Wednesday, April 22, 2020

Napoleon and the Modern state free essay sample

Napoleon Bonaparte established reforms that began and marked the transition from an absolute government to what is today The Modern State. Napoleon’s political structure, legal codes, security apparatus, and the mobilization of national resources is what lead the French state to the modern state. Napoleon may have been defeated at the battle of waterloo bur he left a legacy and state of government that is still used today in the modern state. Napoleon Bonaparte set a political structure for himself as the new leader of France. Napoleon Bonaparte established himself as first council and he had no plans of sharing his power with others. His not sharing of power came easy to him because he was not associated in the public minds with anyone in the government, or the factions, so he was able to relate to all the French men. Napoleon created the written document The Constitution of the Year VIII, which secured his powers as first council . We will write a custom essay sample on Napoleon and the Modern state or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This provided him with two subordinated councils and three house legislatures and gave him enough power to become the most powerful man of France and even Europe itself . Napoleon knew he had the support of his Frenchmen when in February 1800 the plebiscite, those who voted as the electoral votes, had three million votes for yes and only 1,500 votes as no . Because of the plebiscites Napoleon was given the title first council for life in 1802 and became emperor, which he crowned himself as in 1804. As fist council and emperor, Napoleon Bonaparte established the legal codes that governed France all the way through the 19th century. Napoleon established a centralized administration by rehabilitating the Ancient Regime. One of Napoleons most known legacies among in the modern state are the Napoleonic Codes. Thanks to Jean-Jacques de Cambaceres Napoleon oversaw the new laws for the French Nation known as the Napoleonic Codes, which remains the basis of the French law today . This code did things such as forbidding privileges based on birth, gave freedom of religion. This code was the first modern legal code adopted in Europe . Napoleon issued other than the Napoleonic codes to maintain power a security apparatus. Napoleon enforced a security apparatus to keep his Bonapartist regime as dictator by enforcing police and military power. Napoleon established a prefect for each of the 83 departments. The job of the prefect was to enforce the government laws and monitor its people. They were also responsible for local order . They were also given the power to override the local officials. One of the most important documents that is the basis of human rights were made by Napoleon on 1789. With the French revolution cam a lot of deaths but also the Declaration of the rights of men and citizens. Another set of authority Napoleon had control over was the secret police. Joseph Fouche who was kept by the directory after the reigns of terror was in charge of this secret police. The secret police was to be very strict. They censored the press authors, and playwrights. If the secret police believed that someone was breaking the law the police and the prefects supervised the individual in their home. Napoleon was also able to keep his powers because of the support he was able to retain. In 1799 when Napoleon came into power the revolution had put France with civil unrest, because of the dechristianization policies was put at distress. Napoleon used his powers to reconcile with the Catholic Church. Napoleon was not a very religious man but he understood that if he made peace with the church he would gain more support of the French men. On July 15, 1801 Napoleon signed the Concordat with Pope Pius VII. Most of France approved of this step making Catholicism Frances main religion. Bonaparte also gained power to appoint French bishops at this time . Mobilization of resources came about once Napoleon had power. One of the first things he did was give power to his family members. This in the modern world did not look good and is one of the problems that he caused for himself that eventually led to his fall. He annexed many countries including Holland parts of Germany and Italy. One way that he mobilized resources was with the continental system of 1806. This forbade any trade with France and Frances territories with Britain. Napoleon thought that this continental system will work in the favor of France but it did the opposite ruining its economy and Napoleons Satellites . Napoleon did many things like to leave France and Europe itself with the Modern Government there is today. Though not everything he tried Worked for his benefit a lot like the Napoleonic codes and the French declaration of the right of men and citizen is still the basis of what we have today in our country. The French revolution led the people to fight for what they believed was right and used Napoleon Bonaparte as their leader. While he made not have ended with the best legacy he set standard to today’s government that is still