View allAll Photos Tagged Cyberspace
Books L to R
Cyberspace edited by Michael L. Benedikt.
Inside I found a clipping from Viilage Voice withthis story: Phiber Optik Goes Directly to Jail by Julian Dibbel. Dibell, the author of A Rape in Cyberspace an oft-cited article on Lambdamoo which was expanded in My Tiny Life and, most recently Play Money, has been writing interestingly and entertainingly about virtual communities since the early 90's.
Basics of Left-Handed Calligraphy by Margaret Shepherd
Presidents Birthplaces, Homes and Burial Sites by Rachel M. Kochmann
Tales of Times Square by Josh Alan Friedman
The Celts by Nora Chadwick
Queen Victoria's Little Wars by Byron Farwell
Bye Bye Baby: My Tragic Love Affair with The Bay City Rollers by Caroline Sullivan
Even music critics were young once
The Kingdom in the Country by James Conaway
The History of England by Thomas Babington Macaulay
Private Lives, Public Spirit: Britain: 1870-1914 (Social Hist of Britain) by Jose Harris
Paper Moon by Joe David Brown
Originally titled Addie Pray the book from which Movie (and then, apparently, the TV series) was made
The Vanishing Hitchhiker: American Urban Legends and Their Meanings by Jan Harold Brunvand
Outside Lies Magic: Regaining History and Awareness in Everyday Places by John R. Stilgoe
The Reshaping of Everyday Life: 1790-1840 (Everyday Life in America) . by Jack Larkin
George Orwell: As I Please, 1943-1945 : The Collected Essays, Journalism & Letters (Collected Essays Journalism and Letters of George Orwell) by George Orwell
Spiked Boots: Sketches of the North Country by Robert E. Pike
He's a lumberjack
Just the One: The Wives and Times of Jeffrey Bernard by Graham Lord
A life of Jeffrey Bernard a frequently unwell journalist who liked a drink. Or, probably, a drinker who liked to write. His autobiography, Low Life is most entertaining, if also frightening.
The Rape of Nanking: The Forgotten Holocaust of World War II by Iris Chang
The Best Short Stories of Rudyard Kipling by Rudyard Kipling
All the Devils Are Here by David Seabrook
Children of the City: At Work and At Play by David Nasaw
Res Gestae Divi Augusti: The Achievements of the Divine Augustus by Augustus
The Hard Life: An Exegesis of Squalor by Flann O'Brien
Scent of Dried Roses by Tim Lott
Medieval Village by G. G. Coulton
One Night Stands by Rosa Liksom
Front Row (mugs):
The mug of the book by Françoise Sagan
Model: Saphir Noir & Samuel Nox
Cyberpunk Shooting
Location: Regensburg
Bearbeitung: Jürgen Krall Photography
-------------------------------
Bild Nr.: 120_5099
In this shot, santa_sangre seems to be floating around outrun cyberspace
Lightpainting details: I had my gen3basic board with the new and improved 144 LED/M staff and one pattern. I also had my lightpainting feather with the old 60 LED/M staff showing a bitmap using CircuitPython. So, grab one, wave it around, then grab the other.
WPC 2010, Marrakesh, October 17 – Ulysse Gosset, Journalist, France Televisions; Nathalie Kosciusko-Morizet, Minister of State for Forward Planning and Development of the Digital Economy
From an article in The Hollywood Reporter
This is from a hardhat tour I took of the Experience Music Project in Seattle as it was nearing completion April, 2000.
Note the Guitar World Special Issue Sept. 1985, edited by yours truly, Noë the G.
I wrote about it in this article, which was syndicated by the BPI Newswire but has somehow disappeared from cyberspace. Now it's back.
Experience This / A first look at Paul Allen's ambitious rock'n' roll temple
The Hollywood Reporter
June 13, 2000
By Noë Gold
All photos by Noë Gold
The high walls of the Sky Church are rumbling, literally shaking with a presence that is not of this Earth.
On the physical plane, the cavernous exhibition hall sits in Seattle, a few yards from the terminus of the monorail that links the city's downtown to its monolithic Space Needle.
On the spiritual plane, Jimi Hendrix, the avatar of guitar-driven rock 'n' roll who first asked "Are You Experienced?" is very much in the house -- a gleaming, new house that media mogul Paul G. Allen has built to honor popular American music.
The Sky Church is the spiritual centerpiece of the soon-to-open Experience Music Project, a massive museum designed by famed architect Frank O. Gehry to enclose 140,000 square feet of free-flowing, music-related exhibits on a 35,000 square-foot plot of land carved out of the city's once-grand Seattle Center.
The references to the Seattle-born Hendrix are intentional. The museum's mission, its founders say, is to have people experience the music. Come June 23, the first paying guests will find out what's going on inside the twisted, sky blue and magenta-hued piece of architecture that has been under construction since 1997.
The Sky Church concept is taken from one of Hendrix's dreams, in which he described a place where all diverse people could come together to appreciate music. The space fulfills Hendrix's prophecy by doubling as a grand exhibition hall by day and a performance space at night.
The EMP itself can be described as a museum with aspects of a theme park, through which people will take a "ride" amid the cultural artifacts that celebrate the blues-based, soul-inflected, rockabilly roots of American music.
More than 800,000 are expected to visit the nonprofit facility each year, with top ticket prices set at $19.95.
The museum opens with a party that will include musical performances by James Brown, Metallica, Red Hot Chili Peppers, Eminem and Snoop Dogg, Alanis Morissette, Eurythmics and Bo Diddley. MTV and VH1 will televise much of the hoopla.
Jody Patton, the EMP's co-founder and executive director and Allen's sister, dates the museum's genesis to 1992, when she and her brother attended a Sotheby's auction of rock 'n' roll memorabilia.
"Paul was intrigued by the artifacts," she says, "and we did the bidding. When the pieces arrived, we gingerly unpacked these things and we were in awe of how the spirit of the person who used them becomes imbued in the personal article. Paul said, 'If I think this stuff is really neat, then other people will be moved as well.'"
In Allen's longhair days, he played a Fender guitar. The obsession continues, except today Allen owns the Stratocaster that Hendrix played at Woodstock in 1969. And a whole lot of other stuff -- 80,000 artifacts, in fact, now reside here. More than 1,200 of them will be on display at at any given time.
The EMP's Hendrix Gallery enshrines the contract signed by the musician for Woodstock, revered objects of Hendrix's outrageous clothing and Allen's version of pieces of the cross: fragments of a guitar Hendrix smashed and burned at 1967's Monterey International Pop Festival.
The Guitar Gallery gives museum-style prominence to artifacts of rock like an early electric lap steel guitar, a Gibson Flying V prototype and axes played by the likes of the Byrds' Roger McGuinn and bluesman Tampa Red. There is a trumpet from Quincy Jones' early days in Seattle and song lyrics by another Seattlite, the late grunge rocker Kurt Cobain. Bob Dylan's harmonica and Janis Joplin's pants are there, too.
