Thursday, December 26, 2019

Kant s Categorical Imperative Of The United States

Companies in the U.S are taking full advantage of people in foreign countries as a means to creating profit. Illegal and hazardous products are being shipped overseas, as it is impossible to will the maxim governing their actions as a universal law. U.S companies are not regarding the well being of the consumers, in which case the U.S fails to respect these third world countries as ends and humans of intrinsic worth. Therefore, the company’s actions are morally wrong. Kant’s theory states,â€Å"one must always treat other people as ends, never merely as means† (Shaw). This essential requires that someone should not be taken advantage of only to benefit themselves. The only exception where this would be accepted is, when the person is willing to be treated that way. Also, no matter what the penalties are, some actions will always be viewed as immoral. Kant emphasizes that it is not enough to simply do the right thing, but instead must be done for the sake of ones duty. Kant’s categorical imperative implies that an action is only considered morally right, where every maxim you act on should be intended to be the rule that everyone follows or acts on. In which case if dumping seen as an action that people followed in every country then it would be morally acceptable to do it. It would be considered a moral duty for dumping to be allowed in the world. However, this is not the case â€Å"dumping† is only what the U.S does only in their best interest. In the case â€Å" Made in the U.SA. -Show MoreRelatedBusiness Ethics and Deontology1413 Words   |  6 Pagesseven U.S. uniformed services. The modern army has its roots in the Continental Army which was formed on 14 June 1775, [2] to meet the demands of the American Revolutionary War before the establishment of the United States. The Congress of the Confederation officially created the United States Army on 3 June 1784[3] [4] after the end of the Revolutionary War to replace the d isbanded Continental Army. The army considers itself to be descended from the Continental Army and thus dates its inception fromRead MoreEssay Kant vs. Mill: Human Rights and Utilitarianism1729 Words   |  7 Pagesare aimed at providing protection to every person in an equal way. These rights have been entrenched through laws that are passed by states and international conventions. Human rights laws have evolved over time, and have been shaped by several factors, including philosophical theories in the past. This paper looks at the theories of two philosophers, Emmanuel Kant and John Stuart Mills, and how their teachings can be used to explain the sources of human rights. Kant’s moral philosophy is very directRead MoreAdelphia Communications Scandal1563 Words   |  7 PagesMatthew Tassin Trident University Ethics 501 Introduction Adelphia Communications Company was a television cable company whose headquarters centered in Coudersport, Pennsylvania. It ranked as the fifth most prestigious cable companies in United States. John Rigas is the founder of the company. The company was highly respected until an infamous scandal ensued following claims of bankrupt in 2002, at which time its headquarters relocated to greenwood Village, Colorado. According to Jefferson (2007)Read MoreKotchians Moral Dilemma1652 Words   |  7 Pagesexplored the negotiation of a contract with All Nippon Airlines, Japan’s leading airlines for. Little did Kotchian know, negotiation was much performed much differently in Japan than in the United States, therefore, Marubeni was hired as a representative of Lockheed to manage relations with the Prime Minister ‘s office and All Nippon Airlines (ANA). In order to ensure the future financial success of Lockheed, the company needed to commit to a series of payments to various individuals in order toRead MoreInformation Systems and Unemployment1335 Words   |  6 Pageslonger important. Ones should only focus on what ones’ ought to do (Michael J.Quinn, 2003). Therefore, the discussion below will look into several Categorical Imperative formulation that were proposed by Kant to have an in depth view to determine whether companies should or should not be responsible for from Kantianism perspective. Categorical Imperative first formulation poses the basic conception of fairness and universalizability where there will be a consistent law that were tailored for everyoneRead MoreKants Non-Consequentialist Approach to Ethics,2038 Words   |  9 PagesReflective Essay Kant s non-consequenlialist approach to ethics The name of Comm101 is Principle of Responsible Commerce. Before I enrolled the Comm101, I have no idea about principle of responsible commerce. At the lecture on week two, teacher had the presentation about this subject what the responsible commerce is. Generally speaking, the corporation has the responsible for animal, thing or person and so on. In my own understanding, to a person, if one person wants to have success on the commerceRead MoreThird Breaking Down His Most Important Philosophies1097 Words   |  5 Pagesunderstand Kant’s position, we must first understand the philosophical environment that influenced his thinking. There are two major historical movements in the early modern period of philosophy that had a very large impact on Kant: Empiricism and Rationalism (Kemerling). Kant argues that both the method and the content of philosophers’ arguments contain important flaws. A central epistemological problem for philosophers in both movements was determining how we can escape from within the confines ofRead MoreThe Punishment Of A Prison1357 Words   |  6 Pageslives straight (Dieter). Datesman explains this by saying â€Å"We have taken a life and so we feel it s our responsibility to save a life now.