View allAll Photos Tagged cryptography,

More art on my weblog: uair01.blogspot.com/

 

= = = = =

 

SEVEN SECRET ALPHABETS

Anthony Earnshaw

 

A very remarkable book. The replacement of a conventional capital letter at the beginning of a chapter by some kind of visual pun is as old as the illuminated book, but Earnshaw has succeeded in divorcing it from its customary aesthetic role, stripped it of any scene-setting function. His letters, comic or sinister, exist in their own right. Each image hides its secret until it finds its place. Even then it may prove evasive. The alphabets suggest an alternative reality where humour and disaster are interchangeable and the laws which govern nature are bent certainly, but only very little. An imagination in no way forced selects an apparently arbitrary image at a precise moment . . . Letters, those haphazardly invented signs, those abstract shapes we hear as sounds, take on a concrete meaning of their own.

Guardian

 

It is fair to say th at the author explores a landscape which suggests Magritte and Monty Python. The humour is austere, bleak and if not black, at least charcoal grey. As a feat of imagination the work is outstanding.

The Times Educational Supplement

 

Earnshaw has a devious, allusive, surrealist interest in letters. His imagination is full of wit; each image is a humorous vignette, an unlikely collusion of images in the form of a letter. Such shifting of context is the source of all humour. By providing a main-line to the unconscious and suggesting a revaluation of the essential symbols of which language is constituted, he makes his work compulsive and compulsory viewing.

Arts Review

 

JONATHAN CAPE

THIRTY BEDFORD SQUARE LONDON

 

by Eric Thacker and Anthony Earnshaw

MUSRUM

WINTERSOL

Corrigendum

THE ISBN FOR THE PAPERBACK EDITION OF

SEVEN SECRET ALPHABETS

BY ANTHONY EARNSHAW

SHOULD READ ISBN 022401383 I

FIRST PUBLISHED 1972

© 1972 BY ANTHONY EARNSHAW

JONATHAN CAPE LTD, 30 BEDFORD SQUARE, LONDON, WCI

ISBN 022400795 5

PRINTED AND BOUND IN GREAT BRITAIN BY

W & J MACKAY LIMITED, CHATHAM

Chapter 1: Dani s’ Introduction to Harappan Ciphers

Ahmad Hasan Dani , Nazeer Ahmad Chaudhry , Sony

 

Section 1.1: Sample Draft

Section2.2:Pre-Historical Perspective

Section2.3:Pre- Harappan Culture.

Section2.4:Harappan Culture

Section2.5:Harappan Civilization

Section2.6: Confirmation of Conclusions

Section2.7:Terminal Symbols

Section2.8: Bibliography

Summary | Full Text: PDF (Size: 3924K)

Chapter1: Dani s’ Introduction to Harappan Ciphers

Dr. Prof. Ahmad Hasan Dani , Nazeer Ahmad Chaudhry( Researcher) , Sony

 

Interview with Dani

Dani (1-9) had confirmed most of our conclusions after a detailed interview(10). Nazeer Ahmad Chaudhry( Researcher) and author extends thanks to Farah Dani and all others including Sony(11) . Dani gave detailed account of his life and research work that is on the record hence it is not being repeated. He also gave account of his meeting with Parpola regarding his decipherment (12). We were lost in the ruins of Mohenjodaro available at Mark(13-14) and Omar (1984) IVC sites. Sony is giving the narrative .

The horse hoax was being debated at internet and Author asked the comment from Dani. He said smiling that we are actually Vani from Central Asia and Brahmans hence we support them then he became serious and said that there is no government support and we have limited number of scholars doing this work at their own hence we might complement them , however an agreement is historical evidence.

 

South Asia is a land of many different cultures and traditions with thousands of sites. The prehistoric scripts , motifs and symbols found during Kot Diji Culture (Khan(1965) are quite different from matured Harappan Scripts 1900-1300 B.C . We are interested in the symbols, signs , pictorials and motifs , logos like 1, 2, and 3 or 33 , some symbols, signs and pictorials used in other civilizations imported from other civilizations during 1500-1300 B.C. period for this decryption.

Harappan Scripts

 

Table-1 shows a mixture of roughly over 26 symbols with many variants but we are mostly interested for terminal symbols over 11 starting from right to left like Arabicc alphabets. Dani narrated his meeting with Asko Parpola about his effort of decipherment He , B.B. Lal , Russian Professors and many others had rejected this decipherment. One of the questions frequently asked about the Indus script whether it represents any systematic writing of any language at all is not relevant to our decryption. Dani an eminent Pakistani archaeologist , historian and linguistic is expert on 35 languages and dialects. He is authority on Central Asia , South Asia and Harappan Civilization. He is particularly known for archaeological work on Pre-Harappan Culture. We have no disagreement with even with those who agree that the writings of the Harappan Civilization are not a haphazard arrangement of signs and are at variance with one another. Our purpose in this decryption is to carry out frequency analysis of the script of Matured Harappan Civilization in the last stage 1500-1300 B.C. in order to bring out the statistical structure of the cipher-texts.

Many of sites remain hidden under the ruins of Mohenjodaro , Harappa and other sites. It seems to be the culture of another mythology with tradtions of burial , sacrifices and the motif of bull is found that is not a pictorial . The major diety seems to be horned buffalo and buffelo horned yougi . Mehrgarh 7000 B.C site in Gedrosia pertains to the seventh and third millennium B.C. It covers Neolithlic 6500- 4500 B.C. and Chalcolithic4500- 2600 B.C era. We have tablets , tools , figurines of women with heavy jewelry and ceramics of very fine quality . The motif of fish , scorpian , goat and many others including the mythology are different in matured Harappa civilization Some of the scripts , symbols and signs pertaining to Harappan culture 2600-1900 B.C. are different from previous Kot Diji .

We compliment efforts in decipherment of Indus scripts as written language . Anything before 1900 B.C. including the sign-board from Dholavira consisting of 10 large signs, each sign approximately 37cm by 27cm, embedded in semi-precious stones on a wooden board and an innovate addition of many seals and tablets and even horses is wonderful contribution. Our scope in decryption is limited to Matured Harappan Ciphers in 1500-1300 B.C. those were found from upper layers .

Tablets

    

The tablet shown above has five symbols. The 1st two from right the inverted boa or jar with logo2 on top and lance below is one symbol. , The 4th boa with logo3 inside is third symbol. Vertical 4 line written in bottom line is 4th symbol at number 5 and last 6th position symbol of comb is 5th symbol called the terminal symbol. We have special problem with this terminal symbol and comb inside the bangle or encircled comb in frequency analysis. We require an ethno-archaeological model for frequency analysis of these symbols. Tablets is a standard form of issuing orders like present day deeds , written orders and other transactions sent as encrypted messages or cipher-texts. It had been common practice in all ancient civilizations to issue the orders as tablets . The amulets and tablets also served as identity documents and trade deals. The direction of the writing of scripts on the amulets , artifices and tablets is from right to left like Arabic ,Persian and Urdu and the local languages Punjabi and Pothwari languages spoken in the oldest culture Samma the Sowan Valley 0.5 million years old culture of stone age . We are not saying that Dravidian in IVC or Naga tribe in Snake Valley Taxila adopted the writing system from the creatures of stone age .

 

Let us consider a sample of ten tablets in Table -2 . The frequency count of boa left and diamond the right symbol in tablet-1, The left symbol bearer in tablet-2 , the right symbol harrow or saw in tablet -5, the left symbol leveling tool (KRAH) , left symbol comb in bangle in tablet-8 or comb are terminal symbols. We can not carry out any frequency analysis for such a limited data but we would count the symbols using statistical methods and use an ethno-archaeological model to regenerate more data .

Seals

 

The direction of the writing on the seals is from right to left like English language in s1 Table-3 . Stamping the seal gives the writing from left to right as shown above in the tablet discussed above and in table-2. The seal ‘s2’ above when stamped gives the seal impression as ‘t2’.The seals being used in present day environments for signatures is different from the use of Indus seals that pertains to the level of security in modern concept . The amulet as identity document was given to the officials but messengers or speedy system of communication in IVC were given tablets or it may be tablet as stamped seal impression. Let assume a trained bird or racing camel or buffalo or trained tiger or trained crocodile or rhenocerous for swamps and rivers as communication systems. They may be insecure for special purposes as like any of the modern system in cryptology.

 

The use of impression of a seal as tablet may be compared with a book code as example of a more secure algorithm . The priest on both ends had same seals like the sender and the receiver of the modern code each having a copy of the same book. During encoding, each word in the plaintext is replaced with a code group that indicates where that same word appears in the book. Different occurrences of the same word in the plaintext may be represented by different code groups in the encoded message. With this method, the key is the book itself. Although a person who intercepts a message may guess that a book code is being used, the messages cannot be decoded unless the interceptor can determine what edition of what book is being used. In IVC system special staff priest trained at Priest College Mohenjodaro were present in other states and foreign countries with set of tablets and seals. The orders as seal impression tablet could give the actual tablets to be issued to specific staff to execute the orders.

The security , public policy and prevention of fraud in modern concept as given by Camp (15-21) has to be linked with ancient methods in an ethno-archaeological model. Giving Tablet as actual secret message through any of the communication channels in use during 1500-1300 B.C. was equally insecure like the modern cipher systems that involve transmitting or storing the key with each message. If an unauthorized person can recognize the key, then the next step is to recognize, guess at, or figure out the algorithm. Even without the key, the code breaker can guess the algorithm, and then, by trying all the possible keys in succession, can conceivably recover the plaintext. For example, in Caesar's alphabetical cryptosystem being discussed in next chapters , the cryptanalyst could simply try each of the 25 possible values of the key. The security of transmissions can therefore be increased by increasing the number of possible keys and by increasing the amount of time it takes to try each key. If the same key is used for multiple messages, the cryptanalyst only has to figure out one key; but by varying the key from one message to another, the cipher clerk has used a different procedure for encoding each one. The use of seal impressions as tablets in IVC ciphers is like using a complicated algorithm that may have a very large number of possible keys. The decryption in modern system if the basic algorithm is known or guessed is made difficult due to the time and effort required to try all possible keys that may take years for finding the plaintext.

 

IVC cipher remain as unbreakable system during the century like the most secure encryption method known was the one-time pad. The pad is a long list of different randomly chosen keys. Two and only two identical copies of the list of keys exist . The one for the person enciphering the message like the priest issuing the seal impression as tablet and another for whoever is deciphering it like the priest at the other end who knew the message coded as tablet. In OTP, a key is discarded and never used again after being used for one message but in IVC the same seal can be used again because the ciphers are only taught to specific priests and not the users. In OTP the next message will use the next key on the list. If the algorithm is even moderately complicated and the keys are long enough, cryptanalysis is practically impossible. In IVC ciphers the seal impression as tablet may be same but the tablets issued at other end might be different .

Terminal Symbols

 

The 1st symbol on the right side of seals and the leftmost symbol on the left the last one are called the terminal symbols We have selected after frequency analysis not given here about 11 terminal symbols shown in line-1 of table-3 appearing as 1st symbol on the right side of the seals.

We may call them as boa the 1st on right , diamond or coin , bearer , comb in bangle or encircled comb , comb , lance or spear , harrow or saw , wheel , level tool ( KRAHA) and riding stripe ( RUKAB).

 

We assumes the senate of priests holding important duties as VPs assisted by AVPs the headmen of tribes and supervisors from technical workforce from respective fields at execution level. . Dani confirms our conclusions for terminal symbols Mahadevan s’ analysis (1982:316) confirms the concept of priest for our ‘boa’ an his ‘jar’ symbol1 but with Sanskrit equivalent.

We do not require any confirmation in mathematical solution of cryptanalysis. The experts in frequency analysis have empirical solutions accepted by all cryptologists and cryptanalysts. The boa Symbol is confirmed as English letter E according to empirical solutions in cryptanalysis. The priest ruler in our analysis is confirmed by Dani our Sanskrit expert and he said that it had nothing to do with Sanskrit. Mahadevan s’ analysis ( 1982:316) confirms the concept of priest but with Sanskrit equivalent

 The symbol 2 has largest frequency occurrence after boa symbol and it is termed as symbol of coin or diamond.

Dani confirms coin or diamond symbol 3 an priest VP with financial duties with no Sanskrit equivalent. Mahadevan s’ analysis ( 1982:316) also confirms symbol 3 as officer with priest duties but with Sanskrit equivalent.

The ciphers, crypto systems , and codes in cryptology or Harappan ciphers 1500-1300 B.C. being considered for our cryptanalysis are just like a mule. Every one agrees that a mule cannot generate a daughter. The mule might be forced to adopt a daughter as unique case after brutal attack for training as we call it brutal attack in cryptanalysis for code breaking The concept of spoken language equivalent like Sanskrit or others may be valid for earlier scripts and we have no objection to such adopted daughters.

  

Bull Pictorials

   

The seal on the left becomes tablet in the right side but inscription may be different for seal impression hence above is only an example just to show the direction of terminal symbols. We have large variety of bulls like Zebu or bhahmi bull , short horned bull , humped bull and humpless bull beside the unicorns. Many of the animal systems are used as nick names as a fun in our area of the oldest culture of stone age like bull and Ass for girls .I have retrieved old English Teacher books serial 190-191 from my childhood library that had very interesting (22) history.

Nixon mentioned in his book The Leaders

 

Boa Motif

  

Animal Motifs

  

Conclusions

Long interview with Dani reflecting the confirmation of conclusions by Dani, B.B. Lal, Russian Professors, Tosi, Durani Mughal, Mark and other scholars is not being discussed. We are mentioning some of the conclusions also confirmed or partially confirmed by Asko Parpola and I. Mahadevan through their published work.

The direction of writing on amulets, tablets, and seal impressions is from right to left like Arabic, Persian and Urdu and reversed on the seals like English. Conclusion is agreed by all scholars

Indus ciphers and codes represent system like logo-syllabic writing. This doesn’t constitute a closed system of single-valued graphemes as the syllabic and alphabetic scripts, which could be cracked as wholes. The conclusion is confirmed by Asko Parpola, Dani , Mark and other scholars

The individual symbols may be interpreted one by one, and some of the ciphers may remain eternal mysteries. The conclusion is confirmed by Asko Parpola, Dani, Mark and other scholars.

The Indus Ciphers were essentially similar to the other pictographic ciphers evolved by priests in China , Egypt and others .Many scholars like Dani , Fairservis , Mark and others confirm the conclusion

The Indus Ciphers are like a mule unable to adopt any of ancient language as daughter hence decipherment based on languages was rejected by scholars like Dani, B.B. Lal, and Russian Profs. and many others

The spoken language of the Indus people was Dravidian confirmed by Asko Parpola, Dani, Mark and other scholars. Our cryptanalysis shows that it not found in Script ciphers. This was the system like Liner A codes but no Linear B codes were required.

Harappan professed different religion in Kot Diji culture era that may be genetically related to the religions of both the ancient West Asia and the later India. The mythology of matured Harappan Civilization is different from any other mythology and mythology in ancient India.

 The terminal symbols appearing at the left of the writing on amulets, tablets and seal impression are most important in frequency analysis. The right symbol on the seals is the terminal symbol on seal impressions.

 

Let me complement Possehl , Tosi (1993), Walter, Fairservis, Shaffer ,), B.B.Lal, Durani(1981), Jacobson, Terome(1986), Kenoyer (1985), Ratnagar(1991) and many others who contributed to Indus Valley research. Iravatham Mahadevan seems to be greater scholar when he sys that he could n't decipher the scripts inpite of his over 40 yeras research work. Ahmad Hassan Dani , B.B. Lal and Russian professors are the greates who disagreed to excellent research work by Asko Parpola. Being student of topsecret science Cryptology since childhood , I was associated with code and ciphers. After long discussion with Dani about above researchers and scholars and his work with some of them , we came to the claim of decipherment by Jha N and Rajaram (2000) that I thought the broken seal by Mackay showing rear portion of bull being called hoof of a horse. Dani said smiling , " We am actually Vani from Central Asia hence I would like to apprecite the work by Brahamans ". Then added that government funding is very limited and any effort like the effort of Jha N and Rajaram has to be appreciated but we mightn't agree with decipherment if it is not correct. Then he narrated all the conversation with Parapola and finally he disagreed.

Dried Up River Hakra

Let us run an ethno-archaeological model on the Scripts during 1500-1300B.C. period. We have no comments on any of the efforts of deciphering efforts of IVC scripts as spoken language. IVC existed from Kot D.G era before 2600 B.C. , Harappa 2600-1900 B.C. and matured Harappa 1900-1300 B.C . The direction of shifting from Harappa to Mohenjodaro, and Lothal during 1500-1300 B.C. is assumed . Gedrosia and Kalibangan might have been left due to Aryans but Dholavera, the sites in Cholistan ( Mughal (1997) and Kot D.G. vanished earlier due to heavy floods and climatic changes and the final drying up of the Hakra /Kangra/ Sarasvati in 1900 B.C.

IVC script is found on amulets, tablets and seals. Some of symbols, signs, numerals , pictorials and motif seem to be universal or imported from other civilizations of China , Egypt and in cuneiform texts from Mesopotamia as well as in the ancient Iran. Scholars had been trying to link the scripts to any of the pre-historic languages like Indo-European They provide a reliable basis for this decipherment. The main conclusion is as follows: the Proto-Indian language is the Proto-Indo-Aryan () one. The direction of the writing is right to left like Arabic on amulets and tablets and it may be reversed for seal impressions. Signs depicted on seals and tablets have basically the left-right orientation. It is well to bear in mind that the direction of the reading of a record depends on the context, too. In this work all the texts are transformed so that they have a common direction from left to right. This report contains a number of quasi-bilingual sources that can be the base of the decipherment (Rjabchikov 2006a; 2006b) (1).

Bibliography

1.Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages

2.Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach, 1998, Publishers: The Mathematical Association of America,

3.Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)

 

4.Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages

5.Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach, 232 pages. Publishers: The Mathematical Association of America; 2nd edition (August 1998)

6.Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)

7.Bard Gregory, Algebraic Cryptanalysis , 2009, 392pages, Publishers Springer US

8.Christopher Swenson, Modern Cryptanalysis: Techniques for Advance Code Breaking, Publishers John Wiley & Sons , 2008, 264 pages

9.Simon Singh , The Code Book , The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Publishers: Anchor; Reprint edition (August 29, 2000), 432 pages

10.Jannik Dewny, Cryptanalysis of RSA & its Variants, CRC Press, Taylor & Francis Group,2009

11.Mark Stamp, Richard M. Low , Stamp(ed) , Applied Cryptanalysis: Breaking Ciphers in the Real World, Published Online: 3 Jan 2007

12.Helen F. Gaines, Cryptanalysis , 1989, Dover Publication, 237 pages

13.Friedrich L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology. publisher: Springer- Verlag Telis; 2nd Rev&Ex edition (February 2000) ,language :English, Hardcover: 470 pages

14.Gaines, Helen Fouche, Cryptanalysis a Study of Ciphers and their Solutions, 1939, 237 pages.

15.Foster , Caxon, Cryptanalysis for Microcomputers, 1982, 333 pages

16.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Machines, History and Methods, 1989 , 520 pages

17.Friedman, William F., Military Cryptanalysis Part I, 1935. 149 pages. Cryptanalysis of Number Theoretic Ciphers

Wag staff Jr., Samuel S. / Attalla, Mikhail J. (Editor), 2003. 318 pages

18.Friedman, William F., Military Cryptanalysis Part II: With Added Problems & Computer Programs 1937.

19.Friedman, William F., Military Cryptanalysis Part III: Simpler Varieties of Periodic Substitution Systems, 1939. 119 pages ,

20.Friedman, William F., Military Cryptanalysis Part IV: Transposition and Fractionating Systems, 1941. 189 pages

21.Ryan, Peter / Schneider, Steve, Modeling and Analysis of Security Protocols

2000. 352 pages.

22.Gaines, Helen Fouche, Cryptanalysis: A Study of Ciphers and their Solution

1939. 237 pages.

23.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Yesterday, Today, and Tomorrow, 1987, 519 pages

24.Pickover, Clifford, Cryptorunes, 2000. 96 pages

25.Poe, Edgar Allan, Gold-Bug and Other Tales, 1991. 121 pages.

26.Johnson, Neil F. / Duric, Zoran / Jajodia, Sushil G., Information Hiding: Stenography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1) 2001. 160 pages.

27.Pfleeger, Charles P. / Pfleeger, Shari Lawrence, Security in Computing. 1997, 2nd edition. 569 pages.

28.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor), Selections from Crypto logia: History, People, and Technology, 1998. 552 pages

29.Yardley, Herbert O., Yardley-grams, 1932 (Currently out of print). 190 pages

30.Wagstaff Jr., Samuel S. / Atallah, Mikhail J. (Editor), Cryptanalysis of Number Theoretic Ciphers, 2003. 318 pages.

31.L. Jean Camp, “Code, Coding and Coded Perspectives”, Journal of Information, Communication and Ethics in Society Vol. 1, Jan. 2003, pp. 49-59. (Previously published in the abstract-refereed conference “Code, Coding, and Coded Perspectives”, Association of Internet Researchers, Lawrence, Kansas, and September 2000.).

32.L. Jean Camp & Serena Syme,” The Governance of Code: Open Land vs. UCITA Land” ACM SIGCAS Computers and Society, September 2002, Vol. 32, No. 3.

33.Serena Syme & L. Jean Camp, The Governance of Code, Code as Governance , Ethicomp: The social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk, Gdansk, Poland, 18-20 June 2001, Vol. 1, pp. 86-101.

34.L. Jean Camp & Serena Syme, “A Coherent Intellectual Property Model of Code as Speech, Embedded Product or Service, Journal of Information Law and Technology, Vol. 2, 2001.

35.L. Jean Camp & B. Anderson, Expansion of Telecommunication Infrastructure in Emerging Nations: The Case of Bangladesh, Telecommunications Policy Research Conference, Alexandria, VA. 25-26 Sept. 1999.

36.L. Jean Camp, “The World in 2010: Many New Entrants”, info: the journal of policy, regulation and strategy for telecommunications, information and media, Vol. 2 No. 2, April 2000, 167-186.

L. Jean Camp & Charles Vincent, Looking to the Internet for Models of Governance , Ethics and Information Technology, 2004, Vol. 6, No. 3, pp. 161-174.

L. Jean Camp, “Community Considered”, democracy.com? Governance in a Networked, World Hollis Publishing (Hollis, NH) 1999.

37.L. Jean Camp, Democratic Implication of Internet Protocols , : Ethical, Social and Political Dimensions of Information Technology, February 28 - March 1, 1998; Princeton University, Department of Computer Science, Princeton NJ.

38.L. Jean Camp, “The Shape of the Network”, Governance in a Globalizing World, ed. J. Donahue, Brookings Press (Washington, DC) summer 2001.

39.L. Jean Camp, “Principles for Design of Digital Rights Management Systems” IEEE Internet Computing Vol. 6, No. 3 pp. 59-65, May 2003.

40.L. Jean Camp & Stephen Lewis, “The Economics of Information Security” Springer-Verlag 2004.

41.L. Jean Camp, “Identity Theft: Causes, Consequences, Possible Cures.” Springer-Verlag 2007.

Farzeneh Asgapour, Debin Liu and L. Jean Camp, “Computer Security Mental Models of Experts and non-Experts”, Usable Security 07, (Tobago) 16 February 2007.

42.L. Jean Camp, “Privacy: from abstraction to applications”, Computers & Society, Sept. 1994, Vol. 24, No. 3, 8-15.

43.L. Jean Camp & Marvin Sirbu, “Critical issues in Internet commerce”, IEEE Communications, May, 1997

44.Marshall, John 1931. Moenjodaro and the Indus Civilization. 3 Vols. London.

45.Ahmad Hasan Dani, New Light on Central Asia, Sang-e-Meel Publication,1996

46.Ihsan H. Nadiem, Moenjodaro , The Heritage of Mankind, Sang-e-Meel Publication,2002

47.Asko Parpola, Deciphering the Indus Script, Cambridge, Cambridge University Press, 1994

48.Mohammed Rafique Mughal ,Ancient Cholistan Art and Architecture, Ferozsons Ltd., Lahore, 1997

49.Asko Parpola ,Deciphering the Indus Script: methods and select interpretations, Occasional Papers Series, Center for South Asia, University of Wisconsin-Madison, 1997

50.Gregory Possehl , The Indus Age: The Writing System , U. of Pennsylvania Press, 1996,

51.Richard Meadow , Harappa Excavations 1986-1990: A Multidisciplinary Approach to Third Millennium Urbanism, Prehistory Press, 1991,

52.Raymond and Bridget All chin, The Rise of Civilization in India and Pakistan,

Cambridge Univ. Press, 1982

53.Gregory Possehl, Harappa Civilization, Science Pub., 1993

54.Naida Kirkpatrick, The Indus Valley Understanding People in the Past,

Heinemann Library, April 2002

55.Iravatham Mahadevan, Terminal Ideograms in the Indus Script, in Gergeory L. Possehl, Harappan Civilization: A Contemporary Perspective, Oxford & IBH Publishing Co., 1982

56.Gregory Possehl ,The Indus Civilization A Contemporary Perspective,

Altamira Press, January

57.Ardeleanu-Jansen, Alexandra 1983. Stone sculptures from Moenjodaro. Interim Reports, Vol. I. ISMEO- Aachen University Mission. Aachen.pp.139-157.

58.Joshi J.P. & Asko Parpola 1987. Corpus of Indus Seals and Inscriptions (=CISI). Vol. I: Collections in India. Helsinki.

59.Knorozov Y.V. et al 1981. Proto-Indica 1979. Moscow.

60.Lal B.B. 1960. From Megalithic to the Harappa: tracing back the graffiti on pottery. Ancient India, 16, pp. 4-24.

61.Mahadevan I. 1977. The Indus Script: Texts, Concordance and Tables (=ISTCT). Archaeological Survey of India. New Delhi.1998.

  

Evolution of Ethno-Archaeological Model

1.Nazeer Ahmad Chaudhry, Integration of TCP/IP Protocol Suites with Cryptographic Security approved Ph. D. Electrical & Electronics Engg.) In Total Technology thesis at University of Bradford U.K.

2.Nazeer Ahmad , Secure MIS book draft sent to Artic House Norwood

3.Nazeer Ahmad, Secure MIS in Business Communication, B.M.A. Preston University Research Paper in MIS subject.

4.Nazeer Ahmad ,Protection of Radio Tele-printing Circuits, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1987,pp 25-29

5.Nazeer A. Chaudhry ,Protection of Speech and Data Communication Circuits , The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1988,pp 52-56

6.Nazeer Ahmad ,Neo-Communication Security Environments, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1990,pp 25-29

7.Nazeer Ahmad Chaudhry ,Communication Systems , MS Thesis MUET Jamshoro 1990-1992,

8.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994

9.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Hilal Magazine , ISPR Publication , January 1995

10.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1994

11.N. A. Chaudhry , Tactical Nuclear Operations : Indian Option for 21st Century, Pakistan Defence Review, Volume 6, 1994, pp 80-92

12.N. A. Chaudhry , Integrated National Defence , Pakistan Army Green Book, 1991, pp343-346

13.N. A. Chaudhry , Safety Equipment for Nuclear Operations , T.S.O. Research Paper , E.M.E. College NUST Campus Rawalpindi, 1985

14.Nazeer Ahmad. Chaudhry , Pre- Evolution History Corps of Signals 1847-1947, SRC Publishers Hyderabad, 1992

15.Nazeer Ahmad. Chaudhry, Design and Development of Secrecy Electronics Communication System, M. Phil. ( Electronics Engg. ) thesis at MUET Jamshoro, 1993-1995

16.Nazeer Ahmad. Chaudhry , Electronics Warfare Doctrine Under Hostile Environments , Pakistan Army Green Book, 1991, pp 287-290

17.N. A. Chaudhry , Cryptographic and Computer Security , The Hilal Magazine , ISPR Publication , volume 24 , 19 January 1995

18.N. A. Chaudhry ,Evolution of Codes and Ciphers , The Hilal Magazine , ISPR Publication , 8 February 1995

19.N. A. Chaudhry , Cryptographic Security Systems , The Hilal Magazine , ISPR Publication , volume 20 , 15 December 1994

20.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994

21.N. A. Chaudhry , Axiomatic Educational Strategy for 21st Century , Research Paper presented at IEEEP Lahore ,1995 and published in local press

22.Nazeer Ahmad , Quality Education , Pakistan Observer Daily, 18 November 1998

23.Nazir Ahmad Chaudhry, Education System & National Development , The Jung Daily, 6 February 1995

24.Nazir Ahmad Chaudhry , A Short History Of Lahore & Its Monuments, 2000, Sang-e-Meel Publisher Lahore

25.Nazeer Ahmad, Legal Settlement of Kashmir Problem , Pakistan Army Journal , U.N. and Kashmir Issue , Pakistan Observer Daily, 15 November 1994

26.Nazeer Chaudhry , Islamic Requirements of Justice System, , Daily Markaz, 22 February1998 Islamabad

27.Nazeer Chaudhry , Islamic System of Saudi Arabia , Daily Markaz, 8 September 1998 Islamabad

28.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Bazem –i- Alm –o-Fun Islamabad 2000

29.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 21 September,1998

30.Nazeer Chaudhry, How to Reduce Budget Deficit , Daily Markaz, 3 April,1999, 4 April,1999, 11 April,1999, Islamabad

31.Nazeer Ahmad , Solution to Public Problems , The Exclusive Weekly, Islamabad, 26 September 1996

32.Nazeer Chaudhry, Budget and Unemployment , Asas Daily , 20 June 1999

33.Nazeer Ahmad , Time to Shake Hands With India , The Exclusive Weekly, Islamabad, 16 July 1991

34.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Defense Digest Monthly, October 1992, pp 53-87

35.Nazeer Ahmad, Constitution of Pakistan and Peoples’ rights , 2004

36.Nazeer Ahmad , We can’t Progress Without Science Education, Pakistan Observer Daily, 2 November 1994

37.Nazeer Chaudhry, South Asian Economy and Kashmir , Al Akhbar Daily, 16 October 1999

38.Nazir Ahmad Chaudhry, Peace, Security &Development, Daily Markaz, 17 Agust,1998, Islamabad

39.Nazir Ahmad Chaudhry, Harappa : the cradle of our civilization , Sang-e-Meel Publication,2002

40.N. A. Chaudhry , Modern Technology Impacts of Defence , Pakistan Army Journal , 1994, pp62-74

41.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999

42.Nazir Ahmad Chaudhry, Multan :glimpses, Sang-e-Meel Publication,2002

43.N.A. Chaudhry , Tourism Development in Pakistan , Friday News Weekly, 6 July 1999

44.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, September 1999

45.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999

46.Nazir Ahmad Chaudhry, Basanat :a cultural festival of Lahore , Sang-e-Meel Publication,2001

47.Nazir Ahmad , Academic libraries in a developing society ,1984, Sang-e-Meel Publication

48.Nazeer Ahmad , 21st Century Challenges for Our Engineers, Pakistan Observer Daily, 11 December 1994

49.Nazir Ahmad , University library practices in developing countries ,1984, Sang-e-Meel Publication

50.Nazeer Ahmad , New Trends in Energy Generation, Pakistan Observer Daily, 2 November 1994

51.Nazir Ahmad, Oriental presses in the world ,1985, Sang-e-Meel Publication

52.Nazir Ahmad Chaudhry, Eastern Science of Medicine, Pakistan Observer Daily, 18 March 1995

53.N.A. Chaudhry, Kala Bagh Dam , Niwa –i- Waqat Daily, 14 July 1998

54.Nazir Ahmad Chaudhry , Ghulam Rasul Chaudhry , Irrigated Agriculture in Pakistan , Sang-e-Meel Publication,1988

55.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 22 July 1998, Islamabad

56.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 28 July 1998, Islamabad

57.Nazir Ahmad Chaudhry, Anarkali, archives and tomb of Sahib Jamal : a study in perspective , Sang-e-Meel Publication,2002,

58.Nazir Ahmad Chaudhry, Ground Water Resources in Pakistan, Sang-e-Meel Publication, 1974.Nazeer Chaudhry, Expected Attack on Atomic Instillations Pakistan , Osaf Daily 5June 1998, Islamabad

59.Nazeer Chaudhry, Regional Cooperation and Pakistani Forces, Markaz Daily 30 June 1999, Islamabad

60.Nazeer Chaudhry, Circulation of Money Al Akhbar Daily 17 February 2003, Islamabad

61.Nazeer Chaudhry, Solution of Unemployment Problem , Daily Subha, , 17 April 2004, Islamabad

62.Nazeer Chaudhry, Inflation, Unemployment and Terrorism, Daily Subha, , 9 August 2004, Islamabad

63.Nazeer Chaudhry, Social and Economic Welfare of Society , Daily Ehsas , 6 April 1999, Islamabad

64.Nazeer A. Chaudhry, Strategic Dimension of Pakistan, Submitted to Pakistan Defence Review, 2005

65.Nazeer A. Chaudhry, Solution to Kashmir Problem, Submitted to Pakistan Defence Review

66.Nazeer Chaudhry, How to End Terrorism, Daily Markaz , 8 November 1998 , Islamabad

From: N.A. Chaudhry : My thanks to A. Times for registration . Decrypted Secrets of Harappan Civilization 19oo-1300 B.C. can be used for peace and security in Asia and end of terrorism.Global trade through IVC ( Indus Valley Civilization) worth $7.5 billions and trading of largest oil & gas reserves worth over $ 15 Trillions from central Asia is being blocked because , presnt Asians are not so civlized as compared with the Senate of tragers of Harappan States : Harappa , Mohenjodaro, Dholavera , Lothal and Gedrosia . Dani said during very long interview with me for approval of conclusions on 1st cryptanalysis model on IVC script. ,"South Asia was termed as golden sparrow and every one got the job at his door step . Grains and water was protected and we find best model of social security and protection of human rights.Many scholars tried the kicking mule ( IVC scripts ) to accept the daughter ( any of ancient language like Dravidian , Brahvi, and many others ) or at least to adopt it. Many scholars including Dani, B. B. Lal , Russian Professors , Steve Farmer and Michael from Harvard University , Fairservis and others who confirm our conclusions that we might stop forcing the mule to accept the given daughter. Sunskrit literature evolved in Ganga valley even ignores events like attack by Alender in Indus Valley but the literature evolved in1300-1000 B.C. era according to new dating was made to mention the dried up river Hakrra/ Kangra or Srawati( Mughal -1997) in 1990B.C. as flowing big river. After extensive travelling and research work and spending in 5 years including 7 day journey on helicopter , I conclude that this was excessive floods over 18 recorded by Mark & Possehl and change of coarse by indus that shifted Harappa culture to 2600-1900 B.C. to matured Harappan civilzation. Kot Diji culture (Khan -1965) 3500-2600B.C. was quite diffent culture with differnt mythology motifs and symbols having burials sacrfices and divine god like others. Matured Harappan civilization is different adopting global cult of sun god and King Priest was not a divine god. We are not including methimatical cryptanalysis and we ware not diagreeing to anything.. Dravidian the sopken language was not required to be in written form. Do we have any of local languages in written scripts. The answer on record is no . The oldest culture of stone age is Suma ( Sownan Valley ) 0.5 -2.5 million yera old along with bone of Peking man 0.5 m , Iwaja in Japan , a city under the sea at Indian Gujrat coast , oldest city near dead sea in Jordan and Mehrgarh in Gedrosia of 8000 B.C. We had history as sing subject in oldest culture of the world till 1960s and we have elders using counting system of 20s till 1970s in Suma. According to the research by General Kungham Aryan had left Suma ( the salt range & Kashmir in 1426 B.C. and it was being ruled by Anavas tribe. Aran started arriving around 2500 B.C. in small grups as cattle grazers but they had evolved sunskrit before 1900 B.C. seening a big flowing river Hakra. Dani, Mughal and others call it a seperate river but we call it previous alignment of Indus. The concept of roads and rivers is different for people like us actually moving the troops and their suppies. Let us consider my claim that global trading route and attacking route in South Asia before Grand Trunk road was rougly 10 km wide on both sides of G.T. road. Any one who disagree is posted as logistic commader. I ask him to move the treasure of Alender 7 tons of god and silver. Eva our VP on control desk give him published data that this treasure required 26000 mules and 5000 camels. One unit is 33 men and you require over dozen units for many purposes . Two camel load is required for one man. Muhammad of Ghazni attack for Somnat had 30000 troops and 2 camels were required for one soldier for water and rations. We requre the grazing grounds for cattle, local labour , water replenshment and replacement for sick animals . We require a herd of cattles for ration. It may requre few months to get the convoy moved after prepration of many months.

