.

Tuesday, June 4, 2019

Christmas and Chinese New Year Festival | Comparison

Christmas and Chinese red-hot family Festival ComparisonAfter researching twain Christmas and the Chinese novel Year Festival, fire correspondentities between the two incomparable celebrations came into fruition. For instance, both contain traditional meals, presents, feasts, decorations, songs, poems, beau ideal(s), folk lore, and are family oriented occasions. When discovering similarities, at that place were also perceptible differences between the two, such as the clip of year, and the signifi peckce of the occasion within their respective cultures. This paper forget be showcasing both Christmas, and the Chinese New Year Festival in wrong of their origins, as rise up as the similarities and differences they both share.Christmas is a religious celebratory holi twenty-four hours, which embraces the birth of messiah Christ. Christmas Eve takes place on December 24th, the twenty-four hours in the lead Jesus Christ is born. This is the day where family members gather for a festive meal, which in North America, usu altogethery consists of a large turkey, mashed potatoes, stuffing, vegetables, gravy and wine. It is significant to know that divergent cultures may eat distinct meals. gibe to Wikipedia.org, In Poland, traditional Christmas Eve meals include champion or more of the following foods Golabki filled with Kasza, Pierogi, Borscht, weight soup, carp, and pickled Herring. Krupnik is abouttimes drunk after dinner,1 and In the Republic of Macedonia and Bulgaria, a coin is concealed in a bread loaf and the host breaks a makeup of the loaf at the dinner table for each member of the household it is believed that the one who gets the piece of bread with the coin will be fortunate in the forthcoming year. The dinner is according to the blueprints of fasting fish, baked beans, sauerkraut, walnuts and red wine are common. The dessert may consist of apples and dried fruits plums, dates, figs. The table is usually non uncontaminatinged after the dinner and until the next morning, to leave some food for the holly spirits a custom which probably comes from pagan pre-Christian times.2 Also, there are some(prenominal) families whom may attend mass or choose to divine fast3on this day, as a means to celebrate on the night before Jesus birth. It is important to know that non-religious individuals may also celebrate Christmas as well, whom primarily focus on the family, feasting, and gift self-aggrandising aspect of Christmas. Some may consume Santa Claus, a mythological figure, to be more important than Jesus Christ. Santa Claus is known for travelling across the world on December 24th, from the North Pole, delivering presents to the nice children, composition the naughty children receive a lump of coal. Hence, Santas list for delivering gifts to children is called the naughty or nice list. Santa Clause originates from St. Nicholas, whom tried to help others while inspiring his virtues. Legends of his unselfish giving public exposure all over Northern Europe, and accounts of his heroic deeds blended with regional folklore. Eventually, the image of the stately saint was transformed onto an almost mystical being, one known for rewarding the good and punishing the bad.4 How Santa Clauss name came to be in North America was due to Dutch immigrants whom presented Sinterklaas (meaning St. Nicholas) to the colonies. In their excitement, many English-speaking children utter the name so quickly that Sinterklaas sounded like Santy Claus. After years of mispronunciation, the name evolved into Santa Claus.5 December 25th is the day where Jesus Christ, known to many Christians as their savior, is born. This is the day where a fewer individuals will put up numerous decorations, although many will decorate in advance. Examples of decorations utilise for Christmas are miniature size parthenceogenesis scene figures, stockings, wreaths, ornaments, candles, mistletoes, garlands, poinsettias, Christmas lights an d most importantly, the Christmas tree. The origin of the tree is credited to Saint Boniface (circa 722) who stopped a child from becoming a human sacrifice to a pagan god by striking down the oak tree destined for use as the stake. A fir tree sprang up in its place and he declared it a holy tree and instructed the faithful to carry one to their homes and surround it with love and gifts.6 Ultimately, the blending of numerous cultures is how Santa Claus, as well as the numerous traditions on Christmas Eve and Day, came to be.The Chinese New Year Festival is a major holiday, which has been celebrated in mainland China for many centuries, victorious place on the present moment New Moon after the winter solstice.7 It is significant to know that this festival is also celebrated in other countries by its Chinese inhabitants, while various foreigners contri barelye been known to participate in the festivities as well. During this coming year, 2010, the Chinese will