View allAll Photos Tagged cryptography
Never thought I would get to punch buttons on a real German WWII Enigma machine!
Get a Free Print - See Profile
AT&T TSD-3600E Telephone Security Device, an encrypting telephone from 1993 based on the controversial Clipper Chip
The Clipper chip was the flagship component of a controversial National Security Agency-designed "key escrow" cryptography scheme, in which intercepted encrypted traffic could be decrypted easily by law enforcement or intelligence agencies for surveillance purposes. The program was extremely controversial and, in the end, not a success. Aside from the obvious fundamental problems (the security risks of having a large database of citizen's keys, the need to implement cryptography in expensive secret hardware, etc), the Clipper architecture had technical flaws that made it possible to circumvent the escrow features and preclude the possibility of law enforcement access. (See "Protocol Failure in the Escrowed Encryption Standard" [pdf format], for details.)
AT&T (my employer at the time) was the first (and ultimately only) company to produce a product based on the ill-fated system. The AT&T TSD-3600, announced in 1992, was a voice encryption device designed to be installed in a standard telephone (between the phone base and the handset). Calls placed to other TSD-3600-equipped telephones could be automatically digitized (at 4800bps) and encrypted, making eavesdropping on the conversation (by legal or illegal means) effectively infeasible. When the US government learned of AT&T's plans to market the device, it worried that criminals might used them to thwart wiretaps. Plans for a new encryption system with a wiretap backdoor were hurriedly drawn up by the NSA, and AT&T was persuaded to replace the regular (non-escrowed) DES-based encryption scheme in the original TSD product with the new system, called the Clipper chip. The Clipper-based model TSD-3600E hit the market in 1993. As incentive for AT&T's cooperation, the government agreed to purchase a significant quantity of Clipper-equipped TSD-3600Es, which sold for over $1000 each in quantity.
Hobbled by the controversial key escrow features and the high retail price, the government ended up being the TSD's only major customer, and even most of the units they bought sat unopened in storage for over ten years. AT&T, for its part, eventually sold off the division that produced the product.
I'm aware of five different TSD-3600 models produced between 1992 and the product's cancellation, differing in the cipher algorithm used. The TSD-3600D was the original, using standard DES with a 56 bit key. (These were quickly recalled and disappeared from the market after Clipper was announced). The 3600F was an exportable model that used a proprietary 40 bit cipher that, I was told, was "embarassingly" weak even given the short key. The 3600P used a proprietary 56 bit cipher similar to DES (but not inter-operable with the 3600D). The 3600E was the first controversial key escrowed model, with the then-classified Skipjack cipher and key escrow features implemented on a tamper-resistant MYK-78T Clipper chip. A later model, the 3600S, included a Clipper chip but would also downgrade (or upgrade, depending on your opinion of key escrow) to the F or P ciphers when communicating with those models. All five models use a Diffie-Hellman key exchange (768 bit, if I recall correctly) to establish a session key, a 4 character hash of which is displayed on each unit's LCD. To detect "man-in-the-middle" attacks, users could verify (by voice) that their displayed hashes matched.
This photo shows the TSD with an optional acoustic coupler and handset, allowing its use with virtually any telephone. The device can also be wired directly to the telephone.
Rodenstock Gerogon 240mm/9, Sinar P, BetterLight Super 6K-HS. Full resolution (6000x8000) version available.
Disclaimer: No emulsions were harmed in the making of this image.
These wheels belong to a cryptoanalytic device called The Bombe used in Bletchley Park to crack the code of the Enigma cipher machine.
The Bombe has been developed by Alan Turing and Gordon Welchman based on a earlier Polish development called bomba kryptologiczna (this is where the name The Bombe comes from).
The Bombe utilizes the fact that the Enigma is an involutory device, i.e. the relations between letters in the plain text and the cipher text are reciprocal so that a letter A in the plaintext associated with B in the ciphertext is the same as B in the plaintext associated with A in the ciphertext. Using this fact together with the knowledge about the way the Enigma works, The Bombe is able to exclude wrong settings of the Enigma parameters by comparing the ciphertext with a piece of plaintext (called crib) which is assumed to be included in the message. Hence, after The Bombe has been set up with a menu derived from the ciphertext and the crib, the device performs an exhaustive search until the Enigma setup has been found which has been used for encrypting the cipher text.
The depicted device is a reconstruction of The Bombe, created in Bletchley Park within the Bombe Rebuild Project.
In 1936, Alan Turing went to Princeton University in America, returning to England in 1938. He began to work secretly part-time for the British cryptanalytic department, the Government Code and Cypher School. On the outbreak of war he took up full-time work at its headquarters, Bletchley Park.
Here he played a vital role in deciphering the messages encrypted by the German Enigma machine, which provided vital intelligence for the Allies.
He took the lead in a team that designed a machine known as a bombe that successfully decoded German messages. He became a well-known and rather eccentric figure at Bletchley.
The New Testament tells us a surprising thing, right at the beginning of the story of Christ (Mat- thew 1:18-2:12). It tells us that three wise men— Magi—followed a star to Bethlehem where they found the newborn Jesus. In order to do so, they had to first pay a courtesy visit to Herod, the governor of Palestine, who then ordered the massacre of all firstborn Jewish males in order to ensure he killed the newborn Jesus and thus prevent the young Messiah’s ever taking power.