† This man proves that citizens that are convicted for life can make a significant contribution to the public if given the chance. The death penalty eliminates any chance of such people being able to give back to families of victims or society in general. Immanuel Kant, a pious Lutheran, thought the essence of morality was the Golden Rule: do on to others the wayRead MorePlanned Parenthood : A Funded Program1712 Words   |  7 PagesPlanned Parenthood Federation of America has been a governmentally funded program in the United States of America since 1970 despite countless efforts nationwide to defund the organization. Founded by Martha Sanger and Ethel Byrne, Planned Parenthood (PPFA) is a nonprofit organization which provides reproductive health services in Africa as well as North, Central and South America. Over 650 clinics across the nation provide a collective four million medical visits annually.10 PPFA, one of the largestRead MoreCyber Warfare Is The New Warfare Domain1528 Words   |  7 Pages During times of war, the United States should preemptively attack the opposing country using their cyber warfare capabilities. II. Explanation of thesis and short summary. Cyber warfare is the new warfare domain. Understanding how to morally utilize the newfound capabilities will assist the United States to maintain military dominance as well as mitigate possible immoral tragedies. Cyber warfare and war envelops a vast array of topics available for discussion. Therefore, the topics of interest

Wednesday, December 18, 2019

An Argument Against Abortion Essay - 1400 Words

An Argument Against Abortion Abortion is a serious topic that people have been debating about for years. Everywhere you turn the topic of abortion presents itself, on TV, in the newspapers, in books and magazines. It already has, and will continue to cause, controversy for years to come. As long as abortion remains legal, pro-life advocates will continue to protest what they believe to be these horrible acts of murder. Dating all the way back to the 1800’s, abortions have been taking place all over the world. In the US abortion laws were created around 1820 stating that women would not have abortions after already being pregnant for four months. Then by 1900 most abortions were outlawed. It wasn’t until 1956 that all fifty states had†¦show more content†¦It has a genetic make up from the time of creation, therefore making it a living thing. It was argued that the fetus was just a mass of tissue that wasn’t really alive, but it has been proven that it is indeed a human being. The concept fetus is used to denote the unborn human from the end of the eighth week after conception to the moment of birth, as distinguished from the earlier embryo (the product of conception from implantation in the uterus through the eighth week of development). A fetus contains all the organs and has the basic human form. (Rand) So when we take the life of a fetus, we are taking the life of another human being. Looking at abortion from a religious viewpoint, abortion is a mortal sin. Taking the life of a human being is the greatest sin a human can commit. If it is not acceptable to take the life of a 5 year old, an 18 year old, or a 50 year old, then why is it acceptable to take the life of a human who hasn’t even had the chance to live yet? The point is it shouldn’t be. Taking a life, no matter what the age is, is morally wrong. An unexpected pregnancy is no reason to abort the baby. If someone is mature enough to make the decision to have sex, they should be mature enough to do it properly, and if they do not, they should live with the consequences of their actions. The only way to totally prevent a pregnancy is to practice total abstinence, which is the only birth control that is 100%. PracticingShow MoreRelatedArguments For And Against Abortion1590 Words   |  7 PagesArguments for and Against Abortion The battle over whether to legalize or ban abortion in the United States has greatly increased in recent years; the moral, ethical and legal had been a continuous fight in our society. The abortion issue is also the most passionate and debatable in the United States to whether allow one to have free will over their body or have the government make that decision. Furthermore, it is one of the