Premium Essay

Warfare Is Not a Necessity

In: English and Literature

Submitted By lizpetrak17
Words 475
Pages 2
Warfare: An Invention— Not a Biological Necessity
Margaret Mead

Margret Mead writes an essay, “Warfare: An Invention-Not a Biological Necessity” to show us warfare and to summarize how warfare was invented. Throughout her essay, she writes of three different world views of warfare and how others might view it. She also shares her view on warfare and how other cultures have treated warfare.
Mead shows us three different world views in this essay. The first view talks about an aggressive and competitive human nature who is down to the very basic of needs. Those who take this view Mead points out wish to outlaw war or at least find different ways of competing given that it is part of man’s nature to fight and go to war.
The second view that Mead points out is that warfare is inevitable. Those who take this stance feel that there is a struggle for power and possessions unless we change our social system and completely change what we have between our lower class, middle class, and our higher class. They feel that if the classes simply disappear than there wouldn’t be any more problems.
The third view that comes forth between the two major extremes is that each man’s biological determines his needs. When his needs are met because each culture had its own frustrations, war will be inevitable and natural.
Moreover, Mead has her own view that she would like to share. She would like us to recognize that warfare can be between two groups as groups (and each groups fights and kills each other). She goes on to share that warfare is an invention like anything else; for example: cooking or writing which is necessary anywhere in history. Throughout history, there have been many cultures that have been touched by warfare but the Eskimos are one culture who has neither understood war nor undergone war. For others like simple and civilized people, they will go to war…...

Similar Documents

Premium Essay

Cyber Warfare

...Computers have modernized terrorism in the same way cyber terrorism revolutionized information warfare. There is no distinct definition of Cyber terrorism; however, its threat is as real as waging war but with weapons of automation. Terrorists have begun to exploit the availability of information with the malicious intent to sabotage; conversely, there are those who are not quite sure if information warfare - cyber terrorism is an actual threat. This research paper will briefly explore the history of cyber terrorism, the friend the internet has been to terrorist and how we can make the internet safer through vigilant tactics of prevention and deterrence. It will also expose the truth about cyber terrorism for the skeptic, reasons not to discount the threat, and why it is paramount their mind is changed. Information Warfare-Cyber Terrorism Did you know there were 18 cybercrime victims every second, 1058 every minute, approximately 64,000 per hour, and 1.5 million per day, that affected over 556 million people within the last year (Norton , 2012)? The internet has made it possible for terrorists to gather our public information and use it against us. As the internet matures so does the terrorist, finding ways to cripple and intimidate. The internet and terrorists have become a real hazard to the health of the cyber world. The government has implemented several organizations to help combat cyber terrorism but have not given it a clear concise definition. ......

Words: 3494 - Pages: 14

Free Essay

Religion and Warfare

...Religion and Warfare: Yesterday and Today A religious war is a war justified by religious differences. It can be the acceptable forces of one state that has a well-known religion against those of another state with either a different religion or a different section within the same religion, or, at the level below a state, it can be a faction motivated by religion attempting to spread its faith by violence either within the state or elsewhere. The French Wars of Religion, the Crusades, and the Reconquista are often cited historical examples. While there are certainly wars fought primarily on religious grounds, wars frequently have multiple and complex causes. Saint Augustine is credited as being the first to detail a "Just War" theory within Christianity, whereby war is justifiable on religious grounds. Saint Thomas Aquinas elaborated on these criteria and his writings were used by the Roman Catholic Church to regulate the actions of European countries (Sherman & Salisbury). In modern times religious differences are frequently used as shorthand for cultural and historical differences between combatants, giving the impression that the conflict is primarily about religious differences. For example, The Troubles in Northern Ireland is frequently seen as a conflict between Catholic and Protestant. However, the more basic cause is the attachment of Northern Ireland to either the Republic of Ireland or the United Kingdom. As the native Irish were mostly Catholic, and......