be celebrating the ye ar of the tiger, the for the first time day being on February 14th. According to tales and legends, the beginning of Chinese New Year started with the fight against a mythical beast called the Nien (Chinese ?pinyin nin). Nien would come on the first day of New Year to devour livestock, crops, and even villagers, especially children. To protect themselves, the villagers would put food in front of their doors at the beginning of every year.8 The Chinese not only employ food as a means to protect themselves from Nian, but they also released firecrackers, and wore red attire. Hence, the color red is strongly used finishedout the festival, such as clothing, decorations, envelopes, sweets, gifts, etc. When families come together, they will feast on meat, noodles, rice, dumplings, mandarin oranges, sweets, and so forth. Before the feast, which takes place on the Eve of Chinese New Year, red envelopes with money inside and gifts should have already been distributed amongst family members , and children. The Chinese New Year consists of fifteen days, with the majority of the days each signifying different usance and actions. For instance, The first day of the Lunar New Year is the welcoming of the gods of the heavens and earth. Many people abstain from meat on the first day of the bracing year because it is believed that this will ensure long and happy lives for them,9 The fifth day is called Po Woo. On that day people stay home to welcome the God of Wealth. No one visits families and friends on the fifth day because it will bring both parties bad luck,10 the seventh day of the New Year is the day for farmers to screening their produce. These farmers make a drink from seven types of vegetables to celebrate the occasion. The seventh day is also considered the birthday of human beings. Noodles are eaten to promote longevity and raw fish for success,11 and on the 10th through the 12th are days that friends and relatives should be invited for dinner. After so much ric h food, on the 13th day you should have simple rice congee and mustard greens (choi sum) to cleanse the system.12 These are just a few of the customs that the Chinese celebrate throughout their New Year Festival. It is also the tradition that every family thoroughly cleans the house to sweep away any ill-fortune in hopes to make way for good incoming luck. Windows and doors will be decorated with red color paper-cuts and couplets with popular themes of happiness, wealth, and longevity.13 Decorations are usually red, consisting of pictures, greetings, and Chinese idioms. On the fifteenth and final day of the Chinese New Year Festival, the Lantern Festival takes place. During this period, numerous individuals decorate the streets with Lanterns they have lit, which are primarily red. Some people may add their own unique individuality to a lantern, by adding a song or a poem to it. The Chinese New Year Festival is a high-spirited, content time where family and friends come together in fellow enchant to celebrate years of tradition, such as feasts, decorations, gifts, envelopes, mythology, fortune gods, national pride, etc. It is also an influential festival that has spread across the world, blending in with copious cultures.It is fascinating to learn that Christmas and the Chinese New Year have actual similarities, with slight variations to them. For instance, the use of flowers is strongly used in both celebrations, although the Chinese convention for flowers has a more significant meaning within their culture. A certain flower can symbolize different connotations, for instance, longevity, luck, prosperity, tranquility, health, etc. The Chinese are known for using many different flowers for the Chinese New Year Festival, such as pussy willows, plum blossoms, water supply lilies, bamboo, and so forth. For example, the reason for using pussy willows for the Chinese New Year is In Cantonese, Yin Liu sounds like Yin Lou which is similar to Yin Liang (money). Theref ore, having this plant around during Chinese New Year would represent the invitation of abundant luck and prosperity into homes.14 As for western cultures, when celebrating Christmas, individuals use flowers mostly as decorations. It is principal to know, that there is an origin story of how the poinsettia became the decreed flower for Christmas. The poinsettia is a shrub that features green leaves combined with red, white, or pink leaves surrounding tiny yellow flowers. Used by the Aztecs as a dye and medicine, it is native to Mexico and Central America where it is known as Flores de Noche Buena (Flower of the Holy Night) and was used in these areas by Franciscan friars in Nativity processions as primordial as the 17th century.15 In terms of sweets and baked goods, sticky cake and Christmas cake closely resemble one another. Sticky cake, also known as Neen Gow, is a fruitcake that can be either steamed or baked. This particular cake is do in appreciation for the kitchen god. The Christmas