Wednesday, December 25, 2019

The Murder Of Dahmer s Victims - 1786 Words

Well Known Serial Kills Dahmer Jeffery Dahmer was a homosexual serial killer that raped, dismembered his victims while also engaging in necrophilia and cannibalism. Dahmer was an active between 1978 and 1991 when he was in his late teens and early twenties. He committed his acts of murder through the use of throat cutting and strangling. All seventeen of his victims were male ranging from there early teen years to early thirties. His victims included Stephen Hicks, Steven Tuomi, James Jamie Doxtator, Richard Guerrero, Anthony Sears, Eddie Smith, Ricky Beeks, Ernest Miller, David Thomas, Curtis Straughter, Errol Lindsey, Tony Hughes, Konerak Sinthasomphone, Matt Turner, Jeremiah Weinberger, Oliver Lacy, and Joseph Bradehoft, All of Dahmer’s victims were killed in Ohio and Wisconsin. All seventeen of Dahmer’s victims ranged in race, but ten out the seventeen victims were African American. Dahmer had two victims that ended up getting away Keison Sinthasomphone and Tracy Edwards. Edwards escape led to t he discovery of Dahmer and to his arrest in July of 1991. Dahmer was arrested after luring Tracy Edwards to his apartment. Edwards escaped from Dahmer and was able to flag down two police officers. After Edwards told the officers what had happened, he led them back to Dahmer’s apartment. Dahmer was confronted by the two police officers and tried to charm them. Upon a search of Dahmer’s residence the police officers found dismembered body parts and remains from Dahmer’sShow MoreRelatedJeffrey Dahmer : An American Serial Killer912 Words   |  4 PagesAccording to the FBI (Federal Bureau of Investigation), a Serial Murder is defined as â€Å"The unlawful killing of two or more victims by the same offender(s), in separate events.† Jeffrey Lionel Dahmer, who is well known as an American serial killer and sex offender who was born on May 21, 1960, in Milwaukee, Wisconsin. He is known for his murders committed in his teenage years between the years of 1978 and 1991; Jeffrey Dahmer murdered 17 males. He not only murdered 17 men, but horrifically disposedRead MoreMurder Is An Interesting Topic. Everyone Wants To Know1563 Words   |  7 PagesMurder is an interesting topic. Everyone wants to know why murderers kill, and how could a human do that to another human? Also, are murderers psychopaths? The real interesting thing though is serial killers. They kill over three people, and no one knows why. Serial Killers are some of the most mysterious and misunderstood criminals in law enforcement. Jack the Ripper Five female prostitutes left the world in 1888, due to an unidentified killer known as Jack the Ripper( â€Å"Jack the Ripper Biography†)Read MoreJeffrey Dahmer : An Strange Boy1646 Words   |  7 PagesPeriod 9 20 January 2015 Jeffrey Dahmer Jeffrey Dahmer was born on May 21, 1960 in Milwaukee Wisconsin to Joyce and Lionel Dahmer. Jeffrey Dahmer grew up a very joyful, outgoing, happy kid. Dahmer was like this until his brother was born. After the birth of his brother, he seemed lonely as if he was seeking love and attention. Around the age of 6, Dahmer had a double hernia operation. Joyce and Lionel Dahmer soon realized that their son had really changed. Dahmer was shy and kept to himself, almostRead More Jeffrey Dahmer Essay example1398 Words   |  6 PagesBiography On: Jeffrey Dahmer Section I: Introduction: Jeffrey Dahmer was one of the most well known serial killers ever. Dahmer was no ordinary serial killer. He was a killer, necropheliac, and a cannibal. The purpose of this report is to learn more about this serial killer. Section II: Overview †¢nbsp;nbsp;nbsp;nbsp;nbsp;â€Å"Jeffrey Dahmer