows and doors will be decorated with red color paper-cuts and couplets with popular themes of ecstasy, wealth, and longevity.13 Decorations are usually red, consisting of pictures, greetings, and Chinese idioms. On the ordinal and final day of the Chinese New Year Festival, the Lantern Festival takes place. During this period, numerous individuals decorate the streets with Lante rns they have lit, which are primarily red. Some people may add their own unique individuality to a lantern, by adding a song or a poem to it. The Chinese New Year Festival is a high-spirited, content time where family and friends come together in order to celebrate years of tradition, such as feasts, decorations, gifts, envelopes, mythology, fortune gods, depicted object pride, etc. It is also an influential festival that has spread across the world, blending in with copious cultures.It is fascinating to learn that Christmas and the Chinese New Year have actual similarities, with slight variations to them. For instance, the use of flowers is strongly used in both celebrations, although the Chinese convention for flowers has a more significant meaning within their culture. A certain flower can symbolize different connotations, for instance, longevity, luck, prosperity, tranquility, health, etc. The Chinese are known for using many different flowers for the Chinese New Year Festival , such as pussy willows, plum blossoms, water lilies, bamboo, and so forth. For example, the reason for using pussy willows for the Chinese New Year is In Cantonese, Yin Liu sounds like Yin Lou which is similar to Yin Liang (money). Therefore, having this plant around during Chinese New Year would represent the invitation of abundant luck and prosperity into homes.14 As for western cultures, when celebrating Christmas, individuals use flowers mostly as decorations. It is principal to know, that there is an origin story of how the poinsettia became the official flower for Christmas. The poinsettia is a chaparral that features green leaves combined with red, white, or pink leaves surrounding tiny chicken flowers. Used by the Aztecs as a dye and medicine, it is native to Mexico and aboriginal America where it is known as Flores de Noche Buena (Flower of the Holy Night) and was used in these areas by Franciscan friars in Nativity processions as early as the seventeenth century.15 In terms of sweets and baked goods, sticky saloon and Christmas cake virtually resemble one another. Sticky cake, also known as Neen Gow, is a fruitcake that can be either steamed or baked. This crabbed cake is made in appreciation for the kitchen god. The Christmas cake started out as porridge from the English, evolving over the quondam(prenominal) couple of centuries into a fruit cake. The ingredients usually consist of eggs, flour, sugar, scarceter, marzipan, spices, dried fruit, spices, and whisky. All Christmas cakes are made in advance. Many make them in November, keeping the cake upside down in an invulnerable container. A small amount of brandy, sherry or whisky is poured into holes in the cake every week until Christmas. This process is called feeding the cake.16both celebrations are also known for the process of giving and receiving gifts to friends and/or relatives. For instance, during the Chinese New Year, individuals will implement gifts, which are usually brought when visiting friends or relatives at their homes. Common gifts include fruits (typically oranges, and never pears), cakes, biscuits, chocolates, candies, or some other small gift.17 Christmas gifts are also distributed, and some gifts can be similar to those that are given on the Chinese New Year, but Christmas gifts usually consist from a large variety of options. For example, food, alcohol, jewelry, electronics, toys, household appliances, automobiles, etc.Christmas and the Chinese New Year are both important celebratory occasions, which can bring joy and antepast amongst those whom celebrate these events. These are times when family, friends and even stark(a) strangers, can come together in harmonious enthusiasm. Both events contain similarities, such as, folk lore, feasts, decorations, gifts, traditions, songs, poems, flowers, God(s), games, etc. Christmas, a westernized occasion, may contain different significance and exemplary meanings to those whom celebrate it rather tha n those whom celebrate the Chinese New Year. But, the most important thing nearly these two occasions, even with their differences, is they bring people together, and are both accepting towards all cultures and beliefs.Works CitedRetrieved November.28, 2009 from http//www.wikipedia.org/chinesesnewyearRetrieved November.28, 2009 from http//www.educ.uvic.ca/ efficacy/mroth/438/CHINA/taboos.htmlRetrieved November.28, 2009 from http//www.ci.lenoir.nc.us/index.asp? compositors case=B_EVSEC=%7BF083A2AC-A24E-4B3B-8944-F912226F078D%7DDE=%7B817E6FA1-42C1-4B01-8A28-F0EF2477494F%7DRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November.28, 2009 from http//www.familyculture.com/holidays/chinese_new_year.htm(December.2, 2001)The manoeuvre to Life, the Universe and Everything. Retrieved November.28, 2009 from http//www.bbc.co.uk/dna/h2g2/A665949(February.8, 2007) Popular Chinese New Year Plants. Retrieved November.28, 2009 from http//www.nparks.gov.sg/blogs/ garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/Davis, rear end K. (November.10, 2009)The Origins of Traditional Holiday Plants. Retrieved November.28, 2009 from http//botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plantsRetrieved November.28, 2009 from http//www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/Retrieved