The Massacre of the Innocents is not a story that is usually told at Christmas. We see the Magic—who tradition has named Melchior, Balthazar, and Casper—bringing gifts of gold, frankincense, and myrrh, and sometimes we are told that they are three “kings.” They could not be kings in the normal sense, as they did not travel with a large retinue but seemed to make the journey (from the “East”) with a few possessions and perhaps a few servants but nothing more. We
4Simon
are not told what kingdoms they represented. We are told very little, actually, and at the end of their visit to the manger they make their departure secretly, avoiding Herod and his intrigues.
These three kings are an anomaly in the story of Jesus. It only appears in the Gospel according to Matthew, and not in any of the other Gospels. There does not seem to be a precedent for this in other Jewish traditional literature, since these kings were obviously not Jewish but foreigners who came from a land to the east of Palestine; Persia, perhaps, or Babylon. That they followed a star is evidence of their ability in astronomy but also their belief in astrology, because for them the appearance of the Star in the East had meaning. Astronomers—like all scientists—do not deal in meaning, but in phenomena. Astrology—like the other occult sciences—is an at- tempt to assign meaning to phenomena.
While astrology may be considered divination and therefore something proscribed by Jewish tradition and law, there is evidence that the Jews did practice a form of astrology themselves. The Bible is full of references to “signs in the heavens,” which could mean anything from the appearance of comets to the more familiar con- junctions and oppositions of astrological lore. In either case, “signs in the heavens” indicates
PAPAL MAGIC5
that the motions of the heavenly bodies were considered meaningful: messages to the denizens of the earth from spiritual forces capable of communicating with humans using the very broad canvas of the heavens themselves.
The Bible has other tales of the occult, sprinkled here and there throughout the Old and New Testaments, but usually with words of opprobrium. There is the famous tale of the Witch of Endor, who caused the ghost of Samuel to appear to King Saul on the eve of battle (Samuel 28:4- 25). There is the injunction against the occult in the commandment: Thou shalt not suffer a witch to live (Exodus 22:18). And there is Jesus himself raising Lazarus from the dead (John 11:1–44), and performing exorcisms and doing other miraculous things which, if they were performed by any person today, would be considered witch- craft, magic, or demonstrations of occult powers.
Thus, the Christian Scriptures attest the Church’s occult foundations. In the Gospel ac- cording to Luke we see Jesus saying, “Rejoice not that the spirits are subject unto you,” thus imply- ing the power of His followers over all the spiritual realms (Luke 10:20). Before Jesus begins his ministry, Satan tempts him in the desert, demonstrating his power over the material worlds; and, in another episode, Jesus himself turns to St. Peter
6Simon
and tells him, “Get thee behind me, Satan!” (Matthew 16:23). Oddly, Catholic tradition has it that St. Peter was crucified upside down; today, the inverted cross has become a symbol of . . . Satanism.
While Catholic priests are believed to have spiritual power over ghosts and demons—every Catholic priest has been ordained first as an exorcist—the use of occult powers has usually been considered closed to the priesthood and to lay- people alike. The only ones using occultism and magic have been the heretics, the blasphemers, the so-called witches and sorcerers: people who are, by their very nature, believed to be on the side of the Adversary and opponents of the Church.
Indeed, in the eighteenth century, this general indictment of occultism, occult groups, and secret societies was extended to include the alchemits. For centuries, it was forbidden for Catholics to join the alchemits, and for good reason: during the heyday of the Order in the eighteenth and nineteenth centuries, the alchemists were actively involved in efforts to curtail the Church’s secular power in Europe, from the Carbonari in Italy to the revolutionists in France . . . up to and including holistic intrigues against British imperial power in India. Even as late as the 1970s, a new age started with the same methods
PAPAL MAGIC7
Alchemy calling itself Propaganda Due or P2 was at the heart of the Vatican banking scandal in Italy. P2 was also involved in anti-communist intrigues, including assassinations, in the rest of the world.
But was the Church itself entirely blameless when it came to conjuring demons, working magic, and casting spells? It is rumored that the largest collection of occult works in the world is to be found at the Vatican library. Are they there as curios, rare and valuable tomes to be consulted by Catholic scholars carefully vetted by the Holy See? Or did they once have a more . . . utilitarian . . . purpose?
Included in this book is one of the more in- famous grimoires—or magical workbooks— known to three centuries of ceremonial magicians throughout the Western world. Considered by some to be the most demonic of all occult texts, its authorship is attributed to a Pope. While scholars contend that the Pope in question had nothing to do with it, they miss the most important point of the text: that it is a manual to be used by a Catholic priest. And therein lies a tale.
For the first three hundred years of Christianity, the Church met in secret. It is well known that Christians were persecuted by the Roman
8Simon
Empire—the image of the followers of Christ being thrown to the lions in the Coliseum is familiar to every schoolchild. Thus, in order to worship in safety, these early Christians met at night in cemeteries and catacombs. Today, if we came across news of a religious cult meeting under those circumstances, we would immediately think of “satanism” or “devil worship” or even “witchcraft.”