was born May 21, 1960, at Evangelical Hospital in Milwaukee, Wisconsin† (Blakey). †¢nbsp;nbsp;nbsp;nbsp;nbsp;â€Å"Jeffrey Dahmer was found beaten by fellowRead Morejeffery dahmer1609 Words   |  5 Pagesï » ¿ Jeffery Dahmer is hands down one of the most notorious serial killers. Dahmer murdered and raped 17 victims over the course of sixteen years. He raised the bar for the most gruesome deaths in history. Jeffrey Dahmer began his life as a normal suburban kid who played with similar children in his neighborhood; His fascination with death and dark, gruesome subjects started at a very young age and grew into a strong part of his personality as a juvenile. Jeffery was born on May 21Read MoreSociological Perspective : Jeffrey Dahmer1252 Words   |  6 PagesMurder, willingly taking another humans life, is considered a heinous crime in the United States, and from the sociological perspective, breaks an important more. Serial Murder, therefore, is a sociologically deviant phenomenon where a person kills two or more people in distinct events, and an FBI overview of serial killers states â€Å"No single cause, trait, or even a group of traits can differentiate or identify serial killers †¦ from other types of violent offenders† (FBI). We can, however, use sociologicalRead MoreEvan Lalor. English 10. Mrs. Rb . 12 April 2017. Was Jeffrey1484 Words   |  6 PagesWas Jeffrey Dahmer Insane One of the most infamous serial killers of the 20th century was named Jeffrey Dahmer, whose horrific murders shocked the nation. In many ways people would think Jeffrey Dahmer was insane because he killed 17 people and tried to turn them into living zombies for his self pleasure. Jeffrey Dahmer had mental struggles starting at a young age and throughout his life, Some say he had a mental illness. (Jeffrey Dahmer |Crime Library| serial killers) Jeffrey Dahmer was born onRead MoreMental Disorders And Personality Disorder1723 Words   |  7 Pagesstructure of all things personality and there are no set boundaries that it falls in. But what happens when there s a glitch, causing people to not understand human ethics? There are certain mental disorders that can be linked to serial criminality, such as antisocal personality disorder and borderline personality which are exhibited in notorious killers Ted Bundy and Jeffrey Dahmer. Ted Bundy is perhaps a household name. His crimes were so horrendous and large that people more or less recognizeRead MoreThe History and Evolution of Cannibalism659 Words   |  3 PagesCannibalism has evolved from a cultural norm in prehistoric history, to medicinal use in the middle ages to finally sexual cannibalism in the present. One of the most famous cases of cannibalism is Jeffery Dahmer. From a young age, Dahmer was obsessed with death. His father, Lionel Dahmer, recollected on the time when young Jeffery first showed a peculiar interest in death; as Lionel was picking up animal bones from the lawn, he noticed Jeffery, â€Å"oddly thrilled by the sound they made. His smallRead MoreSerial Murders Are Not Indigenous, Nor Are They A New Phenomenon1157 Words   |  5 Pagescause someone to go on a ravenous murder spree? Serial murders are not indigenous, nor are they a new phenomenon. Ted Bundy and The Zodiac Killer are well-known individuals that are often mentioned when speaking about infamous serial killers. Conventional characteristics such as quantity, time, and place are all put into consideration when classifying a murderer as a serial killer (FBI). The Federal Bureau of Investigation definition states that three or more murders must take place at different locations

Monday, December 16, 2019

American Indian Genocide Museum The Confederate Flag,...