A recent hard-hat tour reveals EMP is no mere memorabilia collection. Flat-screen monitors and interactive displays are everywhere. A snaking corridor leads to the "Crossroads" exhibit, the main exhibition area, where disparate musicians like Hendrix, hip-hop and Bing Crosby meet via multimedia.
Patrons can also wander into hands-on personal studios, where they can try their hands at keyboards, drums and guitars.
The facility is truly wired, with organizers especially proud of the flooring itself, a raised platform made of modular concrete slabs that can be removed and bolted down to give technicians access to miles of high-definition optical cable and ISDN lines.
Via a modular data processing unit called a MEG, visitors can zoom in on various exhibits and receive data about what they are seeing. They can then download bookmarks that may be accessed later.
In researching his designs for the building, Gehry visited a music store and looked at guitars, bringing some home and deconstructing them. "It's not supposed to be a smashed-up guitar," says EMP's design and construction project manager, Paul Zumwalt, who created the Portland Trail Blazers' Rose Garden basketball arena, another Paul Allen edifice. "It's about the spirit of the music, with its flow and movement."
Originally, the monorail was supposed to stop short of the building. But when Gehry saw that the monorail bisected the site, he began to play.
Allen and his sister wanted an architectural design that "could literally express the way we respond to the music." And the music she was describing is anything but conventional. Allen used the word "swoopy."
Swoopy is what they got. There is not a right angle in the place. Neighbors who watched the building come together were mystified by what looked like a jumble of curved metallic sections reaching up into the sky.
"What appealed to me about Frank," Patton says of the architect," was his commitment to exploring the process. ... His designs go to a new place aesthetically -- the curves. It is a living, moving, organic thing."
Kind of like Electric Ladyland.
From an article in The Hollywood Reporter
Links referenced within this article
Find this article at:
doctornoemedia.blogspot.com/2013/02/experience-music-proj...
Now dig this ...
Graham Webster, Lecturer and Senior Fellow, Paul Tsai China Center at Yale Law School;
Samm Sacks, Senior Fellow in the Technology Policy Program, Center for Strategic & International Studies
The fireplace is casting a blanket of warmth through our cottage home but I still feel chilled. The small lake is as clear as a mirror today, leaves reflected in and floating on the surface burn with rich colours but I can’t really enjoy them today.
It was October 2002 and the cottage was on Bell Lake in the Gatineau Hills of Quebec. I had just spent three weeks in Iqaluit, Nunavut getting the academic year's courses underway. Within a few days of my return to the Ottawa area the youth suicide epidemic struck again. I wrote this letter to cyberspace but I really did not expect any response.
Yesterday my urban Inuit students in their course on Inuit art, spoke of death --- too many deaths, too many funerals and fresh graves in small communities where almost no one is left untouched. Another youth, Jimmy took his life last weekend in Iqaluit, Nunavut. The suicide rate in North America’s far north has no equal anywhere on our globe. We couldn't just talk about sculpture, prints and drawings. I strained to hear not just to listen . . . to force time to slow down. I was out of sync with the cadence of their voices. These are supposed to be the learners but I am learning from them. They were grappling with the loss of someone who was a real embodied presence throughout their youth and childhood. I needed them to help me understand. I speak too fast with too many words.
Seventeen hours later after trying to watch brain candy or tranquilize my mind with the hues and saturations of the lake leaves, I am still unable to settle in to my real world obligations. So I am writing letters to cyberspace addressing them to journalists. We are connected. NYT journalists do not simply produce our news stories, they construct our communal archives. The political philosophies that appear in the Times columns inform conversations internationally. Decisions made, policies enacted, interventions, transactions and agreements undertaken in New York, California, Washington, Kyoto, Rio Janeiro, The Hague, Tel Aviv, Baghdad, Beijing, Winnipeg, Ottawa and Toronto have as much --- if not more --- impact than conversations and consultations held in Nunavut. Assumptions and debates about the market, big or small government, direct democracy, policing, racial profiling, drugs, welfare, poverty, taxes that are covered in the pages of the New York Times impact far beyond the space on the grid of a New York mile and the time contained in a New York minute.
This is not Jimmy’s story. Inuit have tried hard to teach me that I cannot tell their stories. I can only tell my story through my eyes and my experience. Jimmy used to live in Iqaluit, Nunavut. He had a good construction job and his friends knew him as a young man who had a lot to live for.
Construction in Nunavut is booming. Entrepreneurs come north for several years or decades and legally amass fortunes as they rush ahead to improve southern Canada’s GNP by building, renting and leasing northern dwellings at prices several times the cost of a similar dwelling in the south. This is a boon to government workers and the upper middle class both Inuit and non-Inuit. According to the logic of the marketplace, this will eventually trickle down to the Inuit who are the most disadvantaged in the North in regards to underemployment, access to education, health and housing. But the youth are dying so quickly I don’t know how many will be there to benefit when help finally does arrive. In the midst of this construction boom many Inuit are still living in overcrowding conditions shockingly comparable to the Third World. Nunavut is a conflicted region of great promise after negotiating a more equitable relationship to the rest of Canada but it is also a region of ever-deepening despair. Extremes of wealth and poverty co-exist with intimacy that is too close for comfort.
Last week Jimmy was part of the boom. He was one of the fortunate Inuit who had found a job. The friends who introduced me to Jimmy through their memories of him, described a young man full of promise. The cadence of the conversations yesterday, like many kitchen table conversations with First Nations, Inuit and Metis friends resonates with the dialogue and silences that narrate the ‘long take’ vistas of a Zach Kunuk video. One of the students from the Igloolik area --- where Atanarjuat was filmed --- spent yesterday afternoon tracing intricate trails in red on a university photocopy of a 1-125,000 map of the islands, waterways and mainland that he knew intimately from his years of traveling with his grandfather. As he traced the pathways, he meticulously wrote the names of familiar places in red syllabics. From time to time he would explain the meaning of these coded words. Each place name described the physical space so accurately it was as though he succeeded in breaking the code that unlocked Borges’ ‘Art of Cartography.’ As he spoke, Julia whispered warnings about imposed flag post place names like Fury Strait. He created a virtual image for me --- and anyone else in the room who strained to listen. The images, sounds and smells he evoked were themselves Hauntings. As he traced and retraced these red pathways that barely covered inches on the photocopied map --- I, the cyborg collector of digital archives, could take a Janet Cardiff’s Wanås Walk… three-hour hikes… seven-hour hikes to his favourite places… seeing panoramas vicariously through his eyes… hearing silence and the wind, tasting… smelling. The place names acknowledged the super natural market of food supplies available to travelers who had local knowledge. He indicated and word painted the tiny island called Tern Island where his father was born.