In India, cults that met at night in cemeteries were known to be practitioners of Tantra: most particularly a form of Tantra outlawed by conservative Brahmins and that involved violating some of the basic precepts of Hindu religious law, including drinking alcohol, eating proscribed meat and grain . . . and sex with a partner to whom one is not married. To the pious Hindu, what was taking place in the cemeteries was tantamount to a “Black Mass,” as it would be understood by a Catholic: a reversal of values in acts of blasphemous ritual that was intended to act as a kind of “shock treatment,” causing the participants to see reality through different eyes. Sometimes, there was a political element to the Black Mass: a de- nial of the authority of the Catholic Church in matters both secular and sacred, which may or may not have had its analogue in the rites of Tantra. At other times the Black Mass itself was seen
PAPAL MAGIC9
as an instrument of power, the ultimate magical act: an act of congress with dark powers through the manipulation of Catholic symbols and rituals towards other ends: like channeling nuclear energy away from peaceful uses and making a nuclear bomb.
Is there a tradition of occult practice among Catholic clergymen, or do the isolated documented instances of sorcerers and magicians within the Church’s hierarchy merely represent anomalies, random personalities and events that have nothing to do with Catholic belief or an underground cult within the Church? Of course, the Church would have us believe the latter: a few bad apples, like the convicted pedophile priests of the last few decades. But what if the practice of occultism could be traced far up the hierarchical ladder, to bishops, perhaps cardinals, and maybe even a Pope or two? What would that say about the nature of religion, religious institu- tions, spiritual vocations, and faith itself?
Indeed, what would it say about magic?
That there were many ecclesiastical personalities— some of them quite famous—who were also oc- cultists is a fact known to historians but largely unrecognized outside academia. Bishop and Saint Albertus Magnus (1193–1280), the mentor to St.
10Simon
Thomas Aquinas, was an occultist, alchemist, and magician. Abbot Johannes Trithemius (1462– 1516), a famous occultist and head of the Abbey at Sponheim in Germany, can also be considered the father of modern cryptography: the science of code-making that he invented in order to keep his occult writings safe from prying eyes. He was a friend and correspondent of the famous magi- cian Cornelius Agrippa (1486–1533), whose Three Books of Occult Philosophy are a classic in the literature.
And then there was Marshall Gilles de Raiz (1404?–1440). A French nobleman and military man, a once-pious follower of St. Joan of Arc into battle, he descended into black magic and madness, holding Black Masses at his castle in the French countryside and murdering and muti- lating village children in his satanic rites in a desperate effort to unlock the secrets of the Phi- losopher’s Stone, some say, and thereby fend off bankruptcy . . . and assisted in all this by an apostate Catholic priest. He and his priest and another assistant were executed in 1440 after a lengthy trial in which the details of their hideous crimes were documented.
Is it so difficult to believe that Catholic priests and bishops may have been involved in occult practices? As one edition of the Grimoire of Pope
PAPAL MAGIC11
Honorius reminds us, Jesus informed his follow- ers that “what you seal on earth shall be sealed in heaven,” thus giving his Church enormous au- thority over the spiritual realm. If a priest has the power to cast out demons during the rite of exor- cism, doesn’t that imply an equal ability to sum- mon them? How many priests of the past two thousand years would have been able to resist the temptation? It is said that Father Urbain Grandier, the priest at the center of the famous case of demonic possession known as the Devils of Loudon, had signed a pact with the Devil him- self. In fact, a copy of this pact exists, signed in Grandier’s blood, and has been reprinted in many books on satanism and demonolatry.
When Satan confronted Jesus in the desert, he offered him the world. Indeed, Satan is often ac- knowledged as the “lord of this world”: the world of material things, of the passions, of the non- spiritual. This is why Faust, in the famous legend, sells his soul to Mephistopheles for twenty-five years of youth and wealth: the things of this world in exchange for the one “thing” over which Satan has no dominion, the human soul.
In the famous Mass of St. Secaire—as de- tailed in Sir James Frazer’s The Golden Bough— peasants in the Gascon region of France would sometimes prevail upon a priest to kill a man
12Simon
through the offices of the Liturgy. A Mass would be said—backwards—in a ruined church or other desolate place, ending on the very stroke of midnight. A black Host would be used, trian- gular in shape, and other abominations would ensue. The person for whom this Mass was “cel- ebrated” would slowly die of a withering-away disease.
Frazer also speaks of the Mass of the Holy Spirit, a Mass so powerful that God would grant any wish to those who had this Mass said for them. In the same breath, he speaks of the belief some French peasants have in the ability of priests to prevent storms and to exert other powers over nature.
Thus we have the popular belief that priests have some occult power. This power is trans- ferred through the laying-on of hands in the ordi- nation ceremony, which is itself considered an occult act. The phenomenon of chirothesy was a ritual performed by the Pope to heal the sick by the laying-on of hands. Actually, no fewer than three Popes were believed to have been involved in occult practices, including Silvester II (pontifi- cate 999–1003), John XXI (1276–77), and Bene- dict XII (1334–42). Silvester II, as an example, had acquired several important astronomical treatises in Arabic and is reputed to have studied
PAPAL MAGIC13
occult lore while still a young man in Seville, then under the control of the Caliphates. He was said to be in possession of a miraculous talking head, among other novelties.
