Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Digital Influence Mercenaries

What’s the Difference Between a Samurai and a Ninja?

admin by admin
Dec 22, 2022
in Digital Influence Mercenaries
0 0
A A
0
FacebookTwitterLinkedIn

Hindsight has a way of glamorizing warfare. Just ask Sarah Thal, a historian of “early modern and modern Japan” who teaches at the University of Wisconsin-Madison.

“During the long peace of the Tokugawa era, when samurai came to work more as administrators than as fighters, many romanticized the earlier times of war (in the 12th to 16th centuries for instance) when samurai actually fought,” she says in an email.

The last shogun was overthrown in 1868. Afterward, Japan entered its reformative Meiji Period, which embraced industry and centralized governance. Historically, the samurai had served feudal lords and enjoyed special privileges. But all that soon changed.

“The official status of samurai was abolished in 1869 and their privileges revoked in the early 1870s,” Thal explains. “With the abolition of their lords’ domains, many former samurai were out of work, unable to get jobs in the new government.

“In the 1890s, they, their children, and many Japanese began trying to define a ‘Way of the Samurai’ that operated both as a nostalgia for the supposedly moral, good old days and as a critique of the modernizing trends of the time,” Thal says.

Enter Nitobe Inazō. A diplomat and author, he radically transformed the way future generations would look at samurai. In 1899, Inazō published an influential book called “Bushido: The Soul of Japan.” The text presents itself as an introduction to “bushido.” According to Inazō, this was the traditional, universal code of conduct observed by real-world samurai.

Except it wasn’t. “The so-called ‘samurai code’ of bushido did not exist in the [Sengoku] heyday of samurai warfare,” Kapur notes. The word “bushido” itself wasn’t coined until the peaceful Tokugawa Period.

But it’s from “Bushido: The Soul of Japan” that we get some of the most pervasive myths about samurai values and behavior. “Samurai were not all the moral, noble, well-to-do spiritual swordsmen depicted in film,” Thal says. “They did not have a single, coherent moral code that defined how they thought and acted.”

“Just like warriors anywhere else,” adds Kapur, “samurai raped and looted and pillaged and were constantly betraying their lords.”

While samurai were real warriors in Japanese history, the stories of mercenaries known as ninjas are, well, kind of fabricated.

tunart/Getty Images

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Opinion | Venezuela shows how mercenaries have become a global security threat
Digital Influence Mercenaries

Opinion | Venezuela shows how mercenaries have become a global security threat

Russian mercenaries leave trail of destruction in the Central African Republic
Digital Influence Mercenaries

Russian mercenaries leave trail of destruction in the Central African Republic

Germany at a crossroads over Sahel mission – DW – 10/11/2022
Digital Influence Mercenaries

Germany at a crossroads over Sahel mission – DW – 10/11/2022

Burkina Faso latest to ‘hire Russian mercenaries’, Ghana alleges
Digital Influence Mercenaries

Burkina Faso latest to ‘hire Russian mercenaries’, Ghana alleges

What to know about the Wagner group, a ‘brutal’ Russian military group fighting in Ukraine
Digital Influence Mercenaries

What to know about the Wagner group, a ‘brutal’ Russian military group fighting in Ukraine

Crypto Kids Love Runescape, But They’re Making Their Own Game Backwards
Digital Influence Mercenaries

Crypto Kids Love Runescape, But They’re Making Their Own Game Backwards

Should You Ever Pause 401(k) Contributions? Morningstar Weighs In
Digital Influence Mercenaries

Should You Ever Pause 401(k) Contributions? Morningstar Weighs In

Menswear creeps up on Fashion Week’s centre stage
Digital Influence Mercenaries

Menswear creeps up on Fashion Week’s centre stage

Russia-Ukraine war | Moscow calling in military support, recruiting mercenaries: Report
Digital Influence Mercenaries

Russia-Ukraine war | Moscow calling in military support, recruiting mercenaries: Report

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

What Security Leaders Need to Know

What Security Leaders Need to Know

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry
  • Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
  • Popular VPN Software Flaw Let Attackers Crash the Systems

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.