He fingered the miniscule unmarked place on the map haunted by the toxicity of the abandoned Dew Line site that is socially, historically, politically, emotionally and physically charged. These stories of these sites, like the stories of the many suicide martyrs, have been erased from communal memory. But the threat of their toxins is a constant reminder of the fragility of the micro ecosystem of this unique place.
The island of Igloolik --- the place of many dwellings --- is where the family of my guide on my vicarious journey, returned for generations. Centuries of overlapping circular trails could be traced on this map in sharp contrast to the grid-like pattern of modernity cut into a New York mile of urban architectural spaces. The layered trails would represent countless seasonal journeys from hunting camp to fishing camp traveling on foot, by dogsled, kayak, Peterhead, snow machine or by foot. Like so many isolated places in the North --- Igloolik --- has been inhabited by the semi-nomadic Inuit for centuries if not millennia. Travelers walking on the land still come across centuries-old natural museums, archives and caches that should have been forgotten. Because the archives are not written, there is an assumption that they do not exist. But the tundra itself has written the story of the early travelers in vivid colours on ancient abandoned sites. Tiny resistant plants that flourished on organic accumulative remains unlock the entrance to the site of ancient bones and tusks. Discarded objects and ancient bones tell stories of those who traveled before.
How far can you go in a New York minute? How many miles are encompassed in the Wall Street grid? How much widescreen and close-up geography can be covered in the longue duree, the ‘long take’, the extended view that echoes natural time. Jimmy’s identity was a personal geography he inhabited, composed of endlessly repeated everyday habits haunted by a communal history that resists the forced act of forgetting.
This week Jimmy’s life and story is beginning a process of being wiped out, completely erased, deleted from communal memory. In an everyday life process his image is beginning already to move from opacity to transparency in the painful but unspoken process of total erasure from a community’s memory. Once the local memory is completely gone, the tiny byte of time and place that he once occupied will be irretrievable from the meta files of data being processed in this the age of the great flood of the archives. If he had children they will never know their father’s story. His image will not be found in photo albums nor will laughter at his exploits be shared around kitchen tables. His name --- if it ever does come up again --- will be spoken only in whispers. Jimmy is not being cruelly punished for dying young. His memory, his life is doubly and triply erased in a desperate attempt to save the youth around him. In Iqaluit, Nunavut there is still nowhere for those youth-at-risk to go for help. They are living and dying through the worst epidemic of suicide on the planet.
When my granddaughters are reading the socio-economic, cultural and political histories of North America several decades from now, how will the story be told? How can and will the bones of this entire generation of our youth be explained and justified? These are our youth. They are not Canadian or American. They are North American.
Maureen Flynn-Burhoe
October, 2003
Bell Lake, Quebec, Canada
I had just returned from Iqaluit, Nunavut where I had set up two courses. I had developed a northern-centred course on Human Rights that was I was teaching along with the Introduction to Sociology I had taught from January to June in 2002. I didn't really want to return to Nunavut but the Director and administrators of the Centre for Initiatives in Education really wanted me to go again. Last term was such a success they had signed an agreement with Nunavut Arctic College President, McClenning. But the Inuit Art Foundation in Ottawa wanted me to teach their courses again as well. So I was commuting between Iqaluit and Ottawa. My own PhD was moving too slowly.
Email correspondence in response to letter
Date: Fri, 24 Oct 2003 16:01:08 -0400
Subject: Re: An Epidemic of Youth Suicide
To: Maureen Flynn-Burhoe
From a friend and mother who works in education in Iqaluit, Nunavut
Thank you for your for sensitive insights and for taking action. Your letter is very eloquent and persuasive. I am at my wits end with the number of deaths as it impacts so terribly on the youth left behind. I had to get my x out of town once again at the end of August after a friend died in a wasteful and tragic car accident. x stayed out visiting family and friends, then joined x and I for Thanksgiving in our x house. It was so peaceful and sane. We all returned on Sunday. The very first phone call to x was from a friend informing x of Jimmy's suicide. x had worked with Jimmy last summer at x. x just collapsed and all the healing seems for nought. Yet x went to the funeral yesterday, but today x hasn't really risen from bed. And at lunch today, I heard that x's step son (really her grand son) died last night, a possible suicide, but we won't know until the autopsy is completed. He was only 19. I think we may have to move away, just in order to keep our x healthy and optimistic about life and youth. Again, though you letter so beautifully articulated the problem. I hope they respond.
From a friend, an anthropologist in Israel working with an off-campus Social Work program for Bedouin women:
Your letter arrived just in the right time to strengthen my belief that, after all, we are connected by some sort of a great path leading us to the same places, meeting us at some crossroads. In two days I am about to start a new course named "Inter-cultural Training in Human Services". Your letter will certainly be shared with the students at the beginning of the course, used as a starting point. I thank you so much for letting me be part of your healing -I consider it as our mutual need for healing. I know from very close the feelings of self-devastation, just from hearing about the silent violence in their lives. But we need to heal ourselves so we can continue hearing the stories and expand the message as far as we can, to as many ears we can, especially to those who can make changes. The act of hearing itself is, I believe, a direct healing process, a humanizing process, we experience with the direct victims of the community, all hurt by the violence. Be strong and courageous to go on in this painful task and remember to take care of yourself. I am always here for you (despite the distance) very close to you in my thoughts and feelings. wish you all the best and warm hugs to x, x
From a university student
Your story was emotionally moving. It is truly unfortunate how there are not enough articles that try and explain the truth, that will attempt to reveal an alternate side to what is actually going on. The newspaper is a valuable source of information, however if we cannot rely on it to report factual accounts than how are we to remain informed? I find that in today’s society it is getting harder and harder to experience true reality. Organizations that are supposed to relay news to us (the individuals) such as CNN, The New York Times, The Ottawa Sun, etc… seem to always have an incredibly bias view on things. It is unfortunate that instances like these occur yet; it seems that if they were to print the truth they would have too much to lose thus, resulting in uninformed patrons, such as yourself and others like me. The account you heard about Jimmy, appears to be a common story in native life these days, and it makes me sore inside. This summer on my way to Vancouver I had the pleasure of being seated next to a lovely young girl named Suzie. She was a young lady from Coral harbor – a small island off the coast of Hudson Bay in Nunavut. As we flew I found out many interesting things about the life she lived. The way hers differed from mine was substantially significant. She told me about her life up north, how she witness first hand a good friend of hers commit suicide, she experienced her brother take his own life, and even her local high school, it seemed like there was another case of suicide every other week. She was flying back to Victoria where she attended a fashion design school. Talking to her really opened my eyes up as I am sure your students opened yours. It was wonderful to see how far she had come along; taking into account the experiences she had gone through.