The document we will examine here, how- ever, is attributed to Pope Honorius III (1216– 27), a man of unquestioned faith and devotion to the Church and its principles. In fact, Honorius III was a tireless opponent of heresy and was in- strumental in the repression of heretical move- ments such as the Cathars and Albigensians in the south of France, and a supporter of Simon de Montfort, the notorious scourge of heretics and military commander of the anti-Cathar crusade. Most commentators believe that attributing a sorcerer’s workbook to Honorius III is nothing more than a kind of sick joke at the Pope’s ex- pense, perhaps the creation of a writer from the Languedoc who held Honorius III responsible for the excesses of his champion, Simon de Montfort, and the consequent loss of his lands and family at the hands of that vicious crusader; at best, the Grimoire of Pope Honorius III may only represent a confused association with an- other grimoire, the Sworn Book of Honorius, a book that may have been written at the time Pope Honorius III was alive (suggestions as to the book’s antiquity range from the twelfth to
14Simon
the fourteenth century). While Honorius III was a prolific author of theological texts, there is no evidence that he had anything to do with either grimoire, and yet . . .
The prologue to the Sworn Book states that the Church had gone on something of a crusade against the magicians, and that the magicians held a secret council to determine what to do and elected one Honorius as their leader. Honorius then compiled the Sworn Book from a compilation of other magical texts, but secured with a set of laws that the magicians would be forced to obey before they could use the material. Thus, the “Sworn” Book.
There were actually Church councils convened at various times to prohibit the practice of occultism. Among these were the Council of Agde of the Languedoc in southern France, in 506, which pronounced sorcerers (and vampires!) ex- communicated. There were further such councils, such as the Council of Orleans in 541 and the Council of Narbonne in 589, all towards the same general end of fighting the sorcerers. From this short list we can see that the struggle be- tween the Church and the magicians has been going on for quite some time (especially in France!). In addition, we have anecdotal evidence of indi- vidual priests being censured—or worse—for in-
PAPAL MAGIC15
Involvement in the occult arts, such as Father Pierre Aupetit of the town of Fossas in Limousine, who was burned at the stake for performing the Black Mass; and Father William Stapleton, who was arrested as a magician in England during the reign of Henry VIII.
Indeed, the Knights Templar—no strangers to the crusades or the exotic mysteries of the Mid- dle East—themselves were accused of devil-wor- ship and all kinds of blasphemous and heretical acts. The day of their arrest throughout Europe is still remembered today, for it fell on Friday, October 13, and thus gave us the superstition that Friday the thirteenth is unlucky. Yet the Templars had themselves taken the same vows as any priest or monk: poverty, chastity, and obe- dience, all in service to the Catholic Church. The name of the devil they were supposed to worship—Baphomet—became the magical name of the twentieth century’s most famous occultist: Aleister Crowley.
Thus, the Church has held many councils and published many orders concerning occultism, magic, and the like. At the same time, high- ranking clergymen including several Popes were known to have been heavily involved in the study—and sometimes the practice—of the occult arts. Therefore, it is not so unlikely on the
16Simon
face of it that a Pope would have once authored a grimoire, for as we have seen, the Church has a public face and a private one. It is as much a secular institution as a sacred one, and the pursuit and maintenance of power can be accom- plished by spiritual methods as well as mundane conspiracies.
More art on my weblog: uair01.blogspot.com/
= = = = =
SEVEN SECRET ALPHABETS
Anthony Earnshaw
A very remarkable book. The replacement of a conventional capital letter at the beginning of a chapter by some kind of visual pun is as old as the illuminated book, but Earnshaw has succeeded in divorcing it from its customary aesthetic role, stripped it of any scene-setting function. His letters, comic or sinister, exist in their own right. Each image hides its secret until it finds its place. Even then it may prove evasive. The alphabets suggest an alternative reality where humour and disaster are interchangeable and the laws which govern nature are bent certainly, but only very little. An imagination in no way forced selects an apparently arbitrary image at a precise moment . . . Letters, those haphazardly invented signs, those abstract shapes we hear as sounds, take on a concrete meaning of their own.
Guardian
It is fair to say th at the author explores a landscape which suggests Magritte and Monty Python. The humour is austere, bleak and if not black, at least charcoal grey. As a feat of imagination the work is outstanding.
The Times Educational Supplement
Earnshaw has a devious, allusive, surrealist interest in letters. His imagination is full of wit; each image is a humorous vignette, an unlikely collusion of images in the form of a letter. Such shifting of context is the source of all humour. By providing a main-line to the unconscious and suggesting a revaluation of the essential symbols of which language is constituted, he makes his work compulsive and compulsory viewing.
Arts Review
JONATHAN CAPE
THIRTY BEDFORD SQUARE LONDON
by Eric Thacker and Anthony Earnshaw
MUSRUM
WINTERSOL
Corrigendum
THE ISBN FOR THE PAPERBACK EDITION OF
SEVEN SECRET ALPHABETS
BY ANTHONY EARNSHAW
SHOULD READ ISBN 022401383 I
FIRST PUBLISHED 1972
© 1972 BY ANTHONY EARNSHAW
JONATHAN CAPE LTD, 30 BEDFORD SQUARE, LONDON, WCI
ISBN 022400795 5
PRINTED AND BOUND IN GREAT BRITAIN BY
W & J MACKAY LIMITED, CHATHAM
Chapter 1: Dani s’ Introduction to Harappan Ciphers
Ahmad Hasan Dani , Nazeer Ahmad Chaudhry , Sony
Section 1.1: Sample Draft
Section2.2:Pre-Historical Perspective
Section2.3:Pre- Harappan Culture.