Words: 1813 - Pages: 8

Premium Essay

Irregular Warfare

...An Irregular Warfare Strategy for Somalia Staff Sergeant Ondrae L. Meyers Enlisted Professional Military Education- Career Course 9 June 2014 In Somalia there is a constant battle that the country faces with a terroristic organization called Al Shabaab. Within these battles they do not use conventional warfare. The Al Shabaab do not have the support of the people and rule by commanding obedience through fear. In a conventional war military forces attempt to achieve strategic objectives against a recognized state. Irregular Warfare is when adversaries seek to isolate themselves from their external supporters and undermine their opponent’s legitimacy and credibility. Irregular Warfare is defined by the Department of Defense Directive 3000.07, (December 2008), as “A violent struggle among state and non-state actors for legitimacy and influence over the relevant population(s). Irregular warfare favors indirect and asymmetric approaches, though it may employ the full range of military and other capacities, in order to erode an adversary’s power, influence, and will.” There are specific applications of “keys to success”, in order to carry out the Irregular Warfare campaign. The two applications are unity of success and understanding the operational environment. Irregular Warfare is defined by Thomas Edward Lawrence, better known as ‘Lawrence of Arabia’, as “Granted mobility, security (in the form of denying targets to the enemy), time, and doctrine (the idea to convert......

Words: 893 - Pages: 4

Free Essay

Act of Necessity

...THE ACT OF NECESSITY 1 The Act of Necessity Jen T. Stunt University Of Arizona THE ACT OF NECESSITY 2 Every day technology advances leaps, and bounds causing new ethical issues. These issues necessitate the creation of new laws by Congress to keep the public safe from their personal private information being used against them unlawfully. In this Information Technology Acts Paper I will discuss two separate acts that were put in place due to such ethical issues arising. The first act is called the Video Privacy Protection Act of 1988. The second act is called The Children’s Internet Protection Act, which was enacted in 2000. The Video Privacy Protection Act of 1988 (VPPA) was passed when the Supreme Court nominee Robert Bork’s video rental records were posted for public viewing during his campaign. Robert Bork was nominated by President Ronald Reagan to serve as Supreme Court Justice. While debates ran hot over the nomination and Bork’s beliefs became a popular topic, someone leaked his video rental records to the public. There wasn’t anything practically ‘juicy’ about what he had viewed, but some tried to use it against him. This sparked the need for a law to protect him, and others from being a victim of invasion of privacy. We all have different likes when it comes to......

Words: 1584 - Pages: 7

Free Essay

Cyber Warfare

...accounts of Chinese human rights activists. The attacks were directed at some 34 companies or entities, most of them in Silicon Valley, California, according to people with knowledge of Google’s investigation into the matter. The attackers may have succeeded in penetrating elaborate computer security systems and obtaining crucial corporate data and software source codes.” Both of these attacks could be dismissed as everyday criminal cyber-attacks but they could be considered something much more serious. By some the attack against Visa and MasterCard maybe considered cyber terrorism and the attack against Google considered cyber warfare. The circumstances of the attack, politics, and the parties involved often determine what category an attack falls in. This paper will focus on cyber-attacks that the United States Government deems to be cyber terrorism or cyber warfare. We will explore the past, present, and future of these attacks and our nation’s current known defensive and offensive cyber-attack capabilities. Cyber Terrorism Distinctions between crime and terrorism may be blurry when attempting to describe a computer network attack (CNA). It can be difficult to determine if non-state actors who initiate a CNA are secretly sponsored by a nation state because it can be hard to determine where a cyberattack originated because attackers may direct suspicion toward an innocent third party. Interactions between terrorist and criminals who use computer technology may further......