The terms Block Cipher and Stream Cipher are borrowed from modern cryptanalysis (1). The methods and maxims of cryptology were reviewed to find the decrypted secrets of Let us take a very simple example of a message to be encrypted 46 words and 252 characters with spaces and 204 without spaces.

 

“His Excellency The King Priest of Harappa State as Chairman of Senate for Global Trading Coordinator in South Asia is pleased to order the new seal and signatures to be taken as final orders for all priests to be enforced from 1 January 1900 B.C. “

 

Let me complement Marshal (1931) , Wheeler (1956), Mackay , Magan, Ghosh, Wolley , Ghosh, Roy (1953), Possel , Tosi (1993), Walter, Fairservis, Sfaffer , Vats(1940), B.B.Lal, Durani(1981), Jacobson, Terome(1986), Kenoyer (1985), Khan F.A.(1965), Ratnagar(1991) and many others who contributed to Indus Valley research. Iravatham Mahadevan seems to be greater scholar when he sys that he could n't decipher the scripts inpite of his over 40 yeras research work. Ahmad Hassan Dani , B.B. Lal and Russian professors are the greates who disagreed to excellent research work by Asko Parpola. Being student of topsecret science Cryptology since childhood , I was associated with code and ciphers. After long discussion with Dani about above researchers and scholars and his work with some of them , we came to the claim of decipherment by Jha N and Rajaram (2000) that I thought the broken seal by Mackay showing rear portion of bull being called hoof of a horse. Dani said smiling , " We am actually Vani from Central Asia hence I would like to apprecite the work by Brahamans ". Then added that government funding is very limited and any effort like the effort of Jha N and Rajaram has to be appreciated but we mightn't agree with decipherment if it is not correct. Then he narrated all the conversation with Parapola and finally he disagreed

   

My highest compliments to all concerned for excellent site."Sir, You have taken a right step to get those Swings removed from site of Harrapa" , Visitors thanked great scholar Dani when I visited his house in 2005. I had taken years to get it done by publishing many articles requesting peoples to create more facilities at cultural heritage sites. My kids and wife would had been cursing me for taking them to Harrapa quite often , My family was not craking Indus Scripts in 1989 because I had more than one computer as Manager Army Computer Club Okara but they had to crack Indus Scripts in 1995 becaue we had just one 486 computer for 3 kids and myself. What attraction kids and families had in ruins visiting 7th time.

“ What you think about round stone with stone round rod in the center and other on the top with hole in the center like grinding stone on top” , my expert visitor Egyptian asked on my 7th visit to Museum of Sasi & Punu two lovers near Twin port Karachi. Being from stone age cultural area , still using hand grinding in 1980 , acting as guide to my guest during last 6 tours , I thought it some sort of grinding though grinding stone are opposite to this , top has a wooen handle to move the stone , hole in the center has wooden piece a slot to where fulcrum from lower stone stone rest. Lower stone has a hole and tappered wooden piece is used for adjust ment of fuckrum. “ But how you would move this set for grinding , this is from tepmle used by issueless women “ , my expert visitor guided me on 7th visit.

My compliments to Thailand tourism , Ms Nani and the driver , she guided me in such an excellent fashon in 1995 that I still remember her. “ No guidence in the way , I would sit with driver , you have to be VIP not speaking a word “ , Nani gave the briefing on a cup of coffe before we started for visit of Royal Palace. She was such an excellent guide that she even gave out out cost of golden budda’s constume , golden bricks on the outer wall of golden temple. They had even kept book on Bhuddaism in my room. Bhudaism started from Taxila Pakistan but we have to make living model of previous prehistoric cultures of snake worshipers and other

 

Historical Perspective

1st success decryption of Indus Scripts confirmed through works of Dani, B B Lal , Mehdewan, Fair Server , Mark, Russian Professoers and many others in the century was approved by Dani in 2005. South Asia as most peaceful global trader and protector of global trading routes was known as ‘golden sparrow’.Everyone got job at his home and economy was stable. “ We must share our research work because there is no government support” Dani said . We have many secrets from Indus Script decryption that can make South Asia as most peaceful region for global trading. Global Peace Mega Project at. twitter.com/#!/nazeeraahmadch. We salute Anhazari for greatmove against anti corruption

Harappan civilization reached improbable heights and evolved amazing scripts .

Ancient inscriptions and pictorials starting from Mehrgarh Gedrosia 7000 BC till fall of civilization have always been an enigma. The glories of the ruined cities and their amazing un-deciphered script had many researchers imagining a gentle society of priests and scribes. Our decrypted secrets explain a culture that reached the heights of artistic achievement during 1900-1300 BC termed as Harappan civilization. New clues, unearthed from research on ruins and from our decrypted secrets point to new civilization of global trading termed as Matured Harappan

The settlement of Kot Diji culture mostly remained l hidden under the ruins of Mohenjodaro , Harappa and other big cities now known as Harappan Civilization 2600-1900 BC . Ethno-archaeological model is assuming much as it was when the first 50 hunting groups arrived in perhaps 8000 – 7000 BC connected with the arrival of Adam on earth. A dense forest , marshes and barren land where wild animals ruled was shared by manlike creatures . scarlet macaws, toucans, and vultures nest in towering tropical hardwoods. Scorpions , mountain , goats , fish , water buffalos lived together . These creatures and monkeys swing from branches and vines and howler monkeys bellow in the distance. It had been a land of jungle , marshes , mud, serpents and sweat, and tigers and horned tigers the lord of the jungle . The earliest arrivals of these creatures has been excavated in Samma Soan Valley of stone age where we find caves is probably had no choice—overcrowding elsewhere may have forced them into this forbidding environment. But once there, they mastered its challenges. Settling near rivers, lakes, and swamps, they learned to maximize the thin soil's productivity. They cleared the forest for maize, squash, and other crops by slashing and burning, much as today's Maya do, then re-enriched the land by alternating crops and letting fields lie fallow.

As populations grew, they adopted more intensive methods of cultivation—composting, terracing, irrigation. They filled in swamps to create fields and carried silt and muck from bottomlands to fertilize enclosed gardens. Artificial ponds yielded fish, and corrals held deer and other game flushed from the forest. The ancient Maya ultimately coaxed enough sustenance from the meager land for several million people, many times more than now live in the region.

Over the centuries, as the Maya learned to prosper in the rain forest, the settlements grew into city-states, and the culture became ever more refined. The Maya built elegant multiroom palaces with vaulted ceilings; their temples rose hundreds of feet toward the heavens. Ceramics, murals, and sculpture displayed their distinctive artistic style, intricate and colorful. Though they used neither the wheel nor metal tools, they developed a complete hieroglyphic writing system and grasped the concept of zero, adopting it for everyday calculations. They also had a 365-day year and were sophisticated enough to make leap-year-like corrections. They regularly observed the stars, predicted solar eclipses, and angled their ceremonial buildings so that they faced sunrise or sunset at particular times of year.

Mediating between the heavens and earth were the Maya kings—the kuhul ajaw, or holy lords, who derived their power from the gods. They functioned both as shamans, interpreting religion and ideology, and rulers who led their subjects in peace and war. Demarest and others have described the Maya centers as "theater states" in which the kuhul ajaw conducted elaborate public rituals to give metaphysical meaning to movements of the heavens, changes of the calendar, and the royal succession.

Behind the cloak of ritual, the Maya cities acted like states everywhere, making alliances, fighting wars, and trading for goods over territory that ultimately stretched from what is today southern Mexico through the Petén to the Caribbean coast of Honduras. Well-worn trails and stucco-paved causeways crisscrossed the forest, and canoes plied the rivers. But until Fire Is Born arrived, the Maya remained politically fragmented, the city-states charting their own courses in the jungle.

By 378 Waka was a prestigious center, boasting four main plazas, hundreds of buildings, temple mounds up to 300 feet (90 meters) tall, ceremonial palaces clad in painted stucco, and courtyards graced with carved limestone altars and monuments. A trading power, it occupied a strategic location on the San Pedro River, which flowed westward from the heart of the Petén. Its market was filled with Maya foodstuffs such as maize, beans, chilies, and avocados, along with chicle harvested from sapodilla trees to make glue, and latex from rubber trees to make balls for ceremonial games. Exotic goods found their way to Waka as well. Jade for sculpture and jewelry and quetzal feathers for costumes came from the mountains to the south, and obsidian for weapons and pyrite for mirrors from the Mexican plateau to the west, the domain of Teotihuacan.

A sprawling metropolis of 100,000 people or more—perhaps the largest city in the world at the time—Teotihuacan left no records that epigraphers have been able to decipher. But its motives in dispatching Fire Is Born to the Maya region seem clear. Waka sat on a promontory overlooking a tributary of the San Pedro with a protected harbor, excellent for berthing large canoes. "It was a perfect staging area" for military action, notes Southern Methodist University archaeologist David Freidel, co-director of excavations at Waka. Which may be precisely what Fire Is Born had in mind.

Waka appears to have been key to the envoy's mission: to bring the entire central Petén into Teotihuacan's orbit, through persuasion if possible, force if necessary. His principal target was Tikal, a kingdom 50 miles (80 kilometers) east of Waka. Tikal was the most influential city-state in the central Petén. Bring Tikal into the fold, and the other cities would follow.

Fire Is Born's soldiers were probably shock troops, designed principally to display his bona fides and demonstrate good faith. He needed reinforcements, and he had come to Waka to get them. In return, he could offer the goodwill of his patron, a mysterious ruler known from inscriptions as Spear-thrower Owl, probably a highland king, perhaps even the lord of Teotihuacan.

Waka's ruler, Sun-faced Jaguar, apparently welcomed Fire Is Born. Based on hints in texts from Waka and other sources, Freidel, project co-director Héctor Escobedo, and epigrapher Stanley Guenter suggest that the two rulers cemented their alliance by building a fire shrine to house the sacred flame of Teotihuacan.

Along with moral support, Fire Is Born probably secured troops. His expeditionary force likely carried the spear-throwers and javelins typical of Teotihuacan and wore backshields covered with glittery pyrite, perhaps meant to dazzle the enemy when the soldiers spun around to hurl their weapons. Now warriors from the Petén, equipped with stone axes and short stabbing spears, swelled their ranks. As armor, many wore cotton vests stuffed with rock salt. Eleven hundred years later, the Spanish conquistadores shed their own metal armor in the sweltering rain forest in favor of these Maya "flak jackets."

The military expedition most likely set out for Tikal in war canoes, heading east, up the San Pedro River. Reaching the headwaters, the soldiers disembarked and marched either along the river or on the canyon rim overlooking it.

Garrisons probably dotted the route. News of the advancing column must have reached Tikal, and somewhere along the stretch of riverbank and roadway, perhaps at a break in the cliffs about 16 miles (26 kilometers) from the city, Tikal's army tried to stop Fire Is Born's advance. Inscribed slabs, called stelae, later erected at Tikal suggest that the defenders were routed. Fire Is Born's forces continued their march on the city. By January 16, 378—barely a week after his arrival in Waka—the conqueror was in Tikal.

The date is noted on Tikal's now famous Stela 31, which yielded early clues to Fire Is Born's importance when David Stuart of the University of Texas at Austin deciphered it in 2000. The second passage on the stela records what happened after the city fell: Tikal's king, Great Jaguar Paw, died that very day, probably at the hands of the vanquishers.

Fire Is Born appears to have dropped whatever pretense he had assumed as a goodwill ambassador. His forces destroyed most of Tikal's existing monuments—stelae put in place by 14 earlier rulers of Tikal. A new era had begun, and later monuments celebrated the victors. Stela 31, erected long after the conquest, describes Fire Is Born as Ochkin Kaloomte, or Lord of the West, probably referring to his origins in Teotihuacan. Some Maya experts have also suggested another meaning: that Fire Is Born represented a faction that had fled to the west—to Teotihuacan—after a coup d'état by Great Jaguar Paw's father years earlier and had now returned to power.

It apparently took Fire Is Born some time to pacify Tikal and its environs. But a year after his arrival, Tikal's monuments record that he presided over the ascension of a new, foreign king. Inscriptions identify him as the son of Spear-thrower Owl, Fire Is Born's patron in Teotihuacan. According to Stela 31, the new king was less than 20 years old, so Fire Is Born probably became Tikal's regent. He was certainly the city's de facto overlord.

In the years that followed the conquest, Tikal itself went on the offensive, expanding its reach across the Maya region. Fire Is Born appears to have masterminded the campaign, or at least inspired it. References to him have been identified in cities as distant as Palenque, more than 150 miles (240 kilometers) to the northwest. But the most poignant testimony to his empire-building comes from Uaxactún, just 12 miles (19 kilometers) from Tikal. There a mural shows a Maya nobleman giving homage to a warrior in Teotihuacan regalia—perhaps one of Fire Is Born's troops. A stela depicting a similar warrior guards a tomb where archaeologists found the remains of two women, one pregnant, a child, and an infant. Freidel and others have concluded that these were the remains of Uaxactún's royal family, slain by Tikal's forces. The king, presumably, was taken to Tikal and sacrificed there.

Decades after the arrival of Fire Is Born and long after he must have died, the aggressive rulers of Tikal continued to invoke Fire Is Born and his patron state, Teotihuacan. In 426, Tikal took over Copán, 170 miles (274 kilometers) to the south in present-day Honduras, and crowned its own king, Kinich Yax Kuk Mo, who became the founder of a new dynasty. A posthumous portrait shows him wearing a costume typical of central Mexico—a reference to Teotihuacan—and like Fire Is Born, he bore the title Lord of the West.

Some Mayanists believe that Tikal was acting as a vassal state for Teotihuacan, expanding its dominion throughout the Maya lowlands, with Fire Is Born acting as a kind of military governor. Others see him less as a conqueror and more as a catalyst who spurred Tikal to expand its own power and influence.

His fate is a mystery. There is no known record of his death, and no evidence that he ever ruled a Maya kingdom. But his prestige lived on. The Waka stela recording his arrival there wasn't erected until a generation later, indicating that even a long-ago visit from the great Fire Is Born was a matter of civic pride.

For more than a millennium, the Maya had entrusted their religious and temporal well-being to their god-kings. These leaders displayed their might and majesty in lavish rituals and pageants, in opulent art and architecture, and in written records of their triumphs, inscribed on stone, murals, and ceramics.

The system prospered—indeed, its excesses created the artistic achievements and learning that defined the Maya as one of the ancient world's great cultures—as long as the land could satisfy people's basic needs. This was easy at first when cities were small and resources relatively plentiful, but over time, growing populations, an expanding nobility, and rivalry between the city-states strained the limits of the environment.

Today the Petén, geographically the largest province in Guatemala, has a population of 367,000, living in isolated towns scattered through a forested wilderness. In the eighth century, by some estimates, ten million people lived in the Maya lowlands. The landscape was an almost unbroken fabric of intensely cultivated farms, gardens, and villages, linked by a web of trails and paved causeways connecting monumental city-states.

Maya farmers were well schooled in sophisticated techniques designed to get maximum production from delicate tropical soils. But beginning in the ninth century, studies of lake-bed sediments show, a series of prolonged droughts struck the Maya world, hitting especially hard in cities like Tikal, which depended on rain both for drinking water and to reinvigorate the swampland bajos where farmers grew their crops. River ports like Cancuén might have escaped water shortages, but across much of the Maya region the lake-bed sediments also show ancient layers of eroded soil, testimony to deforestation and overuse of the land.

When bad times came, there was little the kuhul ajaw could do to help their people. Monoculture farming—growing one staple food crop that could be accumulated and stored for hard times or for trade—could not be sustained in the rain forest. Instead, each city-state produced small quantities of many different food items, such as maize, beans, squash, and cacao. There was enough, at least at first, to feed the kingdom, but little left over.

Meanwhile, Maya society was growing dangerously top heavy. Over time, elite polygamy and intermarriage among royal families swelled the ruling class. The lords demanded jade, shells, feathers from the exotic quetzal bird, fancy ceramics, and other expensive ceremonial accoutrements to affirm their status in the Maya cosmos. A king who could not meet the requirements of his relatives risked alienating them.

The traditional rivalry among states only made matters worse. The kuhul ajaw strove to outdo their neighbors, building bigger temples and more elegant palaces and staging more elaborate public pageants. All of this required more labor, which required larger populations and, perhaps, more wars to exact tribute in forced labor from fallen enemies. Overtaxed, the Maya political system began to falter.

This period marked the golden age of Classic Maya civilization. The kuhul ajaw were in full flower in these two great alliances, competing in art and monuments as well as in frequent but limited wars. Calakmul defeated Tikal in a major battle in 562 but destroyed neither the city nor its population. Eventually Tikal rebounded and defeated Calakmul, subsequently building many of its most spectacular monuments.

Simon Martin, with Nikolai Grube of the University of Bonn, compares the Tikal-Calakmul rivalry to the superpower struggle of the 20th century, when the U.S. and the Soviet Union competed to outdo each other in fields ranging from weaponry to space travel. With neither side ever able to gain the upper hand, the Cold War arguably brought stability, and so did the standoff in the Maya world. "There was a certain degree of destruction" because of the rivalry, says Guatemalan archaeologist Héctor Escobedo. "But there was also equilibrium."

It did not last. Martin suggests the balance may have been intrinsically unstable, like the competition among the city-states of ancient Greece, or the nervous grappling between North and South in the United States prior to the Civil War. Or perhaps an overstressed environment finally caught up with the proud Maya powers, bringing a new edge of desperation to their rivalry. Either way, the unraveling began at the small garrison state of Dos Pilas, near the Pasión River downstream of Cancuén.

In 630 Tikal, trying to reassert a presence along Pasión River trade routes increasingly dominated by Calakmul, expanded an existing outpost near two large springs—pilas, in Spanish. The site had little else to recommend it. Dos Pilas grew no crops and sold nothing. Scholars call it a "predator state" that depended on tribute from the surrounding countryside. War, for Dos Pilas, was not only a ritual to glorify kings and appease gods. War was what Dos Pilas did to survive.

The kingdom's history of violence and duplicity began when Tikal installed one of its princes, Balaj Chan Kawiil, as Dos Pilas's ruler in 635. The garrison slapped together a fancy-looking capital for the young prince, using carved facades to mask loose and unstable construction fill. But in 658 Calakmul overran Dos Pilas and drove Balaj Chan Kawiil into exile.

We know the next chapter thanks to a thunderstorm that toppled a tree at Dos Pilas six years ago, exposing a carved stairway hidden beneath its roots. Inscriptions on the stairway reveal that Balaj Chan Kawiil returned two years after his exile—but as a Calakmul surrogate. Dos Pilas's turncoat king helped Calakmul cement its control over the Pasión Valley during the next two decades. Then Calakmul delivered fateful news. Its rulers ordered Balaj Chan Kawiil to fight his brother in Tikal itself.

For a time, fleeing nobles could find refuge in Cancuén, a quiet port at the headwaters of the Pasión River. Even as downriver cities sank into chaos during the eighth century, Cancuén prospered by trading luxury items and providing sumptuous lodgings for elite visitors. The architect of this golden age was King Taj Chan Ahk, who came to power in 757 at the age of 15. Cancuén had a long history as a strategic trading post, but Taj Chan Ahk transformed the city into a stunning ceremonial center. Its heart was a 270,000-square-foot (25,000 square meters), three-story royal palace with vaulted ceilings and 11 courtyards, made of solid limestone and elegantly placed on a riverside promontory. It was a perfect stage for a Maya god-king, and Taj Chan Ahk was master of the role, even as it was dying out elsewhere.

There is no evidence that Taj Chan Ahk ever fought a war or even won a battle. Instead he managed to dominate the upper Pasión Valley for nearly 40 years by coaxing advantage through patronage and alliances. An altar monument at Cancuén dated 790 shows him in action, engaged in a ceremonial ball game with an unknown noble, perhaps to celebrate a treaty or a state visit.

Taj Chan Ahk died in 795 and was succeeded by his son Kan Maax, who sought to trump his father by expanding the palace. But pomp and ritual—the old trappings of kingship—could no longer hold the Maya universe together. Within five years the spreading chaos had reached the gates of the city. In one terrible day its glory winked out, another light extinguished in the world of the Classic Maya.

Nazeer Ahmad Chaudhry

Independent Researcher from Pakistan

Author & Researcher: Decryption of Harappan Ciphers 1st successful solution in a century

President TPI Inc., President IT Genetics , Manager Asia Women Global Justice Group , Chairman Welfare Committee,

TPI has offered over 0.5 million free predicted solutions at all levels. Integrated solution based on Borderland Sciences, cryptanalysis, forecasting techniques Delphi, Scenarios and multi scenarios, war gaming and other spiritual techniques. We attach no claim with free predicted solutions. Error correction techniques and analysis may be carried out by users.

An analysis might be carried out if I can be of any use for establishing global peace by ending terrorism. I have been subjected to over 30 killing attacks, killing of over 10 members of my family and losses in millions. I have given details at petitions at Care-2, Peace pink, yahoo and other comments. Mega project research work aimed at establishing peace and security at global level by ending terrorism. I desire global board of directors sponsored by UNO to come forward for benefits of all.

I offer 1st decryption of Harappan Scripts in a century; the decrypted secrets not yet published have solution to many problems. The strategic location of Pakistan offer global trading of $ 7.5 billion per year to global community, oil and gas trading of over $ 15 trillions. I have been trained by over 250 foreign telecomm firms; I had lot of interaction with my friends from many countries as class fellows, R&D Engineer at Research Establishment, visit to Thailand, Ministry of Interior Saudi Arabia Border Guards, as operational engineer, as Zonal Manager of NGO and service in the army. I have given lot of material at Internet. My friends , colleagues , group members and others can carry out an analysis of mega project including integrated energy , renewable energy , befouls , safety and security of global trading, safe train link, herbal foods , new employments , new concepts in housing , overhauling of education systems , innovations and integration of new global technologies and many others.. We must establish an accountability system to stop official terrorists and corrupt gangs failing all the global projects.

Mega Project: Problems in offering Global Solutions

The establishment of global peace and stability by ending terrorism has been delayed due to 30 killing attacks on me, killing of 10 members of my family, loss in millions, terrorists attack on 3 sick and crippled women of 3 families, 11 of witnesses and me. Petitions have been registered. May I request global peace lovers to sign the petitions; they may not display their names.

Research Interests Nazeer ’s fundamental research is on discovering and understanding the problems and offering free solutions by forecasting/prediction through economic, social, organizational and technical interactions and techniques evolved through TPI Inc. Over 0.5 million free solutions have been offered at all level but aim of ending terrorism, corruption and prevention of fraud at any level has yet to achieve. Research Projects • Research in any field that can give protection to mankind from fraud, terrorism and human right protection. • Ethno-archaeological Model on Harappan Ciphers: Decryption of Harappan Cipher is over 30 years research project, the 1st successful cryptanalysis in the century • Axiomatic Education Strategy for 21st Century • Prevention of Fraud: Nazeer and his wife Hamida are heir to the lands & property of about 7 families hence an effort underground had been going on for killing of every member of this family. It is very interesting research work scanning the centuries how people slaughter others to become landlords by using fraud and terrorism. • Security and public policy was forced on Nazeer to accept almost all responsibilities in Home County being heir to 7 people. He suffered over 30 killing attacks, killing of 10 members of his family by the snakes brought up by them; the relatives of his step mother.

Contents

[hide]

•1 Education

o1.1 Experience

o1.2 Research Work

•2 Projects

o2.1 Publications:

 

[Edit] Education

B.Sc. Telecomm Engineering, B Sc Honors, Technical Graduate NUST-EME, LLB, PEC, MIE Pak, IEEEP, IEEE, IEEE Computer Society, IEEE- ISST

MBA , M. Phil. Electronics Engineering , MA , Cryptology NUST-MCS , Arabic AIOU , Ph D Total Technology approved researcher Bradford

•B.Sc. (Telecomm. Engineering), Member:PEC,IEEE &Computer Society IEEE USA MIE (Pak.)

•M.B.A. Preston Univ. 1995 , M.A.( Political Science), B.Sc. (Honors War Studies), L.L.B. , Arabic Diploma AIOU Islamabad

•Doctor of Philosophy in Total Technology at University of Bradford UK approved researcher in since 1995. M Phil at MUET was accepted for credit in Ph.D. Second part M.B.A completed from Preston University USA, Courses /research/ 15 years experience/foreign firm training from 250 firms as R&D engineer in cryptographic security completed. Member PEC , TSO graduate from NUST Campus ,Advance Cryptology Course , Refresher Cryptology Course from NUST

•M. Phil. (Electronics Engineering,) Cryptology (NUST), Technical Staff Course (NUST,, Ph.D. (Electrical/Electronics Engineering) approved researcher at Uni. of Bradford U.K. Masters of Science and M Phil at MUET Jamshoro Pakistan was got transferred for PhD

•M.B.A. from Preston University USA from Islamabad Campus getting 98 % in MIS, Organizational Communication and International Marketing subjects. (98 % marks in Information Theory in Advance Cryptology NUST Campus. M.A. (Political Science) from Sindh Uni.

[edit] Experience

•1996-1997 Telecommunication Engineers at Ministry of Interior Saudi Arabia Border Guards

•1978- 1994 Telecommunication Engineer in Sindh and Baluchistan Provinces , Technical Staff Course , Research & Development Engineer at Signals Research Establishment . Telecommunication Engineer and Communication officer in Army 1972-1994

•Teaching: Teaching Assistant and teaching staff for science and technology subjects at Higher Secondary School, Signal Training Center, Computer Clubs, Divisional Battle School NUST Campus MCS, National Institute of Computer Sciences

•Administration: Zonal Manager Hamdard Laboratories Rawalpindi Zone (1998-1999). 24 years experience in Pakistan Army

•Training: Training by foreign Telecom firms from USA, UK, Canada, China, France, Germany, Japan, South Korea, Norway, Sweden and many other countries as R&D Engineer.

Computers: Student Member IEEE USA (1994-95), Manager Army Computer Clubs at Okara and Hyderabad, Teaching Staff National Institute of Computer Sciences Rawalpindi (1995)

•Engineering: Student Member IEEE USA (1994-1997), Telecommunication Member Pakistan Engineering Council, Member Institute of Electrical Engineers Pakistan

[edit] Research Work

Decryption of Indus Valley Scripts has been my research work since last 30 years .This is 1st successful decryption in a century. Dani had confirmed the decryption in 2005 though 1st script was decrypted in 1995 when Secure MIS high security high compression book draft was approved by Artech House USA and Dorrance Publishers USA approved the draft for publication both books not yet published. Rolex Award also approved the research for an award.

B.B. Lal , Russian Professors , and US Scholars Farmer , Sprout , Fair Service, Mark , Durani , F.A. Khan, Mughal and many conclusions of the decryption supported by many other scholars through their written work.

•In 2004, Steve Farmer published, The Collapse of the Indus-Script Thesis: The Myth of a Literate Harappan Civilization, arguing that the Indus valley figures are merely a non-structured symbol system and do not represent a full language.

•In ancient cryptography used by Egyptians or code & ciphers used by lovers, diarists and underworld people, you don't require full language. As a kid, he had just a chance by compulsion to evolve coded language and a writing system to be read by kid girls who could just read Arabic without understanding it.

•All most all the population counted as the people of Indus Valley counted. He was 1st student to qualify Matric (O level) in 1968 and taught new science syllabus to his class as volunteer teacher because his science teacher declined to teach the syllabus unless he had undergone a course.

•He had over 50 of teacher’s 1st &2nd World War soldiers and there were few who had been living in the jungle. His county of 7 treasures in oldest Stone Age culture got electricity in 1990.They used ancient agricultural tools and animal transport like camels, horses, donkeys, bulls and buffalos were used.

[edit] Projects

•Large number of Design and modification projects in Telecommunication Engineering and Cryptology

•Research in any field that can give protection to mankind from fraud, terrorism and human right protection.

•Ethno-archaeological Model on Harappan Ciphers : Decryption of Harappan Cipher is over 30 years research project the 1st successful cryptanalysis in the century

•Axiomatic Education Strategy for 21st Century

•Prevention of Fraud: 50 years Research Work

•Security and public policy was forced on Nazeer to accept almost all responsibilities in Home County being heir to 7 people.