The American educational system is a deeply flawed organization that primarily puts a strong emphasis on American exceptionalism. The problem with this type of thinking, is that it washes out the tragedies of history and places an unhealthy amount of importance on American achievement. As a result, people are not grasping the full image of historic events and are skewed in their ways of thinking due to a biased mindset. In the article â€Å"American Indian Genocide Museum: The Confederate Flag, Buffalo Soldiers at Wounded Knee and Clarifying History†, by Steve Melendez, a recent controversy is discussed. According to Melendez, in 2011 Jerry Patterson, a Land Commissioner, tried to get both a confederate flag license plate and a Buffalo soldier license plate approved by the DMV commissioners; the confederate flag plate was rejected, and the Buffalo soldier plate was approved (Melendez 1). The significance of this, is that both are symbols of genocide and oppression. However, th e Buffalo soldier license plate was approved, because they are not looked at as figures as violence, but instead heroes. This is primarily because most Americans were not properly taught about the Buffalo Soldiers. Throughout history, racial superiority has always been sought after and has resulted in several tragedies. In order to carry out the Indian Removal act of 1830, black men were allowed to join the military, and were later named â€Å"Buffalo Soldiers†. In the article, the author talks mainly about the

Sunday, December 8, 2019

Digital Crimes or Crimes Within Electronic â€Myassignmenthelp.Com

Question: What Is the Digital Crimes or Crimes Within Electronic? Answer: Introduction In the recent years, digital crimes or crimes within electronic and digital media have become quite prevalent. The most common of these has been the cyber crime. As a result of this, there has been a growing need for investigation of digital crimes by both individual organizations and criminal justice systems. These crimes are done partially or entirely via electronic media and the internet. Digital forensics often requires resources and procedures to facilitate searching, location, and preservation of all electronic evidence. An example of digital evidence that can be used in such cases is encrypted data which is used to facilitate criminal activities. Analysis of such data is very important in digital forensics (Aziz,2014). Digital forensics is the process through which electronic data is uncovered and interpreted. Digital forensics aims at preserving any evidence in its original form in the course of forensic investigations in order to enable reconstruction of past events. Digital Financial Services (DFS), which provides financial services for individuals, employees and Companies, is faced with a real-time data threat that is likely to have an impact its more than 250 employees as well as the more than 3 million customers that it serves. John Stuarts incidence has necessitated the formation of a team to investigate the alleged misconduct and violation of company rules by Tom wills through his act of logging into a colleague's account. For that reason, an investigation has been launched by a team of auditors to ascertain the extent of his activities, the extent to which others are involved, the people affected as well as if there is a necessity of criminal charges against Tom. This digital forensics Investigative plan is aimed at enabling systematic collection of evidence and analysis of electronic and digital data. Digital forensics methodology Methodology refers to the theoretical and systematic study of the method used in a field of study. It encompasses a theoretical investigation of methods and principles that are related to a particular branch of knowledge. The forensic investigation requires the use of an investigative methodology that has been used previously with a combination of tools ensure as that data is collected and preserved in a sound and legal manner. Computer forensics is concerned with identifying, preserving, extraction, documentation, and interpretation of computer data. Computer forensics can be viewed as a process involving the use of analysis techniques and computer investigation in order to determine potential evidence in the case of a wide range of computer crimes. Examples of computer crime include fraud, destruction of intellectual property and theft of trade secrets( Caloyannides,2014). A Number of forensic investigation methodologies have been developed to aid in forensic investigation. Some of these methodologies have been developed for use in specific instances while others have been developed for general application. Among the main methodologies used in the Forensic analysis is the method developed by Heiser and Kruse II which involves the acquisition, authentication, analysis and presentation of evidence (Kruse Heiser,2013). Another methodology was developed farmer and Venema in which they identified some main steps in computer forensic analysis. These steps included securing and isolation, recording of the scene, systematic search for evidence, collection and packaging of evidence and maintenance of chain of custody. Mandia and precise also developed a methodology for use in forensic investigations (EC-CounciL Press,2017). Their methodology involves steps such as pre-incidence preparation, incidents detection, first response, Formulation of response