November.28, 2009 from http//botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plantsRetrieved November.28, 2009 from http//www.northpolesantaclaus.com/santa memorial.htmRetrieved November.28, 2009 from http//www.bbc.co.uk/dna/h2g2/A665949Retrieved November.28, 2009 from http//www.chinapage.com/newyear.htmlRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveReferencesRetrieved November.28, 2009 from http//www.wikipedia.org/chinesesnewyearRetrieved November.28, 2009 from http//www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.htmlRetrieved November.2 8, 2009 from http//www.ci.lenoir.nc.us/index.asp? part=B_EVSEC=%7BF083A2AC-A24E-4B3B-8944-F912226F078D%7DDE=%7B817E6FA1-42C1-4B01-8A28-F0EF2477494F%7DRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November.28, 2009 from http//www.familyculture.com/holidays/chinese_new_year.htm(December.2, 2001)The Guide to Life, the Universe and Everything. Retrieved November.28, 2009 from http//www.bbc.co.uk/dna/h2g2/A665949(February.8, 2007) Popular Chinese New Year Plants. Retrieved November.28, 2009 from http//www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/Davis, John K. (November.10, 2009)The Origins of Traditional Holiday Plants. Retrieved November.28, 2009 from http//botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plantsRetrieved November.28, 2009 from http//www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/Retrieved November.28, 2009 from http//botany .suite101.com/article.cfm/the_origins_of_traditional_christmas_plantsRetrieved November.28, 2009 from http//www.northpolesantaclaus.com/santahistory.htmRetrieved November.28, 2009 from http//www.bbc.co.uk/dna/h2g2/A665949Retrieved November.28, 2009 from http//www.chinapage.com/newyear.htmlRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November 27,2009 from http//www.calendar-updates.com/info/holidays/us/christmaseve.aspxRetrieved November 27, 2009 from http//www.ornamentshop.com/history_story/part1.aspRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November.28, 2009 from http//www.northpolesantaclaus.com/santahistory.htmRetrieved November.28, 2009 from http//www.northpolesantaclaus.com/santahistory.htm(December.2, 2001)The Guide to Life, the Universe and Everything. Retrieved November.28, 2009 from http//www.bbc.co.uk/dna/h2g2/A665949Retrieved November.28, 2009 from http//www.chinapage.com/newyear.htmlRetrieved November.28, 2009 from http//www.wikipedia.org/chinesesnewyearRetrieved November.28, 2009 from http//www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.htmlRetrieved November.28, 2009 from http//www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.htmlRetrieved November.28 2009 from http//www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.htmlRetrieved November.28, 2009 from http//www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.htmlRetrieved November.28, 2009 from http//www.ci.lenoir.nc.us/index.asp?Type=B_EVSEC=%7BF083A2AC-A24E-4B3B-8944-F912226F078D%7DDE=%7B817E6FA1-42C1-4B01-8A28-F0EF2477494F%7D(February.8, 2007) Popular Chinese New Year Plants. Retrieved November.28, 2009 from http//www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/Davis, John K. (November.10, 2009)The Origins of Traditional Holiday Pla nts. Retrieved November.28, 2009 from http//botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plantsRetrieved November.28, 2009 from http//www.familyculture.com/holidays/chinese_new_year.htmRetrieved November.28, 2009 from http//en.wikipedia.org/wiki/Chinese_New_YearGulf of Tonkin Incident forces InvestigationGulf of Tonkin Incident Military InvestigationMilitary password agency OrganizationsMilitary news show is a division of multitude the purpose of which is to make for the number of development pull ined and analysis techniques in order to contribute guidance and directions to demanders in support of the crucial decisions made by them. They do it by performing an analysis and assessment of the available data which they gathers from blanket(a) range of sources, guiding and directing the commanders to make decisions or respond to rivet questions as part of their operational campaign. The collected schooling is first set and then incorporated into th e process of news show collection, analysis and dissemination.Military Intelligence Organizations have played their role in resolving conflicts in any nation. Discusses here is the Gulf of Tonkin Incident and the role of U.S. Military Intelligence Organizations to disperse it. The nonessential took place on August 2 4 1964 (Kim, 1999). This was the incident that helped the Americas involvement in Vietnam War.Gulf of Tonkin Incident oerviewWhen hot seat Lyndon b. took over charge of the country after the death of President John F. Kennedy, he became worried about the South Vietnams ability to keep away the Communist Viet Cong guerillas that were actively operating at that time in the country. In order to follow the established policy of containment, the Secretary of excuse at that time Robert McNamara started to increase the military aid to South Vietnam (Trueman, 2000). Many Norwegian built fast patrol boats (PTFs) were purchased and sent to South Vietnam. These PTFs helped in guideing a series of antiaircraft guns on coastal areas of South Vietnam as part of Operation 34A. 34A was originally began by interchange Intelligence Agency in 1961, it was a extremely classified program of the covert operations against North Vietnam. Due to several early failed charges, in 1964 it was transferred to Military Assistance Command, Vietnam Studies and Observations Group, and the focus of it was shifted towards maritime