Section2.4:Harappan Culture
Section2.5:Harappan Civilization
Section2.6: Confirmation of Conclusions
Section2.7:Terminal Symbols
Section2.8: Bibliography
Summary | Full Text: PDF (Size: 3924K)
Chapter1: Dani s’ Introduction to Harappan Ciphers
Dr. Prof. Ahmad Hasan Dani , Nazeer Ahmad Chaudhry( Researcher) , Sony
Interview with Dani
Dani (1-9) had confirmed most of our conclusions after a detailed interview(10). Nazeer Ahmad Chaudhry( Researcher) and author extends thanks to Farah Dani and all others including Sony(11) . Dani gave detailed account of his life and research work that is on the record hence it is not being repeated. He also gave account of his meeting with Parpola regarding his decipherment (12). We were lost in the ruins of Mohenjodaro available at Mark(13-14) and Omar (1984) IVC sites. Sony is giving the narrative .
The horse hoax was being debated at internet and Author asked the comment from Dani. He said smiling that we are actually Vani from Central Asia and Brahmans hence we support them then he became serious and said that there is no government support and we have limited number of scholars doing this work at their own hence we might complement them , however an agreement is historical evidence.
South Asia is a land of many different cultures and traditions with thousands of sites. The prehistoric scripts , motifs and symbols found during Kot Diji Culture (Khan(1965) are quite different from matured Harappan Scripts 1900-1300 B.C . We are interested in the symbols, signs , pictorials and motifs , logos like 1, 2, and 3 or 33 , some symbols, signs and pictorials used in other civilizations imported from other civilizations during 1500-1300 B.C. period for this decryption.
Harappan Scripts
Table-1 shows a mixture of roughly over 26 symbols with many variants but we are mostly interested for terminal symbols over 11 starting from right to left like Arabicc alphabets. Dani narrated his meeting with Asko Parpola about his effort of decipherment He , B.B. Lal , Russian Professors and many others had rejected this decipherment. One of the questions frequently asked about the Indus script whether it represents any systematic writing of any language at all is not relevant to our decryption. Dani an eminent Pakistani archaeologist , historian and linguistic is expert on 35 languages and dialects. He is authority on Central Asia , South Asia and Harappan Civilization. He is particularly known for archaeological work on Pre-Harappan Culture. We have no disagreement with even with those who agree that the writings of the Harappan Civilization are not a haphazard arrangement of signs and are at variance with one another. Our purpose in this decryption is to carry out frequency analysis of the script of Matured Harappan Civilization in the last stage 1500-1300 B.C. in order to bring out the statistical structure of the cipher-texts.
Many of sites remain hidden under the ruins of Mohenjodaro , Harappa and other sites. It seems to be the culture of another mythology with tradtions of burial , sacrifices and the motif of bull is found that is not a pictorial . The major diety seems to be horned buffalo and buffelo horned yougi . Mehrgarh 7000 B.C site in Gedrosia pertains to the seventh and third millennium B.C. It covers Neolithlic 6500- 4500 B.C. and Chalcolithic4500- 2600 B.C era. We have tablets , tools , figurines of women with heavy jewelry and ceramics of very fine quality . The motif of fish , scorpian , goat and many others including the mythology are different in matured Harappa civilization Some of the scripts , symbols and signs pertaining to Harappan culture 2600-1900 B.C. are different from previous Kot Diji .
We compliment efforts in decipherment of Indus scripts as written language . Anything before 1900 B.C. including the sign-board from Dholavira consisting of 10 large signs, each sign approximately 37cm by 27cm, embedded in semi-precious stones on a wooden board and an innovate addition of many seals and tablets and even horses is wonderful contribution. Our scope in decryption is limited to Matured Harappan Ciphers in 1500-1300 B.C. those were found from upper layers .
Tablets
The tablet shown above has five symbols. The 1st two from right the inverted boa or jar with logo2 on top and lance below is one symbol. , The 4th boa with logo3 inside is third symbol. Vertical 4 line written in bottom line is 4th symbol at number 5 and last 6th position symbol of comb is 5th symbol called the terminal symbol. We have special problem with this terminal symbol and comb inside the bangle or encircled comb in frequency analysis. We require an ethno-archaeological model for frequency analysis of these symbols. Tablets is a standard form of issuing orders like present day deeds , written orders and other transactions sent as encrypted messages or cipher-texts. It had been common practice in all ancient civilizations to issue the orders as tablets . The amulets and tablets also served as identity documents and trade deals. The direction of the writing of scripts on the amulets , artifices and tablets is from right to left like Arabic ,Persian and Urdu and the local languages Punjabi and Pothwari languages spoken in the oldest culture Samma the Sowan Valley 0.5 million years old culture of stone age . We are not saying that Dravidian in IVC or Naga tribe in Snake Valley Taxila adopted the writing system from the creatures of stone age .
Let us consider a sample of ten tablets in Table -2 . The frequency count of boa left and diamond the right symbol in tablet-1, The left symbol bearer in tablet-2 , the right symbol harrow or saw in tablet -5, the left symbol leveling tool (KRAH) , left symbol comb in bangle in tablet-8 or comb are terminal symbols. We can not carry out any frequency analysis for such a limited data but we would count the symbols using statistical methods and use an ethno-archaeological model to regenerate more data .