•Codes and Ciphers: Evolution of Coded Language based on Harappan Scripts

•Codes and Ciphers: Evolution of Written Script based on Harappan Scripts

•Design & Development of Maintenance Free Exchange for Desert Working

•Design & Development of Secrecy Electronics Communication System

•Cryptology : Design of High Security High Compression System

•Design & Development of Exchange for Nuclear Warfare

•Design & Development of Battery Charging and Lighting System on Wind Energy

•Design & Development of Energy Saying System

•Decryption of Moenjodaro Scripts

•Decryption of Matured Harappan Scripts

•Herbal Medicine : Medicated Foods and Treatment of Cancer

•Herbal Medicine : New Treatment for Asthma

•Evolution of Recycling Technologies for Low Cost Housing

•Evolution of Integrated Technologies for Energy Crisis

[edit] Publications:

1.Decryption of Moenjodaro Scripts approved in 1995 based on the Thesis: Integration of TCP/IP Protocol Suites with Cryptographic Security approved Ph. D. Electrical & Electronics Engg.) In Total Technology thesis at University of Bradford U.K. Not yet published.

2.Nazeer Ahmad , Secure MIS book draft sent to Artic House Norwood

3.Nazeer Ahmad, Secure MIS in Business Communication, Research Paper in MIS.

4.Nazeer Ahmad ,Protection of Radio Tele-printing Circuits, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1987,pp 25-29

5.Nazeer A. Chaudhry ,Protection of Speech and Data Communication Circuits , The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1988,pp 52-56

6.Nazeer Ahmad ,Neo-Communication Security Environments, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1990,pp 25-29

7.Nazeer Ahmad Chaudhry ,Communication Systems , MS Thesis MUET Jamshoro 1990-1992,

8.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994

9.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Hilal Magazine , ISPR Publication , January 1995

10.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1994

11.N. A. Chaudhry , Tactical Nuclear Operations : Indian Option for 21st Century, Pakistan Defense Review, Volume 6, 1994, pp 80-92

12.N. A. Chaudhry , Integrated National Defense , Pakistan Army Green Book, 1991, pp343-346

13.N. A. Chaudhry , Safety Equipment for Nuclear Operations , T.S.O. Research Paper , E.M.E. College NUST Campus Rawalpindi, 1985

14.Nazeer Ahmad. Chaudhry , Pre- Evolution History Corps of Signals 1847-1947, SRC Publishers Hyderabad, 1992

15.Nazeer Ahmad. Chaudhry, Design and Development of Secrecy Electronics Communication System, M. Phil. ( Electronics Engg. ) thesis at MUET Jamshoro, 1993-1995

16.Nazeer Ahmad. Chaudhry , Electronics Warfare Doctrine Under Hostile Environments , Pakistan Army Green Book, 1991, pp 287-290

17.Nazeer A. , Cryptographic and Computer Security , The Hilal Magazine ,19 January 1995

18.N. A. Chaudhry ,Evolution of Codes and Ciphers , The Hilal Magazine ,8 February 1995

19.N. A. Chaudhry , Cryptographic Security Systems , The Hilal Magazine , 15 December 1994

20.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994

21.N. A. Chaudhry , Axiomatic Educational Strategy for 21st Century , Research Paper presented at IEEEP Lahore ,1995 and published in local press

22.Nazeer Ahmad , Quality Education , Pakistan Observer Daily, 18 November 1998

23.Nazir Ahmad Chaudhry, Education System & National Development , The Jung Daily, 6 February 1995

24.Nazeer Ahmad, Legal Settlement of Kashmir Problem , Pakistan Army Journal , U.N. and Kashmir Issue , Pakistan Observer Daily, 15 November 1994

25.Nazeer Chaudhry , Islamic Requirements of Justice System, , Daily Markaz, 22 February1998

26.Nazeer Chaudhry , Islamic System of Saudi Arabia , Daily Markaz, 8 September 1998 Islamabad

27.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Bazem –i- Alm –o-Fun Islamabad 2000

28.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 21 September,1998

29.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 3 April,1999,

30.Nazeer Ahmad , Solution to National Problems , Daily Markaz, April,1999

31.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 11 April,1999, Islamabad

32.Nazeer Ahmad , Solution to Public Problems , The Exclusive Weekly, Islamabad, 26 September 1996

33.Nazeer Chaudhry, Budget and Unemployment , Asas Daily , 20 June 1999

34.Nazeer Ahmad , Time to Shake Hands With India , The Exclusive Weekly, Islamabad, 16 July 1991

35.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Defense Digest Monthly, October 1992, pp 53-87

36.Nazeer Ahmad , We can’t Progress Without Science Education, Pakistan Observer Daily, 2 November 1994

37.Nazeer Chaudhry, South Asian Economy and Kashmir , Al Akhbar Daily, 16 October 1999

38.Nazir Ahmad Chaudhry, Peace, Security &Development, Daily Markaz, 17 Agust,1998, Islamabad

39.N. A. Chaudhry , Modern Technology Impacts of Defense , Pakistan Army Journal , 1994, pp62-74

40.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999

41.N.A. Chaudhry , Tourism Development in Pakistan , Friday News Weekly, 6 July 1999

42.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, September 1999

43.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999

44.Nazeer Ahmad , 21st Century Challenges for Our Engineers, Pakistan Observer , 11 December 1994

45.Nazeer Ahmad , New Trends in Energy Generation, Pakistan Observer Daily, 2 November 1994

46.Nazir Ahmad Chaudhry, Eastern Science of Medicine, Pakistan Observer Daily, 18 March 1995

47.N.A. Chaudhry, Kala Bagh Dam , Niwa –i- Waqat Daily, 14 July 1998

48.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 22 July 1998, Islamabad

49.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 28 July 1998, 1974.

50.Nazeer Chaudhry, Expected Attack on Atomic Instillations Pakistan , Osaf Daily 5June 1998,

51.Nazeer Chaudhry, Regional Cooperation and Pakistani Forces, Markaz Daily 30 June 1999,

52.Nazeer Chaudhry, Circulation of Money Al Akhbar Daily 17 February 2003, Islamabad

53.Nazeer Chaudhry, Solution of Unemployment Problem , Daily Subha, , 17 April 2004

54.Nazeer Chaudhry, Inflation, Unemployment and Terrorism, Daily Subha, , 9 August 2004,

55.Nazeer Chaudhry, Social and Economic Welfare of Society , Daily Ehsas , 6 April 1999,

56.Nazeer A. Chaudhry, Strategic Dimension of Pakistan, Submitted to Pakistan Defense Review, 2005

57.Nazeer A. Chaudhry, Solution to Kashmir Problem, Submitted to Pakistan Defense Review ,1995

58.Nazeer Chaudhry, How to End Terrorism, Daily Markaz , 8 November 1998 , Islamabad

59.Nazeer Ahmad Chaudhry , Neo Scenario for Armed Forces of Pakistan , Pakistan Army Journal ( Urdu) , Winter 2009 , pp 25-42

60.ibid, PAJ, The J curve , Rise and Fall of Nations by Ian Beemer , Book Review , pp107-108

61.Nazeer Ahmad Chaudhry , Science & Technology : New Challenges for Defense , Pakistan Army Journal ( Urdu) , Summer 2009 , pp 15-25

62.ibid, PAJ , Curveball: Spies, Lies and the Con Man Who caused a War by Bob Dorgan , Book Review , pp- 85-87

63.Nazeer Ahmad Chaudhry , Nuclear Strategy for Future , Pakistan Army Journal ( Urdu) , Winter 2008 , pp 45-55

64.ibid, PAJ, the Failure of American Foreign Policy and Next Great Crisis in Middle East by Ali M. An sari , Book Review , pp104-106

65.Nazeer Ahmad Chaudhry , Defense Strategy for Future , Pakistan Army Journal ( Urdu) , Summer 2008 , pp 42-51

66.ibid, PAJ , Winning the Right War by Phillips H Gordon, Book Review , pp 85-87

 

The early news from the Pacific was bleak: the Pacific Fleet had taken a beating. With the battle line crippled, the undamaged American carriers assumed great importance. There were, on 7 December, only three in the Pacific: USS Enterprise (CV-6), USS Lexington (CV-2), and USS Saratoga (CV-3). USS Ranger (CV-4), USS Wasp (CV-7), and the recently commissioned USS Hornet (CV-8) remained in the Atlantic, Yorktown departed Norfolk on 16 December 1941 for the Pacific, her secondary gun galleries studded with new Oerlikon 20 mm guns. She reached San Diego 30 December 1941 and soon became flagship for Rear Admiral Frank Jack Fletcher's newly formed Task Force 17.

 

The carrier's first mission in her new theater was to escort a convoy carrying Marine reinforcements to American Samoa. Departing San Diego on 6 January 1942, Yorktown and her consorts covered the movement of marines to Tutuila and Pago Pago to augment the garrison already there.

 

Having safely covered that troop movement, Yorktown, in company with sister ship Enterprise, departed Samoan waters on 25 January. Six days later, TF8 (built around Enterprise), and TF17 (around Yorktown) parted company. The former headed for the Marshall Islands, the latter for the Gilberts, each to take part in some of the first American offensives of the war, the Marshalls-Gilberts raids.

 

At 05:17, Yorktown - screened by USS Louisville (CA-28) and USS St. Louis (CL-49) and four destroyers - launched 11 Douglas TBD-1 Devastators and 17 Douglas SBD-3 Dauntlesses, under the command of Comdr. Curtis W. Smiley. Those planes hit what Japanese shore installations and shipping they could find at Jaluit, but severe thunderstorms hampered the mission, and seven planes were lost. Other Yorktown planes attacked Japanese installations and ships at Makin and Mili Atolls.

 

The attack on the Gilberts by TF17 had apparently been a complete surprise since the American force encountered no enemy surface ships. A single four-engined Kawanishi H6K "Mavis" patrol flying boat attempted to attack American destroyers sent astern in hope of recovering the crews of planes overdue from the Jaluit mission. Antiaircraft fire from the destroyers drove off the intruder before he could cause any damage.

 

Later, another "Mavis"-or possibly the same one-came out of low clouds 15,000 yards (14,000 m) distant from Yorktown. The carrier withheld her antiaircraft fire in order not to interfere with the combat air patrol (CAP) fighters. Presently, the "Mavis", pursued by two F4F Wildcats, disappeared behind a cloud. Within five minutes, the enemy patrol plane fell out of the clouds and crashed in the water.

 

Although TF17 was slated to make a second attack on Jaluit, it was canceled because of heavy rainstorms and the approach of darkness. Therefore, the Yorktown force retired from the area.

 

Admiral Chester Nimitz later called the Marshalls-Gilberts raids "well conceived, well planned, and brilliantly executed." The results obtained by TFs 8 and 17 were noteworthy, Nimitz continued in his subsequent report, because the task forces had been obliged to make their attacks somewhat blindly, due to lack of hard intelligence data on the Japanese-mandated islands.

 

Yorktown subsequently put in at Pearl Harbor for replenishment before she put to sea on 14 February, bound for the Coral Sea. On 6 March, she rendezvoused with TF11 - formed around Lexington and under the command of Vice Admiral Wilson Brown - and headed towards Rabaul and Gasmata to attack Japanese shipping there in an effort to check the Japanese advance and to cover the landing of Allied troops at Nouméa, New Caledonia. However, as the two carriers - screened by a powerful force of eight heavy cruisers (including the Australian HMAS Australia and 14 destroyers - steamed toward New Guinea, the Japanese continued their advance toward Australia with a landing on 7 March at the Huon Gulf, in the Salamaua-Lae area on the eastern end of New Guinea.

 

Word of the Japanese operation prompted Admiral Brown to change the objective of TF11's strike from Rabaul to the Salamaua-Lae sector. On the morning of 10 March 1942, American carriers launched aircraft from the Gulf of Papua. Lexington flew off her air group commencing at 07:49 and, 21 minutes later, Yorktown followed suit. While the choice of the gulf as the launch point for the strike meant the planes would have to fly some 125 miles (200 km) across the Owen Stanley mountains - a range not known for the best flying conditions - that approach provided security for the task force and ensured surprise.

 

In the attacks that followed, Lexington's SBDs from Scouting Squadron 2 (VS-2) commenced dive-bombing Japanese ships at Lae at 0922. The carrier's torpedo and bomber squadrons (VT-2 and VB-2) attacked shipping at Salamaua at 09:38. Her fighters (VF-2) split up into four-plane attack groups: one strafed Lae and the other, Salamaua. Yorktown's planes followed on the heels of those from "Lady Lex." VB-5 and VT-5 attacked Japanese ships in the Salamaua area at 0950, while VS-5 went after auxiliaries moored close in shore at Lae. The fighters of VF-42 flew CAP over Salamaua until they determined there was no air opposition, then strafed surface objectives and small boats in the harbor.

 

After carrying out their missions, the American planes returned to their carriers, and 103 planes of the 104 launched were back safely on board by noon. One SBD-2 had been downed by Japanese antiaircraft fire. The raid on Salamaua and Lae was the first attack by many pilots of both carriers; and, while the resultant torpedo and bombing accuracy was inferior to that achieved in later actions, the operation gave the fliers invaluable experience which enabled them to do so well in the Battle of the Coral Sea and the Battle of Midway.

 

Task Force 11 retired at 20 knots (23 mph; 37 km/h) on a southeasterly course until dark, when the ships steered eastward at 15 knots (17 mph; 28 km/h) and made rendezvous with Task Group 11.7 (TG11.7), four heavy cruisers and four destroyers under the Australian Rear Admiral John Crace, which provided cover for the carriers on their approach to New Guinea.

 

Yorktown resumed her patrols in the Coral Sea area, remaining at sea into April, out of reach of Japanese land-based aircraft and ready to carry out offensive operations whenever the opportunity presented itself. After the Lae-Salamaua raid, the situation in the South Pacific seemed temporarily stabilized, and Yorktown and her consorts in TF17 put in to the undeveloped harbor at Tongatapu, in the Tonga Islands, for needed upkeep, having been at sea continuously since departing from Pearl Harbor on 14 February.

 

However, the enemy was soon on the move. To Admiral Nimitz, there seemed to be "excellent indications that the Japanese intended to make a seaborne attack on Port Moresby the first week in May." Yorktown accordingly departed Tongatapu on 27 April 1942, bound once more for the Coral Sea. TF11 - now commanded by Rear Admiral Aubrey W. Fitch, who had relieved Brown in Lexington - departed Pearl Harbor to join Fletcher's TF 17 and arrived in the vicinity of Yorktown's group, southwest of the New Hebrides Islands, on 1 May.

 

Battle of the Coral Sea

At 15:17 the next afternoon, two Dauntlesses from VS-5 sighted a Japanese submarine, running on the surface. Three Devastators took off from Yorktown, sped to the scene, and carried out an attack that only succeeded in driving the submarine under.

 

On the morning of 3 May, TF11 and TF17 were some 100 miles (160 km) apart, engaged in fueling operations. Shortly before midnight, Fletcher received word from Australian-based aircraft that Japanese transports were disembarking troops and equipment at Tulagi in the Solomon Islands. Arriving soon after the Australians had evacuated the place, the Japanese landed to commence construction of a seaplane base there to support their southward thrust.

 

Yorktown accordingly set course northward at 27 knots (31 mph; 50 km/h). By daybreak on 4 May, she was within striking distance of the newly established Japanese beachhead and launched her first strike at 0701-18 F4F-3's of VF-42, 12 TBD's of VT-5, and 28 SBD's from VS and BY-5. Yorktown's air group made three consecutive attacks on enemy ships and shore installations at Tulagi and Gavutu on the south coast of Florida Island in the Solomons. Expending 22 torpedoes and 76 1,000 pound bombs in the three attacks, Yorktown's planes sank the destroyer Kikuzuki, three minecraft and four barges. In addition, Air Group 5 destroyed five enemy seaplanes, all at the cost of two F4F's lost (the pilots were recovered) and one TBD (whose crew was lost).

 

Meanwhile, that same day, TF 44, a cruiser-destroyer force under Rear Admiral Crace (RN), joined Lexington's TF11, thus completing the composition of the Allied force on the eve of the crucial Battle of the Coral Sea.

 

Elsewhere, to the northward, eleven troop-laden transports - escorted by destroyers and covered by the light carrier Shōhō, four heavy cruisers, and a destroyer - steamed toward Port Moresby. In addition, another Japanese task force - formed around the two Pearl Harbor veterans, carriers Shōkaku and Zuikaku, and screened by two heavy cruisers and six destroyers - provided additional air cover.

 

On the morning of 6 May, Fletcher gathered all Allied forces under his tactical command as TF17. At daybreak on the 7th, he dispatched Crace, with the cruisers and destroyers under his command, toward the Louisiade archipelago to intercept any enemy attempt to move toward Port Moresby.

 

While Fletcher moved north with his two flattops and their screens in search of the enemy, Japanese search planes located the oiler USS Neosho (AO-23) and her escort, USS Sims (DD-409) and misidentified the former as a carrier. Two waves of Japanese planes — first high level bombers and then dive bombers — attacked the two ships. Sims, her antiaircraft battery crippled by gun failures, took three direct hits and sank quickly with a heavy loss of life. Neosho was more fortunate in that, even after seven direct hits and eight near-misses, she remained afloat until, on the 11th, her survivors were picked up by USS Henley (DD-391) and her hulk sunk by the rescuing destroyer.

 

Neosho and Sims had performed a valuable service, drawing off the planes that might otherwise have hit Fletcher's carriers. Meanwhile, Yorktown and Lexington's planes found Shōhō and sank her. One of Lexington's pilots reported this victory with the radio message, "Scratch one flattop".

 

That afternoon, Shōkaku and Zuikaku - still not located by Fletcher's forces - launched 27 bombers and torpedo planes to search for the American ships. Their flight proved uneventful until they ran into fighters from Yorktown and Lexington, who proceeded to down nine enemy planes in the ensuing dogfight.

 

Near twilight, three Japanese planes incredibly mistook Yorktown for their own carrier and attempted to land. The ship's gunfire, though, drove them off; and the enemy planes crossed Yorktown's bow and turned away out of range. Twenty minutes later, when three more enemy pilots made the mistake of trying to get into Yorktown's landing circle, the carrier's gunners splashed one of the trio.

 

However, the battle was far from over. The next morning, 8 May, a Lexington search plane spotted Admiral Takeo Takagi's carrier striking force - including Zuikaku and Shōkaku. Yorktown planes scored two bomb hits on Shōkaku, damaging her flight deck and preventing her from launching aircraft; in addition, the bombs set off explosions in gasoline storage tanks and destroyed an engine repair workshop. Lexington's Dauntlesses added another hit. Between the two American air groups, the hits killed 108 Japanese sailors and wounded 40 more.

 

While the American planes were occupying the Japanese flattops, however, Yorktown and Lexington - alerted by an intercepted message which indicated that the Japanese knew of their whereabouts - were preparing to fight off a retaliatory strike, which came shortly after 11:00.

 

American CAP Wildcats downed 17 planes, though some managed to slip through the defenses. "Kates" launched torpedoes from both sides of Lexington's bows. Two "fish" tore into "Lady Lex" on the port side; "Val" dive bombers added to the destruction with three bomb hits. Lexington developed a list, with three partially-flooded engineering spaces. Several fires raged below decks, and the carrier's elevators were put out of commission.

 

Meanwhile Yorktown was having problems of her own. Maneuvered by Captain Elliott Buckmaster, her commanding officer, the carrier dodged eight torpedoes. Attacked then by "Vals", the ship managed to evade all but one bomb. That one, however, penetrated the flight deck and exploded below decks, killing or seriously injuring 66 men.

 

Lexington's damage control parties brought the fires under control, and the ship was still able to continue flight operations despite the damage. The air battle itself ended shortly before noon on the 8th; within an hour, the carrier was on an even keel, although slightly down by the bow. However, an explosion caused by the ignition of gasoline vapors later caused a fire and tore apart the inside. Lexington was abandoned at 1707, and later sunk by USS Phelps.

 

The Japanese had won a tactical victory, inflicting comparatively heavier losses on the Allied force, but the Allies, in stemming the tide of Japan's conquests in the South and Southwest Pacific, had achieved a strategic victory. Yorktown had not achieved her part in the victory without cost, and had suffered enough damage to cause experts to estimate that at least three months in a yard would be required to put her back in fighting trim. However, there was little time for repairs, because Allied intelligence - most notably the cryptographic unit at Pearl Harbor - had gained enough information from decoded Japanese naval messages to estimate that the Japanese were on the threshold of a major operation aimed at the northwestern tip of the Hawaiian chain - two islets in a low coral atoll known as Midway.

 

Battle of Midway

Armed with this intelligence Admiral Nimitz began methodically planning Midway's defense, rushing all possible reinforcement in the way of men, planes and guns to Midway. In addition, he began gathering his naval forces - comparatively meager as they were - to meet the enemy at sea. As part of those preparations, he recalled TF16, Enterprise and Hornet (CV-8), to Pearl Harbor for a quick replenishment.

 

Yorktown, too, received orders to return to Hawaii; and she arrived at Pearl Harbor on 27 May. Performing a seeming miracle, yard workers there - laboring around the clock - made enough repairs to enable the ship to put to sea. Her air group - for the most part experienced but weary - was augmented by planes and crews from USS Saratoga (CV-3) which was then headed for Hawaiian waters after her modernization on the West Coast. Ready for battle, Yorktown sailed as the core of TF17 on 30 May.

 

Northeast of Midway, Yorktown, flying Rear Admiral Fletcher's flag, rendezvoused with TF16 under Rear Admiral Raymond A. Spruance and maintained a position 10 miles (16 km) to the northward of him.

 

Patrols, both from Midway itself and from the carriers, proceeded apace during those days in early June. On the morning of the 4th as dawn began to streak the eastern sky, Yorktown launched a 10-plane group of Dauntlesses from VB-5 which searched a northern semicircle for a distance of 100 miles (160 km) out but found nothing.

 

Meanwhile, PBYs flying from Midway had sighted the approaching Japanese and broadcast the alarm for the American forces defending the key atoll. Admiral Fletcher, in tactical command, ordered Admiral Spruance's TF16 to locate the enemy carrier force and strike them as soon as they were found.

 

Yorktown's search group returned at 0830, landing soon after the last of the six-plane CAP had left the deck. When the last of the Dauntlesses were recovered, the deck was hastily respotted for the launch of the ship's attack group - 17 Dauntlesses from VB-3; 12 Devastators from VT-3, and six Wildcats from "Fighting Three." Enterprise and Hornet, meanwhile, launched their attack groups.

 

The torpedo planes from the three American carriers located the Japanese striking force, but met disaster. Of the 41 planes from VT-8, VT-6, and VT-3, only six returned to Enterprise and Yorktown, collectively. None made it back to Hornet.

 

The destruction of the torpedo planes, however, had served a purpose. The Japanese CAP had broken off their high-altitude cover for their carriers and had concentrated on the Devastators, flying "on the deck." The skies above were thus left open for Dauntlesses arriving from Yorktown and Enterprise.

 

Virtually unopposed, Yorktown's dive-bombers pummeled Japanese aircraft carrier Sōryū, making three lethal hits with 1,000 pound bombs, turning her into an inferno.[2] Enterprise's planes, meanwhile, hit Japanese aircraft carrier Akagi and Japanese aircraft carrier Kaga - turning them, too into wrecks in short order. The bombs from the Dauntlesses caught all of the Japanese carriers in the midst of refueling and rearming operations, and the combination of bombs and gasoline proved explosive and disastrous to the Japanese.

 

Three Japanese carriers had been lost. A fourth however, still roamed at large - Japanese aircraft carrier Hiryū. Separated from her sisters, she launched a striking force of 18 "Vals" and soon located Yorktown.

 

As soon as the attackers had been picked up on Yorktown's radar at about 1329, she discontinued fueling her CAP fighters on deck and swiftly cleared for action. Her returning dive bombers were moved from the landing circle to open the area for antiaircraft fire. The Dauntlesses were ordered aloft to form a CAP. An auxiliary gasoline tank - of 800 gallons capacity - was pushed over the carrier's fantail, eliminating one fire hazard. The crew drained fuel lines and closed and secured all compartments.

 

All of Yorktown's fighters were vectored out to intercept the oncoming Japanese aircraft, and did so some 15 to 20 miles (32 km) out. The Wildcats attacked vigorously, breaking up what appeared to be an organized attack by some 18 "Vals" and 18 "Zeroes." "Planes were flying in every direction", wrote Captain Buckmaster after the action, "and many were falling in flames." The leader of the "Vals", Lieutenant Joichi Tomonaga, was probably shot down by the VF-3's commanding officer, Lieutenant Commander John S. Thach.[1].

 

Despite an intensive barrage and evasive maneuvering, three "Vals" scored hits. Two of them were shot down soon after releasing their bomb loads; the third went out of control just as his bomb left the rack. It tumbled in flight and hit just abaft number two elevator on the starboard side, exploding on contact and blasting a hole about 10 feet (3 m) square in the flight deck. Splinters from the exploding bomb decimated the crews of the two 1.1-inch (28 mm) gun mounts aft of the island and on the flight deck below. Fragments piercing the flight deck hit three planes on the hangar deck, starting fires. One of the aircraft, a Yorktown Dauntless, was fully fueled and carrying a 1,000 pound bomb. Prompt action by Lt. A. C. Emerson, the hangar deck officer, prevented a serious conflagration by activating the sprinkler system and quickly extinguishing the fire.

 

The second bomb to hit the ship came from the port side, pierced the flight deck, and exploded in the lower part of the funnel. It ruptured the uptakes for three boilers, disabled two boilers themselves, and extinguished the fires in five boilers. Smoke and gases began filling the firerooms of six boilers. The men at number one boiler, however, remained at their post despite their danger and discomfort and kept its fire going, maintaining enough steam pressure to allow the auxiliary steam systems to function.

 

A third bomb hit the carrier from the starboard side, pierced the side of number one elevator and exploded on the fourth deck, starting a persistent fire in the rag storage space, adjacent to the forward gasoline stowage and the magazines. The prior precaution of smothering the gasoline system with carbon dioxide undoubtedly prevented the gasoline from igniting.

 

While the ship recovered from the damage inflicted by the dive-bombing attack, her speed dropped to six knots; and then at 14:40, about 20 minutes after the bomb hit that had shut down most of the boilers, Yorktown slowed to a stop, dead in the water.

 

At about 15:40, Yorktown prepared to get steaming again; and, at 1550, the engine room force reported that they were ready to make 20 knots (23 mph; 37 km/h) or better. The ship was not yet out of the fight.

 

Simultaneously, with the fires controlled sufficiently to warrant the resumption of fueling, Yorktown began refueling the fighters then on deck; just then the ship's radar picked up an incoming air group at a distance of 33 miles (53 km). While the ship prepared for battle - again smothering gasoline systems and stopping the fueling of the planes on her flight deck - she vectored four of the six fighters of the CAP in the air to intercept the raiders. Of the 10 fighters on board, eight had as little as 23 gallons of fuel in their tanks. They were launched as the remaining pair of fighters of the CAP headed out to intercept the Japanese planes.

 

At 16:00, maneuvering Yorktown churned forward, making 20 knots (23 mph; 37 km/h). The fighters she had launched and vectored out to intercept had meanwhile made contact with the enemy. Yorktown received reports that the planes were "Kates." The Wildcats shot down at least three, but the rest began their approach while the carrier and her escorts mounted a heavy antiaircraft barrage.

 

Yorktown maneuvered radically, avoiding at least two torpedoes before another two struck the port side within minutes of each other, the first at 16:20. The carrier had been mortally wounded; she lost power and went dead in the water with a jammed rudder and an increasing list to port.

 

As the list progressed Commander C. E. Aldrich, the damage control officer, reported from central station that, without power, controlling the flooding looked impossible. The engineering officer, Lt. Cdr. J. F. Delaney, soon reported that all fires were out, but all power was lost and it was impossible to correct the list. Buckmaster ordered Aldrich, Delaney, and their men to secure and lay up on deck to put on life jackets.

 

The list, meanwhile, continued to increase. When it reached 26 degrees, Buckmaster and Aldrich agreed that capsizing was imminent. "In order to save as many of the ship's company as possible", the captain wrote later, he "ordered the ship to be abandoned."

 

Over the next few minutes the crew lowered the wounded into life rafts and struck out for the nearby destroyers and cruisers to be picked up by their boats, abandoning ship in good order. After the evacuation of all wounded, the executive officer, Commander I. D. Wiltsie, left the ship down a line on the starboard side. Buckmaster, meanwhile, toured the ship one last time, to see if any men remained. After finding no "live personnel", Buckmaster lowered himself into the water by means of a line over the stern, by which time water was lapping the port side of the hangar deck.

 

Salvage and sinking

After being picked up by the destroyer USS Hammann (DD-412), Buckmaster transferred to USS Astoria (CA-34) and reported to Rear Admiral Fletcher, who had shifted his flag to the heavy cruiser after the first dive-bombing attack. The two men agreed that a salvage party should attempt to save the ship, since she had stubbornly remained afloat despite the heavy list and imminent danger of capsizing.

 

While efforts to save Yorktown had been proceeding apace, her planes were still in action, joining those from USS Enterprise (CV-6) in striking the last Japanese carrier - Hiryū - late that afternoon. Taking four direct hits, the Japanese carrier was soon helpless. She was abandoned by her crew and left to drift out of control.

 

Yorktown, as it turned out, floated throughout the night. Two men were still alive on board her; one attracted attention by firing a machine gun, heard by the sole attending destroyer, Hughes. The escort picked up the men, one of whom later died.

 

Meanwhile, Buckmaster had selected 29 officers and 141 men to return to the ship in an attempt to save her. Five destroyers formed an antisubmarine screen while the salvage party boarded the listing carrier, the fire in the rag storage still smouldering on the morning of the 6th. USS Vireo (AT-144), summoned from Pearl and Hermes Reef, soon commenced towing the ship, although progress was painfully slow.

 

Yorktown's repair party went on board with a carefully predetermined plan of action to be carried out by men from each department - damage control, gunnery air engineering, navigation, communication, supply and medical. To assist in the work, Lt. Cdr. Arnold E. True brought his ship, USS Hammann (DD-412), alongside to starboard, aft, furnishing pumps and electric power.

 

By mid-afternoon, it looked as if the gamble to save the ship was paying off. The process of reducing topside weight was proceeding well - one 5-inch (127 mm) gun had been dropped over the side, and a second was ready to be cast loose; planes had been pushed over the side; the submersible pumps (powered by electricity provided by Hammann) had pumped a lot of water out of the engineering spaces. The efforts of the salvage crew had reduced the list about two degrees.

 

Unknown to Yorktown and the six nearby destroyers, Japanese submarine I-168 had achieved a favorable firing position. Remarkably - but perhaps understandably due to the debris and wreckage in the water in the vicinity - none of the destroyers picked up the approaching I-boat. At 15:36 lookouts spotted a salvo of four torpedoes approaching the ship from the starboard beam.

 

Hammann went to general quarters, a 20 millimeter gun going into action in an attempt to explode the torpedoes in the water. Her screws churning the water beneath her fantail as she tried to get underway - one torpedo hit Hammann directly amidships and broke her back. The destroyer jackknifed and went down rapidly.

 

Two torpedoes struck Yorktown just below the turn of the bilge at the after end of the island structure. The fourth torpedo passed just astern of the carrier.

 

About a minute after Hammann sank there was an underwater explosion, possibly caused by the destroyer's depth charges going off. The blast killed many of Hammann's and a few of Yorktown's men who had been thrown into the water. The concussion battered the already-damaged carrier's hull and caused tremendous shocks that carried away Yorktown's auxiliary generator, sent numerous fixtures from the hangar deck overhead crashing to the deck below, sheared rivets in the starboard leg of the foremast, and threw men in every direction, causing broken bones and several minor injuries.

 

All destroyers immediately commenced searches for the enemy submarine (which escaped) and commenced rescuing men from Hammann and Yorktown. Captain Buckmaster decided to postpone further attempts at salvage until the following day.

 

Vireo cut the tow and doubled back to Yorktown to pick up survivors, taking on board many men of the salvage crew while picking up men from the water. The little ship endured a terrific pounding from the larger ship but nevertheless stayed alongside to carry out her rescue mission. Later, while on board the tug, Buckmaster conducted a burial service, and two officers and an enlisted man from Hammann were buried at sea.

 

The second attempt at salvage was never made. Throughout the night of the 6th and into the morning of the 7th, Yorktown remained stubbornly afloat. By 05:30 on 7 June, however, the men in the ships nearby noted that the carrier's list was rapidly increasing to port. At 07:01, the ship turned over onto her port side and sank in 3,000 fathoms (5,500 m) of water, her battle flags flying.