I believe part of the problem these youth face is the way in which society “has” regarded them. In the past native people have always been looked down upon and have been pushed around physically and mentally. There have been many repercussions created to alleviate the Native community, however many of these things have come a little too late. Obviously the argument can be made stating that these repercussions are better than nothing, yet it still doesn’t account for the losses native youth will suffer.
In order to understand what is actually going on in places such as Iqaluit there needs to be a proper healing process. Having stories printed in newspapers about those who have suffered are only the beginning of the healing process. Marilyn Manson, a famous musician was asked what he would have done to prevent the shooting that occurred at Columbine High School. He said “I wouldn’t have said anything to them; I would have listened to them, and what they had to say.” This is an attitude that should be adopted by many more school officials that deal with students and stressful environments. The youth of Iqaulit not only deserve someone to direct them in correct directions they NEED someone who is willing to listen and to understand their problems. Peter Tenute
Labels: benign colonialism, inuit social history, RCAP, youth suicide
Finally, the inside of the sleeve advertises Sam's Club's digital photo services. Correct me if I'm wrong, but I don't think you can get any more early computing-era than that graphic on the left, lol! “We're in cyberspace,” clunky old computer, floppy disk, rainbow trails... love it XD
(c) 2016 Retail Retell
By uploading these 1990s photo sleeves, I'm meaning to showcase the past - nothing else. No copyright infringement, however old, is intended, nor am I responsible for any repercussions (humiliating or otherwise) you receive for attempting use of any expired coupons photographed. And as always, if you share or use my photos, I'd appreciate if you gave me credit. :)
I took this shot when I was leaving Wilderness Park. By then my toes were really cold even though I was wearing boots.
CLICK TO READ THE ORIGINAL ARTICLE
No doubt there are many advantages to in-person photography groups, but let’s face it: the Internet has opened a whole new world for sharing and discussing photography. In many respects cyberspace is the perfect media for images. In fact, it was the evolution of the Internet from text-only communication to text PLUS images that catapulted it from a place inhabited mostly by academics and techy people to a world that encompasses the whole world.
The current success of one photo-sharing community in particular has proven that photographers from many countries, with all sorts of backgrounds, with all skill levels, love communicating via images. Let’s see, what’s the name of that community?…. Oh yeah, FLICKR.
Why do people love such photo sharing communities? Although there’s always a technical learning curve when entering a new online environment, the software infrastructure, when well designed, makes it easy to upload, label, organize, comment on, and search for images. Good technical design also includes many of the features that make any online community successful: the ability for group discussion as well as private communication, profile pages for presenting your background information and establishing your online identity, interesting places for people to gather, social networking features, and, most importantly, your own personal “space” within the community that you can shape to reflect your personality and interests.
People also love these communities because of the PEOPLE. Research in the new field known as psychology of cyberspace or “cyberpsychology” clearly shows that online relationships and groups can be very meaningful additions to a person’s life. I first discovered this years ago when I was a member of the Palace avatar community. This research taught me that an online lifestyle, in some ways, is very similar to your in-person lifestyle - and in some ways it is very different, especially in communities that emphasize images. Cyberpsychology has uncovered some fascinating questions that inhabitants of Flickr encounter every day:
- What do people’s photos and images say about them?
- Do they express their “real” identity in their images?
-What should I reveal and not reveal about myself in the images and comments I post?
- What are the ambiguities and miscommunications that tend to happen when people express themselves with images, and with typed comments?
- How do I react when people reply to me and my photos with positive or negative comments? What does it mean if I get no response at all?
- Why am I drawn to some people, photos, and groups, and not others?
- What does it take to feel like I BELONG to this community?
- Is it possible to get “addicted?”
Participating in a photo sharing communities can help you evaluate yourself as a photographer. As you observe a wide range of photographic styles, techniques, and skill levels, you’ll get a better sense of your own strengths and weaknesses. You’ll get a better sense of where you want to go with your work. When communities like Flickr provide features that enable people to comment on and rate images, you can gather tangible information about how “good” your photography might be – although it’s often wise to take view counts and rating systems with a big grain of salt. Online communities can be complex, confusing places, with many different subgroups and subcultures, and no simple way to predict how and why they react to each other the way they do. To benefit the most from photo sharing communities, take what makes sense, seems useful, and feels good - and leave the rest.
* This image and essay are part of a book on Photographic Psychology that I’m writing within Flickr. Please see the set description.
Taken yesterday evening. It was a blackbird singing its little heart out.
best viewed large (800x600)
On a feathery tip of the eagles wing
In the majestic beauty in flight it brings
My love will follow you
On the digital waves of cyberspace
In the words that fly at a lightning pace
My love will follow you
On the strings of a heart, touched by few
No matter where I go, no matter what I do
My love will follow you
Leria Hawkins
Model: Saphir Noir & Samuel Nox
Cyberpunk Shooting
Location: Regensburg
Bearbeitung: Jürgen Krall Photography
-------------------------------
Bild Nr.: 120_5046
Have a great day...dear friends!! :-)
_________________________________________________________________________________
© Kaaviyam Photography - All Rights Reserved. Text, Concept, Idea and Images by Kaaviyam Photography | காவியம் are the exclusive property of Kaaviyam Photography protected under international copyright laws. Any use of this work in any form without written permission of Kaaviyam Photography will result in violations as per international copyright laws. Contact me: kaaviyam@gmail.com
_______________________________________________________________________________
Model: Samuel Nox
Cyberpunk
Shooting
Location: Regensburger Nacht
Bearbeitung: Jürgen Krall Photography
-------------------------------
Bild Nr.: 120_5252
okay, having been hacked, and my wounds barely healed, I feel it is my responsibility to keep this from happening to any of you....
CNN has announced the worst computer virus ever. If you receive an e-mail with an attachment entitled "A Postcard from Hallmark" over the next couple of days, no matter who it is from, DO NOT OPEN it.....
this particular e-mail opens a postcard which will burn your C drive and completely ruin your computer.....
remember, my hacker pirated my e-mail password TWO times in a 24 hour period, so don't open it even if you recognize the sender's address....
sorry to be so serious today, but it's hard getting back into the ocean after being bitten by a shark!
SANTA RITA, GUAM (Sept. 18, 2020) Seabees assigned to Naval Mobile Construction Battalion 133 depart Camp Covington in a Medium Tactical Vehicle Replacement as part of a convoy operation in support of Exercise Valiant Shield 2020. Valiant Shield is a U.S. only, biennial field training exercise (FTX) with a focus on integration of joint training in a blue-water environment among U.S. forces. This training enables real-world proficiency in sustaining joint forces through detecting, locating, tracking and engaging units at sea, in the air, on land and in cyberspace in response to a range of mission areas. (U.S. Navy photo by Chief Mass Communication Specialist Travis Simmons)
Kitbash and manipulated photographic portrait of Major Motoko Kusanagi, inspired by the recent 'Ghost in the Shell' movie trailer released by Paramount.
here in cyberspace we're all working away behind 'the code'...what you see is all just a bunch of 1's and 0's...so is it real?...can you trust what you see, what you hear and therefore how you react to it all?...