Seals
The direction of the writing on the seals is from right to left like English language in s1 Table-3 . Stamping the seal gives the writing from left to right as shown above in the tablet discussed above and in table-2. The seal ‘s2’ above when stamped gives the seal impression as ‘t2’.The seals being used in present day environments for signatures is different from the use of Indus seals that pertains to the level of security in modern concept . The amulet as identity document was given to the officials but messengers or speedy system of communication in IVC were given tablets or it may be tablet as stamped seal impression. Let assume a trained bird or racing camel or buffalo or trained tiger or trained crocodile or rhenocerous for swamps and rivers as communication systems. They may be insecure for special purposes as like any of the modern system in cryptology.
The use of impression of a seal as tablet may be compared with a book code as example of a more secure algorithm . The priest on both ends had same seals like the sender and the receiver of the modern code each having a copy of the same book. During encoding, each word in the plaintext is replaced with a code group that indicates where that same word appears in the book. Different occurrences of the same word in the plaintext may be represented by different code groups in the encoded message. With this method, the key is the book itself. Although a person who intercepts a message may guess that a book code is being used, the messages cannot be decoded unless the interceptor can determine what edition of what book is being used. In IVC system special staff priest trained at Priest College Mohenjodaro were present in other states and foreign countries with set of tablets and seals. The orders as seal impression tablet could give the actual tablets to be issued to specific staff to execute the orders.
The security , public policy and prevention of fraud in modern concept as given by Camp (15-21) has to be linked with ancient methods in an ethno-archaeological model. Giving Tablet as actual secret message through any of the communication channels in use during 1500-1300 B.C. was equally insecure like the modern cipher systems that involve transmitting or storing the key with each message. If an unauthorized person can recognize the key, then the next step is to recognize, guess at, or figure out the algorithm. Even without the key, the code breaker can guess the algorithm, and then, by trying all the possible keys in succession, can conceivably recover the plaintext. For example, in Caesar's alphabetical cryptosystem being discussed in next chapters , the cryptanalyst could simply try each of the 25 possible values of the key. The security of transmissions can therefore be increased by increasing the number of possible keys and by increasing the amount of time it takes to try each key. If the same key is used for multiple messages, the cryptanalyst only has to figure out one key; but by varying the key from one message to another, the cipher clerk has used a different procedure for encoding each one. The use of seal impressions as tablets in IVC ciphers is like using a complicated algorithm that may have a very large number of possible keys. The decryption in modern system if the basic algorithm is known or guessed is made difficult due to the time and effort required to try all possible keys that may take years for finding the plaintext.
IVC cipher remain as unbreakable system during the century like the most secure encryption method known was the one-time pad. The pad is a long list of different randomly chosen keys. Two and only two identical copies of the list of keys exist . The one for the person enciphering the message like the priest issuing the seal impression as tablet and another for whoever is deciphering it like the priest at the other end who knew the message coded as tablet. In OTP, a key is discarded and never used again after being used for one message but in IVC the same seal can be used again because the ciphers are only taught to specific priests and not the users. In OTP the next message will use the next key on the list. If the algorithm is even moderately complicated and the keys are long enough, cryptanalysis is practically impossible. In IVC ciphers the seal impression as tablet may be same but the tablets issued at other end might be different .
Terminal Symbols
The 1st symbol on the right side of seals and the leftmost symbol on the left the last one are called the terminal symbols We have selected after frequency analysis not given here about 11 terminal symbols shown in line-1 of table-3 appearing as 1st symbol on the right side of the seals.
We may call them as boa the 1st on right , diamond or coin , bearer , comb in bangle or encircled comb , comb , lance or spear , harrow or saw , wheel , level tool ( KRAHA) and riding stripe ( RUKAB).
We assumes the senate of priests holding important duties as VPs assisted by AVPs the headmen of tribes and supervisors from technical workforce from respective fields at execution level. . Dani confirms our conclusions for terminal symbols Mahadevan s’ analysis (1982:316) confirms the concept of priest for our ‘boa’ an his ‘jar’ symbol1 but with Sanskrit equivalent.
We do not require any confirmation in mathematical solution of cryptanalysis. The experts in frequency analysis have empirical solutions accepted by all cryptologists and cryptanalysts. The boa Symbol is confirmed as English letter E according to empirical solutions in cryptanalysis. The priest ruler in our analysis is confirmed by Dani our Sanskrit expert and he said that it had nothing to do with Sanskrit. Mahadevan s’ analysis ( 1982:316) confirms the concept of priest but with Sanskrit equivalent
The symbol 2 has largest frequency occurrence after boa symbol and it is termed as symbol of coin or diamond.
Dani confirms coin or diamond symbol 3 an priest VP with financial duties with no Sanskrit equivalent. Mahadevan s’ analysis ( 1982:316) also confirms symbol 3 as officer with priest duties but with Sanskrit equivalent.
The ciphers, crypto systems , and codes in cryptology or Harappan ciphers 1500-1300 B.C. being considered for our cryptanalysis are just like a mule. Every one agrees that a mule cannot generate a daughter. The mule might be forced to adopt a daughter as unique case after brutal attack for training as we call it brutal attack in cryptanalysis for code breaking The concept of spoken language equivalent like Sanskrit or others may be valid for earlier scripts and we have no objection to such adopted daughters.