Words: 2021 - Pages: 9

Free Essay

Celtic Warfare

...Celtic warfare Celtic warriors were well equipped with an arsenal of weapons and armor, and were always ready to fight. During battles, they dressed in long oval shields that covered most of their body. These oval shields were usually made of wicker or wood and might have been covered with leather. Some warriors carried spears, which looked like javelins. These spears were made of wood, which the Celts would throw at opposing forces to knock down some of the enemies. The range was greater than an arrow, so they had more of an advantage over the enemy. The common warriors would wear leather helmets that provided little to no protection, but wealthy warriors could afford bronze helmets that very protective. During the Bronze Age, they carried a sword that was only designed for thrusting, not cutting. Eventually, the Celts developed a 'Cut - Thrust' Sword which was a long iron double-edged sword. In the Iron Age, they developed their most popular sword, which was the double-edged Broad sword. It was made of iron and bronze, and it was one of the heaviest swords ever created. It had a wooden scabbard covered with leather and was lined with fur, with bronze chaps, and an iron or bronze blade. The Celts used only a few battle tactics to overcome their enemies, but they were still very successful in battle. Chariots were an important part of Celtic warfare, a method that was very effective against the Romans. Warrior and driver were a strong team. The driver would bring the......

Words: 664 - Pages: 3

Free Essay

Celtic Warfare

...rule happened every year before Caesars arrival that they either opened up hostilities themselves or had to defend against -, they all joined the battle . . .” (Caesar, De Belli Gallico VI – 15,1) Caesar may be a biased source, but his statement tells us a lot about the role of war in ancient Celtic society: it was an important part of life, primarily for the nobility, but, to a lesser degree, also for the average man. We see a similar picture if we take a look at the Irish or Welsh legends, where the heroes go off to fights, most often one at a time or in small groups, but often in the company of their followers and clients to fight mass battles. A Short, Short History of Celtic Expansion and Retreat Before we look into ancient Celtic warfare itself, it is necessary to define what time and geographical region I will be talking about. Even though Celtic culture developed probably some centuries earlier, the oldest material I’ll be discussing dates to the beginning of the 5th century BC in central Europe. From that point, the culture expanded until, in the 3rd century BC, it reached its greatest extent with Celts living in Ireland and Spain in the West and as far as Galatia in Asia Minor in the East. This was partly due to cultural exchange and peaceful transmission of ideas, partly due to massive military campaigns like that in northern Italy. From then on, however, the Celts began to lose ground. Starting even in the 3rd century BC, the Romans began to conquer the Celtic......

Words: 2666 - Pages: 11

Premium Essay

The Necessity of Projects

...Introduction As a project manager, it is important to understand change in the organization that you are working within. The necessity of projects as vehicles to accomplish an organization’s strategic goals is imperative to an organization and a project manager. A project manager must also understand the evolving changes in the world and how they can affect the way a project is managed, what change will allow for improvement, and what alternatives exist. Organizational Objectives, Goals, and Strategies to the Project Outcomes The necessity of projects as vehicles to accomplish an organization’s strategic goals is beneficial to the organizational objectives, goals, and strategies to the outcome of the project. In fact, a project should be viewed as a financial and strategic investment (Resch, 2011). In order for a company to be successful, the organizational objectives must be met with effectiveness and productivity. This is because projects are needed to accomplish goals. Without goals an organization would be short with obtaining their objectives. All projects are one-time, temporary endeavors that are meant to meet business objectives (Resch, 2011). Some examples of projects include re-designing a project, building a bridge, and upgrading to a new software release. All of these examples are important with accomplishing an organization’s strategic goals. The responsibility for the project achieving its goals does not rest solely with the project manager, but rather...

Words: 1370 - Pages: 6

Premium Essay

Cyber Warfare

...For over a decade, the concept of cyber warfare (computer warfare) has bee embedded i military doctrine. I 2000 the Defece white paper stated a ambition to repond to cyber warfare attacks. The 2007 Defence Update went further by calling for a focus on 'cyber warfare' to protect 'national networks and deny information'. The most recent Defence White Paper in 2009 also announced a 'major enhancement of Defence's cyber warfare capability...to maximise Australia's strategic capacity and reach in this field'. Given the rate of technological change and the number of system vulnerabilities discovered every day, the ADF's cyber capabilities will require dedicated and constant attention. This will be difficult to achieve and sustain if the ADF has not fully defined what it means by cyber warfare and how it will be used to serve Australia's interests. There are several definitions of cyber warfare, one of which was provided earlier this year by Defence Signals Directorate's (DSD) Deputy Director of Cyber and Information Security Mike Burgess in a speech to the Old Crows Association. He defined cyber warfare as 'an act...intended to degrade, destroy or deny computer accesses and systems' and added 'a true act of cyber warfare would have to be potentially lethal, instrumental and political'. Information stored on computers has become a key national asset and an element of our national power. Our ability to create information, store it, secure it, analyse it and harness it to......