****************************************************************************************
Morpheus: You've been living in a dream world, Neo.
Secretary of State Antony J. Blinken attends a holiday party for the Bureau of Cyberspace and Digital Policy at the U.S. Department of State in Washington, D.C. on December 12, 2022. [State Department photo by Ron Przysucha/ Public Domain]
At the Churchill Club top 10 tech trends debate I disagreed with the propositions that “Cyber Warfare Becomes a Good Thing” and that “US is the Supreme Cyber Security Force in the World and its Primary Force; citizens accept complete observation by the functions of a police state. A devastating electronic attack results in govt. militarization of major gateways and backbones of the Internet.” I have problems with the “goodness” in the first prediction, and while the U.S. may argue that it is the best, I don’t think the trend is toward a sole superpower in cyberspace.
The NSA TAO group that performs the cyber–espionage pulls 2 petabytes per hour from the Internet. The networking infrastructure to support this is staggering. Much of it is distributed among the beige boxes scattered about in plain view, often above ground on urban sidewalks. When President Obama receives his daily intelligence briefing, over 75% of the information comes from government cyberspies. (BusinessWeek)
Cyber-offense may be very different than cyber-defense. Some argue that open disclosure of defense modalities can make them stronger, like open source software. But offensive tactics need to be kept private for them to be effective more than once. This leads to a lack of transparency, even within the chain of command. This leaves open the possibility of rogue actors — or simply bad local judgment — empowered with an ability to hide their activities and continual conditioning that they are “beyond the law” (routinely ignoring the laws of the nations where they operate). We may suspect that rogue hacking is already happening in China, but why should we expect that it wouldn’t naturally arise elsewhere as well?
Since our debate, the Washington Post exposé reported:
“Chinese hackers have compromised the designs of some of America’s most sensitive and advanced weapons systems—including vital parts of the nation’s missile defenses, fighter aircraft and warships… Also compromised were designs for the F/A 18 fighter jet, V-22 Osprey, F-35 Joint Strike Fighter, UH-60 Black Hawk helicopters and the Navy’s new Littoral Combat Ship meant to prowl the coasts.”
And today, a new report from the U.K. Defense Academy, entitled The Global Cyber Game suggests that my mental model may be a bit antiquated.
Shall we play a game?
“When the Internet first appeared, the cultural bias of Western countries was to see it as a wonderful and welcome innovation. The fact that it created security problems somewhat took them by surprise and they have been reluctant to respond.
In contrast, states such as Russia and China saw the Internet as a potential threat from the outset, and looked at the problem in the round from their perspective. They formulated strategy and began to move pre-emptively, which has allowed them to take the initiative and to some extent define the Cyber Game.
As a result, cyberspace is now justifiably seen by Western countries as a new and potentially serious avenue of international attack, which must logically be militarized to protect the nation.
But what if information abundance is so deeply transformative that it is changing not only the old game between nations but the global gameboard itself? In this case, we need a different approach, one that seeks to fully appreciate the new game and gameboard before making recommendations for national security.
The ability of national governments to understand and tame the Global Cyber Game, before it takes on an unwelcome life of its own, may be the crucial test for the effectiveness and even legitimacy of the nation state in the information age.” (p.107)
The China Hypothesis
“It makes extensive state-bankrolled purchases of many critical parts of the local economies and infrastructure under the guise of independent commercial acquisitions. These include contracts for provision of national Internet backbones, and equity stakes in utility companies. These enable it to control ever larger parts of the target economies, to install national-scale wiretaps in domestic networks and, in effect, to place remote off-switches in elements of critical national infrastructure.
Finally, to round off the effort, the ‘competitor’ simultaneously makes a massive effort to build its own domestic knowledge industry, sending students around the world in vast numbers to learn local languages and acquire advanced technical skills. In some cases, these students even manage to obtain funding from the target country educational systems. This effort, which only pays off on long timescales, allows it to consolidate and make full use of the information it has exfiltrated from around the world.
If it is allowed to continue for long enough, the target countries will find that they have lost so much autonomy to the ‘competitor’ country that they are unable to resist a full cultural and economic take-over, which is ultimately accomplished without open hostilities ever being declared, or at least not of a type that would be recognizable as industrial-era conflict.
National geopolitical strategy can be disguised as normal commercial activity and, even if this is noticed, it cannot be challenged within the legal systems of target countries. Thus an international-scale offensive could be mounted without it ever being understood as such.
These difficulties are somewhat reminiscent of the industrial cartelization strategy pursued by Germany in the years running up to the Second World War. This carefully orchestrated form of economic warfare was effectively invisible because it was positioned in the cognitive blind spot of British Empire industrialists. Until war broke out, and the deliberately engineered shortage of materials became apparent, they were unable to see it as anything but apparently profit-seeking industrial strategy on the part of German industry.
What sort of response should be made to a strategy like this... is retaliation of any kind appropriate? Should the Cyber Game be played as a zero-sum game? The essential problem is that the strategy involves IP theft on a grand, indeed global scale. This is real destruction of value for those companies and agencies who have been targeted
Is there any other way of looking at this? Possibly the one thought that trumps Western outrage at the idea of information theft is to recall that it can be stolen without being lost, though it may be devalued. It may not be the knowledge itself but how we create it and use it that is important. In this view, the Cyber Game, being ultimately knowledge-based, is genuinely a non-zero game. Among economic players of the Cyber Game, this understanding is gradually turning into an approach that author Don Tapscott calls ‘radical openness’.
A true knowledge-era strategy may not be stealing information but sharing it, playing the Cyber Game high on the gameboard, as Internet pioneers have been doing all along. Maybe Western democracies should respond to China’s alleged actions in the same way. Dare they choose to reframe in this way?” (pp.52-8.)
The Future
“The most likely form of conflict is now civil war in countries with governments referred to as anocracies, neither fully democratic nor fully autocratic.
Income polarization is rising within wealthy countries, as a side effect of globalization, and is hollowing out the middle class. Commentators and researchers have noted this effect particularly in the US. Whether this rising polarization could raise the risk of civil war in wealthy countries is questionable, as long as their governments remain effective. This itself will be a function of how well they adapt to the evolving information environment. If they fail, and a combination of financial, economic and environmental crises threaten the ability of governments to maintain the quality of life, then internal conflict is entirely possible.” (p.74)
And as I try to look farther to the future, the offensive cyber-code and autonomous agents of today are not so different from the bio and then nano-weapons of tomorrow. The cell is but a vessel for the transmission of code.