leading debates in political races. In this society everyone has aRead MoreAbortion Argument Against Abortion749 Words   |  3 PagesDoes a women’s right to choose to have an abortion outweigh a baby’s right to be born? The controversy at hand is whether the rights of a women outweigh the rights of a baby, and whether a mother should be given the rights to pursue a procedure like an abortion. To clarify an abortion is a medical procedure that ends a pregnancy in which a doctor uses a vacuum and suction to suck out a fetus from the uterus. The issue is whether the fetus who has th e potential to be a rational, productive human beingRead MoreArguments Against Abortion Essay1286 Words   |  6 PagesThe debate on whether abortion should be legal, or illegal has become a controversial topic that has divided the nation into two. The group of people who don’t see anything wrong with the issue refer to their group as pro-choice supporters. Their main belief about abortion is that because a woman’s body belongs to herself it should be up to her on whether she wants to keep a baby or not. Those who are against abortion and feel it should be illegal think of themselves as pro-life supporters. TheyRead MoreBiblical Argument Against Abortions1513 Words   |  7 PagesEthics February 2, 2013 Rational Argument Against Abortions Biblical Argument Against Abortions In this paper, I will discuss arguments against abortions. The first sets of arguments I will discuss are biblical arguments. That being said, I must begin by acknowledging that the Bible doesn’t say anything about abortion directly. Abortion was so unthinkable to an Israelite woman that there was no need to even mention it in the criminal code. Why was abortion an unthinkable act? First, childrenRead MoreArgument Against Abortion On Demand934 Words   |  4 PagesIn this essay I shall argue against abortion on demand. By abortion on demand I mean the taking of life, of the fetal life, and how a woman could enter her doctor s office or local women s health clinic and ask, or â€Å"demand†, to have an abortion, she would then be able to get the next available appointment to do just that. There are several different reasons why one may be pro-life. A few arguments against abortion may include how abortion should not be used as another form of contraception, andRead MoreE ssay Arguments for and Against Abortion2034 Words   |  9 PagesArguments for and Against Abortion An abortion is also known as a termination, meaning to terminate, to stop. An abortion is when you stop a pregnancy, by removing the foetus from the womb. Many people frown upon abortions, as they see them as the killing of a life. Other people believe that it is a ‘potential’ life, and that a foetus is not considered to be a child. Some people feel that in a situation where the prospective parents are told their unbornRead More An Argument Against Abortion Essay1042 Words   |  5 Pages Abortion in America is a controversial issue in which both sides have valid arguments at face value. The pro-choice side has many arguments to support it belief in keeping abortion legal. Many of these are faulty, and argue points irrelevant to the issue as I will attempt to illustrate, thereby eliminating the main pro-choice arguments. The pro-life position has somewhat different ideas. The most popular of these is: The unborn entity is fully human from the moment of Read More An Argument Against Abortion Essay493 Words   |  2 Pages ABORTION nbsp;nbsp;nbsp;nbsp;nbsp;I am against abortion for a couple of reasons. I believe adopting instead of aborting is a better decision. Abortion is murder. Condoms are available and inexpensive. There are also other forms of birth control. Some people say it’s their choice so I think people should choose wisely, by not killing a baby. There are also many programs in the U.S. that will aid people financially, for people who claim to be financially unfit to raise a child. nbsp;nbsp;nbsp;nbsp;nbsp;IRead MorePro Choice Arguments Against Abortion2264 Words   |  10 PagesIn cases of abortion, though, where a potential life is considered â€Å"bad†, is it justified to remove it? Life is viewed as the highest intrinsic good, thus any act of deliberately taking it away becomes a serious moral issue. Pro-life arguments, or arguments opposing abortion, claim that each human has a right to life, a person is a human at the moment of conception, and each human possesses the obligation to protect human lives. Pro-choice arguments, or arguments supporting abortion, argue that aRead MoreMy Second Argument Against Abortion2246 Words   |  9 PagesMy second argument against abortion is due to the physical health issues having an abortion can cause for women. There are minor complications such as: minor infections, bleeding, fevers, abdominal pain, gastro disturbances, and vomiting that can occur as a result of having an abortion. Approximately 10% of wome n undergoing induced abortion suffer from immediate complications, of which one-fifth (2%) were considered major. Major complications that occur include: major infections, excessive bleeding