Words: 571 - Pages: 3

Free Essay

Necessity of the Scriptures

...God and Man are the main reasons for the necessity of the Scriptures. The inmate behavior of the fallen man to distort an oral comprehension of the divine truth required a written revelation to teach the human generations about the complexities of the sacred Word of God. The Holy Bible is the way God made a Statement to Man about his fallen state and the Way of Redemption from that. This statement by God was a necessary, sufficient, rational and authoritative mode of Communication to generation after generation of human kind. The topic of necessity of the inscribed Word of God is unfortunately, a topic which is discussed rarely. Some theologians do talk about the necessity of the divine revelation, but that is different from the topic of the necessity of Scriptures because not all revelations are inscribed. The scribed word of God does not comprise the totality of divine revelations (John. 20:30). It is important, however for a theology student to understand the necessity behind the scriptural form of the Word of God. In order to evaluate if it was necessary that God gave the Scriptures to the man, one should understand the meaning of necessity as well as what the Scriptures itself tells about the necessity of the Scriptures. DEFINITION OF NECESSITY Dictionary defines Necessity as “the fact of being required or indispensable” which means that it is the situation that is bound by some constrained circumstances. Necessities are distinguished from wants because a......

Words: 1794 - Pages: 8

Free Essay

Spiritual Warfare

...Spiritual Warfare Strongholds & Strategies Bob Burns “Everything is permissible for me-but I will not be mastered by anything” 1 Corinthians 6:12 1 The Bible tells us that we struggle not against flesh and blood, but against demonic forces. Ephesians 6:12, "For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places." Often the enemy uses life controlling problems as a means of attack. “Life-controlling problems are anything that master our lives and block our spiritual growth.” Other description include: life-controlling struggles, addictions, dependency, stronghold, besetting sin, slavery, and compulsive behavior. 1 Almost everyone has something blocking his or her spiritual growth in Christ. Some strongholds may be something that people consider positive such as sports or ministry. Others that are considered negative include drugs, gambling, sexual addiction and more. Perhaps a person is consumed by another persons problem, trapped by grief, depression, anger, envy, lust and etc. 2 In this paper we will discover the three tools Satan uses to keep people trapped which are delusion, secrecy, and isolation. Secondly we will learn about three resources God provides to confront the enemies attack. These include the Word of God, the Spirit of God, and the People of God. Delusion or deception means to make another person......

Words: 983 - Pages: 4

Premium Essay

Cyber Warfare

...Cyber warfare One of the first cyber-attacks was the Morris worm in the year 1988. It had affected the world cyber infrastructure. This worm utilized the weak areas of UNIX system Noun1. This worm has replicated adversely and slowed down the computers in all of the US and made them unusable. Cyber warfare has become a societal issue now. Though the roots of cyber warfare aimed at military areas primarily, it extended its effects to non-military areas too. The information infrastructure based companies have become victimized due to abundant availability of cheap cyber weapons over internet. This resulted in economic instability. Libicki classified information warfare into seven categories. They are intelligence based warfare, economic information warfare, hacker warfare, psychological warfare, electronic warfare, command and control warfare and cyber warfare. CSI and CERT information reflects that securities incidents are common, private firms are the major targets and much of these security incidents never receive public acknowledgement (Geeks et al., 2010). Several tools in the cyber warfare are developed based on Windows and are available free of cost. They require a minimal understanding about the technology frames. Many of the network organizations today are using well developed proxy servers, intrusion detection systems and firewalls. However these defensive systems are often configured improperly and carried known vulnerabilities. This weakness gave an opportunity......