 

Honors and rediscovery

Yorktown (CV-5) earned three battle stars for her World War II service, two of them for the significant part she had played in stopping Japanese expansion and turning the tide of the war at Coral Sea and at Midway.

 

On 19 May 1998, the wreck of Yorktown was found and photographed by renowned oceanographer Dr. Robert D. Ballard, discoverer of the wreck of the RMS Titanic. The wreck, 3 miles (5 km) beneath the surface, was surprisingly intact after having been on the sea bottom since 1942—much paint and equipment were still visible.

 

this is a scan from a print I recived from the Navy back in 1977

 

ISO 27001 ISMS Training Videos By Luv Johar

 

Security policy, Organization of information security, Asset management, Human resources security, Physical and environmental security, Communications and operations management, Access control, Information systems acquisition, development and maintenance, Information security incident management, Business continuity management, Regulatory compliance, Lead Auditors, Information Security Professionals, CTO, CISO, Ransomeware, Ransomeware virus, ransomeware attack, what is ransomeware, mac ransomeware, windows ransomeware, anti ransomeware, computer virus, encryption, malware, virus, infection agent, bitcoin, security, wannacry ransomeware, wanna cry, virus wannacry, wannacry patch, cyber attack, wannacry attack, wanna cry attack, ransomware meaning, ransomeware attacks, ransomeware prevention, ransomeware removal, ransomeware awareness, ransomeware antivirus, isms security, isms audit, isms implementation, isms 27001, isms scope, isms training, isms video, isms risk, isms policy, isms iso 27001, isms awareness training, Isms certification, ISMS audit, isms meaning, isms full form, isms policy, isms stands for, isms 27001, isms awareness, isms security, isms auditor, isms awareness trainings, isms audit reports, isms benefits, isms controls, isms checklist, isms clauses, isms trainings, isms course, isms documentation, isms documents list, isms define, isms explained, isms 27001 controls, isms 27001 manuals, isms 27001 audits, isms standards, isms 27001 standards, isms bestpractices, isms audit checklist, isms governance framework,Iso 27001 lead auditor training videos, iso 27001 tutorials, iso 27001 controls, iso 27001 implementation, iso 27001 risk assessment, iso 27001 lead implementer, iso 27001 lead auditor, iso 27001 lead implementer training, iso 27001 training, iso 27001 audit, iso 27001, iso 27001 awareness presentation, iso 27001 auditing checklist, iso 27001 bcm, iso 27001 business continuity, iso 27001 basics, iso 27001 certification, iso 27001 cbt nuggets, iso 27001 cryptography, iso 27001 certification guide, iso 27001, case study, iso 27001 context of the organization, iso 27001 documentation templates, iso 27001 exam, iso 27001 exam explained, iso 27001 free training, iso 27001 for beginners, iso 27001 foundation, iso 27001 framework, iso 27001 introduction, iso 27001 implementation steps, information security courses, information security interview questions, information security policy, information security management system, information security certifications, information security management, information security awareness, information security audit, information security awareness, information security audit checklist, an information security governance framework, an information security policy, an information security threat is, an information security management system, become a information security analyst, a career in information security, what is a information security, what is a information security officer, information security book, information security basics, information security blogs, information security breaches, information security best practices, information security consultant, information security concepts, information security certification in india, information security cia, c.i.a. information security, information security definition, information security domains, information security education and awareness, information security framework, information security forum, information security fundamentals, information security for beginners, information security for dummies, information security governance, information security goals, information security group, information security governance and risk management, information security guidelines, information security glossary, information security goals and objectives, information security handbook, information security interview questions and answers, information security incident, information security is characterized as the preservation of, information security is a matter of building and maintaining, information security incident management, information security importance, information security keywords, information security kpi, information security key points, information security key risk indicators, information security kpi metrics, information security kpi examples, information security key risk indicators examples, information security key performance indicators, information security lifecycle, information security objectives, principles of information security, definition of information security, importance of information security,

La SG-41 (Schlüsselgerät 41), màquina de xifratge alemanya molt poc coneguda, hauria estat la substituta de la famosissima Enigma, si la SGM hagués durat més.

 

cryptomuseum.com/crypto/sg41/index.htm

 

Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.

 

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

The quite unknown German SG-41 (Schlüsselgerät 41) would had been the substitute of the World famous Enigma cipher machine, had WW2 ended later. It was a very different machine, and looks like it was harder to crack.

 

cryptomuseum.com/crypto/sg41/index.htm

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.

 

Aqui teniu un parell de rotors de la famosa máquina de xifratge Enigma.

 

ca.wikipedia.org/wiki/M%c3%a0quina_Enigma

 

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

These are a couple of german Enigma's rotors (walzen), showing their electrical contacts.

 

www.youtube.com/watch?v=JJm4-lqRJDc

 

en.wikipedia.org/wiki/Enigma_machine

 

cryptomuseum.com/crypto/enigma/i/index.htm

 

The emulator (all the site is wonderful):

users.telenet.be/d.rijmenants/en/enigmasim.htm

 

en.wikipedia.org/wiki/Bletchley_Park

 

www.bletchleypark.org/

www.bletchleypark.org/content/museum.rhtm

 

For an impresive virtual visit, take a look to these videos:

 

www.youtube.com/watch?v=ZmMFp2FQPsY

Joon Ian Wong, Founder, Cryptographic Media, Alex Zhang, Mayor, Friends with Benefits and Meltem Demirors, CSO, CoinShares

 

(Morgan Brown/Shutterstock/CoinDesk)

(Candid street shot, London,UK). Hundreds of friends, but no one to talk to!

 

The U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create,” Apple CEO Tim Cook said. “They have asked us to build a backdoor to the iPhone. Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software – which does not exist today – would have the potential to unlock any iPhone in someone’s physical possession.”

 

Apple’s position on the matter is clear: acquiescing to the FBI’s request to develop a tool to unlock an iPhone, even if it belonged to a murderous terrorist, would set a dangerous precedent and slippery slope.

  

China is watching the dispute closely. Analysts say the Chinese government does take cues from United States when it comes to encryption regulations, and that it would most likely demand that multinational companies provide accommodations similar to those in United States.

 

Last year, Beijing backed off several proposals that would have mandated that foreign firms providing encryption keys for devices sold in China after heavy pressure from foreign trade groups. …

While it’s still not clear how the law might be carried out, it is possible a push from American law enforcement agencies to unlock iPhones would embolden Beijing to demand the same. China would also most likely push to acquire any technology that would allow it to unlock iPhones.

 

-------------------------------------------------

Never mind the FBI in the UK, GCHQ have been monitoring your communications for years, they didn't even bother to ask.

Edward Snowden, former intelligence contractor told the BBC's Panorama that UK intelligence agency GCHQ had the power to hack into phones without their owners' knowledge.

 

The UK government declined to comment.

----------------------------------------

1st March 2016

New UK Snooper’s charter still gives state wide hacking powers

 

The latest version of the Investigatory Powers Bill has failed to clarify tricky issues like encryption and gives police and security services wide-ranging powers

Rotor wheels on the Bombe exhibit at Bletchley Park, one of the devices which ultimately helped save lives and shorten the second world war. Polish contribution to the war effort is also noted.

Man it feels good when you crack a code and open a door, and look whats behind it! Another riddler trophy! Concept art unlocked, Hooray!

Cinta perforada, un dels primers sistemes d'enmagatzematge d'informació per a màquines, en aquest cas formant part del que s'anomanaba Heath Robinson, un primitiu sistema de desxifratge de la complexa maquina Lorenz, emprada pel propi Hitler i els comandaments principals de la Wehrmacht. Heath Robinson comparava dues cintes identiques però en posicions diferents. La lectura es feia per mitjà de cel·lules fotoelectriques.

 

Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.

  

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

This punched tape was part of the primitive deciphering machine called Heath Robinson, used to crack the mighty Lorenz cipher, used by Hitler himself. It compared two streams with the same information, looking for patterns in it.

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

en.wikipedia.org/wiki/Heath_Robinson_%28codebreaking_mach...

 

en.wikipedia.org/wiki/Bletchley_Park

dark | light | closer

 

[1] [2] [3] [4] [5] [6] :: [semaphore] sensory

 

visual study in

perception of self

and the environment

in relation to the five

physical senses

  

From Wikipedia, the free encyclopedia

 

The Lockheed Martin F-22 Raptor is a fifth-generation, single-seat, twin-engine, all-weather stealth tactical fighter aircraft developed for the United States Air Force (USAF). The result of the USAF's Advanced Tactical Fighter (ATF) program, the aircraft was designed primarily as an air superiority fighter, but also has ground attack, electronic warfare, and signal intelligence capabilities. The prime contractor, Lockheed Martin, built most of the F-22's airframe and weapons systems and conducted final assembly, while Boeing provided the wings, aft fuselage, avionics integration, and training systems.

 

The aircraft was variously designated F-22 and F/A-22 before it formally entered service in December 2005 as the F-22A. Despite its protracted development and various operational issues, USAF officials consider the F-22 a critical component of the service's tactical air power. Its combination of stealth, aerodynamic performance, and situational awareness enable unprecedented air combat capabilities.

 

Service officials had originally planned to buy a total of 750 ATFs. In 2009, the program was cut to 187 operational production aircraft due to high costs, a lack of clear air-to-air missions due to delays in Russian and Chinese fighter programs, a ban on exports, and development of the more versatile F-35. The last F-22 was delivered in 2012.

  

Development

 

Origins

 

In 1981, the U.S. Air Force identified a requirement for an Advanced Tactical Fighter (ATF) to replace the F-15 Eagle and F-16 Fighting Falcon. Code named "Senior Sky", this air-superiority fighter program was influenced by emerging worldwide threats, including new developments in Soviet air defense systems and the proliferation of the Su-27 "Flanker"- and MiG-29 "Fulcrum"-class of fighter aircraft. It would take advantage of the new technologies in fighter design on the horizon, including composite materials, lightweight alloys, advanced flight control systems, more powerful propulsion systems, and most importantly, stealth technology. In 1983, the ATF concept development team became the System Program Office (SPO) and managed the program at Wright-Patterson Air Force Base. The demonstration and validation (Dem/Val) request for proposals (RFP) was issued in September 1985, with requirements placing strong emphasis on stealth and supercruise. Of the seven bidding companies, Lockheed and Northrop were selected on 31 October 1986. Lockheed teamed with Boeing and General Dynamics while Northrop teamed with McDonnell Douglas, and the two contractor teams undertook a 50-month Dem/Val phase, culminating in the flight test of two technology demonstrator prototypes, the YF-22 and the YF-23, respectively.

 

Dem/Val was focused on risk reduction and technology development plans over specific aircraft designs. Contractors made extensive use of analytical and empirical methods, including computational fluid dynamics, wind-tunnel testing, and radar cross-section calculations and pole testing; the Lockheed team would conduct nearly 18,000 hours of wind-tunnel testing. Avionics development was marked by extensive testing and prototyping and supported by ground and flying laboratories. During Dem/Val, the SPO used the results of performance and cost trade studies conducted by contractor teams to adjust ATF requirements and delete ones that were significant weight and cost drivers while having marginal value. The short takeoff and landing (STOL) requirement was relaxed in order to delete thrust-reversers, saving substantial weight. As avionics was a major cost driver, side-looking radars were deleted, and the dedicated infra-red search and track (IRST) system was downgraded from multi-color to single color and then deleted as well. However, space and cooling provisions were retained to allow for future addition of these components. The ejection seat requirement was downgraded from a fresh design to the existing McDonnell Douglas ACES II. Despite efforts by the contractor teams to rein in weight, the takeoff gross weight estimate was increased from 50,000 lb (22,700 kg) to 60,000 lb (27,200 kg), resulting in engine thrust requirement increasing from 30,000 lbf (133 kN) to 35,000 lbf (156 kN) class.

 

Each team produced two prototype air vehicles for Dem/Val, one for each of the two engine options. The YF-22 had its maiden flight on 29 September 1990 and in flight tests achieved up to Mach 1.58 in supercruise. After the Dem/Val flight test of the prototypes, on 23 April 1991, Secretary of the USAF Donald Rice announced the Lockheed team as the winner of the ATF competition. The YF-23 design was considered stealthier and faster, while the YF-22, with its thrust vectoring nozzles, was more maneuverable as well as less expensive and risky. The aviation press speculated that the Lockheed team's design was also more adaptable to the U.S. Navy's Navalized Advanced Tactical Fighter (NATF), but by 1992, the Navy had abandoned NATF.

  

Production and procurement

 

As the program moved to full-scale development, or the Engineering & Manufacturing Development (EMD) stage, the production version had notable differences from the YF-22, despite having a broadly similar shape. The swept-back angle of the leading edge was decreased from 48° to 42°, while the vertical stabilizers were shifted rearward and decreased in area by 20%. To improve pilot visibility, the canopy was moved forward 7 inches (18 cm), and the engine intakes moved rearward 14 inches (36 cm). The shapes of the wing and stabilator trailing edges were refined to improve aerodynamics, strength, and stealth characteristics. Increasing weight during development caused slight reductions in range and maneuver performance.

 

Prime contractor Lockheed Martin Aeronautics manufactured the majority of the airframe and performed final assembly at Dobbins Air Reserve Base in Marietta, Georgia; program partner Boeing Defense, Space & Security provided additional airframe components as well as avionics integration and training systems. The first F-22, an EMD aircraft with tail number 4001, was unveiled at Marietta, Georgia, on 9 April 1997, and first flew on 7 September 1997. Production, with the first lot awarded in September 2000, supported over 1,000 subcontractors and suppliers from 46 states and up to 95,000 jobs, and spanned 15 years at a peak rate of roughly two airplanes per month. In 2006, the F-22 development team won the Collier Trophy, American aviation's most prestigious award. Due to the aircraft's advanced nature, contractors have been targeted by cyberattacks and technology theft.

 

The USAF originally envisioned ordering 750 ATFs at a total program cost of $44.3 billion and procurement cost of $26.2 billion in fiscal year (FY) 1985 dollars, with production beginning in 1994. The 1990 Major Aircraft Review led by Secretary of Defense Dick Cheney reduced this to 648 aircraft beginning in 1996. By 1997, funding instability had further cut the total to 339, which was again reduced to 277 by 2003. In 2004, the Department of Defense (DoD) further reduced this to 183 operational aircraft, despite the USAF's preference for 381. A multi-year procurement plan was implemented in 2006 to save $15 billion, with total program cost projected to be $62 billion for 183 F-22s distributed to seven combat squadrons. In 2008, Congress passed a defense spending bill that raised the total orders for production aircraft to 187.

 

The first two F-22s built were EMD aircraft in the Block 1.0 configuration for initial flight testing, while the third was a Block 2.0 aircraft built to represent the internal structure of production airframes and enabled it to test full flight loads. Six more EMD aircraft were built in the Block 10 configuration for development and upgrade testing, with the last two considered essentially production quality jets. Production for operational squadrons consisted of 37 Block 20 training aircraft and 149 Block 30/35 combat aircraft; one of the Block 35 aircraft is dedicated to flight sciences at Edwards Air Force Base.

 

The numerous new technologies in the F-22 resulted in substantial cost overruns and delays. Many capabilities were deferred to post-service upgrades, reducing the initial cost but increasing total program cost. As production wound down in 2011, the total program cost is estimated to be about $67.3 billion, with $32.4 billion spent on Research, Development, Test and Evaluation (RDT&E) and $34.9 billion on procurement and military construction (MILCON) in then year dollars. The incremental cost for an additional F-22 was estimated at about $138 million in 2009.

 

Ban on exports

 

The F-22 cannot be exported under US federal law to protect its stealth technology and other high-tech features. Customers for U.S. fighters are acquiring earlier designs such as the F-15 Eagle and F-16 Fighting Falcon or the newer F-35 Lightning II, which contains technology from the F-22 but was designed to be cheaper, more flexible, and available for export. In September 2006, Congress upheld the ban on foreign F-22 sales. Despite the ban, the 2010 defense authorization bill included provisions requiring the DoD to prepare a report on the costs and feasibility for an F-22 export variant, and another report on the effect of F-22 export sales on U.S. aerospace industry.

 

Some Australian politicians and defense commentators proposed that Australia should attempt to purchase F-22s instead of the planned F-35s, citing the F-22's known capabilities and F-35's delays and developmental uncertainties. However, the Royal Australian Air Force (RAAF) determined that the F-22 was unable to perform the F-35's strike and close air support roles. The Japanese government also showed interest in the F-22 for its Replacement-Fighter program. The Japan Air Self-Defense Force (JASDF) would reportedly require fewer fighters for its mission if it obtained the F-22, thus reducing engineering and staffing costs. However, in 2009 it was reported that acquiring the F-22 would require increases to the Japanese government's defense budget beyond the historical 1 percent of its GDP. With the end of F-22 production, Japan chose the F-35 in December 2011. Israel also expressed interest, but eventually chose the F-35 because of the F-22's price and unavailability.

 

Production termination

 

Throughout the 2000s, the need for F-22s was debated, due to rising costs and the lack of relevant adversaries. In 2006, Comptroller General of the United States David Walker found that "the DoD has not demonstrated the need" for more investment in the F-22, and further opposition to the program was expressed by Secretary of Defense Donald Rumsfeld, Deputy Secretary of Defense Gordon R. England, Senator John McCain, and Chairman of U.S. Senate Committee on Armed Services Senator John Warner. The F-22 program lost influential supporters in 2008 after the forced resignations of Secretary of the Air Force Michael Wynne and the Chief of Staff of the Air Force General T. Michael Moseley.

 

In November 2008, Secretary of Defense Robert Gates stated that the F-22 was not relevant in post-Cold War conflicts such as irregular warfare operations in Iraq and Afghanistan, and in April 2009, under the new Obama Administration, he called for ending production in FY2011, leaving the USAF with 187 production aircraft. In July, General James Cartwright, Vice Chairman of the Joint Chiefs of Staff, stated to the Senate Committee on Armed Services his reasons for supporting termination of F-22 production. They included shifting resources to the multirole F-35 to allow proliferation of fifth-generation fighters for three service branches and preserving the F/A-18 production line to maintain the military's electronic warfare (EW) capabilities in the Boeing EA-18G Growler.[60] Issues with the F-22's reliability and availability also raised concerns. After President Obama threatened to veto further production, the Senate voted in July 2009 in favor of ending production and the House subsequently agreed to abide by the 187 production aircraft cap. Gates stated that the decision was taken in light of the F-35's capabilities, and in 2010, he set the F-22 requirement to 187 aircraft by lowering the number of major regional conflict preparations from two to one.

 

In 2010, USAF initiated a study to determine the costs of retaining F-22 tooling for a future Service Life Extension Program (SLEP).[66] A RAND Corporation paper from this study estimated that restarting production and building an additional 75 F-22s would cost $17 billion, resulting in $227 million per aircraft, or $54 million higher than the flyaway cost. Lockheed Martin stated that restarting the production line itself would cost about $200 million. Production tooling and associated documentation were subsequently stored at the Sierra Army Depot, allowing the retained tooling to support the fleet life cycle. There were reports that attempts to retrieve this tooling found empty containers, but a subsequent audit found that the tooling was stored as expected.

 

Russian and Chinese fighter developments have fueled concern, and in 2009, General John Corley, head of Air Combat Command, stated that a fleet of 187 F-22s would be inadequate, but Secretary Gates dismissed General Corley's concern. In 2011, Gates explained that Chinese fifth-generation fighter developments had been accounted for when the number of F-22s was set, and that the U.S. would have a considerable advantage in stealth aircraft in 2025, even with F-35 delays. In December 2011, the 195th and final F-22 was completed out of 8 test EMD and 187 operational aircraft produced; the aircraft was delivered to the USAF on 2 May 2012.

 

In April 2016, the House Armed Services Committee (HASC) Tactical Air and Land Forces Subcommittee proposed legislation that would direct the Air Force to conduct a cost study and assessment associated with resuming production of the F-22. Since the production halt directed in 2009 by then Defense Secretary Gates, lawmakers and the Pentagon noted that air warfare systems of Russia and China were catching up to those of the U.S. Lockheed Martin has proposed upgrading the Block 20 training aircraft into combat-coded Block 30/35 versions as a way to increase numbers available for deployment. On 9 June 2017, the Air Force submitted their report to Congress stating they had no plans to restart the F-22 production line due to economic and operational issues; it estimated it would cost approximately $50 billion to procure 194 additional F-22s at a cost of $206–$216 million per aircraft, including approximately $9.9 billion for non-recurring start-up costs and $40.4 billion for aircraft procurement costs.

 

Upgrades

 

The first aircraft with combat-capable Block 3.0 software flew in 2001. Increment 2, the first upgrade program, was implemented in 2005 for Block 20 aircraft onward and enabled the employment of Joint Direct Attack Munitions (JDAM). Certification of the improved AN/APG-77(V)1 radar was completed in March 2007, and airframes from production Lot 5 onward are fitted with this radar, which incorporates air-to-ground modes. Increment 3.1 for Block 30 aircraft onward provided improved ground-attack capability through synthetic aperture radar mapping and radio emitter direction finding, electronic attack and Small Diameter Bomb (SDB) integration; testing began in 2009 and the first upgraded aircraft was delivered in 2011. To address oxygen deprivation issues, F-22s were fitted with an automatic backup oxygen system (ABOS) and modified life support system starting in 2012.

 

Increment 3.2 for Block 35 aircraft is a two-part upgrade process; 3.2A focuses on electronic warfare, communications and identification, while 3.2B includes geolocation improvements and a new stores management system to show the correct symbols for the AIM-9X and AIM-120D.[83][84] To enable two-way communication with other platforms, the F-22 can use the Battlefield Airborne Communications Node (BACN) as a gateway. The planned Multifunction Advanced Data Link (MADL) integration was cut due to development delays and lack of proliferation among USAF platforms. The F-22 fleet is planned to start receiving Increment 3.2B as well as a software upgrade for cryptography capabilities and avionics stability in May 2019. A Multifunctional Information Distribution System-Joint (MIDS-J) radio that replaces the current Link-16 receive-only box is expected to be operational by 2020. Subsequent upgrades are also focusing on having an open architecture to enable faster future enhancements.

 

In 2024, funding is projected to begin for the F-22 mid-life upgrade (MLU), which is expected to include new sensors and antennas, hardware refresh, cockpit improvements, and a helmet mounted display and cuing system. Other enhancements being developed include IRST functionality for the AN/AAR-56 Missile Launch Detector (MLD) and more durable stealth coating based on the F-35's.

 

The F-22 was designed for a service life of 8,000 flight hours, with a $350 million "structures retrofit program". Investigations are being made for upgrades to extend their useful lives further. In the long term, the F-22 is expected to be superseded by a sixth-generation jet fighter to be fielded in the 2030s.

  

Design

 

Overview

 

The F-22 Raptor is a fifth-generation fighter that is considered fourth generation in stealth aircraft technology by the USAF.[91] It is the first operational aircraft to combine supercruise, supermaneuverability, stealth, and sensor fusion in a single weapons platform. The F-22 has four empennage surfaces, retractable tricycle landing gear, and clipped delta wings with reverse trailing edge sweep and leading edge extensions running to the upper outboard corner of the inlets. Flight control surfaces include leading-edge flaps, flaperons, ailerons, rudders on the canted vertical stabilizers, and all-moving horizontal tails (stabilators); for speed brake function, the ailerons deflect up, flaperons down, and rudders outwards to increase drag.

 

The aircraft's dual Pratt & Whitney F119-PW-100 augmented turbofan engines are closely spaced and incorporate pitch-axis thrust vectoring nozzles with a range of ±20 degrees; each engine has maximum thrust in the 35,000 lbf (156 kN) class. The F-22's thrust-to-weight ratio at typical combat weight is nearly at unity in maximum military power and 1.25 in full afterburner. Maximum speed without external stores is approximately Mach 1.8 at military power and greater than Mach 2 with afterburners.

 

The F-22's high cruise speed and operating altitude over prior fighters improve the effectiveness of its sensors and weapon systems, and increase survivability against ground defenses such as surface-to-air missiles. The aircraft is among only a few that can supercruise, or sustain supersonic flight without using fuel-inefficient afterburners; it can intercept targets which subsonic aircraft would lack the speed to pursue and an afterburner-dependent aircraft would lack the fuel to reach. The F-22's thrust and aerodynamics enable regular combat speeds of Mach 1.5 at 50,000 feet (15,000 m). The use of internal weapons bays permits the aircraft to maintain comparatively higher performance over most other combat-configured fighters due to a lack of aerodynamic drag from external stores. The aircraft's structure contains a significant amount of high-strength materials to withstand stress and heat of sustained supersonic flight. Respectively, titanium alloys and composites comprise 39% and 24% of the structural weight.

 

The F-22's aerodynamics, relaxed stability, and powerful thrust-vectoring engines give it excellent maneuverability and energy potential across its flight envelope. The airplane has excellent high alpha (angle of attack) characteristics, capable of flying at trimmed alpha of over 60° while maintaining roll control and performing maneuvers such as the Herbst maneuver (J-turn) and Pugachev's Cobra. The flight control system and full-authority digital engine control (FADEC) make the aircraft highly departure resistant and controllable, thus giving the pilot carefree handling.

  

Stealth

 

The F-22 was designed to be highly difficult to detect and track by radar. Measures to reduce radar cross-section (RCS) include airframe shaping such as alignment of edges, fixed-geometry serpentine inlets and curved vanes that prevent line-of-sight of the engine faces and turbines from any exterior view, use of radar-absorbent material (RAM), and attention to detail such as hinges and pilot helmets that could provide a radar return. The F-22 was also designed to have decreased radio emissions, infrared signature and acoustic signature as well as reduced visibility to the naked eye. The aircraft's flat thrust-vectoring nozzles reduce infrared emissions of the exhaust plume to mitigate the threat of infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Additional measures to reduce the infrared signature include special topcoat and active cooling of leading edges to manage the heat buildup from supersonic flight.

 

Compared to previous stealth designs like the F-117, the F-22 is less reliant on RAM, which are maintenance-intensive and susceptible to adverse weather conditions. Unlike the B-2, which requires climate-controlled hangars, the F-22 can undergo repairs on the flight line or in a normal hangar. The F-22 has a Signature Assessment System which delivers warnings when the radar signature is degraded and necessitates repair. While the F-22's exact RCS is classified, in 2009 Lockheed Martin released information indicating that from certain angles the aircraft has an RCS of 0.0001 m² or −40 dBsm – equivalent to the radar reflection of a "steel marble". Effectively maintaining the stealth features can decrease the F-22's mission capable rate to 62–70%.

 

The effectiveness of the stealth characteristics is difficult to gauge. The RCS value is a restrictive measurement of the aircraft's frontal or side area from the perspective of a static radar. When an aircraft maneuvers it exposes a completely different set of angles and surface area, potentially increasing radar observability. Furthermore, the F-22's stealth contouring and radar absorbent materials are chiefly effective against high-frequency radars, usually found on other aircraft. The effects of Rayleigh scattering and resonance mean that low-frequency radars such as weather radars and early-warning radars are more likely to detect the F-22 due to its physical size. However, such radars are also conspicuous, susceptible to clutter, and have low precision. Additionally, while faint or fleeting radar contacts make defenders aware that a stealth aircraft is present, reliably vectoring interception to attack the aircraft is much more challenging. According to the USAF an F-22 surprised an Iranian F-4 Phantom II that was attempting to intercept an American UAV, despite Iran's assertion of having military VHF radar coverage over the Persian Gulf.

"The quest for certainty blocks the search for meaning. Uncertainty is the very condition to impel man to unfold his powers."

– Erich Fromm, in 'Man for Himself' (1947), Ch. 3.

 

"Ants are more like the parts of an animal than entities on their own. They are mobile cells, circulating through a dense connective tissue of other ants in a matrix of twigs. The circuits are so intimately interwoven that the anthill meets all the essential criteria of an organism.

– Lewis Thomas, 'The Lives of a Cell: Notes of a Biology Watcher', "Antaeus in Manhattan" (1974).

 

"A good man, through obscurest aspirations,

Has still an instinct of the one true way."

– Johann Wolfgang von Goethe, 'Faust'.

 

The Lorenz SZ40, SZ42A and SZ42B were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin and the model name SZ was derived from Schlüsselzusatz, meaning cipher attachment. The instruments implemented a Vernam stream cipher.

British cryptographers, who referred to encrypted German teleprinter traffic as Fish, dubbed the machine and its traffic Tunny.

The SZ machines were in-line attachments to standard Lorenz teleprinters. An experimental link using SZ40 machines was started in June 1941. The enhanced SZ42 machines were brought into substantial use from mid-1942 onwards for high-level communications between the German High Command in Berlin, and Army Commands throughout occupied Europe. The more advanced SZ42A came into routine use in February 1943 and the SZ42B in June 1944.

Wireless telegraphy (WT) rather than land-line circuits was used for this traffic. These non-Morse (NoMo) messages were picked up by Britain's Y-stations at Knockholt and Denmark Hill and sent to Government Code and Cypher School at Bletchley Park (BP). Some were deciphered using hand methods before the process was partially automated, first with Robinson machines and then with the Colossus computers. The deciphered messages made an important contribution to Ultra military intelligence.

 

On 30 August 1941, a message of some 4,000 characters was transmitted from Athens to Vienna. However, the message was not received correctly at the other end, so (after the recipient sent an unencoded request for retransmission, which let the codebreakers know what was happening) the message was retransmitted with the same key settings (HQIBPEXEZMUG); a forbidden practice. Moreover, the second time the operator made a number of small alterations to the message, such as using abbreviations, making the second message somewhat shorter. From these two related ciphertexts, known to cryptanalysts as a depth, the veteran cryptanalyst Brigadier John Tiltman in the Research Section teased out the two plaintexts and hence the keystream. Then, after three months of the Research Section failing to diagnose the machine from the almost 4,000 characters of key, the task was handed to mathematician Bill Tutte. He applied a technique that he had been taught in his cryptographic training, of writing out the key by hand and looking for repetitions. Tutte did this with the original teleprinter 5-bit Baudot codes, which led him to his initial breakthrough of recognising a 41 character repetition. Over the following two months up to January 1942, Tutte and colleagues worked out the complete logical structure of the cipher machine. This remarkable piece of reverse engineering was later described as "one of the greatest intellectual feats of World War II".

After this cracking of Tunny, a special team of code breakers was set up under Ralph Tester, most initially transferred from Alan Turing's Hut 8. The team became known as the Testery. It performed the bulk of the subsequent work in breaking Tunny messages, but was aided by machines in the complementary section under Max Newman known as the Newmanry.

 

Several complex machines were built by the British to aid the attack on Tunny. The first was the British Tunny. This machine was designed by Bletchley Park, based on the reverse engineering work done by Tiltman's team in the Testery, to emulate the Lorenz Cipher Machine. When the pin wheel settings were found by the Testery, the Tunny machine was set up and run so that the messages could be printed.

A family of machines known as "Robinsons" were built for the Newmanry. These used two paper tapes, along with logic circuitry, to find the settings of the chi pin wheels of the Lorenz machine. The Robinsons had major problems keeping the two paper tapes synchronized and were relatively slow, reading only 2000 characters per second.

The most important machine was the Colossus of which ten were in use by the war's end. They were the world's first large-scale programmable electronic digital computers, the first becoming operational in December 1943. These were developed by senior engineer Tommy Flowers at the Post Office Research Station at Dollis Hill in London. Like the later ENIAC of 1946, Colossus did not have a stored program, and was programmed through plugboards and jumper cables. It was faster, more reliable and more capable than the Robinsons, so speeding up the process of finding the Lorenz chi pin wheel settings. Since Colossus generated the putative keys electronically, it only had to read one tape. It did so with an optical reader which, at 5000 characters per second, was driven much faster than the Robinsons' and meant that the tape travelled at almost 30 miles per hour (48 km/h). This, and the clocking of the electronics from the optically read paper tape sprocket holes, completely eliminated the Robinsons' synchronisation problems.

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

Die Luftwaffe (Air Force) ENIGMA

 

Like the Army, the Air Force relied on ENIGMA for coomunications security (COMSEC). As a result of radio intercept and timely analysis, which was aided by poor COMSEC on German radion nets, plans such as decisve air attacks known as the Battle of Britain were revealed to the British well in advance of the intended strike. The losses suffered by the German air force during this time were never regained.