Tuesday, December 10, 2019

Terms of Engagement for Cyber Warfare - myassignmenthelp.com

Question: Discuss about theTerms of Engagement for Cyber Warfare. Answer: Introduction The world needs cyber war terms of engagement to manage to the probably devastating cyber weapons. Regardless of the growing complexities of the cyberspace along with the considerable strategic challenge cyber warfare could pose vital interest to numerous nations particular rules for the cyber warfare exist [1]. Countries need to seek to develop as well as maintain cyber warfare rules to be able to develop the globally recognized norms, as well as mitigate the problems on the essential governmental, commercial as well as private resources and assist hang on the belligerent actors more accountable [12]. An example of cyber-attacks which occurred against Georgia in the summer of the year 2008 provided a contemporary example to the complexities which are associated to the cyber-attack attribution, application of the law for the armed conflicts principles to the war as along with the international ineptitude of communities when it comes to responding. The terms of engagement of warfare are very clear and they have been spelled out in the Geneva Convention. Various types of weapon have been banned and certain protection have existed for the civilian as well as the medical entities [13]. However, when it comes to cyber warfare there has been no clear policies on how to address on this issues. In this research it will examine the aspect of terms of engagement for the cyber warfare. The focus will be how the world leader have highlighted on the cyberwar rules of engagement since it has posed a challenge to many nations. The terms of engagement for the deployment of the cyber-weapons needs to be developed by the nations so as to prevent any event which could arise [15]. The wars have traditionally been waged between the nations or clearly defined groups which declare themselves in the conflict. This has yet to happen openly on the internet, despite such accusations have been leveled against countries such as China, Russia as well as other nations [11]. The aspect of the cyber warfare has been more likely to reflect on the wars which are fought shadowy basically by the terrorist network such as the Al-Qaeda as comparison to the conflict which exists between the uniformed national military forces. One aspect of the war is that the lines need to be drawn and there should be an understanding who is the enemy [12]. When it comes to the cyber-attack it is not possible to know who to declare war to. Discussion on rule of cyber conflicts The discussion on the issue of the cyber conflict occurred after the infamous Stuxnet worm which blamed for the infecting business control system as well as sabotaging centrifuges at the contentious Iranian nuclear facilities [14]. Such was the world fist cyber weapon which happened via the cyber-espionage in most of the guises which unquestionably happened to be practiced by the intelligence agencies throughout the worldwide for many years. The computer systems usually underpin the delivery of the essential services which can incorporate the utilities along with telecoms along with the banking and the government services [16]. The vital national infrastructure systems are the most privately held in most of the nations. The attack against these critical systems could be commonplace since they tend to be low to the level of the information stealing or even the denial of the services exploits [13]. There are many independent who are expert particularly in the cyber security they are di smissing talk about the cyberwar hype [18]. The rules of the cyberwarfare they seek in the establishment of the protected domains for example in the schools and the hospital which are off the limit of the attack. Conflict between the nations Currently, USA and Russia are engaged in the creeping cyberwarfare against one another [14]. They have gone to an extend of disabling or even undermining each other critical infrastructure. The potential has deadly between these two countries and it has affected them adversely since they are not subjected to any rudimentary rule or even mutual agreement which has existed to govern them. There would be a need to fix, through the multilateral process which are under the auspices of the United Nations [15]. Nonetheless, according to the British government sources they highlighted to the BBC that they are not much convinced that there is need for a treaty which could govern on the cyberspace conflict. Moreover, based on their view they think that there is a need for a discussion on the proportional response especially on the attribution of the source of the attack [3]. It is important to note that to identify the source of the cyber-assault that could easily be launched from the networks which is compromised by the third-party. There is need for the countries to agree on the basic notions