Words: 1988 - Pages: 8

Premium Essay

Necessity

...NECESSITY LAW THE GENERAL RULE Necessity arises where a defendant is forced by circumstances to transgress the criminal law. The generally accepted position is that necessity cannot be a defence to a criminal charge. The leading case is: * R v Dudley and Stephens (1884) 14 QBD 273. The defendants and a cabin boy were cast adrift in a boat following a shipwreck. The defendants agreed that as the cabin boy was already weak, and looked likely to die soon, they would kill him and eat him for as long as they could, in the hope that they would be rescued before they themselves died of starvation. A few days after the killing they were rescued and then charged with murder. The judges of the Queen's Bench Division held that the defendants were guilty of murder in killing the cabin boy and stated that their obvious necessity was no defence. The defendants were sentenced to death, but this was commuted to six months' imprisonment. * Lord Coleridge CJ, having referred to Sir Matthew Hale's assertion (The History of the Pleas of the Crown, 1736) that a man was not to be acquitted of theft of food on account of his extreme hunger, doubted that the defence of necessity could ever be extended to a defendant who killed another to save his own life. After referring to the Christian aspect of actually giving up one's own life to save others, rather than taking another's life to save one's own, he referred to the impossibility of choosing between the value of one person's life and......

Words: 1991 - Pages: 8

Free Essay

Submarine Warfare

...WWII Submarine Warfare Germany’s surrender and agreement not to retain any submarines due to the Armstice terms in 1918 and the Treaty of Versailles was short-lived. Britain was not ready for Hitler’s initiation 20 years later. After building up his submarine stock since 1935, his initiative to intercept merchant ships in the Atlantic commenced in 1939. The directive was to sink more supply line ships than the Allies could replace to force a surrender through starvation and lack of supplies. This initiative created what was known as the Battle of the Atlantic. Known as the longest continuous campaign of World War II, the Battle of the Atlantic mostly involved the Allies protecting the shipping routes across the Atlantic which were constantly being intercepted by German U-boats. The Nazi’s submarines, referred to by most as U-boats, were more like submersible ships than submarines at the time. They ran on diesel engines for their surface time and battery for their submersed. They dove beneath the water only when they were attacked or for torpedo strikes during the day. More often attacks were made on the surface at night. This was extremely effective in the early years of the war as they were virtually untraceable due to the lack of sonar technologies at the time. This time was known to Germans as “die gluckliche Zeit” or “the happy time”. Many classes of U-boats were made, but the most prominent of them were Type VII, the workhorse (700 active), Type IX, larger with......

Words: 672 - Pages: 3

Free Essay

History of Warfare

...Edward LeBar November 25th, 2009 HIST 017 Prof: Dan Hambly History of Warfare: Essay Assignment The two key individual advancements of weaponry in warfare that I believe were most relevant to the change in warfare tactics were the Spears used by the Ancient Greek and Macedonian Phalanx (300 B.C.E) and the Long Bow used by the British (1300-1500 AD). Each of these weapons made a huge impact in warfare upon being developed and changed the course of history of their armies who wielded these weapons of excellence. Each weapon was wielded by soldiers slaying millions of people during many glorious historical battles still taught to students around the globe today about their importance to warfare. “One of the earliest, and certainly the deadliest of these first purpose-made weapons, was the spear” (Weir, 2005). The spear was developed in early known warfare, and had an impact when the Ancient Greeks wielded the spear in their battles. The Spear was a simple weapon to make as it consisted of a wooden poll 6 to 8 feet in length with a sharp piercing arrowhead attached to the end capable of puncturing any enemy armor. The Ancient Greek’s developed the spear to be able to attack an enemy from a longer range than the sword and used the spear with tactics and coordination with a Hoplon shield protecting the Hoplite soldier which was later called a Phalanx. The spear proved to be very useful to the Greek Phalanx providing the Greek’s with many victories with this particular......

Words: 1344 - Pages: 6

Boku no Hero Academia 48 | Episodio 09: Il Demone e la Luna | Rainha do Deserto