used today. Napoleon and the Modern state free essay sample Napoleon Bonaparte established reforms that began and marked the transition from an absolute government to what is today The Modern State. Napoleon’s political structure, legal codes, security apparatus, and the mobilization of national resources is what lead the French state to the modern state. Napoleon may have been defeated at the battle of waterloo bur he left a legacy and state of government that is still used today in the modern state. Napoleon Bonaparte set a political structure for himself as the new leader of France. Napoleon Bonaparte established himself as first council and he had no plans of sharing his power with others. His not sharing of power came easy to him because he was not associated in the public minds with anyone in the government, or the factions, so he was able to relate to all the French men . Napoleon created the written document The Constitution of the Year VIII, which secured his powers as first council . We will write a custom essay sample on Napoleon and the Modern state or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This provided him with two subordinated councils and three house legislatures and gave him enough power to become the most powerful man of France and even Europe itself . Napoleon knew he had the support of his Frenchmen when in February 1800 the plebiscite, those who voted as the electoral votes, had three million votes for yes and only 1,500 votes as no . Because of the plebiscites Napoleon was given the title first council for life in 1802 and became emperor, which he crowned himself as in 1804. As fist council and emperor, Napoleon Bonaparte established the legal codes that governed France all the way through the 19th century. Napoleon established a centralized administration by rehabilitating the Ancient Regime. One of Napoleons most known legacies among in the modern state are the Napoleonic Codes. Thanks to Jean-Jacques de Cambaceres Napoleon oversaw the new laws for the French Nation known as the Napoleonic Codes, which remains the basis of the French law today . This code did things such as forbidding privileges based on birth, gave freedom of religion. This code was the first modern legal code adopted in Europe . Napoleon issued other than the Napoleonic codes to maintain power a security apparatus. Napoleon enforced a security apparatus to keep his Bonapartist regime as dictator by enforcing police and military power. Napoleon established a prefect for each of the 83 departments. The job of the prefect was to enforce the government laws and monitor its people. They were also responsible for local order . They were also given the power to override the local officials. One of the most important documents that is the basis of human rights were made by Napoleon on 1789. With the French revolution cam a lot of deaths but also the Declaration of the rights of men and citizens. Another set of authority Napoleon had control over was the secret police. Joseph Fouche who was kept by the directory after the reigns of terror was in charge of this secret police. The secret police was to be very strict. They censored the press authors, and playwrights. If the secret police believed that someone was breaking the law the police and the prefects supervised the individual in their home. Napoleon was also able to keep his powers because of the support he was able to retain. In 1799 when Napoleon came into power the revolution had put France with civil unrest, because of the dechristianization policies was put at distress. Napoleon used his powers to reconcile with the Catholic Church. Napoleon was not a very religious man but he understood that if he made peace with the church he would gain more support of the French men. On July 15, 1801 Napoleon signed the Concordat with Pope Pius VII. Most of France approved of this step making Catholicism Frances main religion. Bonaparte also gained power to appoint French bishops at this time . Mobilization of resources came about once Napoleon had power. One of the first things he did was give power to his family members. This in the modern world did not look good and is one of the problems that he caused for himself that eventually led to his fall. He annexed many countries including Holland parts of Germany and Italy. One way that he mobilized resources was with the continental system of 1806. This forbade any trade with France and Frances territories with Britain. Napoleon thought that this continental system will work in the favor of France but it did the opposite ruining its economy and Napoleons Satellites . Napoleon did many things like to leave France and Europe itself with the Modern Government there is today. Though not everything he tried Worked for his benefit a lot like the Napoleonic codes and the French declaration of the right of men and citizen is still the basis of what we have today in our country. The French revolution led the people to fight for what they believed was right and used Napoleon Bonaparte as their leader. While he made not have ended with the best legacy he set standard to today’s government that is still used today.