for example what could constitute an attack or even illegal intervention, as opposed to just the mere nuisance, and what has retaliatory moves are more legitimate or even excessive [18]. The cyber security incidents such as the one alleged that the Russian hacked the Democratic National Committee on their emails clearly shows that in the USA as well as other major power they have not established any terms of engagement such as those which governed their behavior in the cold war [17]. The problem might be even more serious since the defense thinkers have only now begun to grapple on this aspect when it comes to how the international conflict in the cyber arena could play out. An example when it comes to the nuclear weapons there is a bold line which is established between the use of the nuclear weapons and not using them, but when it comes to the cyber-crime there is no such guidelines [11]. However, like the nuclear exchan ge, the computer warfare could be whole lot easier to begin to manage. The basic question in relation to the second day of this war have just begun to be asked; the technology has run much ahead of this doctrine to the extent of the unmatched when it comes to the annals of the warfare. View in regards to terms of engagement for the cyber warfare The countries are beginning to develop their own cyberwarfare policies to be able to protect their national interests, but defending themselves especially from the borderless internet may prove very problematic [10]. There has been speculation among the politician as well as the pundits that the aspect of war would soon extend to the internet, based on the recent report that the USA department of Defense would introduce on the cyberwarfare doctrine [5]. The war has traditionally been waged between the nation and this is yet to happen openly on the internet, although this accusation has not been leveled against countries such as China as well as Russia. As nations enters into the new era where there has been advancement in attackers which has increased effort in order to steal the nations intellectual property, USA has been putting final touches when it comes to the terms of engagement so as to respond to the cyber-attacks. Moreover, the USA has been running stories on the new framework for having an effective cyber response [9]. The rules which govern on the state action particularly in the cyberspace are much similar to those which govern on the state behavior in other areas. When waging on the cyberwar, there is need of ensuring that the attack as well as tactics are militarily important and distinguishable between the combatants as well as the noncombatants and which is the force that is used is much proportional to which gain has been achieved [7]. On the draft document which is aimed to facilitate security aspect on the issue of cybercrime calls for the fresh definition of the nation state with the new territories as well as t he cyberspace which is beyond the government [8]. In the proposal it clearly highlights that the ambiguity in regards to what constitutes to the cyber conflict is the delay for the international policy to deal with the idea of peace or even war which is simple in regards to the internet age when the world might find itself in a third other than the war mode. Other countries are also following suit to be able to curb on the issue of the cyber-crime such as UK they are developing the cyber weapons programs which will have attacking capability in order to help counter growing of the threats to the national security on the cyberspace [7]. Moreover, Australia has also highlighted that they are also developing cybersecurity strategy to be in a position of confronting on the growing threat which has been posed by the electronic espionage, theft as well as state sponsored cyber-attacks. Laws on cyber warfare According to the principle of jus ad bellum it means the right to war. This aims to limit the rightful reason as to why state could fight by defining what kind of the action would constitute to the act of the war and in a derivative sense, prescribed to what state actions are as well as not acceptable especially during peacetime [6]. Based on this principle therefore, there is no experience of the cyberwar since there is no state which has every declared one, even though there has been cyber-conflict which has been common among the countries [4]. An example, in Ukrainian power grid attack was part of the ongoing conflict, thus, it was an act of the war. Nevertheless, its worth noting that despite widespread consensus in regards to who was ultimately behind the attack there was no nation that reacted on the act of aggression nor did they sought some recompense through the international legal avenues. Over the years there has been major difficulties when it comes to prescribing to the right to a just war when it comes to cyber [5]. This is because of the aspect of the attribution of the attack which is either still not very good or even it entails release of the classified, sensitive