I think humanity will cut its teeth on cultural norms and responses (police state, cyber-counter-guerillas (beyond governments to posses and bounty hunters), and a societal immune system for the crazy ones) in response to the imminent cyber threats… and then we will face bio threats… and finally nano threats. So there is little reason to focus on the latter until we have solved the former.
from our little piece of cyberspace to yours, happiest of holidays and best wishes for health, happiness and prosperity to you in 2008!!
I joined flickr over a year ago because I’ve always enjoyed photography and thought being here might be fun as well as educational. Fortunately, I was right about that. I’ve learned a lot here and have really enjoyed meeting people and making friends.
As a psychologist who specializes in studying how people interact with each other in cyberspace (aka “cyberpsychology”), I’ve also found the flickr community itself fascinating. So recently I asked myself, why not do some cyberpsychology research in flickr? During the winter break between semesters I wrote and submitted a grant proposal for such a project. Lo and behold, it was accepted!
Imagistic communication in cyberspace. That’s the fancy title for the project. Basically, it’s about how people in flickr use photographs and images to express themselves, converse with each other, and form relationships as well as groups.
I hate using terms like “analyze” when I do online research. It’s a bit of a cold, even aggressive term, and it’s not how I think about this kind of work. Instead, when I do research in online groups and communities, I offer people observations and reflections on what I see happening, sort of like holding up a mirror. I encourage people to discuss and debate those reflections, and to offer observations of their own. Those discussions lead to more powerful insights than I alone could come up with.
Over the next few months, I’ll be posting images to my stream to encourage those kinds of discussions. In fact, I’ve been doing that sort of thing all along with various ideas related to psychology and photography, haven’t I?
So I welcome my flickr friends and all visitors to participate in those discussions in my photostream. At some point I may also invite people to participate in a private email interviews with me, and in a focus group. If you think you might be interested in that, please let me know!
"..has this faceless world of cyberspace created the next generation sex?"
Facebook has an application called the 'Honesty Box' which invites any
member to send and receive anonymous messages from the forum.
Store window night shot with V3 VGA camera phone
(read more)
flickr today
Nada referente a futebol, mas eu queria faz tempo fazer essa combinação.
Usei meus dois amados da Milani 3D o Hi-Tech e o Cyberspace.
eu duas unhas esmaltei com meu Santion que já é figurinha repetida aqui e quando secou peguei o pincel de cada um e fiz desordenado listras sobre as unhas. Esperei secar e fiz o esquema de carimbar na caixa de leite com a placa DRK-D4 e preenchi as pétalas com os esmaltes e depois de seco apliquei sobre as duas unhas. Sério essa eu realmente amei com força! Essa linha 3D da Milani é só amor! Eu fiquei aboxonada!
In computer technology and telecommunication, online and offline are defined by Federal Standard 1037C.[citation needed] They are states or conditions of a "device or equipment" or of a "functional unit". To be considered online, one of the following may apply to a system: it is under the direct control of another device; it is under the direct control of the system with which it is associated; or it is available for immediate use on demand by the system without human intervention.[citation needed]
In contrast, a device that is offline meets none of these criteria (e.g., its main power source is disconnected or turned off, or it is off-power).
The Oxford dictionary defines "online" (sometimes also referenced as "On the Line") as "controlled by or connected to a computer" and as an activity or service which is "available on or performed using the Internet or other computer network".[1] The term is utilized within terms such as these: "online identity", "online predator", "online gambling", "online shopping", "online banking", and "online learning". The online context is given to other words by the prefixes "cyber" and "e", as in the words "cyberspace", "cybercrime", "email", and "ecommerce".[2]
Antecedents[edit]
During the 19th century, the term "on line" was commonly used in both the railroad and telegraph industries. For railroads, a signal box would send a messages down the line (track), via a telegraph line (cable), indicating the track's status: "Train on line" or "Line clear".[3] Telegraph linemen would refer to sending current through a line as "direct on line" or "battery on line";[4] or they may refer to a problem with the circuit as being "on line", as opposed to the power source or end-point equipment.[5]
Examples[edit]
Offline email[edit]
One example of a common use of these concepts with email is a mail user agent (MUA) that can be instructed to be in either online or offline states. One such MUA is Microsoft Outlook. When online it will attempt to connect to mail servers (to check for new mail at regular intervals, for example), and when offline it will not attempt to make any such connection. The online or offline state of the MUA does not necessarily reflect the connection status between the computer on which it is running and the Internet. That is, the computer itself may be online—connected to Internet via a cable modem or other means—while Outlook is kept offline by the user, so that it makes no attempt to send or to receive messages. Similarly, a computer may be configured to employ a dial-up connection on demand (as when an application such as Outlook attempts to make connection to a server), but the user may not wish for Outlook to trigger that call whenever it is configured to check for mail.[6]
Offline media playing[edit]
Another example of the use of these concepts is digital audio technology. A tape recorder, digital audio editor, or other device that is online is one whose clock is under the control of the clock of a synchronization master device. When the sync master commences playback, the online device automatically synchronizes itself to the master and commences playing from the same point in the recording. A device that is offline uses no external clock reference and relies upon its own internal clock. When a large number of devices are connected to a sync master it is often convenient, if one wants to hear just the output of one single device, to take it offline because, if the device is played back online, all synchronized devices have to locate the playback point and wait for each other device to be in synchronization.[7] (For related discussion, see MIDI timecode, word sync, and recording system synchronization.)
Offline browsing[edit]
Main article: Offline browsing
A third example of a common use of these concepts is a web browser that can be instructed to be in either online or offline states. The browser attempts to fetch pages from servers while only in the online state. In the offline state, users can perform offline browsing, where pages can be browsed using local copies of those pages that have previously been downloaded while in the online state. This can be useful when the computer is offline and connection to the Internet is impossible or undesirable. The pages are downloaded either implicitly into the web browser's own cache as a result of prior online browsing by the user or explicitly by a browser configured to keep local copies of certain web pages, which are updated when the browser is in the online state, either by checking that the local copies are up-to-date at regular intervals or by checking that the local copies are up-to-date whenever the browser is switched to the online state. One such web browser capable of being explicitly configured to download pages for offline browsing is Internet Explorer. When pages are added to the Favourites list, they can be marked to be "available for offline browsing". Internet Explorer will download to local copies both the marked page and, optionally, all of the pages that it links to. In Internet Explorer version 6, the level of direct and indirect links, the maximum amount of local disc space allowed to be consumed, and the schedule on which local copies are checked to see whether they are up-to-date, are configurable for each individual Favourites entry.[8][9][10][11]
For communities that lack adequate Internet connectivity—such as developing countries, rural areas, and prisons—offline information stores such as the eGranary Digital Library (a collection of approximately thirty million educational resources from more than two thousand web sites and hundreds of CD-ROMs) provide offline access to information. Numerous organizations have developed, or are developing, flash memory chips with collections of educational materials for offline use in smartphones, tablets, and laptops.[citation needed]
Offline storage[edit]
Likewise, offline storage is computer data storage that is not "available for immediate use on demand by the system without human intervention." Additionally, an otherwise online system that is powered down may be considered offline.