Source National Cryptologic Museum (Added links to Wikipedia)

 

A slightly different view from Battle of Britain Wikipedia

Effect of signals intelligence

It is unclear how much the British intercepts of the Enigma cipher, used for high-security German radio communications, affected the battle. Ultra, the information obtained from Enigma intercepts, gave the highest echelons of the UK's command a view of German intentions but it seems little of this material filtered down to Hugh Dowding's desk. (It would have had little tactical value in any case.) However, the radio listening service (known as Y Service), monitoring the patterns of Luftwaffe radio traffic, contributed considerably to the early warning of raids

 

ENIGMA remains the best known German cryptographic machine of World War II.

 

ENIGMA cipher machine collection

  

i09_0214 100

Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.

 

Aquesta de la imatge és una maquina Enigma M4, del tipus emprat per la Kriegsmarine al final de la guerra. És molt facil d'identificar perque té 4 rotors en comptes de 3. Sense dubte és l'element més famós de la historia del xifratge i la criptologia.

 

ca.wikipedia.org/wiki/M%c3%a0quina_Enigma

 

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

This is a Kriegsmarine M4 model Enigma. You can identify it by the 4 rotors, when usually the earlier machines had only 3 rotors. The Enigma machine is without doubt the most famous icon in the history of cryptology

  

www.youtube.com/watch?v=JJm4-lqRJDc

 

en.wikipedia.org/wiki/Enigma_machine

 

cryptomuseum.com/crypto/enigma/i/index.htm

 

The emulator (all the site is wonderful):

users.telenet.be/d.rijmenants/en/enigmasim.htm

 

en.wikipedia.org/wiki/Bletchley_Park

 

www.bletchleypark.org/

www.bletchleypark.org/content/museum.rhtm

 

For an impresive virtual visit, take a look to these videos:

 

www.youtube.com/watch?v=ZmMFp2FQPsY

She is the wind now, impossible to escape, impossible to touch.

 

Fighting she understand now is no different then seeing the solution to the complex cryptographic equations she has made an art of solving on the fly before the ICE hits. Down in the hi-tech dungeons of the GSC HQ they learn how fatal being on the wrong side of the equal sign is...

 

Then she is there, the inner chamber where the enslaved AI that controls the world we live in exists in huge processor arrays!

 

Sorry about this silliness, but I need to find out how this ends!

 

View On Black

 

episode 1 * episode 2 * episode 3 * episode 4

A blockchain, originally block chain, is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash of the previous block, a timestamp and transaction data. By design, a blockchain is inherently resistant to modification of the data. It is "an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way". For use as a distributed ledger, a blockchain is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks. Once recorded, the data in any given block cannot be altered retroactively without the alteration of all subsequent blocks, which requires collusion of the network majority. Blockchains are secure by design and are an example of a distributed computing system with high Byzantine fault tolerance. Decentralized consensus has therefore been achieved with a blockchain. This makes blockchains potentially suitable for the recording of events, medical records, and other records management activities, such as identity management,transaction processing, documenting provenance, food traceability or voting. Blockchain was invented by Satoshi Nakamoto in 2008 for use in the cryptocurrency bitcoin, as its public transaction ledger.The first work on a cryptographically secured chain of blocks was described in 1991 by Stuart Haber and W. Scott Stornetta.In 1992, Bayer, Haber and Stornetta incorporated Merkle trees to the design, which improved its efficiency by allowing several documents to be collected into one block.In 2002, David Mazières and Dennis Shasha proposed a network file system with decentralized trust: writers to the file system trust one another but not the network in between; they achieve file system integrity by writing signed commits to a shared, append-only signature chain that captures the root of the file system (which in turn is a Merkle Tree). This system can be viewed as a proto-blockchain in which all authorized clients can always write, whereas, in modern blockchains, a client who solves a cryptographic puzzle can write one block.[citation needed] In 2005, Nick Szabo proposed a blockchain-like system for decentralized property titles and his bit gold payment system that utilised chained proof-of-work and timestamping. However, Szabo's method of double-spending protection was vulnerable to Sybil attacks. The first blockchain was conceptualised by a person (or group of people) known as Satoshi Nakamoto in 2008. It was implemented the following year by Nakamoto as a core component of the cryptocurrency bitcoin, where it serves as the public ledger for all transactions on the network.Through the use of a blockchain, bitcoin became the first digital currency to solve the double spending problem without requiring a trusted authority and has been the inspiration for many additional applications. In August 2014, the bitcoin blockchain file size, containing records of all transactions that have occurred on the network, reached 20GB (gigabytes). In January 2015, the size had grown to almost 30GB, and from January 2016 to January 2017, the bitcoin blockchain grew from 50GB to 100GB in size.The words block and chain were used separately in Satoshi Nakamoto's original paper, but were eventually popularized as a single word, blockchain, by 2016. The term blockchain 2.0 refers to new applications of the distributed blockchain database, first emerging in 2014. The Economist described one implementation of this second-generation programmable blockchain as coming with "a programming language that allows users to write more sophisticated smart contracts, thus creating invoices that pay themselves when a shipment arrives or share certificates which automatically send their owners dividends if profits reach a certain level". Blockchain 2.0 technologies go beyond transactions and enable "exchange of value without powerful intermediaries acting as arbiters of money and information". They are expected to enable excluded people to enter the global economy, protect the privacy of participants, allow people to "monetize their own information", and provide the capability to ensure creators are compensated for their intellectual property. Second-generation blockchain technology makes it possible to store an individual's "persistent digital ID and persona" and are providing an avenue to help solve the problem of social inequality by "potentially changing the way wealth is distributed".:14–15 As of 2016, blockchain 2.0 implementations continue to require an off-chain oracle to access any "external data or events based on time or market conditions [that need] to interact with the blockchain". In 2016, the central securities depository of the Russian Federation (NSD) announced a pilot project, based on the Nxt blockchain 2.0 platform, that would explore the use of blockchain-based automated voting systems. IBM opened a blockchain innovation research center in Singapore in July 2016. A working group for the World Economic Forum met in November 2016 to discuss the development of governance models related to blockchain.[28] According to Accenture, an application of the diffusion of innovations theory suggests that blockchains attained a 13.5% adoption rate within financial services in 2016, therefore reaching the early adopters phase. Industry trade groups joined to create the Global Blockchain Forum in 2016, an initiative of the Chamber of Digital Commerce. A blockchain is a decentralized, distributed and public digital ledger that is used to record transactions across many computers so that the record cannot be altered retroactively without the alteration of all subsequent blocks and the collusion of the network. This allows the participants to verify and audit transactions inexpensively. A blockchain database is managed autonomously using a peer-to-peer network and a distributed timestamping server. They are authenticated by mass collaboration powered by collective self-interests.The result is a robust workflow where participants' uncertainty regarding data security is marginal. The use of a blockchain removes the characteristic of infinite reproducibility from a digital asset. It confirms that each unit of value was transferred only once, solving the long-standing problem of double spending. Blockchains have been described as a value-exchange protocol. This blockchain-based exchange of value can be completed more quickly, more safely and more cheaply than with traditional systems. A blockchain can assign title rights because it provides a record that compels offer and acceptance.

 

Blocks

Blocks hold batches of valid transactions that are hashed and encoded into a Merkle tree. Each block includes the cryptographic hash of the prior block in the blockchain, linking the two. The linked blocks form a chain.This iterative process confirms the integrity of the previous block, all the way back to the original genesis block.

 

Sometimes separate blocks can be produced concurrently, creating a temporary fork. In addition to a secure hash-based history, any blockchain has a specified algorithm for scoring different versions of the history so that one with a higher value can be selected over others. Blocks not selected for inclusion in the chain are called orphan blocks. Peers supporting the database have different versions of the history from time to time. They only keep the highest-scoring version of the database known to them. Whenever a peer receives a higher-scoring version (usually the old version with a single new block added) they extend or overwrite their own database and retransmit the improvement to their peers. There is never an absolute guarantee that any particular entry will remain in the best version of the history forever. Because blockchains are typically built to add the score of new blocks onto old blocks and because there are incentives to work only on extending with new blocks rather than overwriting old blocks, the probability of an entry becoming superseded goes down exponentially as more blocks are built on top of it, eventually becoming very low. For example, in a blockchain using the proof-of-work system, the chain with the most cumulative proof-of-work is always considered the valid one by the network. There are a number of methods that can be used to demonstrate a sufficient level of computation. Within a blockchain the computation is carried out redundantly rather than in the traditional segregated and parallel manner.

 

The block time is the average time it takes for the network to generate one extra block in the blockchain. Some blockchains create a new block as frequently as every five seconds. By the time of block completion, the included data becomes verifiable. In cryptocurrency, this is practically when the money transaction takes place, so a shorter block time means faster transactions. The block time for Ethereum is set to between 14 and 15 seconds, while for bitcoin it is 10 minutes.Express. Why is Ripple XRP falling today? Why is it crashing in value?Ripple price: Why is Ripple XRP falling today? Why is it… 'Ripple is first in line' - CEO reveals next cryptocurrency to catch up with bitcoin

'Ripple is first in line' - CEO reveals next cryptocurrency to…

Ripple price news: Why is XRP falling so fast? What's happening to Ripple?Ripple price news: Why is XRP falling so fast? What's happening… Bitcoin price BOOST: Big investors are FINALLY realising Bitcoin is GAME-CHANGING Bitcoin price WARNING: CEO says cryptocurrency has 'NOTHING to do with the real economy' BITCOIN has come under fire from the CEO of Euronext as the financial expert claimed the cryptocurrency "has nothing to do with the real economy".

Bitcoin price suffered a massive plunge as the cryptocurrency reached the value of $9,114.56, according to Coindesk at 10:37 pm on February. As the crypto-craze started to die down, Euronext CEO Stéphane Boujnah claims bitcoin cannot even be classified as a cryptocurrency. Speaking on Bloomberg, Mr Boujnah said Euronext will never open a bitcoin market. He said: "We will not create a bitcoin market because the mandate of Euronext is to power Pan-European capital markets to finance the real economy and bitcoin has nothing to do with the real economy. "Bitcoin has a lot to do with bitcoin. And we believe bitcoin is not a cryptocurrency.

"Bitcoin is at best a crypto asset. All currencies are assets but not all assets are currencies. "Clearly, bitcoin today is just like a piece of art, or just like a diamond, just like a Pokemon card.

"It can be anything to capture value but today people buy it because it goes up and because it’s not as serious and transparent as a lot of assets. "So great, good luck. Like any emerging assets, it’s very fancy, which is great, but this is not our mandate. "Our mandate is to be the place regulated, transparent, open, reliable. It’s not our mandate to be part of this new game in town." Despite the rollercoaster few months suffered by the crypto mania, bitcoin and other cryptocurrencies such as Ripple and ethereum still benefit from a "growing" appreciation among institutional investors, according to Dr Garrick Hileman, from the Cambridge University Centre for Alternative Finance.In an exclusive interview with Express.co.uk, Dr Hileman said: "Any breakthrough technology, and bitcoin and blockchain, are certainly breakthrough technologies, hype often outpaces the reality. “In terms of both of how mature the technology is, the rates of adoption. “We’ve seen this before with bitcoin and we’ve seen the price shoot up first in late 2013 when it first entered the mainstream public consciousness. “The price subsequently crashed 85 percent as security at a major exchange broke down and bitcoin’s were stolen. “So we’ve seen this kind of story repeat where bitcoin rises, gets hyped and then there’s a crash.” This section is transcluded from Fork (blockchain). A hard fork occurs when a blockchain splits into two incompatible separate chains. This is a consequence of the use of two incompatible sets of rules trying to govern the system. For example, Ethereum has hard-forked to "make whole" the investors in The DAO, which had been hacked by exploiting a vulnerability in its code. In 2014 the Nxt community was asked to consider a hard fork that would have led to a rollback of the blockchain records to mitigate the effects of a theft of 50 million NXT from a major cryptocurrency exchange. The hard fork proposal was rejected, and some of the funds were recovered after negotiations and ransom payment.

Decentralization

By storing data across its network, the blockchain eliminates the risks that come with data being held centrally. The decentralized blockchain may use ad-hoc message passing and distributed networking. Its network lacks centralized points of vulnerability that computer crackers can exploit; likewise, it has no central point of failure. Blockchain security methods include the use of public-key cryptography. A public key (a long, random-looking string of numbers) is an address on the blockchain. Value tokens sent across the network are recorded as belonging to that address. A private key is like a password that gives its owner access to their digital assets or the means to otherwise interact with the various capabilities that blockchains now support. Data stored on the blockchain is generally considered incorruptible. This is where blockchain has its advantage. While centralized data is more controllable, information and data manipulation are common. By decentralizing it, blockchain makes data transparent to everyone involved. Every node in a decentralized system has a copy of the blockchain. Data quality is maintained by massive database replication[9] and computational trust. No centralized "official" copy exists and no user is "trusted" more than any other. Transactions are broadcast to the network using software. Messages are delivered on a best-effort basis. Mining nodes validate transactions, add them to the block they are building, and then broadcast the completed block to other nodes. Blockchains use various time-stamping schemes, such as proof-of-work, to serialize changes. Alternate consensus methods include proof-of-stake. Growth of a decentralized blockchain is accompanied by the risk of node centralization because the computer resources required to process larger amounts of data become more expensive.

 

Openness

Open blockchains are more user-friendly than some traditional ownership records, which, while open to the public, still require physical access to view. Because all early blockchains were permissionless, controversy has arisen over the blockchain definition. An issue in this ongoing debate is whether a private system with verifiers tasked and authorized (permissioned) by a central authority should be considered a blockchain. Proponents of permissioned or private chains argue that the term "blockchain" may be applied to any data structure that batches data into time-stamped blocks. These blockchains serve as a distributed version of multiversion concurrency control (MVCC) in databases. Just as MVCC prevents two transactions from concurrently modifying a single object in a database, blockchains prevent two transactions from spending the same single output in a blockchain.[24]:30–31 Opponents say that permissioned systems resemble traditional corporate databases, not supporting decentralized data verification, and that such systems are not hardened against operator tampering and revision. Nikolai Hampton of Computerworld said that "many in-house blockchain solutions will be nothing more than cumbersome databases."Business analysts Don Tapscott and Alex Tapscott define blockchain as a distributed ledger or database open to anyone.

 

Permissionless

The great advantage to an open, permissionless, or public, blockchain network is that guarding against bad actors is not required and no access control is needed.This means that applications can be added to the network without the approval or trust of others, using the blockchain as a transport layer.

 

Bitcoin and other cryptocurrencies currently secure their blockchain by requiring new entries including a proof of work. To prolong the blockchain, bitcoin uses Hashcash puzzles developed by Adam Back in the 1990s.

 

Financial companies have not prioritised decentralized blockchains. In 2016, venture capital investment for blockchain related projects was weakening in the USA but increasing in China. Bitcoin and many other cryptocurrencies use open (public) blockchains. As of January 2018, bitcoin has the highest market capitalization.

 

Permissioned (private) blockchain

 

Permissioned blockchains use an access control layer to govern who has access to the network. In contrast to public blockchain networks, validators on private blockchain networks are vetted by the network owner. They do not rely on anonymous nodes to validate transactions nor do they benefit from the network effect. Permissioned blockchains can also go by the name of 'consortium' or 'hybrid' blockchains.

 

The New York Times noted in both 2016 and 2017 that many corporations are using blockchain networks "with private blockchains, independent of the public system."

 

Disadvantages

Nikolai Hampton pointed out in Computerworld that "There is also no need for a "51 percent" attack on a private blockchain, as the private blockchain (most likely) already controls 100 percent of all block creation resources. If you could attack or damage the blockchain creation tools on a private corporate server, you could effectively control 100 percent of their network and alter transactions however you wished." This has a set of particularly profound adverse implications during a financial crisis or debt crisis like the financial crisis of 2007–08, where politically powerful actors may make decisions that favor some groups at the expense of others.[citation needed] and "the bitcoin blockchain is protected by the massive group mining effort. It's unlikely that any private blockchain will try to protect records using gigawatts of computing power — it's time consuming and expensive."He also said, "Within a private blockchain there is also no 'race'; there's no incentive to use more power or discover blocks faster than competitors. This means that many in-house blockchain solutions will be nothing more than cumbersome databases."

 

Uses

Blockchain technology can be integrated into multiple areas. The primary use of blockchains today is as a distributed ledger for cryptocurrencies, most notably bitcoin.While a few central banks, in countries such as China, United States, Sweden, Singapore, South Africa and England are studying issuance of a Central Bank Issued Cryptocurrency (CICC), none have done so thus far.

 

General potentials

Blockchain technology has a large potential to transform business operating models in the long term. Blockchain distributed ledger technology is more a foundational technology—with the potential to create new foundations for global economic and social systems—than a disruptive technology, which typically "attack a traditional business model with a lower-cost solution and overtake incumbent firms quickly".Even so, there are a few operational products maturing from proof of concept by late 2016.The use of blockchains promises to bring significant efficiencies to global supply chains, financial transactions, asset ledgers and decentralized social networking.

 

As of 2016, some observers remain skeptical. Steve Wilson, of Constellation Research, believes the technology has been hyped with unrealistic claims.To mitigate risk businesses are reluctant to place blockchain at the core of the business structure.

 

This means specific blockchain applications may be a disruptive innovation, because substantially lower-cost solutions can be instantiated, which can disrupt existing business models. Blockchain protocols facilitate businesses to use new methods of processing digital transactions.[68] Examples include a payment system and digital currency, facilitating crowdsales, or implementing prediction markets and generic governance tools.

 

Blockchains alleviate the need for a trust service provider and are predicted to result in less capital being tied up in disputes. Blockchains have the potential to reduce systemic risk and financial fraud. They automate processes that were previously time-consuming and done manually, such as the incorporation of businesses.In theory, it would be possible to collect taxes, conduct conveyancing and provide risk management with blockchains.

 

As a distributed ledger, blockchain reduces the costs involved in verifying transactions, and by removing the need for trusted "third-parties" such as banks to complete transactions, the technology also lowers the cost of networking, therefore allowing several applications.

 

Starting with a strong focus on financial applications, blockchain technology is extending to activities including decentralized applications and collaborative organizations that eliminate a middleman.

 

Land registration

"Land is a financial source, if people can prove they own it, they can borrow against it."

Emmanuel Noah, CEO of Ghanian startup BenBen, New York Observer

Frameworks and trials such as the one at the Sweden Land Registry aim to demonstrate the effectiveness of the blockchain at speeding land sale deals.The Republic of Georgia is piloting a blockchain-based property registry.The Ethical and Fair Creators Association uses blockchain to help startups protect their authentic ideas.

 

The Government of India is fighting land fraud with the help of a blockchain.

 

In October 2017, one of the first international property transactions was completed successfully using a blockchain-based smart contract.

 

In the first half of 2018, an experiment will be conducted on the use of blocking technology to monitor the reliability of the Unified State Real Estate Register (USRER) data in the territory of Moscow.

 

The Big Four

Each of the Big Four accounting firms is testing blockchain technologies in various formats. Ernst & Young has provided cryptocurrency wallets to all (Swiss) employees,has installed a bitcoin ATM in their office in Switzerland, and accepts bitcoin as payment for all its consulting services. Marcel Stalder, CEO of Ernst & Young Switzerland, stated, "We don't only want to talk about digitalization, but also actively drive this process together with our employees and our clients. It is important to us that everybody gets on board and prepares themselves for the revolution set to take place in the business world through blockchains, [to] smart contracts and digital currencies."PwC, Deloitte, and KPMG have taken a different path from Ernst & Young and are all testing private blockchains.

 

Smart contracts

Blockchain-based smart contracts are contracts that can be partially or fully executed or enforced without human interaction.One of the main objectives of a smart contract is automated escrow. The IMF believes blockchains could reduce moral hazards and optimize the use of contracts in general.Due to the lack of widespread use their legal status is unclear.

 

Some blockchain implementations could enable the coding of contracts that will execute when specified conditions are met. A blockchain smart contract would be enabled by extensible programming instructions that define and execute an agreement.For example, Ethereum Solidity is an open-source blockchain project that was built specifically to realize this possibility by implementing a Turing-complete programming language capability to implement such contracts.

 

Nonprofit organizations

Level One Project from the Bill & Melinda Gates Foundation aims to use blockchain technology to help the two billion people worldwide who lack bank accounts.

Building Blocks project from the U.N.'s World Food Programme (WFP) aims to make WFP's growing cash-based transfer operations faster, cheaper, and more secure. Building Blocks commenced field pilots in Pakistan in January 2017 that will continue throughout spring.

Decentralized networks

The Backfeed project develops a distributed governance system for blockchain-based applications allowing for the collaborative creation and distribution of value in spontaneously emerging networks of peers.[88][89]

The Alexandria project is a blockchain-based Decentralized Library.

Tezos is a blockchain project that governs itself by voting of its token holders. Bitcoin blockchain performs as a cryptocurrency and payment system. Ethereum blockchain added smart contract system on top of a blockchain. Tezos blockchain will add an autonomy system – a decentralized code Development function on top of both bitcoin and Ethereum blockchains.

Governments and national currencies

The director of the Office of IT Schedule Contract Operations at the US General Services Administration, Mr. Jose Arrieta, disclosed at the 20 Sep ACT-IAC (American Council for Technology and Industry Advisory Council) Forum that its organization is using blockchain distributed ledger technology to speed up the FASt Lane process for IT Schedule 70 contracts through automation. Two companies, United Solutions (prime contractor) and Sapient Consulting (subcontractor) are developing for FASt Lane a prototype to automate and shorten the time required to perform the contract review process.

The Commercial Customs Operations Advisory Committee, a subcommittee of the U.S. Customs and Border Protection, is working on finding practical ways Blockchain could be implemented in its duties.[1]

Companies have supposedly been suggesting blockchain-based currency solutions in the following two countries:

 

e-Dinar, Tunisia's national currency, was the first state currency using blockchain technology.

eCFA is Senegal's blockchain-based national digital currency.

Some countries, especially Australia, are providing keynote participation in identify the various technical issues associated with developing, governing and using blockchains:

 

In April 2016 Standards Australia submitted a New Field of Technical Activity (NFTA) proposal on behalf of Australia for the International Organization for Standardization (ISO) to consider developing standards to support blockchain technology. The proposal for an NFTA to the ISO was intended to establish a new ISO technical committee for blockchain. The new committee would be responsible for supporting innovation and competition by covering blockchain standards topics including interoperability, terminology, privacy, security and auditing.[99] There have been several media releases[100] supporting blockchain integration to Australian businesses.

Banks

Don Tapscott conducted a two-year research project exploring how blockchain technology can securely move and store host "money, titles, deeds, music, art, scientific discoveries, intellectual property, and even votes".. Furthermore, major portions of the financial industry are implementing distributed ledgers for use in banking, and according to a September 2016 IBM study, this is occurring faster than expected.

 

Banks are interested in this technology because it has potential to speed up back office settlement systems.

 

Banks such as UBS are opening new research labs dedicated to blockchain technology in order to explore how blockchain can be used in financial services to increase efficiency and reduce costs.

 

Russia has officially completed its first government-level blockchain implementation. The state-run bank Sberbank announced 20 December 2017 that it is partnering with Russia's Federal Antimonopoly Service (FAS) to implement document transfer and storage via blockchain.

 

Deloitte and ConsenSys announced plans in 2016 to create a digital bank called Project ConsenSys.

 

R3 connects 42 banks to distributed ledgers built by Ethereum, Chain.com, Intel, IBM and Monax.

 

A Swiss industry consortium, including Swisscom, the Zurich Cantonal Bank and the Swiss stock exchange, is prototyping over-the-counter asset trading on a blockchain-based Ethereum technology.

 

Other financial companies.

The credit and debits payments company MasterCard has added three blockchain-based APIs for programmers to use in developing both person-to-person (P2P) and business-to-business (B2B) payment systems.

 

CLS Group is using blockchain technology to expand the number of currency trade deals it can settle.

 

VISA payment systems, Mastercard,Unionpay and SWIFT have announced the development and plans for using blockchain technology.

 

Prime Shipping Foundation is using blockchain technology to address issues related to the payments in the shipping industry.

 

Other uses

Blockchain technology can be used to create a permanent, public, transparent ledger system for compiling data on sales, storing rights data by authenticating copyright registration,[116] and tracking digital use and payments to content creators, such as musicians. In 2017, IBM partnered with ASCAP and PRS for Music to adopt blockchain technology in music distribution.Imogen Heap's Mycelia service, which allows managers to use a blockchain for tracking high-value parts moving through a supply chain, was launched as a concept in July 2016. Everledger is one of the inaugural clients of IBM's blockchain-based tracking service.

 

Kodak announced plans in 2018 to launch a digital token system for photograph copyright recording.

 

Another example where smart contracts are used is in the music industry. Every time a dj mix is played, the smart contracts attached to the dj mix pays the artists almost instantly.

 

An application has been suggested for securing the spectrum sharing for wireless networks.

 

New distribution methods are available for the insurance industry such as peer-to-peer insurance, parametric insurance and microinsurance following the adoption of blockchain.The sharing economy and IoT are also set to benefit from blockchains because they involve many collaborating peers.Online voting is another application of the blockchain. Blockchains are being used to develop information systems for medical records, which increases interoperability. In theory, legacy disparate systems can be completely replaced by blockchains.Blockchains are being developed for data storage, publishing texts and identifying the origin of digital art. Blockchains facilitate users could take ownership of game assets (digital assets),an example of this is Cryptokitties.

 

Notable non-cryptocurrency designs include:

 

Steemit – a blogging/social networking website and a cryptocurrency

Hyperledger – a cross-industry collaborative effort from the Linux Foundation to support blockchain-based distributed ledgers, with projects under this initiative including Hyperledger Burrow (by Monax) and Hyperledger Fabric (spearheaded by IBM)

Counterparty – an open source financial platform for creating peer-to-peer financial applications on the bitcoin blockchain

Quorum – a permissionable private blockchain by JPMorgan Chase with private storage, used for contract applications

Bitnation – a decentralized borderless "voluntary nation" establishing a jurisdiction of contracts and rules, based on Ethereum

Factom, a distributed registry

Tezos, decentralized voting.

Microsoft Visual Studio is making the Ethereum Solidity language available to application developers.

 

IBM offers a cloud blockchain service based on the open source Hyperledger Fabric project

 

Oracle Cloud offers Blockchain Cloud Service based on Hyperledger Fabric. Oracle has joined the Hyperledger consortium.

 

In August 2016, a research team at the Technical University of Munich published a research document about how blockchains may disrupt industries. They analyzed the venture funding that went into blockchain ventures. Their research shows that $1.55 billion went into startups with an industry focus on finance and insurance, information and communication, and professional services. High startup density was found in the USA, UK and Canada.

 

ABN Amro announced a project in real estate to facilitate the sharing and recording of real estate transactions, and a second project in partnership with the Port of Rotterdam to develop logistics tools.

 

Academic research

 

Blockchain panel discussion at the first IEEE Computer Society TechIgnite conference

In October 2014, the MIT Bitcoin Club, with funding from MIT alumni, provided undergraduate students at the Massachusetts Institute of Technology access to $100 of bitcoin. The adoption rates, as studied by Catalini and Tucker (2016), revealed that when people who typically adopt technologies early are given delayed access, they tend to reject the technology.

 

Journals

 

In September 2015, the first peer-reviewed academic journal dedicated to cryptocurrency and blockchain technology research, Ledger, was announced. The inaugural issue was published in December 2016. The journal covers aspects of mathematics, computer science, engineering, law, economics and philosophy that relate to cryptocurrencies such as bitcoin. There are also research platforms like Strategic coin that offer research for the blockchain and crypto space.

 

The journal encourages authors to digitally sign a file hash of submitted papers, which will then be timestamped into the bitcoin blockchain. Authors are also asked to include a personal bitcoin address in the first page of their papers.

 

Predictions

A World Economic Forum report from September 2015 predicted that by 2025 ten percent of global GDP would be stored on blockchains technology.

 

In early 2017, Harvard Business School professors Marco Iansiti and Karim R. Lakhani said the blockchain is not a disruptive technology that undercuts the cost of an existing business model, but is a foundational technology that "has the potential to create new foundations for our economic and social systems". They further predicted that, while foundational innovations can have enormous impact, "It will take decades for blockchain to seep into our economic and social infrastructure."

 

en.wikipedia.org/wiki/Blockchain

The design, and even existence, of these machines was one of the Nazis' biggest secrets. But that didn't stop cryptographers at Bletchley Park from figuring out precisely how they worked, despite never laying eyes nor hands on one...

 

RPPC depicting a group of six Swedish soldiers.

Unknown photographer.

Date: 26/07/1907.

Sent to: Fröken (Miss) Valborg Hellsén of Stöde.

 

Symbols and numbers written on the front and reverse. May be a letter in code?

On the ProRev Crosshair: XGenPlus

 

XGenPlus is an E-mail server at its core, but it is efficiency and integration-oriented. It has a giant list of features, including Scheduling Integration (Reminders and Scheduled Mailing), Categorization (Folders, Categories), Group Emailing, Delivery Report, Read Receipt, IM, Blocking of Mail addresses, Advance Forwarding, Public-Private key cryptography system, Calendar and Meeting Manager with SMS integration, over and above the features offered by the other mail servers.

 

XGenPlus also gives you “Rights” management; a sender can define whether the recipient can Delete/Forward/Reply or Print the email or not! Yes, XgenPlus gives you mind control – you can finally rule the e-mail world and people will bend to your will!

 

It scores exceptionally well on performance, usability, features and the overall objective of making your inbox a peaceful place to live. The anti-spam is widely recognized and the server is more robust than any. The CPU license with unlimited users costs 2.5 Lacs, and the per user license costs Rs. 500 per annum, which is fine.

 

What does the Verdict Say? Watch to find out!

 

---

 

PROREV is a startup product review show where we dissect products to give you the best insights into technology, design, usability, features and pricing.

 

We review products and services created by startups, ranging from websites, SAAS products and cloud-based software to smartphones, powerbanks, VR headsets and various other technologies and gadgets.

 

All of this in the crispiest, snappiest and funniest startup product review show you will ever see.

 

This is TechPortal TV presents PROREV!

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

南無妙法蓮華経日寛上人御本尊創価学会勤行

 

出典

 

池田大作, 2008-2018: わが友に贈る.

池田大作, 1996: 心の法華経.

ジョーダンテ, 1987: インナースペース.

桐村泰次, 1980: 日蓮大聖人正伝.

中村登, 1979: 日蓮.

池田大作, 1976: 続私の仏教観.

日亨堀, 1966: 日寛上人六巻抄.

渡辺邦男, 1958: 日蓮と蒙古大襲來.

日亨堀, 1952: 新編日蓮大聖人御書全集 (+ 就註法華経口伝).

鳩摩羅什, 406: 妙法蓮華經.

 

十大部 (五大部 +): 唱法華題目抄, 立正安国論, 開目抄, 観心本尊抄, 法華取要抄, 撰時抄, 報恩抄, 四信五品抄, 下山御消息, 本尊問答抄.

 

一念三千 = 十界² · 十如是 · 三世間

 

三基本: 信行学.

三証: 文証, 理証, 現証.

三身: 法身, 報身, 応身.

三世間: 欲界, 色界, 無色界 (→五陰, 眾生, 國土).

三諦: 假諦, 空諦, 中諦 (→如是相, 如是性, 如是體).

五蘊: 色, 受, 想, 行, 識.

六波羅蜜: 忍辱 (佛体), 般若 (佛座), 慈悲 (佛舎), 布施, 持戒, 禪定.

九識 (六根为 +三): , , , , , , 末那, 阿賴耶, 阿摩羅.

十界 (六道 +四): 地獄, 餓鬼, 畜生, 修羅, , , 聲聞, 緣覺, 菩薩, 佛.

十如是: 相, 性, 體, 力, 作, 因, 緣, 果, 報, 本末究竟等.

十四誹謗 (謗法+怨嫉): 憍慢, 懈怠, 計我, 浅識, 著欲, 不解, 不信, 顰蹙, 疑惑, 誹謗, 軽善, 憎善, 嫉善, 恨善.

 

每日指導記号学隐写术暗号理論所见即所思⢱⢚⠷⣸⠓⢜

Marks of intelligent, purposeful design are in these layers of rocks. Do you see them?

Sometime in the distant past, nobody knows exactly when, an Anasazi man and his son left their handprints on the rock wall above the Deer Creek slot canyon. It was a precarious place to stand, so it took bravery. Those prints remain today as signs of a vision quest or of a desire to maintain a memory of a good time with father and son.