Monday, March 16, 2020

Charles Inglis essays

Charles Inglis essays Charles Inglis was born in Donegal, Ireland in 1734. As an Anglican clergyman and a Loyalist, he came to America. He became a teacher and then was ordained to London, England in 1758. He returned though to America in 1759 to be a missionary in Dover, Delaware until 1765. In late 1765, Charles Inglis worked with Rev. Thomas B. Chandler as assistant to the rector of Trinity Church in New York City. During this time he worked for establishment of an American diocese. After the outbreak of the Revolution in 1776, Charles Inglis answered Thomas Paines Common Sense and it was titled The True Interest of America. Following Rev. Samuel Auchmuty, Charles Inglis became Rector of Trinity in 1777; he continued writing against the American reason over the pen name Papinian. In 1783 he returned to England where he was consecrated first Bishop if Nova Scotia in 1787. Charles Iglis was a very good writer. He cared a lot about how America treated him. I dont really thing he got enough recognition because I couldnt find out a lot about him. I wish I were able to though. He seemed to have done a lot for writing in America and expressing feelings freely. He is a great role model for writers who want to change the world. ...

Saturday, February 29, 2020

Breastfeeding and the Sexual Objectification of Women

Female breastfeeding and sexual objectivation Women's sexual objectivity is harmful not only for women but also for their children and even the environment. This objective may interfere with women breastfeeding. Breastfeeding is very beneficial for mothers, babies, and the environment. Breastfeeding children are unlikely to cause ear infections, allergies, vomiting, pneumonia, urinary tract infections, chronic gastrointestinal disorders, insulin dependent diabetes mellitus, bacterial meningitis, breastfeeding is sudden I know that it helps to prevent death. Illness (SIDS), lactating women are low The concept of sexual objectivization, especially women's objectiveness, is an important idea in feminist theory and feminist psychology. Many feminists believe that sexual objectiveness plays an important role in sexual inequality. Psychologists associate objectivity with the physical and mental health risks of women. The male objectivity of men includes women who are mainly considered male sexual desires rather than whole people. There are disagreement about discomfort, but many feminists believe that women are objectiveized in ads, art, and sexually oriented accounts in the media. In prostitution, men evaluate or judge gender and aesthetics of women in public places and activities such as beauty contests. Men play a role in reducing women's sexuality, especially in male friendship groups and the environment, and by reducing the consumption of media by sex. But women also promote women's sexuality and self-objectiveness. For example, in many female groups, we habitually critically evaluate the appearance of ourselves and others and talk about clothes, hair, weight and cosmetics. Mothers often educate their daughters self-objectively by focusing on their daughter's weight and clothing, and by overly focusing on the appearance of the body through imitation. Self-objectiveness exerts a certain influence on the thought processes and actions of women's physical activity a nd sexual activity, but it is unlikely that emotions on the body of a woman, including functions that can not be separated from the body of a woman, such as menstruation and breastfeeding Also relevant. Consistent with the theory of objectiveness, habitual physical monitoring is a feature of self-objectiveness that influences the influence of women on the body (Breines, Crocker, Garcia, 2008). For example, in a qualitative survey, we believe that women's samples of self-identifying feminists express themselves boldly care about their bodies and are trained by others in terms of appearance, speech, and behavior It was. ), Page 34

Thursday, February 13, 2020

Strategic Marketing Plan Essay Example | Topics and Well Written Essays - 3750 words

Strategic Marketing Plan - Essay Example The valley of Swat is known for its amazing natural beauty and therefore there is a huge attraction for domestic and international tourists. In order to resume tourism in the valley after the removal of terrorists hold, this report presents a three year long marketing strategy which is categorized into three phases. The first phase will focus on attracting domestic tourists; the second will focus on domestic and international tourists, while the third phase will concentrate only on attracting international tourists towards Swat valley. The marketing plan presents an overview of the financial aspects of the strategy. Strategic Marketing Plan Resuming Tourism in Swat Valley (Pakistan) Introduction This report covers a strategic marketing plan for resuming tourism in the Swat valley located in the South Asian state, Pakistan. The valley of Swat had been under the control of terrorists and extremists before a successful military operation conducted by the Pakistan Armed Forces in 2009 (K han 2010). The structure of the report is based on the marketing plan structure presented by McDonald (2008). The marketing plan is based on the following structure: Part 1: Goal Setting This part presents the goal set to be achieved from the marketing plan presented in this report. ... Moreover, the monitoring of the outcomes of the marketing plan after its implementation are also being discussed in this part. 1. Goal Setting The aim of this market plan is to resume tourism activities in Swat Valley in Pakistan by taking into consideration the competitive advantages of the place as against the tourist destinations in the region of South Asia. 1.1. Marketing Objectives In order to present a direction for the goal of this marketing plan based on SMART objectives (Doran 1981), following are the strategic marketing objectives which are planned to be attained: To resume tourism activities in Swat valley; To promote the soft image of Swat valley and its people by conducting various events and projecting them to the outside world; To resume tourism activities in Swat by following a step wise strategy which focuses on domestic tourists first and then international tourists; To generate positive cash flows from tourist activities in the second year of the implementation of the marketing plan; To increase cash inflows from domestic tourists visits by 60 percent as compared to the first year in comparison with the first year; To increase cash inflows from international tourists’ visits by 33.33 percent in the third year in comparison with the second year. 2. Situation Analysis Following is an analysis of the situation relating to tourism in Swat valley, which considers different aspects relevant in devising a tourism marketing strategy for Swat. 2.1. Swat Valley Swat is a famous tourist destination in the northern regions of Pakistan, administered under the government of â€Å"Khyber Pakhtunkhwa† Province of Pakistan. The valley of Swat lies in the upper parts

Saturday, February 1, 2020

ASPECTS OF CONTRACT AND NEGLIGENCE Assignment Example | Topics and Well Written Essays - 1250 words

ASPECTS OF CONTRACT AND NEGLIGENCE - Assignment Example This paper analyzes various aspects of a contract, and to an extension the concept of negligence to perform on the contract. In the essay, several studies cases will be analyzed in order to uncover the omission of vital elements of the contract. To achieve the stated objectives, the article will evaluate each and every study case critically and state the applicable consequences of the actions or inactions of the individuals in the study case. Written contracts are the most preferred types of contracts by many common legal systems. In most countries, all contracts pertaining tangible product sales worth more than $500 are required to be ratified in writing and the parties concerned should append their signatures. Examples of contracts that must be in writing include all land dealings, house sales, vehicles and many others. It is paramount to note that immediately someone signs a written contract provided the documents used is contractual in nature, they are legally bound by it irrespective of whether they read and understood the terms and conditions (Poole, 2014, p.86). Written contracts help parties involved understand their commitments and avoid the "he said, she said" dispute in case court prosecution is necessary. These are contracts formed whereby parties contact or meet face to face and enter into an agreement. Such contract provides the element of identity which is very crucial in contracts and a contract can automatically be termed as void because of mistakes relating to identity, particularly if the identity is necessary. Example of cases that have been declared void because of this issue include the Phillips v Brooks and Shogun Finance Ltd v Hudson (Poole, 2014, p.96). Distance sales contracts, currently known as consumer contracts are contracts that pertain to the sale of goods without face-to-face contact. Suppliers are required by law to disclose