cake started out as porridge from the English, evolving over the past couple of centuries into a fruit cake. The ingredients usually consist of eggs, flour, sugar, butter, marzipan, spices, dried fruit, spices, and whisky. All Christmas cakes are made in advance. Many make them in November, keeping the cake upside down in an airtight container. A small amount of brandy, sherry or whisky is poured into holes in the cake every week until Christmas. This process is called feeding the cake.16Both celebrations are also known for the process of giving and receiving gifts to friends and/or relatives. For instance, during the Chinese New Year, individuals will give gifts, which are usually brought when tour friends or relatives at their homes. Common gifts include fruits (typically oranges, and never pears), cakes, biscuits, chocolates, candies, or some other small gift.17 Christmas gifts are also distributed, and some gifts can be similar to those that are given on the Chinese New Year, but Christmas gifts usually consist from a large variety of options. For example, food, alcohol, jewelry, electronics, toys, household appliances, automobiles, etc.Christmas and the Chinese New Year are both important celebratory occasions, which can bring joy and anticipation amongst those whom celebrate these events. These are times when family, friends and even complete strangers, can come together in harmonious enthusiasm. Both events contain similarities, such as, folk lore, feasts, decorations, gifts, traditions, songs, poems, flowers, God(s), games, etc. Christmas, a westernized occasion, may contain different significance and symbolical meanings to those whom celebrate it rather than those whom celebrate the Chinese New Year. But, the most important thing about these two occasions, even with their differences, is they bring people together, and are both accepting towards all cultures and beliefs.Works CitedRetrieved November.28, 2009 from http//www.wikipedia.org/c hinesesnewyearRetrieved November.28, 2009 from http//www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.htmlRetrieved November.28, 2009 from http//www.ci.lenoir.nc.us/index.asp? typeface=B_EVSEC=%7BF083A2AC-A24E-4B3B-8944-F912226F078D%7DDE=%7B817E6FA1-42C1-4B01-8A28-F0EF2477494F%7DRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November.28, 2009 from http//www.familyculture.com/holidays/chinese_new_year.htm(December.2, 2001)The Guide to Life, the Universe and Everything. Retrieved November.28, 2009 from http//www.bbc.co.uk/dna/h2g2/A665949(February.8, 2007) Popular Chinese New Year Plants. Retrieved November.28, 2009 from http//www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/Davis, John K. (November.10, 2009)The Origins of traditional pass Plants. Retrieved November.28, 2009 from http//botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plantsRetrieved November.28, 2009 from http//www.npark s.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/Retrieved November.28, 2009 from http//botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plantsRetrieved November.28, 2009 from http//www.northpolesantaclaus.com/santa chronicle.htmRetrieved November.28, 2009 from http//www.bbc.co.uk/dna/h2g2/A665949Retrieved November.28, 2009 from http//www.chinapage.com/newyear.htmlRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveReferencesRetrieved November.28, 2009 from http//www.wikipedia.org/chinesesnewyearRetrieved November.28, 2009 from http//www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.htmlRetrieved November.28, 2009 from http//www.ci.lenoir.nc.us/index.asp?Type=B_EVSEC=%7BF083A2AC-A24E-4B3B-8944-F912226F078D%7DDE=%7B817E6FA1-42C1-4B01-8A28-F0EF2477494F%7DRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November.28, 2009 from http//www.familyculture.com/holidays/chinese_new_year. htm(December.2, 2001)The Guide to Life, the Universe and Everything. Retrieved November.28, 2009 from http//www.bbc.co.uk/dna/h2g2/A665949(February.8, 2007) Popular Chinese New Year Plants. Retrieved November.28, 2009 from http//www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/Davis, John K. (November.10, 2009)The Origins of Traditional Holiday Plants. Retrieved November.28, 2009 from http//botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plantsRetrieved November.28, 2009 from http//www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/Retrieved November.28, 2009 from http//botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plantsRetrieved November.28, 2009 from http//www.northpolesantaclaus.com/santahistory.htmRetrieved November.28, 2009 from http//www.bbc.co.uk/dna/h2g2/A665949Retrieved November.28, 2009 from http//www.chinapage.com/newyear.htmlRetrieved November 27 , 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November 27,2009 from http//www.calendar-updates.com/info/holidays/us/christmaseve.aspxRetrieved November 27, 2009 from http//www.ornamentshop.com/history_story/part1.aspRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November 