strategy, duplication, analysis, implementation of security measure, network monitoring, recovery, reporting and finally reporting. Digital Forensic Research workshop has also developed am method of forensic analysis which is divided into phases such as identification, preservation, collection, examination, analysis presentation and decision. Due to the fact that the organization servers are UNIX/LINUX, The most appropriate methodology for use will be SANS methodology the main reason for choosing this methodology is that its level of reliability in evidence presentation is quite high. The method will also enable the forensic investigation to remain on the right track (Kruse Heiser,2013). This makes it the most appropriate method for investigation for investigating the IFSA Security issue. This method is divided into eight steps. Verification This is the first done as part of incidence response Verification will be done to ascertain that the incident has taken place. The verification stage will also involve the determination of the scope and breadth of the incident. In short, the factors to be determined here will be the situation, the specifics, and nature of the case. Verification is important because it will facilitate identification of the best approach for identifying, preserving and collecting evidence (Newman, 2007). System description This step will involve gathering data about the incident at hand. The team will need to describe the system for analysis in terms of where it is being acquired, its role in the in the organization as well as in the network. This will be followed by outlining the systems operating system and general configuration such as the format of its disk, the location of evidence and its RAM capacity (Philipp, Cowen Davis,2010). Acquisition of Evidence This step will involve identification of possible sources of data, acquisition of both volatile and nonvolatile data and verification of data integrity and maintenance of chain of custody. This step will also involve prioritization of evidence collection as well as the engagement of the business owners with an aim of identifying the possible impact of the selected strategies. Of central focus should also be the order in which volatile data is collected because of because of the fact that it changes over time. For this reason, volatile data will need to be collected using trusted binaries in running processes, open files, RAM Contents and login sessions. After data acquisition, its integrity should then be determined (Maras, 2015). Timeline Analysis This step will involve forensic lab analysis and investigation for which the first step is timeline analysis under timeline analysis information such as time of data modification, access, change and creation of human readable format. Data will be gathered using a variety of tools, extracted from Inode and then parsed and sorted in order to facilitate analysis. Timelines of memory artifacts will also need to be considered in the reconstruction process to ascertain what happened. This step will also involve generation of an idea of the date of the activity done in the system, the artifacts used, the actual action and source. SIFT Workstation tool can be used in this process (EC-Council Press, 2010) Media and Artifact Analysis This step will involve the analysis of huge sets of data in order to identify what programs were executed, downloaded files, files which were opened, directories which were opened, files which were deleted areas browsed by the use etc. This analysis will also be focused on identifying evidence on the usage of accounts and browsers download of files, creation and opening of files, execution of programs and usage of USB key. Memory analysis will also be important for examination of rogue processes, process paths, mutex, user handles and processed paths (Marshall, 2011). String/Byte search This method will be applied to search for magic cookies through the use of appropriate tools and techniques which will also facilitate low-level image search. This step will also allow string searches by the use of regular expressions to identify strings relevant to the case. Data recovery This step will involve the recovery of data from the file system. Tools will be used to analyze the file system, data layer, and Metadata layer in order to find the files of data.This step will also facilitate analysis of unallocated space, analysis of lack space as well as in-depth file system analysis. Reporting Results This will be the final phase and it will involve reporting what has been found from the analysis such as description of the actions performed, determination of other actions that needed to be performed and offering recommendations on the improvements that need to be made on policies, procedures, tools, guidelines as well as other aspects of the forensic process. Reporting is an important part of the forensic investigation (Volonino Anzaldua,2008). Required resources A number of resources and skills are required to conduct digital forensic investigation Forensic investigation tools The organization will also need to have the necessary tools to facilitate the investigation process. For the case under analysis, tools such as tool dd are required. The investigation also requires the use of tools such as Tool EnCase Sufficient Forensic capabilities As part of the skill requirement in order to carry out the process well, the