Friday, January 24, 2020

Management of Pupil Behaviour Essay -- Education School Behavior Stude

Management of Pupil Behaviour In this report I intend to focus on the different strategies of quieting down and calming the class. Managing the behaviour of the classroom has always been a problem for the class teacher. When given the responsibility of 30 children, all individual, all different, it is a hard task to try and also keep your class peaceful and co-operative. The Elton report stated that ‘Primary schools had to deal with many incidents of minor disruptive behaviour e.g. shouting out, pushing, running in school, name calling, defiance.’ (Elton Report 1989) Because of these incidentds of disruptive behaviour it is important that teachers have in place their own methods of calming the class, or in some cases of repremanding them. The different methods of claming or repremanding the class are often debated amongst theorists. Johnstone, M is of the opinion ‘A lost temper is often needed in order for the pupils to realise the consequence of their actions’(Johnstone1992) Johnstone believes that a teacher needs from time to time to loose his/her temper in order for the class to notice that when they are disruptive the teacher gets angry and unpleasent. Wilson and Cowell do not agree with this belief. ‘It is essential for teachers to remain in control of themselves at all times, so that they may be a source of security for the pupils. They can be excited or enthusiastic or funny, or all sorts of things, but they must feel secure.’ (Wilson & Cowell 1990) As we can s... Management of Pupil Behaviour Essay -- Education School Behavior Stude Management of Pupil Behaviour In this report I intend to focus on the different strategies of quieting down and calming the class. Managing the behaviour of the classroom has always been a problem for the class teacher. When given the responsibility of 30 children, all individual, all different, it is a hard task to try and also keep your class peaceful and co-operative. The Elton report stated that ‘Primary schools had to deal with many incidents of minor disruptive behaviour e.g. shouting out, pushing, running in school, name calling, defiance.’ (Elton Report 1989) Because of these incidentds of disruptive behaviour it is important that teachers have in place their own methods of calming the class, or in some cases of repremanding them. The different methods of claming or repremanding the class are often debated amongst theorists. Johnstone, M is of the opinion ‘A lost temper is often needed in order for the pupils to realise the consequence of their actions’(Johnstone1992) Johnstone believes that a teacher needs from time to time to loose his/her temper in order for the class to notice that when they are disruptive the teacher gets angry and unpleasent. Wilson and Cowell do not agree with this belief. ‘It is essential for teachers to remain in control of themselves at all times, so that they may be a source of security for the pupils. They can be excited or enthusiastic or funny, or all sorts of things, but they must feel secure.’ (Wilson & Cowell 1990) As we can s...