27, 2009 from http//en.wikipedia.org/wiki/Christmas_EveRetrieved November.28, 2009 from http//www.northpolesantaclaus.com/santahistory.htmRetrieved November.28, 2009 from http//www.northpolesantaclaus.com/santahistory.htm(December.2, 2001)The Guide to Life, the Universe and Everything. Retrieved November.28, 2009 from http//www.bbc.co.uk/dna/h2g2/A665949Retrieved November.28, 2009 from http//www.chinapage.com/newyear.htmlRetrieved November.28, 2009 from http//www.wikipedia.org/chinesesnewyearRetrieved November.28, 2009 from http//www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.htmlRetrieved November.28, 2009 from http//www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.htmlRetrieved November.28 2009 from http//www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.htmlRetrieved November.28, 2009 from http//www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.htmlRetrieved November.28, 2009 from http//www.ci.lenoir.nc.us/index.asp?Type=B_EVSEC=%7BF083A2AC-A24E-4B3B-8944-F912226F078D%7DDE=%7B817E6FA1-42C1-4B01-8A28-F0EF2477494F%7D(February.8, 2007) Popular Chinese New Year Plants. Retrieved November.28, 2009 from http//www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/Davis, John K. (November.10, 2009)The Origins of Traditional Holiday Plants. Retrieved November.28, 2009 from http//botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plantsRetrieved November.28, 2009 from http//www.familyculture.com/holidays/chinese_new_year.htmRetrieved November.28, 2009 from http//en.wikipedia.org/wiki/Chinese_New_Year disconnection of Tonkin Incident Military investigationGulf of Tonkin Incident Military InvestigationMilitary Intelligence OrganizationsMilitary Intelligence is a division of legions the purpose of which is to exploit the number of information collected and analysis techniques in order to provide guidance and directions to commanders in support of the crucial decisions made by them. They do it by performing an analysis and assessment of the available data which they gathers from gigantic range of sources, guiding and directing the commanders to make decisions or respond to focused questions as part of their operational campaign. The collected information is first identified and then incorporated into the process of cognizance collection, analysis and dissemination.Military Intelligence Organizations have played their role in resolving conflicts in any nation. Discusses here is the Gulf of Tonkin Incident and the role of U.S. Military Intelligence Organizations to resolve it. The incident took place on A ugust 2 4 1964 (Kim, 1999). This was the incident that helped the Americas function in Vietnam War.Gulf of Tonkin Incident OverviewWhen President Lyndon b. took over charge of the country after the death of President John F. Kennedy, he became worried about the southeasterly Vietnams ability to keep away the Communist Viet Cong guerillas that were actively operating at that time in the country. In order to follow the established policy of containment, the Secretary of Defense at that time Robert McNamara started to increase the military aid to to the south Vietnam (Trueman, 2000). Many Norwegian built fast patrol boats (PTFs) were purchased and sent to South Vietnam. These PTFs helped in alloting a series of attacks on coastal areas of South Vietnam as part of Operation 34A. 34A was originally began by Central Intelligence Agency in 1961, it was a extremely classified program of the covert operations against North Vietnam. Due to several early failed attacks, in 1964 it was tr ansferred to Military Assistance Command, Vietnam Studies and Observations Group, and the focus of it was shifted towards oceanic operations. In due course of time, U.S. Navy was also instructed to conduct Desoto patrols off the North Vietnam.The Desoto Patrols consisted of the American warships cruising in international waters in order to conduct electronic surveillance operations (Shane, 2001). As a result of 34A and the Desoto Patrols, the ships offshore were made able to collect important information about the North Vietnamese Military capabilities.The First AttackOn July 31, 1964 the destroyer USS Maddox conducted the Desoto Patrol off North Vietnam (Paterson, 2008). Under the operational command of Captain John J. Herrick, it steamed through the Gulf of Tonkin collecting intelligence information. This mission was accompanied by several 34A attacks including many big attacks on two islands of North Vietnam. The Government of North Vietnam indomitable to strike the USS Maddox and on August 2, three Soviet built P-4 Motor torpedo boats were dispatched to attack the destroyer. About twenty-eight miles cruising in international waters, the torpedo caught the USS Maddox. In the meanwhile, Herrick requested for air support from the U.S. Air Force. The request was granted and the four F-8 Crusaders were sent towards the Maddox position. Herrick also ordered to fire the three warning shots if