operations. In repayable course of time, U.S. Navy was also instructed to conduct Desoto patrols off the North Vietnam.The Desoto Patrols consisted of the American warships cruising in international waters in order to conduct electronic surveillance operations (Shane, 2001). As a result of 34A and the Desoto Patrols, the ships offshore were made able to collect important information about the North Vietnamese Military capabilities.The First AttackOn July 31, 1964 the destroyer USS Maddox conducted the Desoto Patrol off North Vietnam (Paterson, 20 08). Under the operational command of Captain John J. Herrick, it steamed through the Gulf of Tonkin collecting comprehension operation information. This military mission was accompanied by several 34A attacks including many big attacks on two islands of North Vietnam. The Government of North Vietnam decided to strike the USS Maddox and on August 2, three Soviet built P-4 Motor torpedo boats were dispatched to attack the destroyer. About twenty-eight miles cruising in international waters, the torpedo caught the USS Maddox. In the meanwhile, Herrick pass on for air support from the U.S. Air Force. The request was granted and the four F-8 Crusaders were sent towards the Maddox position. Herrick also ordered to fire the three warning shots if the torpedo reaches a range of 10,000 yards of ship. These warning shots were fired and the P-4s launched their first torpedo attack. The Maddox scored fire on P-4s and was just being hit by one 14.5 millimeter auto gun bullet. Soon after fif teen minutes, the F- crusades arrived to rescue the Maddox and started hitting the targeted fires on North Vietnamese boats, damaging the two and leaving the third one dead in the waters. The attack was retreated and the Maddox returned to join its friends but the Desoto mission was continued as per orders of the commander in the Pacific.The Second AttackOn August 4, the American radars, sonar and radio signals were received of another North Vietnam attacks. Taking evasive action, the U.S. Maddox fired on numerous radar signals targets. After this incident (Parados, 2004), Herrick was not sure that his ship was attacked by the North Vietnam. reportage at 127 AM Washington times that due to freak weather, the radar and sonar signals did report some of the enemy ships but nothing has been visualized by the Maddox. After suggesting the complete evaluation of the battle conducted by the U.S military experience, Herrick radioed a request asking for a complete reconnaissance in daylight by the aircrafts. But the American aircrafts flight of steps over the area failed to find out any North Vietnam ship.Although there were doubts about the second attack, those present on Maddox were convinced that the attack did happen. This along with the f legal philosophyed signals intelligence from the National Security Agency led the forces to attack retaliatory airstrikes against North Vietnam. On August 5, the Operation Pierce pointer saw aircrafts from USS Ticonderoga and USS Constellation strike and attack about thirty North Vietnam vessels. Although the subsequent research and records prove that the second attack didnt happen. This was also reinforced by the statements from the retired Vietnamese Defense Minister who admitted the August 2 attack but denied the second attack.After ordering the airstrikes, soon Johnson went on to turn the nation on television regarding the incident. He in his address requested the passage of a resolution, which expresses the unity and dete rmination of the United States in support of their freedom and in the hope to protect peace in the Southeast Asia (Cohen Solomon, 1994). He also argued that he didnt want a wider war, and said that United States would continue to protect its national interests. As canonic on August 6, 1964, the Southeast Asia (Gulf of Tonkin) Resolution, gave Johnson the power to use military intelligence and force in the region without requiring a declaration of war. Later on over the next few years, Johnson used this resolution to rapidly come to the fore the U.S. involvement in the Vietnam War.Intelligence has fulfilled the wider ranging and very important functions in different section including security, diplomacy and statecraft (Augustin, 2009). However in past few years, the role of military intelligence in resolution of conflicts has expand and broadened its range and now it forms the core element of conflict management policies and procedures. antiquated Greece is the first democracy in the world. It has established several institutions that served as intelligence function. Proxenia were the upper class citizens of Greece who served as top class agents. They used to collect information and even executed the character assassinations if required. The Heralds collected the public and private information. Both were protected by the Law of Greece and only the Heralds used to get the rewards of pitch good news back to the nation. Greece impressive political and military achievements authentically lacked the true intelligence system like today. Although they didnt have the prim intelligence system like today but still they had the intelligence cycle existed in their military endeavors.The two major requirements of intelligence services are democratic control and the effectiveness of the actions and activities (Augustin, 2009). African countries always had difficulties in managing and creating the solid intelligence systems. The territory of the Sahara Dessert is alwa ys problematic so the military intelligence related to that area is restricted. In 1997, the African countries created a security sector