team involved in handling the case will be required to possess robust forensic capabilities. This will require the team to be composed of members possessing different skills for each of them to be able to perform a different effort and collectively make the process a success Efficient Network and Computer forensics For the process to be successful, the team will also need an efficient network and computer forensics to facilitate performance of different tasks in an organization such as investigating inappropriate behavior and crimes and troubleshooting operational problems, without which the organization will encounter challenges in determining when the occurrence of the incident within the system happened (Volonino Anzaldua,2008). Policies having forensic consideration The organization also needs to have in place policies that have forensic consideration. Such policies will be applied to the people tasked with the responsibility of monitoring the network and system. These will also be applied in the investigation of the case under analysis (Volonino,Anzaldua Godwin,2007). This policy must define the roles and responsibilities of each of the individuals taking place in the investigation process as well as provide guidelines on the most appropriate course of action for different cases Approach for data evidence Identification Application of digital technology will lead to the identification of huge sets of data based because of the fact that the company uses UNIX/LINUX servers. The main sources of data used in the forensic investigation include network storage devices, data servers and storage devices among others. These can be used for identification of evidence or the required data. It is also possible to use volatile data that is available on a standard computer system on a temporary basis. The process of identifying evidence will involve seizure of the digital media under investigation; this will then be followed by acquisition which involves the creation of a forensic duplicate. Analysis of image files created during the acquisition process will then be done to identify information that either in support or contradiction of the established hypothesis. This will then be followed by reporting inform of Meta documentation or audit information (Vacca,2015). Approach and Steps to be taken Step one: This will involve the establishment of a chain of custody. This step will require the team to be aware of the location of any items that are related to the examination. Step two: This step will involve cataloging of all the information that is relevant to the investigation. In this step, attempts will be made to recover any information that has been deleted as much as possible. This step will also involve identification of any information that is password protected and encrypted information as well as any evidence of attempts that had been made to hide data. The integrity of the original media should, however, be maintained as much as possible without any form of alteration. Finally, there will be a need to create a hard drive image that would be authenticated against the original to ensure that the two are similar (Shinder, 2012). Step3: This step will require obtaining of additional sources of information if it will be necessary. Some of the sources that will be used include proxy server logs and firewall logs Step 4: Step four will involve the analysis and interpretation of information for the purpose of evidence determination. Evidence to support that the accused person did it as well as evidence to that he did it will be sought. Any files that are encrypted or protected with passwords will need to be cracked at this step. Step five will involve the presentation of a written report that contains the findings of the analysis as well as any comments from the examination (Sheetz, 2007). Approach to recover files that have been deleted from the computer Data recovery can be the most important aspect of the forensic audit. It is from this data that is recovered that evidence is gathered. Although data does not entirely disappear from the system when it is deleted; there are techniques that are needed in order to recover it for forensic analysis. Deleted files in a computer often end up in the computer recycle bin. In such a situation the deleted information can be successfully retrieved from the recycle bin which is a temporary holding point for deleted files. However, in instances where deleted files have also been erased from the dust bin, more needs to be done. If no files are found in the dustbin, the files can still be recovered through the use of a number of data recovery tools. What happens when data is deleted from a computer is that the data is not entirely wiped from the computer. Instead, a file system record that shows the exact location of that particular file on the disc is marked as deleted. The disk space previously occupied by this file is then made available for other sets of data (Quach,2014). An analysis of the file system or conducting a hard drive scan in order to identify characteristic signatures of file types that are known can facilitate recovery of both files deleted by the user and other evidence such as temporary copies of office documents; documents that have been renamed among many other types of documents. Information from other sources such as Skype chat logs that are stored in the chat sync folder can be used to