 

"Intelligent design" theory is simply the logical process of distinguishing purposeful activity from natural activity or chance. It's routinely used in archaeology, cryptography, forensics and several other fields of science. It doesn't concern itself with who the designer is, but whether a phenomenon shows the intentional activity of a mind. We make these kinds of inferences all the time, as when we saw the handprints in this photo. We knew intuitively they were not created by wind and erosion. Not all cases are this easy. Intelligent design theory seeks to make those kinds of inferences logically and mathematically rigorous, so that we can distinguish between chance, natural law, and design, with a high probability of making a correct "inference to the best explanation." For example, if an astronomer claimed to witness an alien signal from space (SETI), other scientists would want to rigorously rule out chance or natural laws before making a design inference. The identity and motivations of the aliens would be interesting follow-up questions, but would fall outside the sphere of intelligent design theory itself.

From Wikipedia, the free encyclopedia

 

The Lockheed Martin F-22 Raptor is a fifth-generation, single-seat, twin-engine, all-weather stealth tactical fighter aircraft developed for the United States Air Force (USAF). The result of the USAF's Advanced Tactical Fighter (ATF) program, the aircraft was designed primarily as an air superiority fighter, but also has ground attack, electronic warfare, and signal intelligence capabilities. The prime contractor, Lockheed Martin, built most of the F-22's airframe and weapons systems and conducted final assembly, while Boeing provided the wings, aft fuselage, avionics integration, and training systems.

 

The aircraft was variously designated F-22 and F/A-22 before it formally entered service in December 2005 as the F-22A. Despite its protracted development and various operational issues, USAF officials consider the F-22 a critical component of the service's tactical air power. Its combination of stealth, aerodynamic performance, and situational awareness enable unprecedented air combat capabilities.

 

Service officials had originally planned to buy a total of 750 ATFs. In 2009, the program was cut to 187 operational production aircraft due to high costs, a lack of clear air-to-air missions due to delays in Russian and Chinese fighter programs, a ban on exports, and development of the more versatile F-35. The last F-22 was delivered in 2012.

  

Development

 

Origins

 

In 1981, the U.S. Air Force identified a requirement for an Advanced Tactical Fighter (ATF) to replace the F-15 Eagle and F-16 Fighting Falcon. Code named "Senior Sky", this air-superiority fighter program was influenced by emerging worldwide threats, including new developments in Soviet air defense systems and the proliferation of the Su-27 "Flanker"- and MiG-29 "Fulcrum"-class of fighter aircraft. It would take advantage of the new technologies in fighter design on the horizon, including composite materials, lightweight alloys, advanced flight control systems, more powerful propulsion systems, and most importantly, stealth technology. In 1983, the ATF concept development team became the System Program Office (SPO) and managed the program at Wright-Patterson Air Force Base. The demonstration and validation (Dem/Val) request for proposals (RFP) was issued in September 1985, with requirements placing strong emphasis on stealth and supercruise. Of the seven bidding companies, Lockheed and Northrop were selected on 31 October 1986. Lockheed teamed with Boeing and General Dynamics while Northrop teamed with McDonnell Douglas, and the two contractor teams undertook a 50-month Dem/Val phase, culminating in the flight test of two technology demonstrator prototypes, the YF-22 and the YF-23, respectively.

 

Dem/Val was focused on risk reduction and technology development plans over specific aircraft designs. Contractors made extensive use of analytical and empirical methods, including computational fluid dynamics, wind-tunnel testing, and radar cross-section calculations and pole testing; the Lockheed team would conduct nearly 18,000 hours of wind-tunnel testing. Avionics development was marked by extensive testing and prototyping and supported by ground and flying laboratories. During Dem/Val, the SPO used the results of performance and cost trade studies conducted by contractor teams to adjust ATF requirements and delete ones that were significant weight and cost drivers while having marginal value. The short takeoff and landing (STOL) requirement was relaxed in order to delete thrust-reversers, saving substantial weight. As avionics was a major cost driver, side-looking radars were deleted, and the dedicated infra-red search and track (IRST) system was downgraded from multi-color to single color and then deleted as well. However, space and cooling provisions were retained to allow for future addition of these components. The ejection seat requirement was downgraded from a fresh design to the existing McDonnell Douglas ACES II. Despite efforts by the contractor teams to rein in weight, the takeoff gross weight estimate was increased from 50,000 lb (22,700 kg) to 60,000 lb (27,200 kg), resulting in engine thrust requirement increasing from 30,000 lbf (133 kN) to 35,000 lbf (156 kN) class.

 

Each team produced two prototype air vehicles for Dem/Val, one for each of the two engine options. The YF-22 had its maiden flight on 29 September 1990 and in flight tests achieved up to Mach 1.58 in supercruise. After the Dem/Val flight test of the prototypes, on 23 April 1991, Secretary of the USAF Donald Rice announced the Lockheed team as the winner of the ATF competition. The YF-23 design was considered stealthier and faster, while the YF-22, with its thrust vectoring nozzles, was more maneuverable as well as less expensive and risky. The aviation press speculated that the Lockheed team's design was also more adaptable to the U.S. Navy's Navalized Advanced Tactical Fighter (NATF), but by 1992, the Navy had abandoned NATF.

  

Production and procurement

 

As the program moved to full-scale development, or the Engineering & Manufacturing Development (EMD) stage, the production version had notable differences from the YF-22, despite having a broadly similar shape. The swept-back angle of the leading edge was decreased from 48° to 42°, while the vertical stabilizers were shifted rearward and decreased in area by 20%. To improve pilot visibility, the canopy was moved forward 7 inches (18 cm), and the engine intakes moved rearward 14 inches (36 cm). The shapes of the wing and stabilator trailing edges were refined to improve aerodynamics, strength, and stealth characteristics. Increasing weight during development caused slight reductions in range and maneuver performance.

 

Prime contractor Lockheed Martin Aeronautics manufactured the majority of the airframe and performed final assembly at Dobbins Air Reserve Base in Marietta, Georgia; program partner Boeing Defense, Space & Security provided additional airframe components as well as avionics integration and training systems. The first F-22, an EMD aircraft with tail number 4001, was unveiled at Marietta, Georgia, on 9 April 1997, and first flew on 7 September 1997. Production, with the first lot awarded in September 2000, supported over 1,000 subcontractors and suppliers from 46 states and up to 95,000 jobs, and spanned 15 years at a peak rate of roughly two airplanes per month. In 2006, the F-22 development team won the Collier Trophy, American aviation's most prestigious award. Due to the aircraft's advanced nature, contractors have been targeted by cyberattacks and technology theft.

 

The USAF originally envisioned ordering 750 ATFs at a total program cost of $44.3 billion and procurement cost of $26.2 billion in fiscal year (FY) 1985 dollars, with production beginning in 1994. The 1990 Major Aircraft Review led by Secretary of Defense Dick Cheney reduced this to 648 aircraft beginning in 1996. By 1997, funding instability had further cut the total to 339, which was again reduced to 277 by 2003. In 2004, the Department of Defense (DoD) further reduced this to 183 operational aircraft, despite the USAF's preference for 381. A multi-year procurement plan was implemented in 2006 to save $15 billion, with total program cost projected to be $62 billion for 183 F-22s distributed to seven combat squadrons. In 2008, Congress passed a defense spending bill that raised the total orders for production aircraft to 187.

 

The first two F-22s built were EMD aircraft in the Block 1.0 configuration for initial flight testing, while the third was a Block 2.0 aircraft built to represent the internal structure of production airframes and enabled it to test full flight loads. Six more EMD aircraft were built in the Block 10 configuration for development and upgrade testing, with the last two considered essentially production quality jets. Production for operational squadrons consisted of 37 Block 20 training aircraft and 149 Block 30/35 combat aircraft; one of the Block 35 aircraft is dedicated to flight sciences at Edwards Air Force Base.

 

The numerous new technologies in the F-22 resulted in substantial cost overruns and delays. Many capabilities were deferred to post-service upgrades, reducing the initial cost but increasing total program cost. As production wound down in 2011, the total program cost is estimated to be about $67.3 billion, with $32.4 billion spent on Research, Development, Test and Evaluation (RDT&E) and $34.9 billion on procurement and military construction (MILCON) in then year dollars. The incremental cost for an additional F-22 was estimated at about $138 million in 2009.

 

Ban on exports

 

The F-22 cannot be exported under US federal law to protect its stealth technology and other high-tech features. Customers for U.S. fighters are acquiring earlier designs such as the F-15 Eagle and F-16 Fighting Falcon or the newer F-35 Lightning II, which contains technology from the F-22 but was designed to be cheaper, more flexible, and available for export. In September 2006, Congress upheld the ban on foreign F-22 sales. Despite the ban, the 2010 defense authorization bill included provisions requiring the DoD to prepare a report on the costs and feasibility for an F-22 export variant, and another report on the effect of F-22 export sales on U.S. aerospace industry.

 

Some Australian politicians and defense commentators proposed that Australia should attempt to purchase F-22s instead of the planned F-35s, citing the F-22's known capabilities and F-35's delays and developmental uncertainties. However, the Royal Australian Air Force (RAAF) determined that the F-22 was unable to perform the F-35's strike and close air support roles. The Japanese government also showed interest in the F-22 for its Replacement-Fighter program. The Japan Air Self-Defense Force (JASDF) would reportedly require fewer fighters for its mission if it obtained the F-22, thus reducing engineering and staffing costs. However, in 2009 it was reported that acquiring the F-22 would require increases to the Japanese government's defense budget beyond the historical 1 percent of its GDP. With the end of F-22 production, Japan chose the F-35 in December 2011. Israel also expressed interest, but eventually chose the F-35 because of the F-22's price and unavailability.

 

Production termination

 

Throughout the 2000s, the need for F-22s was debated, due to rising costs and the lack of relevant adversaries. In 2006, Comptroller General of the United States David Walker found that "the DoD has not demonstrated the need" for more investment in the F-22, and further opposition to the program was expressed by Secretary of Defense Donald Rumsfeld, Deputy Secretary of Defense Gordon R. England, Senator John McCain, and Chairman of U.S. Senate Committee on Armed Services Senator John Warner. The F-22 program lost influential supporters in 2008 after the forced resignations of Secretary of the Air Force Michael Wynne and the Chief of Staff of the Air Force General T. Michael Moseley.

 

In November 2008, Secretary of Defense Robert Gates stated that the F-22 was not relevant in post-Cold War conflicts such as irregular warfare operations in Iraq and Afghanistan, and in April 2009, under the new Obama Administration, he called for ending production in FY2011, leaving the USAF with 187 production aircraft. In July, General James Cartwright, Vice Chairman of the Joint Chiefs of Staff, stated to the Senate Committee on Armed Services his reasons for supporting termination of F-22 production. They included shifting resources to the multirole F-35 to allow proliferation of fifth-generation fighters for three service branches and preserving the F/A-18 production line to maintain the military's electronic warfare (EW) capabilities in the Boeing EA-18G Growler.[60] Issues with the F-22's reliability and availability also raised concerns. After President Obama threatened to veto further production, the Senate voted in July 2009 in favor of ending production and the House subsequently agreed to abide by the 187 production aircraft cap. Gates stated that the decision was taken in light of the F-35's capabilities, and in 2010, he set the F-22 requirement to 187 aircraft by lowering the number of major regional conflict preparations from two to one.

 

In 2010, USAF initiated a study to determine the costs of retaining F-22 tooling for a future Service Life Extension Program (SLEP).[66] A RAND Corporation paper from this study estimated that restarting production and building an additional 75 F-22s would cost $17 billion, resulting in $227 million per aircraft, or $54 million higher than the flyaway cost. Lockheed Martin stated that restarting the production line itself would cost about $200 million. Production tooling and associated documentation were subsequently stored at the Sierra Army Depot, allowing the retained tooling to support the fleet life cycle. There were reports that attempts to retrieve this tooling found empty containers, but a subsequent audit found that the tooling was stored as expected.

 

Russian and Chinese fighter developments have fueled concern, and in 2009, General John Corley, head of Air Combat Command, stated that a fleet of 187 F-22s would be inadequate, but Secretary Gates dismissed General Corley's concern. In 2011, Gates explained that Chinese fifth-generation fighter developments had been accounted for when the number of F-22s was set, and that the U.S. would have a considerable advantage in stealth aircraft in 2025, even with F-35 delays. In December 2011, the 195th and final F-22 was completed out of 8 test EMD and 187 operational aircraft produced; the aircraft was delivered to the USAF on 2 May 2012.

 

In April 2016, the House Armed Services Committee (HASC) Tactical Air and Land Forces Subcommittee proposed legislation that would direct the Air Force to conduct a cost study and assessment associated with resuming production of the F-22. Since the production halt directed in 2009 by then Defense Secretary Gates, lawmakers and the Pentagon noted that air warfare systems of Russia and China were catching up to those of the U.S. Lockheed Martin has proposed upgrading the Block 20 training aircraft into combat-coded Block 30/35 versions as a way to increase numbers available for deployment. On 9 June 2017, the Air Force submitted their report to Congress stating they had no plans to restart the F-22 production line due to economic and operational issues; it estimated it would cost approximately $50 billion to procure 194 additional F-22s at a cost of $206–$216 million per aircraft, including approximately $9.9 billion for non-recurring start-up costs and $40.4 billion for aircraft procurement costs.

 

Upgrades

 

The first aircraft with combat-capable Block 3.0 software flew in 2001. Increment 2, the first upgrade program, was implemented in 2005 for Block 20 aircraft onward and enabled the employment of Joint Direct Attack Munitions (JDAM). Certification of the improved AN/APG-77(V)1 radar was completed in March 2007, and airframes from production Lot 5 onward are fitted with this radar, which incorporates air-to-ground modes. Increment 3.1 for Block 30 aircraft onward provided improved ground-attack capability through synthetic aperture radar mapping and radio emitter direction finding, electronic attack and Small Diameter Bomb (SDB) integration; testing began in 2009 and the first upgraded aircraft was delivered in 2011. To address oxygen deprivation issues, F-22s were fitted with an automatic backup oxygen system (ABOS) and modified life support system starting in 2012.

 

Increment 3.2 for Block 35 aircraft is a two-part upgrade process; 3.2A focuses on electronic warfare, communications and identification, while 3.2B includes geolocation improvements and a new stores management system to show the correct symbols for the AIM-9X and AIM-120D.[83][84] To enable two-way communication with other platforms, the F-22 can use the Battlefield Airborne Communications Node (BACN) as a gateway. The planned Multifunction Advanced Data Link (MADL) integration was cut due to development delays and lack of proliferation among USAF platforms. The F-22 fleet is planned to start receiving Increment 3.2B as well as a software upgrade for cryptography capabilities and avionics stability in May 2019. A Multifunctional Information Distribution System-Joint (MIDS-J) radio that replaces the current Link-16 receive-only box is expected to be operational by 2020. Subsequent upgrades are also focusing on having an open architecture to enable faster future enhancements.

 

In 2024, funding is projected to begin for the F-22 mid-life upgrade (MLU), which is expected to include new sensors and antennas, hardware refresh, cockpit improvements, and a helmet mounted display and cuing system. Other enhancements being developed include IRST functionality for the AN/AAR-56 Missile Launch Detector (MLD) and more durable stealth coating based on the F-35's.

 

The F-22 was designed for a service life of 8,000 flight hours, with a $350 million "structures retrofit program". Investigations are being made for upgrades to extend their useful lives further. In the long term, the F-22 is expected to be superseded by a sixth-generation jet fighter to be fielded in the 2030s.

  

Design

 

Overview

 

The F-22 Raptor is a fifth-generation fighter that is considered fourth generation in stealth aircraft technology by the USAF.[91] It is the first operational aircraft to combine supercruise, supermaneuverability, stealth, and sensor fusion in a single weapons platform. The F-22 has four empennage surfaces, retractable tricycle landing gear, and clipped delta wings with reverse trailing edge sweep and leading edge extensions running to the upper outboard corner of the inlets. Flight control surfaces include leading-edge flaps, flaperons, ailerons, rudders on the canted vertical stabilizers, and all-moving horizontal tails (stabilators); for speed brake function, the ailerons deflect up, flaperons down, and rudders outwards to increase drag.

 

The aircraft's dual Pratt & Whitney F119-PW-100 augmented turbofan engines are closely spaced and incorporate pitch-axis thrust vectoring nozzles with a range of ±20 degrees; each engine has maximum thrust in the 35,000 lbf (156 kN) class. The F-22's thrust-to-weight ratio at typical combat weight is nearly at unity in maximum military power and 1.25 in full afterburner. Maximum speed without external stores is approximately Mach 1.8 at military power and greater than Mach 2 with afterburners.

 

The F-22's high cruise speed and operating altitude over prior fighters improve the effectiveness of its sensors and weapon systems, and increase survivability against ground defenses such as surface-to-air missiles. The aircraft is among only a few that can supercruise, or sustain supersonic flight without using fuel-inefficient afterburners; it can intercept targets which subsonic aircraft would lack the speed to pursue and an afterburner-dependent aircraft would lack the fuel to reach. The F-22's thrust and aerodynamics enable regular combat speeds of Mach 1.5 at 50,000 feet (15,000 m). The use of internal weapons bays permits the aircraft to maintain comparatively higher performance over most other combat-configured fighters due to a lack of aerodynamic drag from external stores. The aircraft's structure contains a significant amount of high-strength materials to withstand stress and heat of sustained supersonic flight. Respectively, titanium alloys and composites comprise 39% and 24% of the structural weight.

 

The F-22's aerodynamics, relaxed stability, and powerful thrust-vectoring engines give it excellent maneuverability and energy potential across its flight envelope. The airplane has excellent high alpha (angle of attack) characteristics, capable of flying at trimmed alpha of over 60° while maintaining roll control and performing maneuvers such as the Herbst maneuver (J-turn) and Pugachev's Cobra. The flight control system and full-authority digital engine control (FADEC) make the aircraft highly departure resistant and controllable, thus giving the pilot carefree handling.

  

Stealth

 

The F-22 was designed to be highly difficult to detect and track by radar. Measures to reduce radar cross-section (RCS) include airframe shaping such as alignment of edges, fixed-geometry serpentine inlets and curved vanes that prevent line-of-sight of the engine faces and turbines from any exterior view, use of radar-absorbent material (RAM), and attention to detail such as hinges and pilot helmets that could provide a radar return. The F-22 was also designed to have decreased radio emissions, infrared signature and acoustic signature as well as reduced visibility to the naked eye. The aircraft's flat thrust-vectoring nozzles reduce infrared emissions of the exhaust plume to mitigate the threat of infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Additional measures to reduce the infrared signature include special topcoat and active cooling of leading edges to manage the heat buildup from supersonic flight.

 

Compared to previous stealth designs like the F-117, the F-22 is less reliant on RAM, which are maintenance-intensive and susceptible to adverse weather conditions. Unlike the B-2, which requires climate-controlled hangars, the F-22 can undergo repairs on the flight line or in a normal hangar. The F-22 has a Signature Assessment System which delivers warnings when the radar signature is degraded and necessitates repair. While the F-22's exact RCS is classified, in 2009 Lockheed Martin released information indicating that from certain angles the aircraft has an RCS of 0.0001 m² or −40 dBsm – equivalent to the radar reflection of a "steel marble". Effectively maintaining the stealth features can decrease the F-22's mission capable rate to 62–70%.

 

The effectiveness of the stealth characteristics is difficult to gauge. The RCS value is a restrictive measurement of the aircraft's frontal or side area from the perspective of a static radar. When an aircraft maneuvers it exposes a completely different set of angles and surface area, potentially increasing radar observability. Furthermore, the F-22's stealth contouring and radar absorbent materials are chiefly effective against high-frequency radars, usually found on other aircraft. The effects of Rayleigh scattering and resonance mean that low-frequency radars such as weather radars and early-warning radars are more likely to detect the F-22 due to its physical size. However, such radars are also conspicuous, susceptible to clutter, and have low precision. Additionally, while faint or fleeting radar contacts make defenders aware that a stealth aircraft is present, reliably vectoring interception to attack the aircraft is much more challenging. According to the USAF an F-22 surprised an Iranian F-4 Phantom II that was attempting to intercept an American UAV, despite Iran's assertion of having military VHF radar coverage over the Persian Gulf.

From: File Unit: Letters from Mrs. Rose O'Neal Greenhow, Also Notes, etc., in Her Handwriting (Record Group 59)

 

Created by: Department of State. (09/1789 - )

 

Subjects:

Greenhow, Rose O'Neal, 1817-1864

 

Persistent URL: research.archives.gov/description/1634036

 

Repository: National Archives at College Park - Archives II (College Park, MD)

   

Access Restrictions: Unrestricted

Use Restrictions: Unrestricted

 

From Wikipedia, the free encyclopedia

 

The Lockheed Martin F-22 Raptor is a fifth-generation, single-seat, twin-engine, all-weather stealth tactical fighter aircraft developed for the United States Air Force (USAF). The result of the USAF's Advanced Tactical Fighter (ATF) program, the aircraft was designed primarily as an air superiority fighter, but also has ground attack, electronic warfare, and signal intelligence capabilities. The prime contractor, Lockheed Martin, built most of the F-22's airframe and weapons systems and conducted final assembly, while Boeing provided the wings, aft fuselage, avionics integration, and training systems.

 

The aircraft was variously designated F-22 and F/A-22 before it formally entered service in December 2005 as the F-22A. Despite its protracted development and various operational issues, USAF officials consider the F-22 a critical component of the service's tactical air power. Its combination of stealth, aerodynamic performance, and situational awareness enable unprecedented air combat capabilities.

 

Service officials had originally planned to buy a total of 750 ATFs. In 2009, the program was cut to 187 operational production aircraft due to high costs, a lack of clear air-to-air missions due to delays in Russian and Chinese fighter programs, a ban on exports, and development of the more versatile F-35. The last F-22 was delivered in 2012.

  

Development

 

Origins

 

In 1981, the U.S. Air Force identified a requirement for an Advanced Tactical Fighter (ATF) to replace the F-15 Eagle and F-16 Fighting Falcon. Code named "Senior Sky", this air-superiority fighter program was influenced by emerging worldwide threats, including new developments in Soviet air defense systems and the proliferation of the Su-27 "Flanker"- and MiG-29 "Fulcrum"-class of fighter aircraft. It would take advantage of the new technologies in fighter design on the horizon, including composite materials, lightweight alloys, advanced flight control systems, more powerful propulsion systems, and most importantly, stealth technology. In 1983, the ATF concept development team became the System Program Office (SPO) and managed the program at Wright-Patterson Air Force Base. The demonstration and validation (Dem/Val) request for proposals (RFP) was issued in September 1985, with requirements placing strong emphasis on stealth and supercruise. Of the seven bidding companies, Lockheed and Northrop were selected on 31 October 1986. Lockheed teamed with Boeing and General Dynamics while Northrop teamed with McDonnell Douglas, and the two contractor teams undertook a 50-month Dem/Val phase, culminating in the flight test of two technology demonstrator prototypes, the YF-22 and the YF-23, respectively.

 

Dem/Val was focused on risk reduction and technology development plans over specific aircraft designs. Contractors made extensive use of analytical and empirical methods, including computational fluid dynamics, wind-tunnel testing, and radar cross-section calculations and pole testing; the Lockheed team would conduct nearly 18,000 hours of wind-tunnel testing. Avionics development was marked by extensive testing and prototyping and supported by ground and flying laboratories. During Dem/Val, the SPO used the results of performance and cost trade studies conducted by contractor teams to adjust ATF requirements and delete ones that were significant weight and cost drivers while having marginal value. The short takeoff and landing (STOL) requirement was relaxed in order to delete thrust-reversers, saving substantial weight. As avionics was a major cost driver, side-looking radars were deleted, and the dedicated infra-red search and track (IRST) system was downgraded from multi-color to single color and then deleted as well. However, space and cooling provisions were retained to allow for future addition of these components. The ejection seat requirement was downgraded from a fresh design to the existing McDonnell Douglas ACES II. Despite efforts by the contractor teams to rein in weight, the takeoff gross weight estimate was increased from 50,000 lb (22,700 kg) to 60,000 lb (27,200 kg), resulting in engine thrust requirement increasing from 30,000 lbf (133 kN) to 35,000 lbf (156 kN) class.

 

Each team produced two prototype air vehicles for Dem/Val, one for each of the two engine options. The YF-22 had its maiden flight on 29 September 1990 and in flight tests achieved up to Mach 1.58 in supercruise. After the Dem/Val flight test of the prototypes, on 23 April 1991, Secretary of the USAF Donald Rice announced the Lockheed team as the winner of the ATF competition. The YF-23 design was considered stealthier and faster, while the YF-22, with its thrust vectoring nozzles, was more maneuverable as well as less expensive and risky. The aviation press speculated that the Lockheed team's design was also more adaptable to the U.S. Navy's Navalized Advanced Tactical Fighter (NATF), but by 1992, the Navy had abandoned NATF.

  

Production and procurement

 

As the program moved to full-scale development, or the Engineering & Manufacturing Development (EMD) stage, the production version had notable differences from the YF-22, despite having a broadly similar shape. The swept-back angle of the leading edge was decreased from 48° to 42°, while the vertical stabilizers were shifted rearward and decreased in area by 20%. To improve pilot visibility, the canopy was moved forward 7 inches (18 cm), and the engine intakes moved rearward 14 inches (36 cm). The shapes of the wing and stabilator trailing edges were refined to improve aerodynamics, strength, and stealth characteristics. Increasing weight during development caused slight reductions in range and maneuver performance.

 

Prime contractor Lockheed Martin Aeronautics manufactured the majority of the airframe and performed final assembly at Dobbins Air Reserve Base in Marietta, Georgia; program partner Boeing Defense, Space & Security provided additional airframe components as well as avionics integration and training systems. The first F-22, an EMD aircraft with tail number 4001, was unveiled at Marietta, Georgia, on 9 April 1997, and first flew on 7 September 1997. Production, with the first lot awarded in September 2000, supported over 1,000 subcontractors and suppliers from 46 states and up to 95,000 jobs, and spanned 15 years at a peak rate of roughly two airplanes per month. In 2006, the F-22 development team won the Collier Trophy, American aviation's most prestigious award. Due to the aircraft's advanced nature, contractors have been targeted by cyberattacks and technology theft.

 

The USAF originally envisioned ordering 750 ATFs at a total program cost of $44.3 billion and procurement cost of $26.2 billion in fiscal year (FY) 1985 dollars, with production beginning in 1994. The 1990 Major Aircraft Review led by Secretary of Defense Dick Cheney reduced this to 648 aircraft beginning in 1996. By 1997, funding instability had further cut the total to 339, which was again reduced to 277 by 2003. In 2004, the Department of Defense (DoD) further reduced this to 183 operational aircraft, despite the USAF's preference for 381. A multi-year procurement plan was implemented in 2006 to save $15 billion, with total program cost projected to be $62 billion for 183 F-22s distributed to seven combat squadrons. In 2008, Congress passed a defense spending bill that raised the total orders for production aircraft to 187.

 

The first two F-22s built were EMD aircraft in the Block 1.0 configuration for initial flight testing, while the third was a Block 2.0 aircraft built to represent the internal structure of production airframes and enabled it to test full flight loads. Six more EMD aircraft were built in the Block 10 configuration for development and upgrade testing, with the last two considered essentially production quality jets. Production for operational squadrons consisted of 37 Block 20 training aircraft and 149 Block 30/35 combat aircraft; one of the Block 35 aircraft is dedicated to flight sciences at Edwards Air Force Base.

 

The numerous new technologies in the F-22 resulted in substantial cost overruns and delays. Many capabilities were deferred to post-service upgrades, reducing the initial cost but increasing total program cost. As production wound down in 2011, the total program cost is estimated to be about $67.3 billion, with $32.4 billion spent on Research, Development, Test and Evaluation (RDT&E) and $34.9 billion on procurement and military construction (MILCON) in then year dollars. The incremental cost for an additional F-22 was estimated at about $138 million in 2009.

 

Ban on exports

 

The F-22 cannot be exported under US federal law to protect its stealth technology and other high-tech features. Customers for U.S. fighters are acquiring earlier designs such as the F-15 Eagle and F-16 Fighting Falcon or the newer F-35 Lightning II, which contains technology from the F-22 but was designed to be cheaper, more flexible, and available for export. In September 2006, Congress upheld the ban on foreign F-22 sales. Despite the ban, the 2010 defense authorization bill included provisions requiring the DoD to prepare a report on the costs and feasibility for an F-22 export variant, and another report on the effect of F-22 export sales on U.S. aerospace industry.

 

Some Australian politicians and defense commentators proposed that Australia should attempt to purchase F-22s instead of the planned F-35s, citing the F-22's known capabilities and F-35's delays and developmental uncertainties. However, the Royal Australian Air Force (RAAF) determined that the F-22 was unable to perform the F-35's strike and close air support roles. The Japanese government also showed interest in the F-22 for its Replacement-Fighter program. The Japan Air Self-Defense Force (JASDF) would reportedly require fewer fighters for its mission if it obtained the F-22, thus reducing engineering and staffing costs. However, in 2009 it was reported that acquiring the F-22 would require increases to the Japanese government's defense budget beyond the historical 1 percent of its GDP. With the end of F-22 production, Japan chose the F-35 in December 2011. Israel also expressed interest, but eventually chose the F-35 because of the F-22's price and unavailability.

 

Production termination

 

Throughout the 2000s, the need for F-22s was debated, due to rising costs and the lack of relevant adversaries. In 2006, Comptroller General of the United States David Walker found that "the DoD has not demonstrated the need" for more investment in the F-22, and further opposition to the program was expressed by Secretary of Defense Donald Rumsfeld, Deputy Secretary of Defense Gordon R. England, Senator John McCain, and Chairman of U.S. Senate Committee on Armed Services Senator John Warner. The F-22 program lost influential supporters in 2008 after the forced resignations of Secretary of the Air Force Michael Wynne and the Chief of Staff of the Air Force General T. Michael Moseley.

 

In November 2008, Secretary of Defense Robert Gates stated that the F-22 was not relevant in post-Cold War conflicts such as irregular warfare operations in Iraq and Afghanistan, and in April 2009, under the new Obama Administration, he called for ending production in FY2011, leaving the USAF with 187 production aircraft. In July, General James Cartwright, Vice Chairman of the Joint Chiefs of Staff, stated to the Senate Committee on Armed Services his reasons for supporting termination of F-22 production. They included shifting resources to the multirole F-35 to allow proliferation of fifth-generation fighters for three service branches and preserving the F/A-18 production line to maintain the military's electronic warfare (EW) capabilities in the Boeing EA-18G Growler.[60] Issues with the F-22's reliability and availability also raised concerns. After President Obama threatened to veto further production, the Senate voted in July 2009 in favor of ending production and the House subsequently agreed to abide by the 187 production aircraft cap. Gates stated that the decision was taken in light of the F-35's capabilities, and in 2010, he set the F-22 requirement to 187 aircraft by lowering the number of major regional conflict preparations from two to one.

 

In 2010, USAF initiated a study to determine the costs of retaining F-22 tooling for a future Service Life Extension Program (SLEP).[66] A RAND Corporation paper from this study estimated that restarting production and building an additional 75 F-22s would cost $17 billion, resulting in $227 million per aircraft, or $54 million higher than the flyaway cost. Lockheed Martin stated that restarting the production line itself would cost about $200 million. Production tooling and associated documentation were subsequently stored at the Sierra Army Depot, allowing the retained tooling to support the fleet life cycle. There were reports that attempts to retrieve this tooling found empty containers, but a subsequent audit found that the tooling was stored as expected.

 

Russian and Chinese fighter developments have fueled concern, and in 2009, General John Corley, head of Air Combat Command, stated that a fleet of 187 F-22s would be inadequate, but Secretary Gates dismissed General Corley's concern. In 2011, Gates explained that Chinese fifth-generation fighter developments had been accounted for when the number of F-22s was set, and that the U.S. would have a considerable advantage in stealth aircraft in 2025, even with F-35 delays. In December 2011, the 195th and final F-22 was completed out of 8 test EMD and 187 operational aircraft produced; the aircraft was delivered to the USAF on 2 May 2012.

 

In April 2016, the House Armed Services Committee (HASC) Tactical Air and Land Forces Subcommittee proposed legislation that would direct the Air Force to conduct a cost study and assessment associated with resuming production of the F-22. Since the production halt directed in 2009 by then Defense Secretary Gates, lawmakers and the Pentagon noted that air warfare systems of Russia and China were catching up to those of the U.S. Lockheed Martin has proposed upgrading the Block 20 training aircraft into combat-coded Block 30/35 versions as a way to increase numbers available for deployment. On 9 June 2017, the Air Force submitted their report to Congress stating they had no plans to restart the F-22 production line due to economic and operational issues; it estimated it would cost approximately $50 billion to procure 194 additional F-22s at a cost of $206–$216 million per aircraft, including approximately $9.9 billion for non-recurring start-up costs and $40.4 billion for aircraft procurement costs.