reform whose purpose was to try and narrow the challenges and constraints of ontogenesis a proper military intelligence system in the area. The main challenges that African countries are facing these days include the legacy of the African socialism and colonialism, autocratic military and security services and the unknown and snug activities of the military intelligence services. Gambia established the National Intelligence Agency in order to protect the regime.The unsuccessful attempts of Eisenhower and Kennedy to remove Castro from the power are considered as the failed military intelligence actions (Augustin, 2009). According to them the biggest threat to democracy is the communism. In Cuba, the America supported the Batista leading anti-communist government. After Castro being elected to power, he started quickly eliminating his enemies. And s tarted to nationalize the economy and created knots with the USSR. His actions made it clear by 1960 that he was following the communism path for the Cuba. Eisenhower tried to remove the Castro from power by procreation Anti-Castro forces and sneaking them into Cuba. They began to target the Cuban sugar fields and the CIA developed an assassination program to eliminate Castro. Although such attempts were failed again and again, Kennedy tried to invade the Cuba by the Bay of Pigs operation but that was again a failure. This was all due to the strong military intelligence of Castro which saved him from all the American attacks.The Shah of Iran has a weak legitimacy and had lot of enemies (Augustin, 2009), , so to overcome them in 1957, he formed the SAVAK, a national intelligence and security organization. The SAVAK served a nib to torture and eliminated anyone who could prove as a threat to the Shah and his dynasty. No free opposition was allowed against the institution in Iran du ring Shah Regime, but with the passage of time the shelter of people became worst. Khomeini got exiled to Iraq and then to France because of his increasing popularity and threat to his life. In 1977, censorship law was introduced in Iran in order to retain the Shahs power but due to his detachment from the public, the public dismissed him and Khomeini came to power after the over throw of the Shah of Iran .In 1980 under the rule of Reagan (Augustin, 2009), The U.S. Intelligence Community realized a need for more intense intervention in Central America in order to stop the communist expansion. El Salvadors military government was the only potential barrier against the communism in the Central America. The DIA also tried to help the government of El Salvador to assist them fight against the leftist group called as FMLN. The DIA worked and operated with the direct military intelligence information sharing and between 1987 to 1989 a guerilla attack was made by the FMLN which surprised the El Salvador and the American armies. This also showed that how little the U.S support helped. Over all the defense of the El Salvador is considered as the failure in the history of the U.S. military intelligence.Intelligence is basically the sociological phenomenon that is used for the information meeting and to ensure the prevention of aggressiveness (Augustin, 2009). It is important to differentiate between the intelligence that has been existed in any nation and the intelligence that is established as a result of state concept. Intelligence cycle, covert actions and counter intelligence are all the components necessary for decision making process. Intelligence focuses on the hostility both in democracies and non-democracies tenures. Intelligence in democratic system must have strong relations with the citizens and must work under a legal framework. The functions and scope of working of intelligence agencies must be subtile and their methods of working and sources of inform ation must be protected. However intelligence in the non-democratic system concentrates more on internal opposition rather than extraneous threats. So the intelligence is outside of the scope of legal framework in non-democratic system while intelligence in democracies should only be used to measure level of democracy in the country.In 1960, the Egyptian forces entered in Sinai which was a big surprise to Israel (Augustin, 2009). The IDF couldnt respond in time and it lead to the result that intelligence was needed for an earlier warning of workable Egyptian attack. The methods or tools for an earlier warning were HUMINT, the SIGINT and the VISINT. The 1960 rotten action and the 1973 Vom Kippur war failure show failure of the intelligence system and a need for strong intelligence system.References1 Sankt Augustin (2009), Intelligence and Democracies in Conflict and Peace, retrieved from,http//www.kas.de/israel/en/publications/18450/2 Tom Kim (1999), The Gulf of Tonkin Incident 196 4, retrieved from,http//www.thenagain.info/webchron/usa/GulfTonkin.html3 Chris Trueman (2000), Gulf of Tonkin 1964, retrieved fromhttp//www.historylearningsite.co.uk/gulf_tonkin_1964.htm4 Scot Shane (2001), The Gulf of Tonkin Incident, retrieved fromhttp//911review.com/ condition/century/tonkin.html5 restutenant Commander Pat Paterson, U.S. Navy (2008), The Truth about Tonkin, retrieved fromhttp//www.usni.org/magazines/navalhistory/2008-02/truth-about-tonkin6John Parados (2004), The Gulf of Tonkin Incident, 40 Years later, retrieved fromhttp//www2.gwu.edu/nsarchiv/NSAEBB/NSAEBB132/7 Jeff Cohen and Norman Solomon (1994), 30-Years anniversary, Tonkin Gulf Lie Launched Vietnam War, retrieved fromhttp//fair.org/media-beat-column/30-year-anniversary-tonkin-gulf-lie-launched-vietnam-war/

No comments:

Post a Comment