Wednesday, January 15, 2020

Digital Fortress Chapter 3

Susan's Volvo sedan rolled to a stop in the shadow of the ten-foot-high, barbed Cyclone fence. A young guard placed his hand on the roof. â€Å"ID, please.† Susan obliged and settled in for the usual half-minute wait. The officer ran her card through a computerized scanner. Finally he looked up. â€Å"Thank you, Ms. Fletcher.† He gave an imperceptible sign, and the gate swung open. Half a mile ahead Susan repeated the entire procedure at an equally imposing electrified fence. Come on, guys†¦ I've only been through here a million times. As she approached the final checkpoint, a stocky sentry with two attack dogs and a machine gun glanced down at her license plate and waved her through. She followed Canine Road for another 250 yards and pulled into Employee Lot C. Unbelievable, she thought. Twenty-six thousand employees and a twelve-billion-dollar budget; you'd think they could make it through the weekend without me. Susan gunned the car into her reserved spot and killed the engine. After crossing the landscaped terrace and entering the main building, she cleared two more internal checkpoints and finally arrived at the windowless tunnel that led to the new wing. A voice-scan booth blocked her entry. NATIONAL SECURITY AGENCY (NSA) CRYPTO FACILITY AUTHORIZED PERSONNEL ONLY The armed guard looked up. â€Å"Afternoon, Ms. Fletcher.† Susan smiled tiredly. â€Å"Hi, John.† â€Å"Didn't expect you today.† â€Å"Yeah, me neither.† She leaned toward the parabolic microphone. â€Å"Susan Fletcher,† she stated clearly. The computer instantly confirmed the frequency concentrations in her voice, and the gate clicked open. She stepped through. The guard admired Susan as she began her walk down the cement causeway. He noticed that her strong hazel eyes seemed distant today, but her cheeks had a flushed freshness, and her shoulder-length, auburn hair looked newly blown dry. Trailing her was the faint scent of Johnson's Baby Powder. His eyes fell the length of her slender torso-to her white blouse with the bra barely visible beneath, to her knee-length khaki skirt, and finally to her legs†¦ Susan Fletcher's legs. Hard to imagine they support a 170 IQ, he mused to himself. He stared after her a long time. Finally he shook his head as she disappeared in the distance. As Susan reached the end of the tunnel, a circular, vaultlike door blocked her way. The enormous letters read: crypto. Sighing, she placed her hand inside the recessed cipher box and entered her five-digit PIN. Seconds later the twelve-ton slab of steel began to revolve. She tried to focus, but her thoughts reeled back to him. David Becker. The only man she'd ever loved. The youngest full professor at Georgetown University and a brilliant foreign-language specialist, he was practically a celebrity in the world of academia. Born with an eidetic memory and a love of languages, he'd mastered six Asian dialects as well as Spanish, French, and Italian. His university lectures on etymology and linguistics were standing-room only, and he invariably stayed late to answer a barrage of questions. He spoke with authority and enthusiasm, apparently oblivious to the adoring gazes of his star-struck coeds. Becker was dark-a rugged, youthful thirty-five with sharp green eyes and a wit to match. His strong jaw and taut features reminded Susan of carved marble. Over six feet tall, Becker moved across a squash court faster than any of his colleagues could comprehend. After soundly beating his opponent, he would cool off by dousing his head in a drinking fountain and soaking his tuft of thick, black hair. Then, still dripping, he'd treat his opponent to a fruit shake and a bagel. As with all young professors, David's university salary was modest. From time to time, when he needed to renew his squash club membership or restring his old Dunlop with gut, he earned extra money by doing translating work for government agencies in and around Washington. It was on one of those jobs that he'd met Susan. It was a crisp morning during fall break when Becker returned from a morning jog to his three-room faculty apartment to find his answering machine blinking. He downed a quart of orange juice as he listened to the playback. The message was like many he received-a government agency requesting his translating services for a few hours later that morning. The only strange thing was that Becker had never heard of the organization. â€Å"They're called the National Security Agency,† Becker said, calling a few of his colleagues for background. The reply was always the same. â€Å"You mean the National Security Council?† Becker checked the message. â€Å"No. They said Agency. The NSA.† â€Å"Never heard of 'em.† Becker checked the GAO Directory, and it showed no listing either. Puzzled, Becker called one of his old squash buddies, an ex-political analyst turned research clerk at the Library of Congress. David was shocked by his friend's explanation. Apparently, not only did the NSA exist, but it was considered one of the most influential government organizations in the world. It had been gathering global electronic intelligence data and protecting U.S. classified information for over half a century. Only 3 percent of Americans were even aware it existed. â€Å"NSA,† his buddy joked, â€Å"stands for ‘No Such Agency.' â€Å" With a mixture of apprehension and curiosity, Becker accepted the mysterious agency's offer. He drove the thirty-seven miles to their eighty-six-acre headquarters hidden discreetly in the wooded hills of Fort Meade, Maryland. After passing through endless security checks and being issued a six-hour, holographic guest pass, he was escorted to a plush research facility where he was told he would spend the