information, and confirming the identity of the aggressor is very difficult. It is through the government and the private organization will they profess on the improvement of the capabilities of attribution, hence providing the aggressor beyond any reasonable doubt to enable them face the hurdles. There has been international policy making time as well as effort which has been deployed towards the development of the norms for the state behavior which is much way below the threshold for the war and of the confidence building measures particularly for the cyberspace [2]. An example, is the Tallinn manual 1.0 which has begun development for the second version which focuses on the international legal framework which applies to the cyber-operations which should be below the threshold for the war. Conclusion The world today it needs the terms of engagement when it comes to the cyber warfare to be in a position of coping with the devastating cyber weapons which have arisen over the years due to the development of internet. When it comes to the cyber weapons they have attributes which have not been seen previously with the traditional weapons nor are they considered when it comes to the development of the current laws of war. The cyber weapon can deliver in the blink of an eye the widest behavior which could be reproduced and at the same time transferred when lacking the target discrimination. There is need for the international treaties which would govern the countries when it comes to the cyber warfare which has significantly affected many nations. The countries need to engage and agree on the basic notions for example on what constitutes to the attack or even the illegal intervention as compared to the mere nuisance and what retaliatory moves are legitimate or even excessive when addres sing on the issue of the cyber warfare. There should be terms of engagement which are developed between the countries to enable them guide one another. In USA NATO have presented the second edition of the Tallinn Manual which clearly examines on the current international laws which can be applied to the issue of the cyber warfare. This manual was compiled based on the Cyberattacks which have occurred globally. The terms of engagement policies needs to be developed to respond on the attack of cyber war that could occur. In this research, it has examined on the aspect of terms of engagement for the cyber warfare which has been a predominant issues that is not addressed fully. The research has provided a clear guidelines on how different nations are approaching on the issue and the possible laws which are being applied to address it with emphasis with some recommendations. References [1] Andress J, Winterfeld S. Cyber warfare: techniques, tactics and tools for security practitioners. Elsevier; 2013 Oct 1. [2] Beidleman SW. Defining and deterring cyber war. ARMY WAR COLL CARLISLE BARRACKS PA; 2009 Jan 6. [3] Carr J. Inside cyber warfare: Mapping the cyber underworld. " O'Reilly Media, Inc."; 2011 Dec 12. [4] Caso JS. The rules of engagement for cyber-warfare and the Tallinn Manual: A case study. InCyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2014 IEEE 4th Annual International Conference on 2014 Jun 4 (pp. 252-257). IEEE. [5] Crawford BC. Information warfare: Its application in military and civilian contexts. The Information Society. 1999 Nov 1;15(4):257-63. [6] Farwell JP, Rohozinski R. The new reality of cyber war. Survival. 2012 Sep 1;54(4):107-20. [7] Greengard S. The new face of war. Communications of the ACM. 2010 Dec 1;53(12):20-2. [8] Hoisington M. Cyberwarfare and the use of force giving rise to the right of self-defense. BC Int'l Comp. L. Rev.. 2009;32:439. [9] Kelsey JT. Hacking into international humanitarian law: The principles of distinction and neutrality in the age of cyber warfare. Michigan Law Review. 2008 May 1:1427-51. [10] Lewis JA. The" Korean" Cyber Attacks and Their Implications for Cyber Conflict. [11] Lindley-French J. Terms of engagement. The paradox of American power and the. 2002 May. [12] Lynn WJ. Defending a new domain: the Pentagon's cyberstrategy. Foreign Affairs. 2010 Sep 1;89(5):97-108. [13] Reich PC, Weinstein S, Wild C, Cabanlong AS. Cyber warfare: a review of theories, law, policies, actual incidentsand the dilemma of anonymity. European Journal of Law and Technology. 2010 Oct 7;1(2). [14] Robinson M, Jones K, Janicke H. Cyber warfare: Issues and challenges. Computers security. 2015 Mar 31;49:70-94. [15] Schaap AJ. Cyber warfare operations: Development and use under international law. AFL Rev.. 2009;64:121. [16] Schmitt MN, editor. Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press; 2013 Mar 7. [17] Swanson L. The era of cyber warfare: Applying international humanitarian law to the 2008 Russian-Georgian cyber conflict. Loy. LA Int'l Comp. L. Rev.. 2010;32:303. [18] Tirenin W, Faatz D. A concept for strategic cyber defense. InMilitary Communications Conference Proceedings, 1999. MILCOM 1999. IEEE 1999 (Vol. 1, pp. 458-463). IEEE.

