Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Tee Shirt Enforcement Agency - 1,502 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

Creative Writing: The Big Scoop Hello, my name is Jack Williams. I am a reporter you have been hearing a lot about and this is how I gathered my information for my article on Computers, Hacking, And Usa's Citizens that has been causing so much uproar in many states and even in the government. Recently, people have claimed that I fantasized everything in the report and that I should work in the fiction field in stead of journalism, so here is the exact way I received my information for my story. I will start from the top and I will try not to miss a detail so you can fully understand me.

It was the first Friday of July and it was like any typical midsummer evening at 6: 00 pm. The sun was still out shining down, just turning red for sunset. It was not especially hot, but it was still tee-shirt weather. I walked down the rather clean street towards the Citicorp building, thinking excitedly about what was going to happen at the meeting and about what information I could receive from this experience.

It was not long before I was standing in front of the modern Citicorp building. The building exterior consisted of mainly large glass windows which provided a very vivid reflection of the neighboring buildings, almost camouflaging its presence on the block. I thought of how the buildings appearence is suiting for what is happening inside at that moment. I casually walked into the revolving glass doors that stood at the base of the building. There were plenty of stores to my left and right. They ranged from candy stores selling snickers bars and almond joy to fast food restaurants selling burgers and french fries and all of the had people inside of them, spending the money they just withdrew from the nearby ATM machines and the tellers upstairs.

It was the typical gimmick to make people spend their money, let them have easy access to it, so it was nothing surprising to me. I continued to walk towards the back of the building looking at all the stores to my sides until I reached the very back of the building, right in front of Barnes &# 038; Nobles. I saw a crowd of people standing there, all of mixed ages and nationality. None were alike. These were not the normal people you would picture as vivid computer lovers or people who liked to hack. People exchanged disks everywhere in sight.

There were all types of people sharing information about everything from the latest computer security weakness or newest computer visit to what new programs were released today. Forty year old men and women in suits and ties standing, talking, and exchanging information with kids age ten to fifteen who were dressed in skater outfits. In other places people from foreign countries spoke with Americans overlooking their differences. They all shared the same interest in hacking and computer technology. They live in their own world where dollars mean nothing and disks mean everything.

I casually walked into the crowd towards a man who seemed rather interesting to me. He was a tall man, about 30. The man was wearing Levis jeans, a clean white tee-shirt that said duh? in large straight black letters, and a large red and black side bag full of printed papers. He handed me some paper and told me in a semi-happy voice to take a look at that and that it would explain everything. I threw the paper into my bag saying to my self that this guy belongs in a mental institution if he actually believed that one piece of paper could explain the whole hacker world and I walked on to the other side of the room.

There was a kid standing there in the normal baggy pants and tee shirt working on a toshiba laptop. Wanting to get the information I needed for my story, I walked over to the kid and asked him what he was up to and to my surprise he asked me in a deep voice if I was affiliated with any law enforcement agencies such as the F. B. I. or the C.

I. A... I said to myself why would I be with a law enforcement agency, but to get information, I tried to play it out very casually and said told him no, but if I was, I dont think I would tell him. He said to me that by law, I would be required to tell him the truth on that question if I was a member of a law enforcement agency. I was shocked becuase I did not know about that. He asked me again if I was a member of a law enforcement agency, and I replied that I wasnt.

He said that he didnt think I was but he is always better safe than sorry. At this point I thought this guy was off the wall crazy or a really well informed kid, but again I reminded myself about the story I was writing. I asked him what he was doing in a nonchalant voice and his response astounded me. He said he was trying to hack a computer server. It was not so much the idea of hacking a server, because I knew everyone in the meeting was looking to do that or to learn how to do that, but it was the way he said it. The way it flowed was as if it was nothing special, nothing that did not happen everyday.

This kid seemed to be my story standing live in front of me. I played as what hackers, partakers (people who play with telephone companies), and software pirates call a lamer, which is someone who is a complete computer idiot or knows very little. I asked him if he tried to break into computer systems often and he replied everyday and that he was usually successful on all of them. He just continued typing his unix commands which went way over my computer training. I figured that he was entranced enough with his hacking that I would be able to ask him a few more questions. I proceeded to ask him about how many American kids and adult like to hack and or peak, what percentage of hackers were kids and how many were adults and the like.

The responses were astounding and I checked with other people on these answers and they turned out to be frighteningly correct. When I asked him, why hackers do what they do, he grabbed my bag and pulled out the paper the man had given me earlier and rudely said that I should read that and leave him alone. I could tell that I had outlived my short welcome being a lamer, so off I went into a secluded corner and read the document which the man had given me. It was written by a hacker called the mentor just a few days before he was sentenced to a jail term, I believe it was a fifty year term so he entitled it The Mentors Last Words.

It told me about what goes on in a hackers mind and why they do it. It also showed me what hackers really are; they are not really criminals, at least not all of them. They are curious and seek knowledge. According to them and this document the true hacker never destroys, just looks. That is the essence of the United States Hacker. He is neither male nor female.

He does not age nor does he have a nationality. People must realize most of these people will never meet anywhere except in a virtual chat room and will never hear each others voice. They have no choice but to judge people by what they do and not what they look like or by their age. The Citizens view of hackers is completely distorted.

All you see is what the government wants you to see and by know even the most sheltered of American citizens know how deranged the government can be. We are afraid of hackers becuase we dont understand them and I dont blame you becuase that is human nature to fear what you can not explain. What my article was trying to present was the truth about hackers because the amount that you know is a joke, plain and simple. This is where I received my story from.

Yes it is depressing that more and more people like to hack and peak, but in a way, it is also good. Now quite frankly I dont care if you believe me or not and probably if you do believe me you will say you dont because you are scared to believe me, but that is a battle I cant put to words as a story nor can I fight it for you. So, having finished my explanation, I say good night and thank you for coming and listening.


Free research essays on topics related to: law enforcement, hackers, walked, enforcement agency, tee shirt

Research essay sample on Tee Shirt Enforcement Agency

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com