supplement data from deleted files. With the existence of chat sync folder, Skype chats can be recovered even in the event of failure to recover deleted Skype database (Pilli, Joshi and Niyogi,2010). Data security policies. A number of policies can be put up by the organization to enhance the security of data within the organization. Restricting unauthorized access to information: This will involve safeguarding all sensitive institutional and personal information against access by unauthorized persons. This can be achieved through the use of stringent punishments on those found to have violated data privacy policy. Establishing password management: This policy will require the establishment of passwords for all employees who have access to corporate resources. After passwords have been established, employees should then be directed to keep their passwords private and confidential and avoid sharing them will colleagues (Cyber Defense Training Systems, Lewis,2007). Recommendations There are a number of factors that the company can consider in order to make the process a success and effectively deal with the identified problem. The first recommendation for the company is the determination of all the parts that will be involved in the forensic examination and subsequently determine the individuals who will be responsible for each of the parts. The reason for this is the fact that many parts of the forensic investigation might require specific skills and attributes( Casey,2010). The organization will need to identify if any part of the analysis will need to be performed by external parties or whether everything will be handled by the organizations staff. Additionally, the organization will have to involve teams such as the management, human resources and IT professionals to make the process more effective. Finally, the organization will have to create procedures and guidelines to be used during the process such as explaining the methodologies most appropriate as well as guidelines for ensuring the integrity of the data collected. Conclusion Based on this report, the issue experienced by Impact Financial Service Australia is quite serious can cause serious harm to the organization if nothing is done about it. The action is a threat not only to individual employees data but also organizational data. Access to unauthorized data can facilitate fraud and other crimes in an organization such as data theft. For this reason, a forensic analysis has been instituted by the organization to provide more insight about the alleged fraud and institute measures to prevent such occurrence in future. It is evident from the plan that specific tools, as well as expertise and skills, will need to be employed in the forensic investigation. The process will also involve specific methodologies. Reference List: Aziz, B., 2014. Modelling and refinement of forensic data acquisition specifications. Digital Investigation, 11(2), pp.90-101. Caloyannides, M. (2014). Privacy Protection and Computer Forensics. Norwood, Artech House. https://public.eblib.com/choice/publicfullrecord.aspx?p=227692. Casey, E. (2010). Digital investigations, security and privacy. Digital Investigation, 7(1-2), pp.1-2. Cyber Defense Training Systems, Lewis, J. A. (2007). Corporate computer forensics training system text manual. Volume I. Leslie, Mich, Cyber Defense and Research Initiative. EC-CounciL Press. (2017). Computer forensics: investigating network intrusions and cybercrime. EC-Council Press. (2010). Computer forensics: investigating wireless networks and devices. Clifton Park, NY, Course Technology Cengage Learning. EC-Council Press. (2010). Computer forensics: investigating data and image files. Clifton Park, NY, Course Technology Cengage Learning Kruse, W. G., Heiser, J. G. (2013). Computer forensics: incident response essentials. Boston, Mass. [u.a.], Addison-Wesley Maras, M.-H. (2015). Computer forensics: cybercriminals, laws, and evidence, second edition. Burlington, MA, Jones Bartlett Learning. https://www.books24x7.com/marc.asp?bookid=69834 Marshall, A. (2011). Standards, regulation quality in digital investigations: The state we are in. Digital Investigation, 8(2), pp.141-144. Newman, R. C. (2007). Computer forensics: evidence collection and management. Boca Raton, FL, Auerbach Publications. Philipp, A., Cowen, D., Davis, C. (2010). Hacking exposed computer forensics: secrets solutions. New York, McGraw-Hill/Osborne. https://www.books24x7.com/marc.asp?bookid=72523. Pilli, E., Joshi, R. and Niyogi, R. (2010). Network forensic frameworks: Survey and research challenges. Digital Investigation, 7(1-2), pp.14-27. Quach, T. (2014). Extracting hidden messages in steganographic images. Digital Investigation, 11, pp.S40-S45 Sheetz, M. (2007). Computer forensics: an essential guide for accountants, lawyers, and managers. New Jersey, John Wiley Sons. Shinder, D. L. (2012). Scene of the cybercrime: computer forensics handbook. Rockland, Syngress Media. https://public.eblib.com/choice/publicfullrecord.aspx?p=294354 Vacca, J. R. (2015). Computer forensics: computer crime scene investigation. Hingham, Mass, Charles River Media. Volonino, L., Anzaldua, R., Godwin, J. (2007). Computer forensics: principles and practices. Upper Saddle River, N.J., Pearson/Prentice Hall. Volonino, L., Anzaldua, R. (2008). Computer forensics for dummies. Hoboken, N.J., Wiley. https://www.123library.org/book_details/?id=11847.