Offline messages[edit]
With the growing communication tools and media, the words offline and online are used very frequently. If a person is active over a messaging tool and is able to accept the messages it is termed as online message and if the person is not available and the message is left to view when the person is back, it is termed as offline message. In the same context, the person's availability is termed as online and non availability is termed as offline
Generalizations[edit]
Online and offline distinctions have been generalized from computing and telecommunication into the field of human interpersonal relationships. The distinction between what is considered online and what is considered offline has become a subject of study in the field of sociology.[12]
The distinction between online and offline is conventionally seen as the distinction between computer-mediated communication and face-to-face communication (e.g., face time), respectively. Online is virtuality or cyberspace, and offline is reality (i.e., Real life or meatspace). Slater states that this distinction is "obviously far too simple".[12] To support his argument that the distinctions in relationships are more complex than a simple dichotomy of online versus offline, he observes that some people draw no distinction between an online relationship, such as indulging in cybersex, and an offline relationship, such as being pen pals. He argues that even the telephone can be regarded as an online experience in some circumstances, and that the blurring of the distinctions between the uses of various technologies (such as PDA versus mobile phone, Internet television versus Internet, and telephone versus Voice over Internet Protocol) has made it "impossible to use the term online meaningfully in the sense that was employed by the first generation of Internet research".[12]
Slater asserts that there are legal and regulatory pressures to reduce the distinction between online and offline, with a "general tendency to assimilate online to offline and erase the distinction," stressing, however, that this does not mean that online relationships are being reduced to pre-existing offline relationships. He conjectures that greater legal status may be assigned to online relationships (pointing out that contractual relationships, such as business transactions, online are already seen as just as "real" as their offline counterparts), although he states it to be hard to imagine courts awarding palimony to people who have had a purely online sexual relationship. He also conjectures that an online/offline distinction may be seen by people as "rather quaint and not quite comprehensible" within 10 years.[12]
This distinction between online and offline is sometimes inverted, with online concepts being used to define and to explain offline activities, rather than (as per the conventions of the desktop metaphor with its desktops, trash cans, folders, and so forth) the other way around. Several cartoons appearing in The New Yorker have satirized this. One includes Saint Peter asking for a username and a password before admitting a man into Heaven. Another illustrates "the off-line store" where "All items are actual size!", shoppers may "Take it home as soon as you pay for it!", and "Merchandise may be handled prior to purchase!"[13][14]
en.wikipedia.org/wiki/Online_and_offline
Surfing the Internet is a term typically used to describe an undirected type of web of browsing where users whimsically follow one interesting link to another without a planned search strategy or definite objective. Surfing the net has become a popular pastime, for many Internet users.Surfing the Internet' is not to be confused with the phrase 'browsing the Internet' which refers to exploring the web with a clear-cut objective but without any planned search strategies. Searching the web refers to exploring the Internet with a definite in both strategy and objective.Surfing the Internet has been likened to the ironic term 'channel surfing', which is used to describe randomly changing TV channels. Its only relation to actual surfboarding has to do with the notion of 'going with flow' when surfing.Jean Armour Polly is credited with the first published use of the phrase. She used it in an article titled 'surfing the Internet' that was published, in the June 1992 issue of the monthly magazine, Wilson Library Bulletin.Polly was also key in popularizing the phrase; she maintains that she purposefully wanted it to have the exact connotation it currently has. Coining the phrase has since been attributed to Internet pioneer Mark McCahill.
www.reference.com/technology/phrase-surfing-internet-mean...
Project Overmatch: US Navy preps to deploy secretive multidomain tech
By Megan Eckstein and Colin Demarest
Dec 8, 2022
Participants of the multinational Rim of the Pacific exercise launch a REMUS 100 autonomous underwater vehicle. Project Overmatch will arguably be the U.S. Navy’s most important work in 2023, especially as the service aims to incorporate more unmanned systems. (Seaman Victoria Danser/U.S. Navy)
WASHINGTON — The U.S. Navy is moving quickly to link its fleet through its Project Overmatch initiative, which has been kept almost entirely secret for two years.
Shielded from public view, the service has undertaken a flurry of work: simulating current pathways for data, writing software code to close gaps, testing it in a lab and at sea, and providing feedback to coders to improve future iterations.
Rear Adm. Doug Small, who leads both Naval Information Warfare Systems Command and Project Overmatch, told Defense News this high-priority effort remains on track for a planned deployment of the new capabilities to a carrier strike group in 2023.
Project Overmatch is the Navy’s contribution to the Pentagon’s multibillion-dollar Joint All-Domain Command and Control effort — a push to reliably connect forces across land, air, sea, space and cyberspace as well as enable seamless international collaboration.
The fielding of Project Overmatch will arguably be the Navy’s most important work in 2023, especially as the service aims to incorporate more unmanned systems that serve as intelligence-collecting nodes, feeding information to sailors on ships and in ashore command centers.
“The Navy’s effort on Overmatch is very much focused on the next two or three years,” said Bryan Clark, a senior fellow and director of the Center for Defense Concepts and Technology at the Hudson Institute. “Overmatch has really focused much more directly on the near-term operational problems faced by commanders dealing with China.”
Small said he’s optimistic about the upcoming demonstration — the largest of its kind, but not the first time the Navy will use this new technology at sea, noting it continues a critical line of research. With ships inherently disaggregated, he said, the Navy is naturally considering ways to better share information across ships and aircraft so the best-positioned platform can strike a target.
“The Navy in particular had been working various system of systems-type concepts and the technologies that would go into that for mission threads. How do you stitch together various components to create a mission or an outcome, an effect?” he said in a Nov. 10 interview. “Overmatch [is] sort of a natural progression of that sort of work.”
Origins of Overmatch
Though the Navy was already researching how to connect ships, planes and weapons, Chief of Naval Operations Adm. Mike Gilday created Project Overmatch in fall 2020 and tapped Small to lead the effort. Gilday has since said Overmatch is his No. 2 priority, behind delivery of the Columbia-class ballistic missile submarine.
Whereas past efforts were housed within specific offices, Small said Project Overmatch is meant to encompass the entire Navy.
“Inside of a platform-centric service,” he said, “how can you become more data- and network-centric?”
Rear Adm. Doug Small speaks at the 2021 Fleet Maintenance and Modernization Symposium. (Elisha Gamboa/U.S. Navy)
The core team started with just a few people, but has grown to about 50. The team, plus its collaborators across the Navy and industry, are focused on several key points: tools and analytics, networks, data, and infrastructure, which includes computing and platforms as a service.