 

Upgrades

 

The first aircraft with combat-capable Block 3.0 software flew in 2001. Increment 2, the first upgrade program, was implemented in 2005 for Block 20 aircraft onward and enabled the employment of Joint Direct Attack Munitions (JDAM). Certification of the improved AN/APG-77(V)1 radar was completed in March 2007, and airframes from production Lot 5 onward are fitted with this radar, which incorporates air-to-ground modes. Increment 3.1 for Block 30 aircraft onward provided improved ground-attack capability through synthetic aperture radar mapping and radio emitter direction finding, electronic attack and Small Diameter Bomb (SDB) integration; testing began in 2009 and the first upgraded aircraft was delivered in 2011. To address oxygen deprivation issues, F-22s were fitted with an automatic backup oxygen system (ABOS) and modified life support system starting in 2012.

 

Increment 3.2 for Block 35 aircraft is a two-part upgrade process; 3.2A focuses on electronic warfare, communications and identification, while 3.2B includes geolocation improvements and a new stores management system to show the correct symbols for the AIM-9X and AIM-120D.[83][84] To enable two-way communication with other platforms, the F-22 can use the Battlefield Airborne Communications Node (BACN) as a gateway. The planned Multifunction Advanced Data Link (MADL) integration was cut due to development delays and lack of proliferation among USAF platforms. The F-22 fleet is planned to start receiving Increment 3.2B as well as a software upgrade for cryptography capabilities and avionics stability in May 2019. A Multifunctional Information Distribution System-Joint (MIDS-J) radio that replaces the current Link-16 receive-only box is expected to be operational by 2020. Subsequent upgrades are also focusing on having an open architecture to enable faster future enhancements.

 

In 2024, funding is projected to begin for the F-22 mid-life upgrade (MLU), which is expected to include new sensors and antennas, hardware refresh, cockpit improvements, and a helmet mounted display and cuing system. Other enhancements being developed include IRST functionality for the AN/AAR-56 Missile Launch Detector (MLD) and more durable stealth coating based on the F-35's.

 

The F-22 was designed for a service life of 8,000 flight hours, with a $350 million "structures retrofit program". Investigations are being made for upgrades to extend their useful lives further. In the long term, the F-22 is expected to be superseded by a sixth-generation jet fighter to be fielded in the 2030s.

  

Design

 

Overview

 

The F-22 Raptor is a fifth-generation fighter that is considered fourth generation in stealth aircraft technology by the USAF.[91] It is the first operational aircraft to combine supercruise, supermaneuverability, stealth, and sensor fusion in a single weapons platform. The F-22 has four empennage surfaces, retractable tricycle landing gear, and clipped delta wings with reverse trailing edge sweep and leading edge extensions running to the upper outboard corner of the inlets. Flight control surfaces include leading-edge flaps, flaperons, ailerons, rudders on the canted vertical stabilizers, and all-moving horizontal tails (stabilators); for speed brake function, the ailerons deflect up, flaperons down, and rudders outwards to increase drag.

 

The aircraft's dual Pratt & Whitney F119-PW-100 augmented turbofan engines are closely spaced and incorporate pitch-axis thrust vectoring nozzles with a range of ±20 degrees; each engine has maximum thrust in the 35,000 lbf (156 kN) class. The F-22's thrust-to-weight ratio at typical combat weight is nearly at unity in maximum military power and 1.25 in full afterburner. Maximum speed without external stores is approximately Mach 1.8 at military power and greater than Mach 2 with afterburners.

 

The F-22's high cruise speed and operating altitude over prior fighters improve the effectiveness of its sensors and weapon systems, and increase survivability against ground defenses such as surface-to-air missiles. The aircraft is among only a few that can supercruise, or sustain supersonic flight without using fuel-inefficient afterburners; it can intercept targets which subsonic aircraft would lack the speed to pursue and an afterburner-dependent aircraft would lack the fuel to reach. The F-22's thrust and aerodynamics enable regular combat speeds of Mach 1.5 at 50,000 feet (15,000 m). The use of internal weapons bays permits the aircraft to maintain comparatively higher performance over most other combat-configured fighters due to a lack of aerodynamic drag from external stores. The aircraft's structure contains a significant amount of high-strength materials to withstand stress and heat of sustained supersonic flight. Respectively, titanium alloys and composites comprise 39% and 24% of the structural weight.

 

The F-22's aerodynamics, relaxed stability, and powerful thrust-vectoring engines give it excellent maneuverability and energy potential across its flight envelope. The airplane has excellent high alpha (angle of attack) characteristics, capable of flying at trimmed alpha of over 60° while maintaining roll control and performing maneuvers such as the Herbst maneuver (J-turn) and Pugachev's Cobra. The flight control system and full-authority digital engine control (FADEC) make the aircraft highly departure resistant and controllable, thus giving the pilot carefree handling.

  

Stealth

 

The F-22 was designed to be highly difficult to detect and track by radar. Measures to reduce radar cross-section (RCS) include airframe shaping such as alignment of edges, fixed-geometry serpentine inlets and curved vanes that prevent line-of-sight of the engine faces and turbines from any exterior view, use of radar-absorbent material (RAM), and attention to detail such as hinges and pilot helmets that could provide a radar return. The F-22 was also designed to have decreased radio emissions, infrared signature and acoustic signature as well as reduced visibility to the naked eye. The aircraft's flat thrust-vectoring nozzles reduce infrared emissions of the exhaust plume to mitigate the threat of infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Additional measures to reduce the infrared signature include special topcoat and active cooling of leading edges to manage the heat buildup from supersonic flight.

 

Compared to previous stealth designs like the F-117, the F-22 is less reliant on RAM, which are maintenance-intensive and susceptible to adverse weather conditions. Unlike the B-2, which requires climate-controlled hangars, the F-22 can undergo repairs on the flight line or in a normal hangar. The F-22 has a Signature Assessment System which delivers warnings when the radar signature is degraded and necessitates repair. While the F-22's exact RCS is classified, in 2009 Lockheed Martin released information indicating that from certain angles the aircraft has an RCS of 0.0001 m² or −40 dBsm – equivalent to the radar reflection of a "steel marble". Effectively maintaining the stealth features can decrease the F-22's mission capable rate to 62–70%.

 

The effectiveness of the stealth characteristics is difficult to gauge. The RCS value is a restrictive measurement of the aircraft's frontal or side area from the perspective of a static radar. When an aircraft maneuvers it exposes a completely different set of angles and surface area, potentially increasing radar observability. Furthermore, the F-22's stealth contouring and radar absorbent materials are chiefly effective against high-frequency radars, usually found on other aircraft. The effects of Rayleigh scattering and resonance mean that low-frequency radars such as weather radars and early-warning radars are more likely to detect the F-22 due to its physical size. However, such radars are also conspicuous, susceptible to clutter, and have low precision. Additionally, while faint or fleeting radar contacts make defenders aware that a stealth aircraft is present, reliably vectoring interception to attack the aircraft is much more challenging. According to the USAF an F-22 surprised an Iranian F-4 Phantom II that was attempting to intercept an American UAV, despite Iran's assertion of having military VHF radar coverage over the Persian Gulf.

claisebrook train station, perth

welcoming diverse new investors: Vy Capital, Coinbase, BlockTower Capital, Alameda Research, and the investment arms of Bernard Arnault, Marc Benioff, Nicolas Berggruen and Drake.

 

VentureBeat today: “MobileCoin has raised $66 million for its cryptocurrency payments platform that aims to democratize privacy for all. MobileCoin uses peer-to-peer networking for payments, so that transactions can be more easily kept private even while taking advantage of the blockchain, the transparent and secure digital ledger. The company bills its system as fast, safe, and easy-to-use, giving everyone the ability to transact digitally from nearly anywhere in the world. A cell phone transaction takes just seconds, in contrast to most cryptocurrency transactions that can take minutes to resolve.

 

When it comes to cryptocurrency transactions, MobileCoin is pretty unique. “People are really excited about what we’ve built because it’s really fast,” CEO Joshua Goldbard said. “It’s carbon negative, and it works on the cell phone. “It’s just something that really doesn’t exist in crypto.” The technology was built for mobility and convenience, with payments occurring right on your phone.

 

The San Francisco company has an opaque ledger and cryptographically protected transactions. The network uses forward secrecy to keep data from being compromised, ensuring that private information remains private.

 

“On the customer side, we think we can deliver the lowest total cost to merchants and individuals for moving money around the world,” Goldbard said. “When you use a bank, it can take 30 to 45 days to get your money as a merchant. If you use Stripe or Venmo, it’s three to five days before it hits your bank account. With MobileCoin, you have possession of the funds in a second.”

 

Unlike other cryptocurrencies, MobileCoin was built to ensure that digital wallets can be easily recovered — and not lost forever. Even if merchants or users lose their phones, they can recover their account balance and transaction history by simply loading their account onto a new phone.

 

Overseas, MobileCoin has issued its own cryptocurrency, and the coins on the network are valued at more than $4 billion now. It has shown that it can be used for merchandise transactions on messenger platforms such as Mixi in Japan.

 

MobileCoin provides anti-fraud services and other services for merchants. MobileCoin charges just 0.004% transaction fees, and that goes to its foundation for improving the cryptocurrency.

 

“If we didn’t build MobileCoin, we would end up with things like Alipay, Facebook Libra, and others that would track every single transaction that people do,” Goldbard said. “And they’re not doing that necessarily to be helpful.”

 

And TechCrunch: "The newest round values the outfit at $1.066 billion. Signal founder Moxie Marlinspike told Wired that because MobileCoin is a so-called privacy coin designed to protect users’ identities and the details of their payments on a blockchain, that it’s an ideal fit for Signal. 'There’s a palpable difference in the feeling of what it’s like to communicate over Signal, knowing you’re not being watched or listened to, versus other communication platforms. I would like to get to a world where not only can you feel that when you talk to your therapist over Signal, but also when you pay your therapist for the session over Signal.'”

 

FD: Future Ventures is the second largest outside shareholder in MobileCoin.

 

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

Calcite, Paint

Thebes, Valley of the Kings, Tomb of Tutankhamun (KV 62).

New Kingdom, 18th Dynasty, Reign of Tutankhamun (1355-1346 BCE).

 

Tutankhamun's tomb held more than eighty vessels of oils and unguents, but thieves stole most of the contents. This container has a central frieze in which the royal throne name appears in a cryptographic writing, ensuring the survival of the king's name.

 

King Tut exhibit, Seattle Washington, 2012.

ИN

Deflowering Eyes

Igigi

 

www.saatchiart.com/print/New-Media-Deflowering-Eyes-Inna-...

 

en.wikipedia.org/wiki/Igigi

Igigi are the gods of heaven in the mythology of Mesopotamia.

The name has unknown origin. The signs for the names, and one of the options for the etymology of the igigi are i2-gi3-gi3, which are the same signs for 5-1-1 or 5-60-60 5*(60+60)=600 which are by some traditions All the gods.

Another option is to try to interpret the words themselves. Igi means (eye) in the Sumerian language, and it used as logogram in the Akkadian language, gi stands for (penetrate sexually). Therefore, Igigi could be translated to (Eyes in the sky, the watchers, who deflower).

Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.

 

Igigi/Igigu (a group of gods)

This Semitic term describes a group of possibly seven or eight gods. It is likely that the god Marduk was one of them, but the total membership in this group is unclear and likely changed over time.

Functions

Like the term Anunna, the term Igigu is equally complicated and in need of a comprehensive new study. Igigu, which is likely of Semitic origin, indicates a group of gods in the Mesopotamian pantheon. It is, however, not entirely clear what distinguishes the Igigu from the Anunna.

The story of Atrahasis, the Babylonian story of the Flood and a precursor to the flood story in the Gilgameš Epic (Tablet XI), offers some evidence on the relationship between the Annunaki and the Igigu. The poem begins with the lines "When the gods like men bore the work and suffered the toil, the toil of the gods was great, the work was heavy, the distress was much" (lines 1-4) (Lambert and Millard 1999 [1969]: 43). The composition continues: "The Seven great Anunnaki were making the Igigu suffer the work" (lines 5-6) (Lambert and Millard 1969 [1999]: 43). What follows is partly fragmentary, but seems to indicate that the Igigu gods did not want to work any more and therefore the Anunnaki had to find a solution. Ultimately, this led to the creation of humans, who from then on had to bear the gods' work. In this story it appears that the Igigu were subordinate to the Anunnaki (von Soden 1989: 341-2). It is unclear which deities were included in the Igigu group.

In the prologue to the famous Code of Hammurabi it is indicated that the Anunnaki elevated the god Marduk among the Igigu gods (for a translation see Roth 1997: 76-142; also see von Soden 1966: 144), but it is difficult to assess the significance of this passage.

Some mythological texts, such as the Anzu myth, speak of an assembly of the Igigu gods, but whether this might be an institutionalized assembly, as suggested by Kienast 1965: 146, remains doubtful.

Divine Genealogy and Syncretisms

As mentioned above, it is not clear how many and which gods belonged to the Igigu, although the god Marduk appears to belong to this group for certain. It is possible that the group included only seven (von Soden 1966), eight (Kienast 1965: 144) or ten (Black and Green 1998: 106) gods, but this is uncertain as well.

Other gods who may belong to this group are Ištar, Asarluhi, Naramṣit, Ninurta, Nuska, and Šamaš (Kienast 1965: 149). Some gods seem to belong to both the Anunnaki and the Igigu (Kienast 1965: 152), yet more research is needed to gain a better understanding of this situation in the first millennium BCE.

Cult Place(s)

We currently know of no cult places for the Igigu. Kienast (1965; 1976-80) has repeatedly suggested that the Igigu are only attested in literary and mythological texts. However, von Soden (1966) has brought forth some evidence that might indicate that there are very few theophoric personal names TT which invoke the Igigu, thus offering some evidence for their veneration.

Time Periods Attested

The term Igigu is first attested in texts from the Old Babylonian period (Kienast 1976-80: 40; von Soden 1989: 340) and only occurs in Akkadian contexts (Edzard 1976-80: 37). A Sumerian logographic equivalent of the term Igigu is nun-gal-e-ne, to be translated as "the great princes/sovereigns." This term is mentioned in a literary text that has been ascribed to the princess Enheduanna, daughter of king Sargon, the founder of the Old Akkadian dynasty (Inana C, ETCSL 4.7.3 l. 2). This particular composition is only attested in Old Babylonian manuscripts and it is unclear whether an older date can be proven. According to Edzard (1976-80: 39) it is possible that nun-gal-e-ne was originally an epithet of the Anunna gods that later became identified with the Igigu under influence from Akkadian.

The Igigu and Anunnaki are frequently attested in literary, mythological, and religious (incantations and prayers) texts until the end of the cuneiform tradition. The Igigu are mentioned, among others, in the Anzu myth (Foster 2005: 555-578), in Enāma eliš TT (Foster 2005: 436-486), and the Erra poem (Foster 2005: 880-913), all of which are attested in manuscripts of the first millennium BCE.

Iconography

Because this term describes a group of gods, there are no known images of the Igigu.

Name and Spellings

The etymology of this term is unclear. It has been suggested the term is of Old Akkadian (Kienast 1965: 157; 1976-80: 40) or of (Old) Amorite (von Soden 1966: 144) or possibly Arabic origins (von Soden 1989: 340). For the various spellings see Kienast 1965: 142.

Written forms:

logographic: dnun gal-e-ne, dnun-gal-meš;

syllabic and pseudo-logographic: i-gi-gu, i-gi-gi, di-gi4-gi4, di-gi4-gi4-ne, i-gi4-gu, dí-gì-gì (the latter appears first in ninth century BCE);

cryptographic: dgéš-u

Normalized forms:

Igigu, Igigi

Igigu in Online Corpora

The Corpus of Ancient Mesopotamian Scholarship

Nungalene in Online Corpora

The Electronic Text Corpus of Sumerian Literature

Further Reading

Edzard 1976-80, "[Igigu], Anunna und."

Kienast 1965, "Igigu und Anunnakku nach den akkadischen Quellen."

Kienast 1976-80, "Igigu, Anunnakku und."

von Soden 1966, "Die Igigu-Götter."

von Soden 1989, "Die Igigu-Götter in altbabylonischer Zeit."

Nicole Brisch

Nicole Brisch, 'Igigi/Igigu (a group of gods)', Ancient Mesopotamian Gods and Goddesses, Oracc and the UK Higher Education Academy, 2012 [oracc.museum.upenn.edu/amgg/listofdeities/igigi/]

Released under a Creative Commons Attribution Share-Alike license 3.0, 2011.

The Pennsylvania

Sumerian Dictionary

igi [EYE] (1133x: ED IIIb, Old Akkadian, Lagash II, Ur III, Early Old Babylonian, Old Babylonian, unknown) wr. igi; i-bi2; i-gi "eye; carved eye (for statues)" Akk. īnu

psd.museum.upenn.edu/epsd/epsd/e2510.html

The Pennsylvania Sumerian Dictionary Project is carried out in the Babylonian Section of the University of Pennsylvania Museum of Anthropology and Archaeology. It is funded by the National Endowment for the Humanities and private contributions.

____________________________________

Cycles of the earth, winds, Igigi it's all here and no wonder the church has been hiding the text. The smoke sedates the Elohim (judges) they have their Territories, Not demons nor angels but IGIGI; the Watchers the little big eyed guys who have been stealing my eggs while I sleep 1-4.

archive.org/details/bookofenochproph00laur

ia802707.us.archive.org/10/items/bookofenochproph00laur/b...

The book of Enoch the prophet

by Laurence, Richard, 1760-1838

Publication date 1883

Publisher London : Kegan Paul, Trench

Collection Princeton; americana

Digitizing sponsor Internet Archive

Contributor Princeton Theological Seminary Library

Language English.

Addeddate 2008-11-12 13:13:18

Call number 185459

Camera Canon 5D

External-identifier urn:oclc:record:1041620576[WorldCat (this item)]

Foldoutcount 0

Identifier bookofenochproph00laur

Identifier-ark ark:/13960/t16m3hr86

Lcamid

Missingpages

Openlibrary_edition OL23282189M

Openlibrary_work OL16734660W

Pages 244

Possible copyright status NOT_IN_COPYRIGHT

Ppi 500

Rcamid

Scandate 20081117214436

Scanfactors 4

Scanner scribe2.nyc.archive.org

Scanningcenter nyc

SHOW LESS

Full catalog record MARCXML

 

en.wikipedia.org/wiki/Watcher_(angel)#Grigori

Philo

According to PrEv 1.10.1-2 of Philo of Byblos, Sanchuniathon mentioned "some living beings who had no perception, out of whom intelligent beings came into existence, and they were called Zophasemin (Heb. șōpē-šāmayim, that is, 'Watchers of Heaven'). And they were formed like the shape of an egg."

The Old Testament Pseudepigrapha, volume 1, Apocalyptic Literature and Testaments

EDITED BY JAMES H. CHARLES WORTH, DUKE UNIVERSITY

DOUBLEDAY & COMPANY, INC. GARDEN CITY, NEW YORK

Library of Congress Catalog Card Number: ISBN: 0-385-09630-5 Copyright © 1983 by James H. Charlesworth All Rights Reserved Printed in the United States of America Designed by Joseph P. Ascherl Library of Congress Cataloging in Publication Data Main entry under title: Old Testament pseudepigrapha.

eclass.uoa.gr/modules/document/file.php/THEOL264/James%20...

____________________________________

Livius.org Articles on ancient history

www.livius.org/sources/content/anet/104-106-the-epic-of-a...

The Epic of Atraḥasis

The Epic of Atraḥasis is the fullest Mesopotamian account of the Great Flood, with Atraḥasis in the role of Noah. It was written in the seventeenth century BCE

The text is known from several versions: two were written by Assyrian scribes (one in the Assyrian, one in the Babylonian dialect), a third one (on three tablets) was written during the reign of king Ammi-saduqa of Babylonia (1647-1626 BCE). Parts are quoted in Tablet XI of the Epic of Gilgameš; other influences are in the Babylonian History by Berossus (quote). These texts can be used to reconstruct the lost parts of the Epic of Atraḥasis, while the overall structure is, of course, known from the Bible.

Summary

The conditions immediately after the Creation: the Lower Gods have to work very hard and start to complain

Revolt of the Lower Gods

Negotiations with the Great Gods

Proposal to create humans, to relieve the Lower Gods from their labor

Creation of the Man

Man's noisy behavior; new complaints from the gods

The supreme god Enlil's decision to extinguish mankind by a Great Flood

Atraḥasis is warned in a dream

Enki explains the dream to Atraḥasis (and betrays the plan)

Construction of the Ark

Boarding of the Ark

Departure

The Great Flood

The gods are hungry because there are no farmers left to bring sacrifices, and decide to spare Atraḥasis, even though he is a rebel

Regulations to cut down the noise: childbirth, infant mortality, and celibacy

The translation offered here is adapted from the one by B.R. Foster.

Translation

Complaints of the Lower Gods

[1] When the gods were man

they did forced labor, they bore drudgery.

Great indeed was the drudgery of the gods,

the forced labor was heavy, the misery too much:

[5] the seven great Anunna-gods were burdening

the Igigi-godsnote with forced labor.

[Lacuna]

[21] The gods were digging watercourses,

canals they opened, the life of the land.

The Igigi-gods were digging watercourses

canals they opened, the life of the land.

[25] The Igigi-gods dug the Tigris river

and the Euphrates thereafter.

Springs they opened from the depths,

wells ... they established.

...

They heaped up all the mountains.

[Several lines missing]

[34] ... years of drudgery.

[35] ... the vast marsh.

They counted years of drudgery,

... and forty years, too much!

... forced labor they bore night and day.

They were complaining, denouncing,

[40] muttering down in the ditch:

"Let us face up to our foreman the prefect,

he must take off our heavy burden upon us!

Enlil, counsellor of the gods, the warrior,

come, let us remove him from his dwelling;

[45] Enlil, counsellor of the gods, the warrior,

come, let us remove him from his dwelling!"

[Several lines missing]

[61] "Now them, call for battle,

battle let us join, warfare!"

The gods heard his words:

they set fire to their tools,

[65] they put fire to their spaces,

and flame to their workbaskets.

Off they went, one and all,

to the gate of the warrior Enlil's abode.

...

Insurrection of the Lower Gods

[70] It was night, half-way through the watch,

the house was surrounded, but the god did not know.

It was night, half-way through the watch,

Ekur was surrounded, but Enlil did not know!

[Several lines missing; the great gods send a messenger]

The Great Gods Send a Messenger

[132] Nusku opened his gate,

took his weapons and went ... Enlil.

In the assembly of all the gods,

[135] he knelt, stood up, expounded the command,

"Anu, your father,

your counsellor, the warrior Enlil,

your prefect, Ninurta,

and your bailiff Ennugi have sent me to say:

[140] 'Who is the instigator of this battle?

Who is the instigator of these hostilities?

Who declared war,

that battle has run up to the gate of Enlil?

In ...

[145] he transgressed the command of Enlil.'"

Reply by the Lower Gods

"Everyone of us gods has declared war;

...

We have set ... un the excvation,

excessive drudgery has killed us,

[150] our forced labor was heavy, the misery too much!

Now, everyone of us gods

has resolved on a reckoning with Enlil."

[The great gods decide to create man, to relieve the lower gods from their misery.]

Proposals by Ea, Belet-ili, and Enki

[a1] Ea made ready to speak,

and said to the gods, his brothers:

"What calumny do we lay to their charge?

Their forced labor was heavy, their misery too much!

[a5] Every day ...

the outcry was loud, we could hear the clamor.

There is ...

Belet-ili, the midwife, is present.note

Let her create, then, a human, a man,

[a10] Let him bear the yoke!

Let him bear the yoke!

Let man assume the drudgery of the god."

Belet-ili, the midwife, is present.

[190] Let the midwife create a human being!

Let man assume the drudgery of the god."

They summoned and asked the goddess

the midwife of the gods, wise Mami:note

"Will you be the birth goddess, creatress of mankind?

[195] Create a human being, that he bear the yoke,

let him bear the yoke, the task of Enlil,

let man assume the drudgery of the god."

Nintu made ready to speak,note

and said to the great gods:

[200] "It is not for me to do it,

the task is Enki's.

He it is that cleanses all,

let him provide me the clay so I can do the making."

Enki made ready to speak,

[205] and said to the great gods:

"On the first, seventh, and fifteenth days of the month,

let me establish a purification, a bath.

Let one god be slaughtered,

then let the gods be cleansed by immersion.

[210] Let Nintu mix clay with his flesh and blood.

Let that same god and man be thoroughly mixed in the clay.

Let us hear the drum for the rest of the time.

[215] From the flesh of the god let a spirit remain,

let it make the living know its sign,

lest he be allowed to be forgotten, let the spirit remain."

The great Anunna-gods, who administer destinies,

[220] answered "yes!" in the assembly.

The Creation of Man

On the first, seventh, and fifteenth days of the month,note

he established a purification, a bath.

They slaughtered Aw-ilu, who had the inspiration, in their assembly.

[225] Nintu mixed clay with his flesh and blood.

That same god and man were thoroughly mixed in the clay.

For the rest of the time they would hear the drum.

From the flesh of the god the spirit remained.

It would make the living know its sign.

[230] Lest he be allowed to be forgotten, the spirit remained.

After she had mixed the clay,

she summoned the Anunna, the great gods.

The Igigi, the great gods, spat upon the clay.

[235] Mami made rady to speak,

and said to the great gods:

"You ordered me the task and I have completed it!

You have slaughtered the god, along with his inspiration.

[240] I have done away with your heavy forced labor,

I have imposed your drudgery on man.

You have bestowed clamor upon mankind.

I have released the yoke, I have made restoration."

They heard this speech of hers,

[245] they ran, free of care, and kissed her feet, saying:

"Formerly we used to call you Mami,

now let your name be Belet-kala-ili:"note

[The human population increases and their noise disturbs the gods, who decide to wipe out mankind. The god Enki, however, sends a dream to Atrahasis. When the text resumes, Enki is still speaking.]

Enki explains Atraḥasis' dream

[i.b35] "Enlil committed an evil deed against the people."

[i.c11] Atraḥasis made ready to speak,

and said to his lord:

"Make me know the meaning of the dream.

let me know, that I may look out for its consequence."

[i.c15] Enki made ready to speak,

and said to his servant:

"You might say, 'Am I to be looking out while in the bedroom?'

Do you pay attention to message that I speak for your:

[i.c20] 'Wall, listen to me!

Reed wall, pay attention to all my words!

Flee the house, build a boat,

forsake possessions, and save life.

[i.c25] The boat which you build

... be equal ...

...

...

Roof her over like the depth,

[i.c30] so that the sun shall not see inside her.

Let her be roofed over fore and aft.

The gear should be very strong,

the pitch should be firm, and so give the boat strength.

I will shower down upon you later

[i.c35] a windfall of birds, a spate of fishes.'"

He opened the water clock and filled it,

he told it of the coming of the seven-day deluge.

Atraḥasis and the Elders

Atraḥasis received the command.

He assembled the Elders at his gate.

[i.c40] Atraḥasis made ready to speak,

and said to the Elders:

"My god does not agree with your god,

Enki and Enlil are constantly angry with each other.

They have expelled me from the land.

[i.c45] Since I have always reverenced Enki,

he told me this.

I can not live in ...

Nor can I set my feet on the earth of Enlil.

I will dwell with my god in the depths.

[i.c50] This he told me: ..."

Construction of the Ark

[ii.10] The Elders ...

The carpenter carried his axe,

the reedworker carried his stone,

the rich man carried the pitch,

the poor man brought the materials needed.

[Lacuna of about fifteen lines; the word Atraḥasis can be discerned.]

Boarding of the Ark

[ii.29] Bringing ...

[ii.30] whatever he had ...

Whatever he had ...

Pure animals he slaughtered, cattle ...

Fat animals he killed. Sheep ...

he choose and and brought on board.

[ii.35] The birds flying in the heavens,

the cattle and the ... of the cattle god,

the creatures of the steppe,

... he brought on board

...

[ii.40] he invited his people

... to a feast

... his family was brought on board.

While one was eating an another was drinking,

[ii.45] he went in and out; he could not sit, could not kneel,

for his heart was broken, he was retching gall.

Departure

The outlook of the weather changed.

Adadnote began to roar in the clouds.

[ii.50] The god they heard, his clamor.

He brought pitch to seal his door.

By the time he had bolted his door,

Adad was roaring in the clouds.

The winds were furious as he set forth,

[ii.55] He cut the mooring rope and released the boat.

[Lacuna]

The Great Flood

[iii.5] ... the storm

... were yoked

Anzu rent the sky with his talons,

He ... the land

[iii.10] and broke its clamor like a pot.

... the flood came forth.

Its power came upn the peoples like a battle,

one person did not see another,

they could not recognize each other in the catastrophe.

[iii.15] The deluge belowed like a bull,

The wind resounded like a screaming eagle.

The darkness was dense, the sun was gone,

... like flies.

[iii.20] the clamor of the deluge.

[Lacuna. The gods find themselves hungry because there are no farmers left and sacrifices are no longer brought. When they discover that Atrahasis has survived, they make a plan to make sure that the noise will remain within limits: they invent childbirth, infant mortality, and celibacy.]

Mankind Punished

[iii.45] Enki made ready to speak,

and said to Nintu the birth goddess:

"You, birth goddess, creatress of destinies,

establish death for all peoples!

[iii.d1] "Now then, let there be a third woman among the people,

among the people are the woman who has borne

and the woman who has not borne.

Let there be also among the people the pasittu (she-demon):

[iii.d5] Let her snatch the baby from the lap who bore it.

And etablish high priestesses and priestesses,

let them be taboo,note and so cut down childbirth."

This page was created in 2007; last modified on 12 October 2020.

Home » Sources » Content » ANET » 104-106 The Epic of Atraḥasis

All content copyright © 1995–2020 Livius.org. All rights reserved.

____________________________________

Brain Magick: Exercises in Meta-Magick and Invocation by Philip H. Farber

archive.org/details/BrainMagic/Brain%20Magic

archive.org/stream/BrainMagic/mega-book-two-volumes-in-on...

"Satana-il was the supreme leader of an extraterrestrial race that accompanied the Anunnaki in their second landing on earth.

This galactic race was physically and genetically different from the An unna ki and the Igigi. Their duty was to serve the Anu nna ki.

They rebelled against the An unna ki and broke the laws of their leader by breeding with the women of the Earth.

Contrary to the general belief, the An unna ki were not the first extraterrestrial race to marry, or the have sexual relations with the women of earth."

____________________________________

archive.org/details/img20190908220021901

Ancient Creation Myths

by Alberta Parish

Publication date 2019-09-08

Topics Enlil, Enki, Anunnaki, Sumerians, ancient myths, Babylonians, Enuma Elish, Atrahasis, Noah, Genesis Flood, Sumerian flood myth

God: The Original Slavemaster by Alberta Parish

Ever since I was a child, I have always believed in a benevolent God called Yahweh and Jehovah that biblical writers claimed created mankind for the express purpose of his will. In a Christianized Western culture, I was taught that only through Jesus Christ could I have eternal life with him and Yahweh. The epic of Atrahasis, an Akkadian tablet dating from the 18th Century BCE, gives a completely different account of mankind's creation and how the universe was formed beginning with the primordial waters.

Atrahasis was the last Sumerian king before the Great Deluge who was saved from the flood by the Anunnaki god Enki who had rulership of the great deep. According to Atrahasis, Homo Sapiens were created to serve the Anunnaki, which were extraterrestrials that landed in the Persian Gulf region about 450,000 years ago in search of gold to repair their home planet Nibiru's ozone.They made the Igigi gods, who were lower gods, mine for gold. Enlil, the ruler of earth and sky, who is also the equivalent of the biblical God Yahweh, also made the Igigi build canals, reedbeds, rivers and mountains. They built the Tigris and Euphrates rivers, and after 3,600 years, rebelled against their oppressor, Enlil.

Atrahasis had recorded that the Igigi cast off their work tools and surrounded Enlil's temple demanding to be relieved of their hard labor. It was later decided that the Anunnaki would make a species that were intelligent enough to do the work that the Igigi had refused to do. This was mankind's original purpose for being created by these extraterrestrials. It was also decided that an Anunnaki had to be sacrificed to make mankind.