afternoon providing â€Å"blind support† to the Cryptography Division-an elite group of mathematical brainiacs known as the code-breakers. For the first hour, the cryptographers seemed unaware Becker was even there. They hovered around an enormous table and spoke a language Becker had never heard. They spoke of stream ciphers, self-decimated generators, knapsack variants, zero knowledge protocols, unicity points. Becker observed, lost. They scrawled symbols on graph paper, pored over computer printouts, and continuously referred to the jumble of text on the overhead projector. JHdja3jKHDhmado/ertwtjlw+jgj328 5jhalsfnHKhhhfafOhhdfgaf/fj37we ohi93450s9djfd2h/HHrtyFHLf89303 95jspjf2j0890Ihj98yhfi080ewrt03 jojr845h0roq+jt0eu4tqefqe//oujw 08UY0IH0934jtpwfiajer09qu4jr9gu ivjP$duw4h95pe8rtugvjw3p4e/ikkc mffuerhfgv0q394ikjrmg+unhvs9oer rk/0956y7u0poikIOjp9f8760qwerqi Eventually one of them explained what Becker had already surmised. The scrambled text was a code-a â€Å"cipher text†-groups of numbers and letters representing encrypted words. The cryptographers' job was to study the code and extract from it the original message, or â€Å"cleartext.† The NSA had called Becker because they suspected the original message was written in Mandarin Chinese; he was to translate the symbols as the cryptographers decrypted them. For two hours, Becker interpreted an endless stream of Mandarin symbols. But each time he gave them a translation, the cryptographers shook their heads in despair. Apparently the code was not making sense. Eager to help, Becker pointed out that all the characters they'd shown him had a common trait-they were also part of the Kanji language. Instantly the bustle in the room fell silent. The man in charge, a lanky chain-smoker named Morante, turned to Becker in disbelief. â€Å"You mean these symbols have multiple meanings?† Becker nodded. He explained that Kanji was a Japanese writing system based on modified Chinese characters. He'd been giving Mandarin translations because that's what they'd asked for. â€Å"Jesus Christ.† Morante coughed. â€Å"Let's try the Kanji.† Like magic, everything fell into place. The cryptographers were duly impressed, but nonetheless, they still made Becker work on the characters out of sequence. â€Å"It's for your own safety,† Morante said. â€Å"This way, you won't know what you're translating.† Becker laughed. Then he noticed nobody else was laughing. When the code finally broke, Becker had no idea what dark secrets he'd helped reveal, but one thing was for certain-the NSA took code-breaking seriously; the check in Becker's pocket was more than an entire month's university salary. On his way back out through the series of security check points in the main corridor, Becker's exit was blocked by a guard hanging up a phone. â€Å"Mr. Becker, wait here, please.† â€Å"What's the problem?† Becker had not expected the meeting to take so long, and he was running late for his standing Saturday afternoon squash match. The guard shrugged. â€Å"Head of Crypto wants a word. She's on her way out now.† â€Å"She?† Becker laughed. He had yet to see a female inside the NSA. â€Å"Is that a problem for you?† a woman's voice asked from behind him. Becker turned and immediately felt himself flush. He eyed the ID card on the woman's blouse. The head of the NSA's Cryptography Division was not only a woman, but an attractive woman at that. â€Å"No,† Becker fumbled. â€Å"I just†¦Ã¢â‚¬  â€Å"Susan Fletcher.† The woman smiled, holding out her slender hand. Becker took it. â€Å"David Becker.† â€Å"Congratulations, Mr. Becker. I hear you did a fine job today. Might I chat with you about it?† Becker hesitated. â€Å"Actually, I'm in a bit of a rush at the moment.† He hoped spurning the world's most powerful intelligence agency wasn't a foolish act, but his squash match started in forty-five minutes, and he had a reputation to uphold: David Becker was never late for squash†¦ class maybe, but never squash. â€Å"I'll be brief.† Susan Fletcher smiled. â€Å"Right this way, please.† Ten minutes later, Becker was in the NSA's commissary enjoying a popover and cranberry juice with the NSA's lovely head cryptographer, Susan Fletcher. It quickly became evident to David that the thirty-eight-year-old's high-ranking position at the NSA was no fluke-she was one of the brightest women he had ever met. As they discussed codes and code-breaking, Becker found himself struggling to keep up-a new and exciting experience for him. An hour later, after Becker had obviously missed his squash match and Susan had blatantly ignored three pages on the intercom, both of them had to laugh. There they were, two highly analytical minds, presumably immune to irrational infatuations-but somehow, while they sat there discussing linguistic morphology and pseudo-random number generators, they felt like a couple of teenagers-everything was fireworks. Susan never did get around to the real reason she'd wanted to speak to David Becker-to offer him a trial post in their Asiatic Cryptography Division. It was clear from the passion with which the young professor spoke about teaching that he would never leave the university. Susan decided not to ruin the mood by talking business. She felt like a schoolgirl all over again; nothing was going to spoil it. And nothing did. Their courtship was slow and romantic-stolen escapes whenever their schedules permitted, long walks through the Georgetown campus, late-night cappuccinos at Merlutti's, occasional lectures and concerts. Susan found herself laughing more than she'd ever thought possible. It seemed there was nothing David couldn't twist into a joke. It was a welcome release from the intensity of her post at the NSA. One crisp, autumn afternoon they sat in the bleachers watching Georgetown soccer get pummeled by Rutgers. â€Å"What sport did you say you play?