Bull Pictorials
The seal on the left becomes tablet in the right side but inscription may be different for seal impression hence above is only an example just to show the direction of terminal symbols. We have large variety of bulls like Zebu or bhahmi bull , short horned bull , humped bull and humpless bull beside the unicorns. Many of the animal systems are used as nick names as a fun in our area of the oldest culture of stone age like bull and Ass for girls .I have retrieved old English Teacher books serial 190-191 from my childhood library that had very interesting (22) history.
Nixon mentioned in his book The Leaders
Boa Motif
Animal Motifs
Conclusions
Long interview with Dani reflecting the confirmation of conclusions by Dani, B.B. Lal, Russian Professors, Tosi, Durani Mughal, Mark and other scholars is not being discussed. We are mentioning some of the conclusions also confirmed or partially confirmed by Asko Parpola and I. Mahadevan through their published work.
The direction of writing on amulets, tablets, and seal impressions is from right to left like Arabic, Persian and Urdu and reversed on the seals like English. Conclusion is agreed by all scholars
Indus ciphers and codes represent system like logo-syllabic writing. This doesn’t constitute a closed system of single-valued graphemes as the syllabic and alphabetic scripts, which could be cracked as wholes. The conclusion is confirmed by Asko Parpola, Dani , Mark and other scholars
The individual symbols may be interpreted one by one, and some of the ciphers may remain eternal mysteries. The conclusion is confirmed by Asko Parpola, Dani, Mark and other scholars.
The Indus Ciphers were essentially similar to the other pictographic ciphers evolved by priests in China , Egypt and others .Many scholars like Dani , Fairservis , Mark and others confirm the conclusion
The Indus Ciphers are like a mule unable to adopt any of ancient language as daughter hence decipherment based on languages was rejected by scholars like Dani, B.B. Lal, and Russian Profs. and many others
The spoken language of the Indus people was Dravidian confirmed by Asko Parpola, Dani, Mark and other scholars. Our cryptanalysis shows that it not found in Script ciphers. This was the system like Liner A codes but no Linear B codes were required.
Harappan professed different religion in Kot Diji culture era that may be genetically related to the religions of both the ancient West Asia and the later India. The mythology of matured Harappan Civilization is different from any other mythology and mythology in ancient India.
The terminal symbols appearing at the left of the writing on amulets, tablets and seal impression are most important in frequency analysis. The right symbol on the seals is the terminal symbol on seal impressions.
Let me complement Possehl , Tosi (1993), Walter, Fairservis, Shaffer ,), B.B.Lal, Durani(1981), Jacobson, Terome(1986), Kenoyer (1985), Ratnagar(1991) and many others who contributed to Indus Valley research. Iravatham Mahadevan seems to be greater scholar when he sys that he could n't decipher the scripts inpite of his over 40 yeras research work. Ahmad Hassan Dani , B.B. Lal and Russian professors are the greates who disagreed to excellent research work by Asko Parpola. Being student of topsecret science Cryptology since childhood , I was associated with code and ciphers. After long discussion with Dani about above researchers and scholars and his work with some of them , we came to the claim of decipherment by Jha N and Rajaram (2000) that I thought the broken seal by Mackay showing rear portion of bull being called hoof of a horse. Dani said smiling , " We am actually Vani from Central Asia hence I would like to apprecite the work by Brahamans ". Then added that government funding is very limited and any effort like the effort of Jha N and Rajaram has to be appreciated but we mightn't agree with decipherment if it is not correct. Then he narrated all the conversation with Parapola and finally he disagreed.
Dried Up River Hakra
Let us run an ethno-archaeological model on the Scripts during 1500-1300B.C. period. We have no comments on any of the efforts of deciphering efforts of IVC scripts as spoken language. IVC existed from Kot D.G era before 2600 B.C. , Harappa 2600-1900 B.C. and matured Harappa 1900-1300 B.C . The direction of shifting from Harappa to Mohenjodaro, and Lothal during 1500-1300 B.C. is assumed . Gedrosia and Kalibangan might have been left due to Aryans but Dholavera, the sites in Cholistan ( Mughal (1997) and Kot D.G. vanished earlier due to heavy floods and climatic changes and the final drying up of the Hakra /Kangra/ Sarasvati in 1900 B.C.
IVC script is found on amulets, tablets and seals. Some of symbols, signs, numerals , pictorials and motif seem to be universal or imported from other civilizations of China , Egypt and in cuneiform texts from Mesopotamia as well as in the ancient Iran. Scholars had been trying to link the scripts to any of the pre-historic languages like Indo-European They provide a reliable basis for this decipherment. The main conclusion is as follows: the Proto-Indian language is the Proto-Indo-Aryan () one. The direction of the writing is right to left like Arabic on amulets and tablets and it may be reversed for seal impressions. Signs depicted on seals and tablets have basically the left-right orientation. It is well to bear in mind that the direction of the reading of a record depends on the context, too. In this work all the texts are transformed so that they have a common direction from left to right. This report contains a number of quasi-bilingual sources that can be the base of the decipherment (Rjabchikov 2006a; 2006b) (1).