The epic of Atrahasis states, "They slaughtered Aw-ilu, who had the inspiration, in their assembly.

Nintu mixed clay with his flesh and blood.

That same god and man were thoroughly mixed in the clay...After she had mixed the clay, she summoned the Anunna, the great gods.

The Igigi, the great gods, spat upon the clay.

Mami made ready to speak, and said to the great gods: "You ordered me the task and I have completed it!

You have slaughtered the god, along with his inspiration.

I have done away with your heavy forced labor,

I have imposed your drudgery on man.

You have bestowed clamor upon mankind."

With the help of Enki, half-brother of Enlil, the mother goddess Nintu (i.e., Mami) formed seven males and seven females from fourteen pieces of clay. It was also after this event that the human population grew, because the first seven males and females were given the ability to reproduce. When the human population grew, Enlil complained of their noise. He then set about to reduce the population. First, he caused a drought and mankind was destroyed. But it did nothing to reduce the population. Then, pestilence followed. Still, the population continued to grow. Lastly, Enlil caused a great famine. Eventually, the people turned cannibal as a result of the famine. Finally, Enlil proposed a solution to destroy the human population through a flood.

Read the remainder of my essay at www.ancientcreationmyths.com.

Addeddate 2019-09-15 19:04:20

Identifier img20190908220021901

Scanner Internet Archive HTML5 Uploader 1.6.4

____________________________________

ETCSLtranslation

etcsl.orinst.ox.ac.uk/cgi-bin/etcsl.cgi?charenc=gcirc&amp...

© Copyright 2003, 2004, 2005, 2006 The ETCSL project, Faculty of Oriental Studies, University of Oxford

Updated 2006-12-19 by JE

Igigi Search the English translations

Result: 3 paragraph(s)

 

A hymn to Marduk for Abī-Ešuḫ (Abī-Ešuḫ A): c.2.8.5.1

King who gathers up the divine powers of heaven and earth, foremost son of Enki, Marduk, mighty lord, perfect hero, foremost of the Great Princes (a name for the Igigi gods), strong one of the Anuna, the great gods who have given him justice and judgment! Great prince, descendant of holy An, lord who decides destinies, who has everything in his grasp (?), wise, august knower of hearts, whose divinity is manifest, who shows concern for all that he looks upon! Your ancestor An, king of the gods, has made your lordship effective against the armies of heaven and earth.

 

A hymn to Inana (Inana C): c.4.07.3

The great-hearted mistress, the impetuous lady, proud among the Anuna gods and pre-eminent in all lands, the great daughter of Suen, exalted among the Great Princes (a name of the Igigi gods), the magnificent lady who gathers up the divine powers of heaven and earth and rivals great An, is mightiest among the great gods -- she makes their verdicts final. The Anuna gods crawl before her august word whose course she does not let An know; he dare not proceed against her command. She changes her own action, and no one knows how it will occur. She makes perfect the great divine powers, she holds a shepherd's crook, and she is their magnificent pre-eminent one. She is a huge shackle clamping down upon the gods of the Land. Her great awesomeness covers the great mountain and levels the roads.

 

The debate between Bird and Fish: c.5.3.5

"You are like a watchman living on the walls (?), ……! Fish, you kindled fire against me, you planted henbane. In your stupidity you caused devastation; you have spattered your hands with blood! Your arrogant heart will destroy itself by its own deeds! But I am Bird, flying in the heavens and walking on the earth. Wherever I travel to, I am there for the joy of its …… named. ……, O Fish, …… bestowed by the Great Princes (a name for the Igigi). I am of first-class seed, and my young are first-born young! …… went with uplifted head …… to the lustrous E-kur. …… until distant days. …… the numerous people say. How can you not recognise my pre-eminence? Bow your neck to the ground."

____________________________________

A song to Ninimma (Ninimma A): translation

web.archive.org/web/20060925024833/http://www-etcsl.orien...

SEGMENT A

1-18You are the seal-holder of the treasury of the ....... You are the caretaker of the great gods, you are ....... Ninimma, you are the lady of all the great rites in the E-kur. Lady, you are the ...... of Enlil, you are the heavenly scribe. You ...... the tablet of life.

1 line fragmentary

You, who bring the best corn, are the lady of the E-sara. The surveyor's gleaming line and the measuring rod suit you perfectly. You can hold your head high among the great princes. You are ....... You are ......, the cherished one.

1 line fragmentary

......; you are exceptional in wisdom. ...... joy ....... My lady, you were exalted already in the womb; you are resplendent like the sunlight. You are suited to the lapis-lazuli crown (?); you are the heavenly ....... ...... adorned with loveliness .......

1 line fragmentary

approx. 10 lines missing

 

SEGMENT B

1-11...... like a strong (?) ....... ...... of the E-kur ...... lady ....... ...... the forceful one of Nanna ....... You are profoundly intelligent, one who knows everything. You are the shining light which fills the exalted sanctuary. You are she who ...... by Enlil. You are ....... You are ....... You are most apt for the holy susbu rites and lustration rites.

1 line unclear

Ninimma of the holy divine plans, it is sweet to praise you!

 

SEGMENT C

1You are .......

 

Top | Home | Email us This composition: composite text | bibliography

 

Revision history

22.x.1999 : GZ : adapting translation

06.xii.1999 : JAB : proofreading

13.xii.1999 : GC : tagging

22.xii.1999 : ER : proofreading SGML

22.xii.1999 : ER : converting to HTML 4.0

7.ix.2001 : ER : header and footer reformatted; substantive content of file not changed

____________________________________

 

Inly, Bohdan

 

about.me/chekanart

 

Blog: makaylalewis.co.uk/2013/11/20/sketchnotes-introduction-to...

 

©ALL RIGHTS RESERVED.

These photographs are presented here for viewing purposes ONLY. They are NOT royalty free images and may not be used for commercial or private use. Any such use of these images is strictly prohibited. Specifically, these images may not be copied, manipulated, be reproduced by any other means nor sold without prior written consent by the author.

China is a likely winner of the information age supply chain through ecommerce

 

Peace and Ecommerce, A Global Systems View

 

Attending a required Masters class “Policy, Law, and Ethics in Information Management” it was only ethical to admit that I worked three months drafting and publishing policy documents for Microsoft, which was now our current class assignment, to research Web based privacy policies and other related documents such as terms of use, conditions of use, code of conduct and learn more about them, with a diary of examples in the wild, and related materials.

 

The educational idea is that we would then be able to contribute meaningfully to creating policy statements and understand their underlying implications to end users and companies. But I had already done this work professionally, so it would be of questionable value for me to do the coursework on the same topic as if I had never done it before.

 

The instructor of the class, Glenn Von Tersch assigned me to present information on freedom of speech, a topic I fell in love with, and wanted to research more. But for my final research, I needed something else.

 

One of my favorite things to discuss in job interviews, or with anyone in earshot, is that I believe that the networked spread of ecommerce over the Web, filtering into even the poorest nations will aid in understanding through communication; that ecommerce leads to peace. In effect I believed that ecommerce contributes in a direct way to peace because it provides the fuel to grow and maintain the Internet. Also it seemed obvious that people and countries that are invested in and perform transactions with each other are less likely to go war against their own interests. Von Tersch said, “These topics you are interested in have more research value than freedom of speech, because 1st amendment rights have been heavily legislated, written about, and researched.” He mentioned something called “The McDonald’s Effect”, how having a McDonald’s outlet or franchise appears to contribute to peace between countries. So peace and ecommerce became my topic.

 

What I did not expect to discover is in human society war is considered the norm and peace the exception. I did not expect to learn about how ugly the 3rd world poverty creating monster of WTO became according to one economist, even though I live in Seattle where the initial protests were. I was surprised to know how Reganomics theory hangs on, like an old B-grade movie on late night TV, because someone somewhere in the supply chain makes money. I did not expect to find that privacy and intellectual rights are so tightly interwoven, or how they relate to conflict, security, potential world dominance and growth.

 

I had no way to guess that I would enjoy the study of economics – statistical, yes, nicely so, but dull no; as a global topic it is juicy-rotten, full of international spies, botched security, with rogue pirate computer chips, and unintended consequences.

 

Who can accurately predict how patterns of global economics relate to peace, privacy, property rights, policies and their outcome in the one breath away from today, the next 20-40 years? Who would think that China - the nation, McDonalds - the corporation, and Chicago crack dealers and their foot soldiers share so much in common when you view their information through these fascinating multi-dimensional facets?

 

One must be educated to search effectively for information. My knowledge about the nature of search is not just intellectual knowledge; this is conditionalized through my own experience of failure to produce relevant search results within massive library databases.

 

My education began with a simple query on the Web “peace + ecommerce” which returned from Google “Theses on the Balkan War,” by Mike Haynes, from the International Socialism Journal, “Capitalism is inherently a competitively expansionist and therefore conflict-ridden system” , effectively laying the blame for war on the US and Western capitalist nations and on anyone claiming to be fighting a war with good intentions. I read it, thinking I would not see this relate to my project – also surprising very similar material was presented in the global economic books I read later.

 

As mentioned the pursuit of ‘education justifies anything’, like looking at any results, so I also clicked on an article entitled “Dinosaur Extinction linked to change in Dinosaur Culture” I read it, and it made sense that something like author Daniel Quinn’s theory of “The Law of Limited Competition” is an operant factor in global markets today, with war being genocide, and countries struggling to win economically laying waste to the very place they live. A notable example is Beijing, the air pollution capital of the world struggling to host the Olympic Games this year. I stored that URL for future reference. The theory and the reality imply that in the race to catch up and compete in global economics, the Chinese are killing themselves off before they arrive at their desired goal.

 

Then I queried in several of the University of Washington interconnected and extensive library databases on the same thing “peace + ecommerce” and found in all of them, zero returns, “0 Results”. My teacher was surprised and advised me to extrapolate and offer conjecture on what was likely, if few sources were available. I notified a friend studying economics who emailed related articles. Very frustrated I tried related queries and turned up articles on the economies of war . How perverse, I thought. I contacted a librarian through the online tool and chatted with her, explaining my quest. She suggested I query on “economics and public policy”. “How is public policy related to peace and ecommerce?” I asked. “Try Conflict Resolution” she replied.

 

Thus the reason I couldn't find 'peace' is because the term used, in educated facet writers’ metadata which is designed to expose information to search, is 'conflict resolution' or ‘conflict prevention’. Oddly the social implication is that war is the norm. Maybe peace doesn’t exist anywhere. A reason I used 'ecommerce' instead of 'global economics' is due to consulting in that field for technology firms. Searching again returned few meaningful results -- the user interface was strange, very slow, and clunky. I longed for Google .

 

Then I remembered the “McDonald's Effect” our teacher mentioned, and quickly I located a reference on the Web, but it was deeply nested in a staggering number of oddly worded articles. I stopped without uncovering where the concept originated. The next night I searched again, and found the author Thomas Friedman and his related books. I briefly scanned all the related Wikipedia articles. I realized quickly that to become educated enough on my two topics, I had to some understanding of economics. This is because even to scrape by enough to search among the many interrelated topics one needs to know the central facet. Very esoteric topics require specialized language and deep knowledge of the subject.

 

More searches turned up substantial evidence that China lags behind other nations in ecommerce.

 

For years I worked in ecommerce designing interfaces (for Microsoft 2003 and Amazon 2007-2008), and working with supply chain software (as a director of an ecommerce company). But because I didn't realize that one could understand it better, and that it is not as dull as computer science and its requisite cash register receipts , I never tried.

 

The "McDonald's Effect" is named after "The Golden Arches Theory of Conflict Prevention" created by the author Thomas Friedman's slightly in cheek comments and his book, “The Lexus and the Olive Tree” (the update now titled "The Lexus and the Olive Tree: Understanding Globalization").

 

Those books led me to order Amazon ecommerce overnight book delivery, and I read, 'The World Is Flat?: A Critical Analysis of New York Times Bestseller by Thomas Friedman', 'Freakonomics: A Rogue Economist Explores the Hidden Side of Everything' , 'Making Globalization Work' which reports that there is hope in the world for peace. The Nobel Prize winning author helps the reader extrapolate based on significant knowledge of statistics and global economic analysis through his personal, professional, and academic connections.

 

Common Name Academic Name Book Title

 

McDonalds Effect Golden Arches Theory of Conflict Prevention,

 

aka democratic peace theory Lexus and the Olive Tree

 

Dell Theory The Dell Theory of Conflict Prevention The World is Flat, A Brief History of the Twenty-First Century

 

peace conflict prevention

 

ecommerce global economics

 

"In his book, The Lexus and the Olive Tree, Thomas L. Friedman proposed The Golden Arches Theory of Conflict Prevention, observing that no two countries with a McDonald's franchise had ever gone to war with one another, a version of the democratic peace theory."

 

"The Dell Theory stipulates: No two countries that are both part of a major global supply chain, like Dell's, will ever fight a war against each other as long as they are both part of the same global supply chain."

 

---------------------------------------------------------------------

 

Readings

 

The World Is Flat 3.0: A Brief History of the Twenty-first Century by Thomas Friedman

 

Larry Page, Google Co-Founder quoted by Thomas Friedman, p. 179, entire paragraph. “The more global Google’s user base becomes, the more powerful a flattener it becomes…”

 

From Friedman’s conversation with Google’s director of operations in China, Kai-Fu Lee, p. 181 entire paragraph ”In time individuals will have the power to find anything in the world at any time on all kinds of devices – and that will be enormously empowering.”

 

The Quiet Crisis, entire pages 368, 369, chapter on research in China, beating out American innovation in research. “The Chinese government gave Microsoft the right to grant post-docs.” “They work through their holidays because their dream is to get to Microsoft.”

 

“What are those?” She said the researchers get them from Microsoft every time they invent something that gets patented. How do you say Ferrari in Chinese.”

 

p. 370 “… whether we are going to implement or China is going to beat us to our own plan.” Council on Creativeness, regarding the Innovate America report, comment to Friedman by Deborah Wince-Smith.

 

Introduction p. X, Thomas Friedman, “Of course the world is not flat. But it isn’t round anymore either. I have been using the simple notion of flatness to describe how more people can plug, play, compete, connect, and collaborate with more equal power than ever before – which is what is happening in the world. … the essential impact of all the technological changes coming together in the world today. … My use of the word flat doesn’t mean equal (as in ‘equal incomes’) and never did. It means equalizing.”

 

The Lexus and the Olive Tree: Understanding Globalization by Thomas Friedman

 

Forward to the Anchor Edition, Thomas Friedman, “… my Golden Arches Theory – that no two countries that both have McDonald’s have ever fought a war again each other since they each got their McDonald’s.”

 

p. 7 “When I say that globalization has replaced the Cold War as the defining international system, what exactly do I mean?”

 

p. 8 “The cold war system was symbolized by a single word, the wall … “You can’t handle the truth,” Says Nickleson. “Son we live in a world that has walls…”

 

p. 8 “This Globalization system is also characterized by a single word: the Web. … we have gone from a system built around divisions and walls to a system built around integration and webs.”

 

p. 19 “What is information arbitrage? Arbitrage is a market terms. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

Chapter 3, p. 29. The Lexus and the Olive Tree

 

Photo: Jerusalem, December 29, 1998: Simon Biton places his cellular phone up to the Western Wall so a relative in France can say a prayer at the holy site. (Photo: Menahem Kahana, Agence France-Presse) [caused my spontaneous tears]

 

p. 47 “advertising jingle “Let us put a bank in your home” … office … newspaper … bookstore … brokerage firm … factory … investment firm … school in our homes.”

 

The World Is Flat?: A Critical Analysis of New York Times Bestseller by Thomas Friedman by Ronald Aronica and Mtetwa Ramdoo

 

Freakonomics [Revised and Expanded]: A Rogue Economist Explores the Hidden Side of Everything by Steven D. Levitt and Stephen J. Dubner

 

Chapter 5 “Why do Drug Dealers Still Live with Their Moms?” p. 89 “So how did the gang work? An awful lot like most American businesses, actually, though perhaps none more so than McDonald’s. In fact, if you were to hold a McDonald’s organizational chart and a Black Disciples org chart side by side, you could hardly tell the difference.”

 

p. 46 “There is a tale, “The ring of Gygnes,” … could any man resist the temptation of evil if he knew his acts could not be witnessed?”

 

p. 58 “Attendance at Klan meetings began to fall … of all the ideas Kennedy thought up to fight bigotry, this campaign was clearly the cleverest. … He turned the Klan’s secrecy against itself by making its private information public: he converted heretofore precious knowledge into ammunition for mockery.”

 

Making Globalization Work by Joseph E. Stiglitz

 

My favorite – the entire book was used to write this paper.

 

Web Resources

 

Please view attached Appendix www.crito.uci.edu/pubs/20... regarding the reasons one study concludes that hold China back in ecommerce.

 

[1] Waiting until the time is right, one is good at something, or has collected all the facts, without making any attempts isn’t effective. I had to begin someplace even if it is incomplete so I started with the World Wide Web. “If something is worth doing well, at all, it is also worth doing poorly.” I am not sure where that quote came from but I read it in an article where someone presented their reasoning.

 

[2] You never know where something will come from in free rights actions or what it will mean later. For example the person at the center of the Alaskan “Bong hits For Jesus” case, Frederick Morse, now teaches English to Chinese students in China. As an adult it appears he has his head on straight in his wish to help others communicate, more so that those he fought in court.

 

From the CNN news article, published June 26, 2007, “In dissent, Justice John Paul Stevens said, "This case began with a silly nonsensical banner, (and) ends with the court inventing out of whole cloth a special First Amendment rule permitting the censorship of any student speech that mentions drugs, so long as someone could perceive that speech to contain a latent pro-drug message." He was backed by Justices David Souter and Ruth Bader Ginsburg.” www.cnn.com/2007/LAW/06/2... downloaded March 13, 2008

 

[3] Pentagon attack last June stole an "amazing amount" of data” Joel Hruska Published: March 06, 2008 - 07:13PM CT Pentagon attack last June stole an "amazing amount" of data... from “blueton tips us to a brief story about recent revelations from the Pentagon which indicate that the attack on their computer network in June 2007 was more serious than they originally claimed. A DoD official recently remarked that the hackers were able to obtain an "amazing amount" of data.

 

We previously discussed rumors that the Chinese People's Liberation Army was behind the attack. “CNN has an article about Chinese hackers who claim to have successfully stolen information from the Pentagon.” Quoting Ars Technica: "The intrusion was first detected during an IT restructuring that was underway at the time. By the time it was detected, malicious code had been in the system for at least two months, and was propagating via a known Windows exploit. The bug spread itself by e-mailing malicious payloads from one system on the network to another." Via email from Jeremy Hansen on Slashdot: News for nerds, stuff that matters

 

[4] “Chinese backdoors "hidden in router firmware" Matthew Sparkes, News [Security], Tuesday 4th March 2008 3:17PM, Tuesday 4th March 2008 Chinese backdoors "hidden in router firmware"... The UK's communication networks could be at risk from Chinese backdoors hidden in firmware, according to a security company.

 

SecureTest believes spyware could be easily built into Asian-manufactured devices such as switches and routers, providing a simple backdoor for companies or governments in the Far East to listen in on communications.

 

"Organisations should change their security policies and procedures immediately," says Ken Munro, managing director of SecureTest. "This is a very real loophole that needs closing. The government needs to act fast."

 

"Would they buy a missile from China, then deploy it untested into a Western missile silo and expect it to function when directed at the Far East? That's essentially what they're doing by installing network infrastructure produced in the Far East, such as switches and routers, untested into government and corporate networks."

 

Late last year MI5 sent a letter to 300 UK companies warning of the threat from Chinese hackers attempting to steal sensitive data. Reports at the time suggested that both Rolls Royce and Royal Dutch Shell had been subjected to "sustained spying assaults".

 

The issue has been debated by government for some time. In 2001, the then foreign secretary Robin Cook, warned that international computer espionage could pose a bigger threat to the UK than terrorism.

 

[5] Chip Piracy Might End With Public Key Cryptography. A Web Exclusive from Windows IT Pro Mark Joseph Edwards, Security News, InstantDoc #98491, Windows IT Pro “A group of researchers from two universities have proposed a way to prevent chip piracy. The technique uses public key cryptography to lock down circuitry.

 

In a whitepaper published this month, Jarrod A. Roy and Igor L. Markov (of the University of Michigan) and Farinaz Koushanfar (of Rice University) outline the problem and details of how their proposed technology will help solve it.

 

Chip designers sometimes outsource manufacturing and that opens the door to piracy, should someone copy the design plans. The copied plans are then used to created 'clone' chips for a wide range of devices, including computers, MP3 players, and more.

 

"Pirated chips are sometimes being sold for pennies, but they are exactly the same as normal chips," said Igor Markov, associate professor in the Department of Electrical Engineering and Computer Science at the University of Michigan. "They were designed in the United States and usually manufactured overseas, where intellectual property law is more lax. Someone copies the blueprints or manufactures the chips without authorization."

 

The groups propose the use of public key cryptography, which would be embedded into circuitry designs. Each chip would produce its own random identification number, which would be generated during an activation phase. Chips would not function until activated, and activation would take place in a manner somewhat similar to that seen with many applications in use today. Via email from Jeremy Hansen.Original source - EPIC: Ending Piracy of Integrated Circuits Jarrod A. Roy, Farinaz Koushanfar‡ and Igor L. Markov, The University of Michigan, Department of EECS, 2260 Hayward Ave., Ann Arbor, MI 48109-2121, Rice University, ECE and CS Departments, 6100 South Main, Houston, TX 77005 www.eecs.umich.edu/~imark... March 06, 2008

 

[6] Chapter 5 “Why do Drug Dealers Still Live with Their Moms?” p. 89 “So how did the gang work? An awful lot like most American businesses, actually, though perhaps none more so than McDonald’s. In fact, if you were to hold a McDonald’s organizational chart and a Black Disciples org chart side by side, you could hardly tell the difference.”

 

[7] Mike Haynes, Theses on the Balkan War, “Capitalism is inherently a competitively expansionist and therefore conflict ridden system” Issue 83 of INTERNATIONAL SOCIALISM JOURNAL Published Summer 1999 Copyright © International Socialism, pubs.socialistreviewindex... accessed March 3, 2008.

 

[8] Readings p.7 “When I say that globalization has replaced the Cold War as the defining international system, what exactly do I mean?” p. 8 “The cold war system was symbolized by a single word, the wall … “You can’t handle the truth,” Says Nicholson. “Son we live in a world that has walls…”p. 8 “This Globalization system is also characterized by a single word: the Web. … we have gone from a system built around divisions and walls to a system built around integration and webs.”

 

“What is information arbitrage? Arbitrage is a market term. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

[9] Shared by miles on Feb 13, 2006 3:39 pm that I located through a Gmail...

 

[10] “As it gears up to host the 2008 Olympic Games Beijing has been awarded an unwelcome new accolade: the air pollution capital of the world.Satellite data has revealed that the city is one of the worst environmental victims of China's spectacular economic growth, which has brought with it air pollution levels that are blamed for more than 400,000 premature deaths a year” Satellite data reveals Beijing as air pollution capital of world

 

[11] “What we call ‘war’ is not all bad,” according to Virginia Johnson a former governmental planning consultant, who reminded me, “Without conflict there is no life. You don’t want 'perfect peace' there is no movement. The human standard is actually what we broadly call 'war'; because without conflict, change, motion, growth we would learn nothing, we would have nothing, we would be dead.” Personal conversation, March 14, 2008, Seattle, Washington

 

[12] Readings Larry Page, Google Co-Founder quoted by Thomas Friedman, p. 179, entire paragraph. “The more global Google’s user base becomes, the more powerful a flattener it becomes…”

 

[13] Ranganathan, faceted classification, Five Laws of Library Science, S. R. Ranganathan - Wikipedia, www.boxesandarrows.com/vi... Personality, Matter, Energy, Space, and Time. (PMEST)

 

Personality—what the object is primarily “about.” This is considered the “main facet.”

 

Matter—the material of the object

 

Energy—the processes or activities that take place in relation to the object

 

Space—where the object happens or exists

 

Time—when the object occurs

 

[14] www.crito.uci.edu/pubs/20...

 

[15] I learned about supply chain management mainly from the supply chain wizard Marc Lamonica, Regional Chief Financial Officer at Sutter Connect, Sutter Shared Services, and our mutual friend Web entrepreneur and ecommerce product engineer Adam Kalsey, and Sacramento State University teacher Stuart Williams, of Blitzkeigsoftware.net, <a href="http://blitzkriegsoftware.net/St..." blitzkriegsoftware.net/St...

 

[16] Introduction to Computer software classes in the 1970s consisted of FORTRAN cash register receipt programming, which is by implication is what ecommerce actually does.

 

[17] Freakonomics is a must read book of comedy and connections.

 

[18] Golden Arches, definition on Wikipedia, the free encyclopedia Golden Arches - Wikipedia, accessed March 13, 2008

 

[19] Readings “The World Is Flat 3.0: A Brief History of the Twenty-first Century” by Thomas Friedman, p. 421

 

[20] Readings p. 19 “What is information arbitrage? Arbitrage is a market term. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

[21] “Conservation groups say acid rain falls on a third of China's territory and 70% of rivers and lakes are so full of toxins they can no longer be used for drinking water.” Satellite data reveals Beijing as air pollution capital of world, Jonathan Watts in Beijing The Guardian, Monday October 31 2005, Satellite data reveals Beijing as air pollution capital of world

 

[22] “…After watching Jobs unveil the iPhone, Alan Kay, a personal computer pioneer who has worked with him, put it this way who has worked with him, put it this way: "Steve understands desire." ... Fortune CNN Magazine March 5, 2008, http://money.cnn.com/2008/03/02/......

 

accessed March 5, 2008

 

[23] Mac Margolis, “How Brazil Reversed the Curse, Latin America used to suffer the deepest gap between rich and poor. Now it is the only region narrowing the divide. Upwardly Mobile: Middle-class Brazilians” How Brazil Reversed the Curse NEWSWEEK Nov 12, 2007 Issue

 

[24] Mike Haynes, Theses on the Balkan War, “Capitalism is inherently a competitively expansionist and therefore conflict ridden system” Issue 83 of INTERNATIONAL SOCIALISM JOURNAL Published Summer 1999 Copyright © International Socialism, pubs.socialistreviewindex... accessed March 3, 2008. “The optimism that the end of the Cold War might lead to a new world order has been shown to be false. The hope that it would release a peace dividend that would enable a new generosity in international relations has been belied by experience, as some of us sadly predicted it would.3 Though the arms burden has declined, there has been no outpouring of aid to Eastern Europe, no new 'Marshall Plan'. The result has been that the burden of change has fallen on the broad masses of the population, wrecking lives across the old Soviet bloc in general and in one of its poorest components in south eastern Europe in particular. According to the World Bank, the number of people living in poverty (defined as having less than $4 a day) in the former Soviet bloc has risen from 14 million in 1990 to 147 million in 1998.4 Worse still, the advanced countries have continued to reduce further the miserly sums they devote to aid to the even poorer areas of the world. The OECD countries are rhetorically committed to an aid target of 0.7 percent of their output. In 1990 they gave 0.35 percent, and by 1997 the figure had fallen to 0.22 percent, with the United States under this heading giving 0.09 percent of its output, a figure in startling contrast to the expenditure devoted to destruction.”5

 

[25] Readings p. 46 “There is a tale, “The ring of Gygnes,” … could any man resist the temptation of evil if he knew his acts could not be witnessed?”

 

[26] Readings p. 58 “Attendance at Klan meetings began to fall … of all the ideas Kennedy thought up to fight bigotry, this campaign was clearly the cleverest. … He turned the Klan’s secrecy against itself by making its private information public: he converted heretofore precious knowledge into ammunition for mockery.”

 

Some of the research in this paper on piracy was provided by Jeremy Hansen of Seattle, Washington, USA. Mr. Hansen's email regarding economics served to inform me on this topic. Teacher: Glenn Von Tersch.

Description: During the Second World War Ian Fleming served as a Commander in the Royal Navy as assistant to the Director of Naval Intelligence, Rear Admiral John Godfrey. This document outlines Fleming's plan to capture German Engima codebooks which he dubbed 'Operation Ruthless'.

 

Fleming's name for the operation and his description of the man needed as a "tough batchelor" can't help but recall his later creation of James Bond. The document, prepared after the war as a summary of the activities of Naval Intelligence, suggests Fleming volunteered himself for the mission.

 

Date: c.1946

 

Our Catalogue Reference: ADM 223/463 p38

 

This image is from the collections of The National Archives. Feel free to share it within the spirit of the Commons.

 

For high quality reproductions of any item from our collection please contact our image library.

2011, Mar. 25(Fri)@南海藝廊

入場時間︱19:20入場 19:30準時開始

入場費︱NT$.50

  

【 柔軟次攻擊 】

演出者︱ Sounds like O.range(聽起來好橘)

看起來很刺鼻

吃起來很低沈

摸起來很過飽和

聞起來很痛

 

聽起來好橘,創造視覺和聽覺的連串

e-Mail︱o.range.sounds.2O11@gmail.com

Website|sounds-like-orange.com/

 

表演簡介︱影響

人們會因為"一樣"而有歸屬感,漸漸遺忘"不一樣"的必要,為了安全,多數決將100個人變成1個人,用同一種面貌,做了同一個決定。

但100個人就該有100種樣子,就該存在一些不和諧的畫面與聲音。

 

演出者︱葉立傅

傅立葉轉換是一種線性的積分轉換。在物理學、聲學、光學、結構動力學、數論、組合數學、機率論、統計學、訊號處理、密碼學、海洋學、通訊等領域都有著廣泛的應用。例如在訊號處理中,傅立葉轉換的典型用途是將訊號分解成幅值分量和頻率分量。

 

但是你以為把狗倒過來就會變神嗎?

 

表演簡介︱

     ∞

f(x) = ∫  (A(u)*cos(ux) + B(u)*sin(ux)) du

    -∞

Lacking Sound Festival Listen 45

2011, Mar. 25(Fri)@Nan-Hai Gallery

Entrance Time︱19:20 Starts Punctually At 19:30

Entrance Fee︱NT$.50

 

【 Sub-Attack but Sweet 】

Artist︱ Sounds like O.range

It looks pungent

Tastes deep as bass

Touches more than saturated

Smells pain

 

It sounds orange, creating a thread between sight and hearing.

 

e-Mail︱o.range.sounds.2O11@gmail.com

Website|soundslikeOrange.com

 

Performance Introduction︱ Effect

Many tend to acquire belongingness by being all alike, forgetting the necessity of being different. To feel secure, 100 people have become a single unity, disguised in the same appearance, making the same decision.

 

100 people should have 100 faces, conflict and discord shall exist.

  

Artist︱ Reiruof

Fourier transform is a mathematical operation that transforms one complex-valued function of a real variable into another. It is largely applied to physics, acoustics, optics, structural mechanics, number theory, combinatorics, probability theory, statistics, signal processing, cryptography, oceanography, communication…etc. For example, on signal processing the Fourier transform decomposes signal into amplitude and frequency.

 

Well, you think dog in reverse makes it God?

    

Performance Introduction︱

     ∞

f(x) = ∫  (A(u)*cos(ux) + B(u)*sin(ux)) du

    -∞

Curator︱YAO, Chung-Han

Graphic Design︱Nat NIU

Project Manager︱Liang CHEN

 

指導單位︱台北市文化局 

主辦單位︱失聲祭團隊 lsf-taiwan.blogspot.com/

協辦單位︱國立臺北教育大學 南海藝廊 blog.roodo.com/nanhai/

Supervised by︱ Department of Cultural Affairs Taipei City Government

Organized by︱Lacking Sound Festival Team

In Cooperation with︱National Taipei University of Education Nan-Hai Gallery

 

Calcite, Paint

Thebes, Valley of the Kings, Tomb of Tutankhamun (KV 62).

New Kingdom, 18th Dynasty, Reign of Tutankhamun (1355-1346 BCE).

 

Tutankhamun's tomb held more than eighty vessels of oils and unguents, but thieves stole most of the contents. This container has a central frieze in which the royal throne name appears in a cryptographic writing, ensuring the survival of the king's name.

 

King Tut exhibit, Seattle Washington, 2012.

Joon Ian Wong, Founder, Cryptographic Media, Alex Zhang, Mayor, Friends with Benefits and Meltem Demirors, CSO, CoinShares

 

(Morgan Brown/Shutterstock/CoinDesk)

1 2 4 6 7 ••• 79 80