† Susan teased. â€Å"Zucchini?† Becker groaned. â€Å"It's called squash.† She gave him a dumb look. â€Å"It's like zucchini,† he explained, â€Å"but the court's smaller.† Susan pushed him. Georgetown's left wing sent a corner-kick sailing out of bounds, and a boo went up from the crowd. The defensemen hurried back downfield. â€Å"How about you?† Becker asked. â€Å"Play any sports?† â€Å"I'm a black belt in Stairmaster.† Becker cringed. â€Å"I prefer sports you can win.† Susan smiled. â€Å"Overachiever, are we?† Georgetown's star defenseman blocked a pass, and there was a communal cheer in the stands. Susan leaned over and whispered in David's ear. â€Å"Doctor.† He turned and eyed her, lost. â€Å"Doctor,† she repeated. â€Å"Say the first thing that comes to mind.† Becker looked doubtful. â€Å"Word associations?† â€Å"Standard NSA procedure. I need to know who I'm with.† She eyed him sternly. â€Å"Doctor.† Becker shrugged. â€Å"Seuss.† Susan gave him a frown. â€Å"Okay, try this one†¦ ‘kitchen.' â€Å" He didn't hesitate. â€Å"Bedroom.† Susan arched her eyebrows coyly. â€Å"Okay, how about this†¦ ‘cat.' â€Å" â€Å"Gut,† Becker fired back. â€Å"Gut?† â€Å"Yeah. Catgut. Squash racquet string of champions.† â€Å"That's pleasant.† She groaned. â€Å"Your diagnosis?† Becker inquired. Susan thought a minute. â€Å"You're a childish, sexually frustrated squash fiend.† Becker shrugged. â€Å"Sounds about right.† It went on like that for weeks. Over dessert at all-night diners Becker would ask endless questions. Where had she learned mathematics? How did she end up at the NSA? How did she get so captivating? Susan blushed and admitted she'd been a late bloomer. Lanky and awkward with braces through her late teens, Susan said her Aunt Clara had once told her God's apology for Susan's plainness was to give her brains. A premature apology, Becker thought. Susan explained that her interest in cryptography had started in junior high school. The president of the computer club, a towering eighth grader named Frank Gutmann, typed her a love poem and encrypted it with a number-substitution scheme. Susan begged to know what it said. Frank flirtatiously refused. Susan took the code home and stayed up all night with a flashlight under her covers until she figured out the secret-every number represented a letter. She carefully deciphered the code and watched in wonder as the seemingly random digits turned magically into beautiful poetry. In that instant, she knew she'd fallen in love-codes and cryptography would become her life. Almost twenty years later, after getting her master's in mathematics from Johns Hopkins and studying number theory on a full scholarship from MIT, she submitted her doctoral thesis, Cryptographic Methods, Protocols, and Algorithms for Manual Applications. Apparently her professor was not the only one who read it; shortly afterward, Susan received a phone call and a plane ticket from the NSA. Everyone in cryptography knew about the NSA; it was home to the best cryptographic minds on the planet. Each spring, as the private-sector firms descended on the brightest new minds in the workforce and offered obscene salaries and stock options, the NSA watched carefully, selected their targets, and then simply stepped in and doubled the best standing offer. What the NSA wanted, the NSA bought. Trembling with anticipation, Susan flew to Washington's Dulles International Airport where she was met by an NSA driver, who whisked her off to Fort Meade. There were forty-one others who had received the same phone call that year. At twenty-eight, Susan was the youngest. She was also the only female. The visit turned out to be more of a public relations bonanza and a barrage of intelligence testing than an informational session. In the week that followed, Susan and six others where invited back. Although hesitant, Susan returned. The group was immediately separated. They underwent individual polygraph tests, background searches, handwriting analyses, and endless hours of interviews, including taped inquiries into their sexual orientations and practices. When the interviewer asked Susan if she'd ever engaged in sex with animals, she almost walked out, but somehow the mystery carried her through-the prospect of working on the cutting edge of code theory, entering â€Å"The Puzzle Palace,† and becoming a member of the most secretive club in the world-the National Security Agency. Becker sat riveted by her stories. â€Å"They actually asked you if you'd had sex with animals?† Susan shrugged. â€Å"Part of the routine background check.† â€Å"Well†¦Ã¢â‚¬  Becker fought off a grin. â€Å"What did you say?† She kicked him under the table. â€Å"I told them no!† Then she added, â€Å"And until last night, it was true.† In Susan's eyes, David was as close to perfect as she could imagine. He only had one unfortunate quality; every time they went out, he insisted on picking up the check. Susan hated seeing him lay down a full day's salary on dinner for two, but Becker was immovable. Susan learned not to protest, but it still bothered her. I make more money than I know what to do with, she thought. I should be paying. Nonetheless, Susan decided that aside from David's outdated sense of chivalry, he was ideal. He was compassionate, smart, funny, and best of all, he had a sincere interest in her work. Whether it was during trips to the Smithsonian, bike rides, or burning spaghetti in Susan's kitchen, David was perpetually curious. Susan answered what questions she could and gave David the general, unclassified overview of the National Security Agency. What David heard enthralled him. Founded by President Truman at 12:01 a.m. on November 4, 1952, the NSA had been