Sunday, December 1, 2019

The Holocausts Effects On Wiesel Essay Example For Students

The Holocausts Effects On Wiesel Essay The Effects of the HolocaustOn Wiesels FaithIn early 1944 the town of Sighet, Transylvania was overran by the Nazi war regime as it rapidly expanded across Europe and parts of Asia. In this town a young religious man named Elie Wiesel was questioning the intent of the German army and the rumors that were circling about them. Although he had heard that the Germans were planning mass genocide of the Jewish race, the common feeling throughout the town was that Hitler could never exterminate every Jew. Early in Wiesels Night, he recounts his experiences in the Holocaust and he expresses his undying faith and belief that god would never allow Hitlers regime to run its course. When the Nazi army finally reached the town of Signet, the Jews were forced from their homes and relocated into the towns gettos. We will write a custom essay on The Holocausts Effects On Wiesel specifically for you for only $16.38 $13.9/page Order now It was the seventh day of Passover, and according to Wiesel, the race towards death had begun.1 The Jews were slowly removed from the large getto of Sighet and shipped to the smaller, holding getto where they were separated according to sex, age, and physical ability, and prepared for shipment to Auschwitz. The day that Wiesel and his family were to be moved to the smaller getto of Signet, Wiesel demonstrates his faith in God by awaking early to perform his daily prayers. As he prepared to leave his home he said, I looked at our house, where I had spent so many years in my search for God; in fasting in order to hasten the coming of the Messiah; in imagining what my life would be like. Yet I felt little sorrow.2 This passage is symbolic of his first parting with his faith in God. Yet he still believed in God, he was beginning to understand that a God should not let mass extermination happen to his people. While he was sub-consciencly loosing his faith in God, he still felt that there was strength in humanity and that human morals would never allow the burning of Jews. Upon Wiesels arrival at Auschwitz he caught his first glimpse of the crematories he exclaimed to his father, I do not believe that they can burn people in our agehumanity would never tolerate it.3 Yet after his father convinced him of the horrible truth his faith in god could never be restored.Wiesels father, after fully realizing the full horror of the concentration camps, said a small prayer to God, and to this Elie reacted with utter defiance. For the first time, I felt revolt rise up in me. Why should I bless His name? The Eternal, Lord of the Universe, the All-Powerful and Terrible, was silent. What had I to thank Him for?4 Although Wiesel still believed in the presence of God, he felt that in Gods silence he was defying the Jews and their faith in him. How could someone you are so devoted to be absent in your greatest time of need? Wiesel said that he sympathized with Job, and I feel that the similarities between Wiesel and Job are numerous. Both were very religious men who put their faith before all other, and yet both found that their faith brought them nothing but suffering. Both felt that they deserved a more peaceful and humane existence because of their undying devotion, yet both lived in the cruelest situations for some time. Wiesel felt that man was stronger that god because throughout the Holocaust his fellow prisoners continued to praise God and believed that God allowed the Holocaust in order to benefit the Jews in some strange way. Wiesel felt that because of all the torture that the Jews were subjected to their continued praise proved that they were ignorant to the fact that God was not a source of supreme justice. Wiesel continued to despise God for the remainder of the Holocaust, yet from this new independence he found power. .u1d3bc8d8d46dcb75e57caf918cc755f9 , .u1d3bc8d8d46dcb75e57caf918cc755f9 .postImageUrl , .u1d3bc8d8d46dcb75e57caf918cc755f9 .centered-text-area { min-height: 80px; position: relative; } .u1d3bc8d8d46dcb75e57caf918cc755f9 , .u1d3bc8d8d46dcb75e57caf918cc755f9:hover , .u1d3bc8d8d46dcb75e57caf918cc755f9:visited , .u1d3bc8d8d46dcb75e57caf918cc755f9:active { border:0!important; } .u1d3bc8d8d46dcb75e57caf918cc755f9 .clearfix:after { content: ""; display: table; clear: both; } .u1d3bc8d8d46dcb75e57caf918cc755f9 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u1d3bc8d8d46dcb75e57caf918cc755f9:active , .u1d3bc8d8d46dcb75e57caf918cc755f9:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u1d3bc8d8d46dcb75e57caf918cc755f9 .centered-text-area { width: 100%; position: relative ; } .u1d3bc8d8d46dcb75e57caf918cc755f9 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u1d3bc8d8d46dcb75e57caf918cc755f9 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u1d3bc8d8d46dcb75e57caf918cc755f9 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u1d3bc8d8d46dcb75e57caf918cc755f9:hover .ctaButton { background-color: #34495E!important; } .u1d3bc8d8d46dcb75e57caf918cc755f9 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u1d3bc8d8d46dcb75e57caf918cc755f9 .u1d3bc8d8d46dcb75e57caf918cc755f9-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u1d3bc8d8d46dcb75e57caf918cc755f9:after { content: ""; display: block; clear: both; } READ: Anne frank Essay I felt very strong. I was the accuser, God the accusedI was terribly alone in a world without god and without man.5Religion Essays