Tuesday, December 3, 2019

J. Edgar Hoover Essays - English-language Films,

J. Edgar Hoover For nearly half a century J. Edgar Hoover was one of the most powerful officials in the Federal government of the United States. As head of the Federal Bureau of Investigation from 1924 until his death in 1972, he was the nation's chief law enforcement officer. His intimate knowledge of politicians and government operations made him a man to be feared by elected officials, and none of the eight presidents under whom he served dared fire him. J.Edgar Hoover was born on January 1, 1895, in Washington D.C. He attended George Washington University and earned a degree in 1917. In 1919 he became assistant to Attorney General A. Mitchell Palmer in the Department of Justice. It was Palmer who instigated the post World War I ?red scare,? an anti-Communist hysteria that led to the deportation of many aliens. Hoover was put in charge of the deportations. When Hoover became director of the Bureau in 1924, he quickly formed an elite force of powerful law enforcement officers. He enhanced the FBI's fame by capturing many gangsters, bank robbers, and other lawbreakers. After World War II he waged a relentless fight against internal subversion. The 1970's often criticized Hoover for his authoritarian methods. He died in Washington, D.C., on May 2, 1972. In the rest of the paper I will explain more in depth of how J. Edgar Hoover rose to power and why he is considered one of the most corrupt men to ever hold a government position. It is not very difficult to figure out the most outstanding characteristic of J. Edgar Hoover. Out of all of his characteristics, the one that truly stands out is that he was extremely powerful. J. Edgar Hoover is the most famous law enforcement officer that the United States has ever known. J. Edgar Hoover began his adult life at the bottom of the ladder with a very limited amount of power. As he grew older and became more experienced his prestige and power skyrocketed. At the height of his prestige and power he was the most famous director of the Federal Bureau of Investigation in the history of the United States. One factor that helped J. Edgar Hoover gain more power, was that he had many connections with many important people (Summers 29). Another factor that aided J. Edgar Hoover in his rise to power was the knowledge he had about people (Kessler 449-450). This meant that he could control people, or in other words, blackmail them (Summers 38-39). The third reason why J. Edgar Hoover became such a powerful individual is that he was very intelligent and shrewd (Summers 25). These three factors all contributed to forming one of the most powerful men the world has ever known. J. Edgar Hoover knew many important people that held many important positions. Hoover received his first government job thanks to a close family friend by the name of Bill Hitz (Summers 29). Hitz was a judge and considered the President and Supreme Court Justice Brandeis among his close friends (Summers 29). Another individual who helped Edgar along the way was his boss at the Department of Justice, George Michaelson (Summers 29). Bruce Bielaski, a senior official, recalled how - on the trolley to work one day in 1917 - he found himself talking shop with his neighbor, mail room chief George Michaelson (Summers 29). Michaelson dropped the name of a young lawyer he had sorting mail, ?one of the brightest boys around? (Summers 29). ?You don't need anybody with brains doing that,? said Bielaski (Summers 29). ?If you want him,? Michaelson replied, ?you can have him? (Summers 28-29). That conversation on the trolley was a fatal one for America (Summers 29). Bruce Bielaski was Director of the Bureau of Investigation, direct forerunner of what we know now as the Federal Bureau of Investigation (Summers 29). Bielaski would now join the growing list of people that would help Hoover on his quest to power. Bielaski did not forget the young man that his neighbor had recommended - though he did not bring Edgar into the Bureau (Summers 29). Instead he told John Lord O'Brian, head of the War Emergency Division, about Edgar (Summers 29). Many