the torpedo reaches a range of 10,000 yards of ship. These warning shots were fired and the P-4s launched their first torpedo attack. The Maddox scored fire on P-4s and was just being hit by one 14.5 millimeter machine throttle valve bullet. Soon after fifteen minutes, the F- crusades arrived to rescue the Maddox and started hitting the targeted fires on North Vietnamese boats, damaging the two and leaving the third one dead in the waters. The attack was retreated and the Maddox returned to join its friends but the Desoto mission was continued as per orders of the command er in the Pacific.The Second AttackOn August 4, the American radars, echo sounder and radio signals were received of another North Vietnam attacks. Taking evasive action, the U.S. Maddox fired on numerous radar signals targets. After this incident (Parados, 2004), Herrick was not sure that his ship was attacked by the North Vietnam. Reporting at 127 AM Washington times that due to freak weather, the radar and sonar signals did report some of the enemy ships but nothing has been visualized by the Maddox. After suggesting the complete evaluation of the affair conducted by the U.S military intelligence, Herrick radioed a request asking for a complete reconnaissance in daylight by the aircrafts. But the American aircrafts flying over the area failed to find out any North Vietnam ship.Although there were doubts about the second attack, those present on Maddox were convinced that the attack did happen. This along with the flawed signals intelligence from the National Security Agency led t he forces to attack punitory airstrikes against North Vietnam. On August 5, the Operation Pierce Arrow saw aircrafts from USS Ticonderoga and USS Constellation strike and attack about thirty North Vietnam vessels. Although the subsequent research and records prove that the second attack didnt happen. This was also reinforced by the statements from the retired Vietnamese Defense Minister who admitted the August 2 attack but denied the second attack.After ordering the airstrikes, soon Johnson went on to address the nation on television regarding the incident. He in his address requested the passage of a resolution, which expresses the uniformity and determination of the United States in support of their freedom and in the hope to protect peace in the Southeast Asia (Cohen Solomon, 1994). He also argued that he didnt want a wider war, and said that United States would continue to protect its national interests. As approved on August 6, 1964, the Southeast Asia (Gulf of Tonkin) Resol ution, gave Johnson the power to use military intelligence and force in the region without requiring a declaration of war. Later on over the next few years, Johnson used this resolution to rapidly come forward the U.S. involvement in the Vietnam War.Intelligence has fulfilled the wider ranging and very important functions in different section including security, diplomacy and statecraft (Augustin, 2009). However in past few years, the role of military intelligence in resolution of conflicts has expanded and broadened its range and now it forms the core element of conflict management policies and procedures. Ancient Greece is the first land in the world. It has established several institutions that served as intelligence services. Proxenia were the upper class citizens of Greece who served as top class agents. They used to collect information and even penalize the assassinations if required. The Heralds collected the public and private information. Both were protected by the Law of Greece and only the Heralds used to get the rewards of bringing good news back to the nation. Greece grand political and military achievements really lacked the true intelligence system like today. Although they didnt have the proper intelligence system like today but still they had the intelligence cycle existed in their military endeavors.The two major requirements of intelligence services are democratic control and the effectiveness of the actions and activities (Augustin, 2009). African countries eternally had difficulties in managing and creating the solid intelligence systems. The territory of the Sahara Dessert is always problematic so the military intelligence related to that area is restricted. In 1997, the African countries created a security sector reform whose purpose was to try and narrow the challenges and constraints of developing a proper military intelligence system in the area. The main challenges that African countries are facing these days include the legacy o f the African socialism and colonialism, autocratic military and security services and the unknown and informal activities of the military intelligence services. Gambia established the National Intelligence Agency in order to protect the regime.The unsuccessful attempts of Eisenhower and Kennedy to remove Castro from the power are considered as the failed military intelligence actions (Augustin, 2009). According to them the biggest threat