the most clandestine intelligence agency in the world for almost fifty years. The NSA's seven-page inception doctrine laid out a very concise agenda: to protect U.S. government communications and to intercept the communications of foreign powers. The roof of the NSA's main operations building was littered with over five hundred antennas, including two large radomes that looked like enormous golf balls. The building itself was mammoth-over two million square feet, twice the size of CIA headquarters. Inside were eight million feet of telephone wire and eighty thousand square feet of permanently sealed windows. Susan told David about COMINT, the agency's global reconnaissance division-a mind-boggling collection of listening posts, satellites, spies, and wiretaps around the globe. Thousands of communiques and conversations were intercepted every day, and they were all sent to the NSA's analysts for decryption. The FBI, CIA, and U.S. foreign policy advisors all depended on the NSA's intelligence to make their decisions. Becker was mesmerized. â€Å"And code-breaking? Where do you fit in?† Susan explained how the intercepted transmissions often originated from dangerous governments, hostile factions, and terrorist groups, many of whom were inside U.S. borders. Their communications were usually encoded for secrecy in case they ended up in the wrong hands-which, thanks to COMINT, they usually did. Susan told David her job was to study the codes, break them by hand, and furnish the NSA with the deciphered messages. This was not entirely true. Susan felt a pang of guilt over lying to her new love, but she had no choice. A few years ago it would have been accurate, but things had changed at the NSA. The whole world of cryptography had changed. Susan's new duties were classified, even to many in the highest echelons of power. â€Å"Codes,† Becker said, fascinated. â€Å"How do you know where to start? I mean†¦ how do you break them?† Susan smiled. â€Å"You of all people should know. It's like studying a foreign language. At first the text looks like gibberish, but as you learn the rules defining its structure, you can start to extract meaning.† Becker nodded, impressed. He wanted to know more. With Merlutti's napkins and concert programs as her chalkboard, Susan set out to give her charming new pedagogue a mini course in cryptography. She began with Julius Caesar's â€Å"perfect square† cipher box. Caesar, she explained, was the first code-writer in history. When his foot-messengers started getting ambushed and his secret communiques stolen, he devised a rudimentary way to encrypt this directives. He rearranged the text of his messages such that the correspondence looked senseless. Of course, it was not. Each message always had a letter-count that was a perfect square-sixteen, twenty-five, one hundred-depending on how much Caesar needed to say. He secretly informed his officers that when a random message arrived, they should transcribe the text into a square grid. If they did, and read top-to-bottom, a secret message would magically appear. Over time Caesar's concept of rearranging text was adopted by others and modified to become more difficult to break. The pinnacle of non computer-based encryption came during World War II. The Nazis built a baffling encryption machine named Enigma. The device resembled an old-fashioned typewriter with brass interlocking rotors that revolved in intricate ways and shuffled cleartext into confounding arrays of seemingly senseless character groupings. Only by having another Enigma machine, calibrated the exact same way, could the recipient break the code. Becker listened, spellbound. The teacher had become the student. One night, at a university performance of The Nutcracker, Susan gave David his first basic code to break. He sat through the entire intermission, pen in hand, puzzling over the eleven-letter message: HL FKZC VD LDS Finally, just as the lights dimmed for the second half, he got it. To encode, Susan had simply replaced each letter of her message with the letter preceding it in the alphabet. To decrypt the code, all Becker had to do was shift each letter one space forward in the alphabet-â€Å"A† became â€Å"B,† â€Å"B† became â€Å"C,† and so on. He quickly shifted the remaining letters. He never imagined four little syllables could make him so happy: IM GLAD WE MET He quickly scrawled his response and handed it to her: LD SNN Susan read it and beamed. Becker had to laugh; he was thirty-five years-old, and his heart was doing back flips. He'd never been so attracted to a woman in his life. Her delicate European features and soft brown eyes reminded him of an ad for Estee Lauder. If Susan's body had been lanky and awkward as a teenager, it sure wasn't now. Somewhere along the way, she had developed a willowy grace-slender and tall with full, firm breasts and a perfectly flat abdomen. David often joked that she was the first swimsuit model he'd ever met with a doctorate in applied mathematics and number theory. As the months passed, they both started to suspect they'd found something that could last a lifetime. They'd been together almost two years when, out of the blue, David proposed to her. It was on a weekend trip to the Smoky Mountains. They were lying on a big canopy bed at Stone Manor. He had no ring-he just blurted it out. That's what she loved about him-he was so spontaneous. She kissed him long and hard. He took her in his arms and slipped off her nightgown. â€Å"I'll take that as a yes,† he said, and they made love all night by the warmth of the fire. That magical evening had been six months ago-before David's unexpected promotion to chairman of the Modern Language Department. Their relationship had been in a downhill slide ever since.