“Fundamentally, this is all about management of data, exchange of data,” David Deptula, the dean of the Mitchell Institute for Aerospace Studies and a retired Air Force lieutenant general, said Nov. 14 at a JADC2 industry event. “Without the appropriate infrastructure, you can’t be able to do the data, connectivity or networking. Without the security, all of it falls apart because you’re yielding a huge weakness and vulnerability to our adversary.”
But perhaps the most significant, overriding mission of the team is to figure out what barriers the Navy has put in its own way.
Small said the commercial industry is able to do what the Navy wants to do; car companies like Tesla remotely send software updates to address security gaps or capability improvements without creating safety risks for drivers, and Amazon pushes out hundreds of thousands of software updates each day, which an online shopper might never notice.
“Everything that we have put in our way that prevents us from doing exactly that is something that we’ve done to ourselves,” Small said. “Now, there are changes that need to happen to systems on ships and shore facilities to enable that, but then, eventually, that’s how you get to fielding.”
Small said his Project Overmatch team should have a client-like relationship with the fleet, where they understand what sailors need to do their jobs more effectively and, in turn, quickly produce and deliver tools to address those gaps.
“Bringing an upgrade every several years, or bringing hundreds of thousands of changes per day — somewhere in the middle, there is that sweet spot where we basically pace our adversaries with delivery of capability. And that’s what it’s really all about,” said Small, noting the difference between the Navy and the tech industry.
Ready to strike
Small said his focus is now on the 2023 carrier strike group demonstration. Though he wouldn’t identify specific technologies or software involved, he dubbed the event “the starting gun” and said additional capabilities will roll out in future iterations.
Small said the team will deploy this first increment onto the first carrier strike group in 2023, and then continue until all 11 carrier strike groups have the hardware and software installed. That equates to a large portion of the surface fleet, excluding amphibious ships and some forward-deployed vessels with a different operational model.
“The alternative path is, well, let’s design the whole thing out for a few years and then field that everywhere, right? And you’ve probably seen the [timeline] curves on that, and we’re trying to take a stepwise approach to get there faster,” he said.
The Navy sought $195 million for Project Overmatch in fiscal 2023, a 167% increase over the $73 million it received in fiscal 2022. Spending details have otherwise been scant, with the service executing Project Overmatch behind closed doors, a posture taken, experts said, to bamboozle China.
“It’s mostly because they don’t want to tip their hand as to what they’re looking to put together,” Clark said. “How they deter China is by increasing the uncertainty on the part of the Chinese, on the [People’s Liberation Army], that they’ll be successful on terms that the Chinese leadership would find acceptable.”
Away from the public eye, Project Overmatch technology has already undergone repeated testing, according to Small.
“Within even the first six months of the effort, we had done some work with the Marine Corps, for example, where we got some real-time feedback and did some connections,” he explained. “We’ve been to individual ships with systems and connected it to our labs to sort of simulate other [ships].”
Pushing Project Overmatch advancements into the real world is vital, according to Clark.
“Of all the services, the Navy’s done the best job of trying to really focus their effort on what the operational commander needs, rather than things that the service thinks are cool to put together,” he said. “The Navy’s really focused on Overmatch, being focused on what the average commander needs, focused on the near term and, therefore, focused on actual systems that can be deployed today.”
This fall, the technology was used in the Army’s Project Convergence exercise across multiple units, Small said. The weekslong experiment, during which bleeding-edge tech is put through the wringer, represents the Army’s contribution to JADC2. The Air Force, likewise, has its Advanced Battle Management System, an attempt to adopt the next generation of command-and-control tech.
The Air Force's Advanced Battle Management System is expected to enable the rapid collection, processing and sharing of data across all domains, weapons systems and commands. (U.S. Air Force)
But there are concerns the separate efforts are not properly aligned. An early draft of the annual defense bill included an audit of JADC2, with the House Armed Services Committee’s cyber and innovative technologies panel, chaired by retiring Rhode Island Democrat Rep. Jim Langevin, requesting a study on timelines, goals and potential shortfalls.
Defense officials have also expressed skepticism. The Air Force’s principal cyber adviser, Wanda Jones-Heath, in July described the services’ efforts as “all different.”
The data-centric odyssey is of the highest stakes as the U.S. and allied nations attempt to thwart Chinese and Russian ambitions, officials argue. Beijing and Moscow have each spent significant sums on military science and technology — including artificial intelligence and cyber advancements — ratcheting up the pace at which information must be exchanged and decisions must be made on the battlefield.
“Here’s how I see it: any data, anywhere, any time that is needed. And the vision, when I start to spin this out, is coalition warfare,” Pentagon Chief Information Officer John Sherman said at a Defense Information Systems Agency event Nov. 7. “You have a U.S. Marine Corps [High Mobility Artillery Rocket System] getting a firing solution from an Australian [intelligence, surveillance and reconnaissance] capability; maybe you have a Japanese frigate that’s also going to hit the same target there; you’ve got multinational F-35s coming on station to provide combat air-support capability. All of this is going to have to happen quickly.”
Gilday in October said the Navy is sharing Project Overmatch insights with foreign forces to ensure international communication and collaboration will be possible in large-scale, distributed fights.
Though Gilday did not identify those allies, Small told Defense News his program started with Five Eyes — an intelligence-sharing group made up of the U.S., the U.K., Canada, Australia and New Zealand. Small added that the U.S. has since welcomed other allies and partners to collaborate on software development.
No final destination
Some ships will have to wait for their next maintenance period to receive hardware and software changes, but Small said his team is working through policy issues to allow for installations to happen pier-side and, therefore, on a quicker timeline. In the meantime, the Project Overmatch team will chip away at the next increment, even as it’s fielding the first.
“Our concept of ‘done’ has to change a little bit,” Small said, “because it’s really not a traditional type of acquisition approach.”
Defense officials have cast JADC2 in a similar light. There is no true finish line, but rather the massive networking endeavor requires a rolling development process to maintain an advantage over adversaries capable of jamming, intercepting and muddying communications.
Sherman, the Pentagon CIO, said the key to JADC2 is speed and stubbornly staying “inside the enemy’s turn circle.”
“This has got to move so fast that the adversary cannot get back up off the mat,” he said. “Maybe they have mass on us, but we have quality of data, quality of capability.”
About Megan Eckstein and Colin Demarest
Megan Eckstein is the naval warfare reporter at Defense News. She has covered military news since 2009, with a focus on U.S. Navy and Marine Corps operations, acquisition programs and budgets. She has reported from four geographic fleets and is happiest when she’s filing stories from a ship. Megan is a University of Maryland alumna.
Colin Demarest is a reporter at C4ISRNET, where he covers military networks, cyber and IT. Colin previously covered the Department of Energy and its National Nuclear Security Administration — namely Cold War cleanup and nuclear weapons development — for a daily newspaper in South Carolina. Colin is also an award-winning photographer.