to democracy is the communism. In Cuba, the America supported the Batista leading anti- communist government. After Castro being elected to power, he started quickly eliminating his enemies. And started to nationalize the economy and created knots with the USSR. His actions made it clear by 1960 that he was following the communism path for the Cuba. Eisenhower tried to remove the Castro from power by training Anti-Castro forces and sneaking them into Cuba. They began to target the Cuban sugar handle and the CIA developed an assassination program t o eliminate Castro. Although such attempts were failed again and again, Kennedy tried to invade the Cuba by the Bay of Pigs operation but that was again a failure. This was all due to the strong military intelligence of Castro which saved him from all the American attacks.The Shah of Iran has a weak legitimacy and had lot of enemies (Augustin, 2009), , so to overcome them in 1957, he formed the SAVAK, a national intelligence and security organization. The SAVAK served a tool to torture and eliminated anyone who could prove as a threat to the Shah and his dynasty. No open contrary was allowed against the institution in Iran during Shah Regime, but with the passage of time the resistance of people became worst. Khomeini got exiled to Iraq and then to France because of his increasing popularity and threat to his life. In 1977, censorship law was introduced in Iran in order to retain the Shahs power but due to his detachment from the public, the public dismissed him and Khomeini came t o power after the over throw of the Shah of Iran .In 1980 under the rule of Reagan (Augustin, 2009), The U.S. Intelligence Community realized a ask for more intense intervention in Central America in order to stop the communist expansion. El Salvadors military government was the only potential barrier against the communism in the Central America. The DIA also tried to help the government of El Salvador to assist them fight against the leftist group called as FMLN. The DIA worked and operated with the direct military intelligence information sharing and between 1987 to 1989 a guerilla attack was made by the FMLN which surprised the El Salvador and the American armies. This also showed that how little the U.S support helped. Over all the defense of the El Salvador is considered as the failure in the history of the U.S. military intelligence.Intelligence is basically the sociological phenomenon that is used for the information gathering and to ensure the prevention of hostility (Augus tin, 2009). It is important to differentiate between the intelligence that has been existed in any nation and the intelligence that is established as a result of state concept. Intelligence cycle, covert actions and counter intelligence are all the components essential for decision making process. Intelligence focuses on the hostility both in democracies and non-democracies tenures. Intelligence in democratic system must have strong dealings with the citizens and must work under a licit framework. The functions and scope of working of intelligence agencies must be clarified and their methods of working and sources of information must be protected. However intelligence in the non-democratic system concentrates more on internal opposition rather than external threats. So the intelligence is outside of the scope of legal framework in non-democratic system while intelligence in democracies should only be used to measure level of democracy in the country.In 1960, the Egyptian forces en tered in Sinai which was a big surprise to Israel (Augustin, 2009). The IDF couldnt respond in time and it lead to the result that intelligence was needed for an earlier warning of assertable Egyptian attack. The methods or tools for an earlier warning were HUMINT, the SIGINT and the VISINT. The 1960 rotten affair and the 1973 Vom Kippur war failure show failure of the intelligence system and a need for strong intelligence system.References1 Sankt Augustin (2009), Intelligence and Democracies in Conflict and Peace, retrieved from,http//www.kas.de/israel/en/publications/18450/2 Tom Kim (1999), The Gulf of Tonkin Incident 1964, retrieved from,http//www.thenagain.info/webchron/usa/GulfTonkin.html3 Chris Trueman (2000), Gulf of Tonkin 1964, retrieved fromhttp//www.historylearningsite.co.uk/gulf_tonkin_1964.htm4 Scot Shane (2001), The Gulf of Tonkin Incident, retrieved fromhttp//911review.com/precedent/century/tonkin.html5 police lieutenant Commander Pat Paterson, U.S. Navy (2008), The Truth about Tonkin, retrieved fromhttp//www.usni.org/magazines/navalhistory/2008-02/truth-about-tonkin6John Parados (2004), The Gulf of Tonkin Incident, 40 Years later, retrieved fromhttp//www2.gwu.edu/nsarchiv/NSAEBB/NSAEBB132/7 Jeff Cohen and Norman Solomon (1994), 30-Years anniversary, Tonkin Gulf Lie Launched Vietnam War, retrieved fromhttp//fair.org/media-beat-column/30-year-anniversary-tonkin-gulf-lie-launched-vietnam-war/

No comments:

Post a Comment