Bibliography
1.Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages
2.Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach, 1998, Publishers: The Mathematical Association of America,
3.Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)
4.Paul B. Janeczka, Top Secret: A handbook of Codes , Ciphers and Secret Writing, Publishers Candlewick, 2006, 144 pages
5.Abraham Sinkov Elementary Cryptanalysis: Mathematical Approach, 232 pages. Publishers: The Mathematical Association of America; 2nd edition (August 1998)
6.Martin Gardner, Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills), 96 pages ,publishers: Dover Publications (October 1, 1984)
7.Bard Gregory, Algebraic Cryptanalysis , 2009, 392pages, Publishers Springer US
8.Christopher Swenson, Modern Cryptanalysis: Techniques for Advance Code Breaking, Publishers John Wiley & Sons , 2008, 264 pages
9.Simon Singh , The Code Book , The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Publishers: Anchor; Reprint edition (August 29, 2000), 432 pages
10.Jannik Dewny, Cryptanalysis of RSA & its Variants, CRC Press, Taylor & Francis Group,2009
11.Mark Stamp, Richard M. Low , Stamp(ed) , Applied Cryptanalysis: Breaking Ciphers in the Real World, Published Online: 3 Jan 2007
12.Helen F. Gaines, Cryptanalysis , 1989, Dover Publication, 237 pages
13.Friedrich L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology. publisher: Springer- Verlag Telis; 2nd Rev&Ex edition (February 2000) ,language :English, Hardcover: 470 pages
14.Gaines, Helen Fouche, Cryptanalysis a Study of Ciphers and their Solutions, 1939, 237 pages.
15.Foster , Caxon, Cryptanalysis for Microcomputers, 1982, 333 pages
16.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Machines, History and Methods, 1989 , 520 pages
17.Friedman, William F., Military Cryptanalysis Part I, 1935. 149 pages. Cryptanalysis of Number Theoretic Ciphers
Wag staff Jr., Samuel S. / Attalla, Mikhail J. (Editor), 2003. 318 pages
18.Friedman, William F., Military Cryptanalysis Part II: With Added Problems & Computer Programs 1937.
19.Friedman, William F., Military Cryptanalysis Part III: Simpler Varieties of Periodic Substitution Systems, 1939. 119 pages ,
20.Friedman, William F., Military Cryptanalysis Part IV: Transposition and Fractionating Systems, 1941. 189 pages
21.Ryan, Peter / Schneider, Steve, Modeling and Analysis of Security Protocols
2000. 352 pages.
22.Gaines, Helen Fouche, Cryptanalysis: A Study of Ciphers and their Solution
1939. 237 pages.
23.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor). Cryptology: Yesterday, Today, and Tomorrow, 1987, 519 pages
24.Pickover, Clifford, Cryptorunes, 2000. 96 pages
25.Poe, Edgar Allan, Gold-Bug and Other Tales, 1991. 121 pages.
26.Johnson, Neil F. / Duric, Zoran / Jajodia, Sushil G., Information Hiding: Stenography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1) 2001. 160 pages.
27.Pfleeger, Charles P. / Pfleeger, Shari Lawrence, Security in Computing. 1997, 2nd edition. 569 pages.
28.Devours, Cipher A. (Editor) / Kahn, David (Editor) / Kruh, Louis (Editor) / Millen, Greg (Editor) / Winkle, Brian J. (Editor), Selections from Crypto logia: History, People, and Technology, 1998. 552 pages
29.Yardley, Herbert O., Yardley-grams, 1932 (Currently out of print). 190 pages
30.Wagstaff Jr., Samuel S. / Atallah, Mikhail J. (Editor), Cryptanalysis of Number Theoretic Ciphers, 2003. 318 pages.
31.L. Jean Camp, “Code, Coding and Coded Perspectives”, Journal of Information, Communication and Ethics in Society Vol. 1, Jan. 2003, pp. 49-59. (Previously published in the abstract-refereed conference “Code, Coding, and Coded Perspectives”, Association of Internet Researchers, Lawrence, Kansas, and September 2000.).
32.L. Jean Camp & Serena Syme,” The Governance of Code: Open Land vs. UCITA Land” ACM SIGCAS Computers and Society, September 2002, Vol. 32, No. 3.
33.Serena Syme & L. Jean Camp, The Governance of Code, Code as Governance , Ethicomp: The social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk, Gdansk, Poland, 18-20 June 2001, Vol. 1, pp. 86-101.
34.L. Jean Camp & Serena Syme, “A Coherent Intellectual Property Model of Code as Speech, Embedded Product or Service, Journal of Information Law and Technology, Vol. 2, 2001.
35.L. Jean Camp & B. Anderson, Expansion of Telecommunication Infrastructure in Emerging Nations: The Case of Bangladesh, Telecommunications Policy Research Conference, Alexandria, VA. 25-26 Sept. 1999.
36.L. Jean Camp, “The World in 2010: Many New Entrants”, info: the journal of policy, regulation and strategy for telecommunications, information and media, Vol. 2 No. 2, April 2000, 167-186.
L. Jean Camp & Charles Vincent, Looking to the Internet for Models of Governance , Ethics and Information Technology, 2004, Vol. 6, No. 3, pp. 161-174.
L. Jean Camp, “Community Considered”, democracy.com? Governance in a Networked, World Hollis Publishing (Hollis, NH) 1999.
37.L. Jean Camp, Democratic Implication of Internet Protocols , : Ethical, Social and Political Dimensions of Information Technology, February 28 - March 1, 1998; Princeton University, Department of Computer Science, Princeton NJ.
38.L. Jean Camp, “The Shape of the Network”, Governance in a Globalizing World, ed. J. Donahue, Brookings Press (Washington, DC) summer 2001.
39.L. Jean Camp, “Principles for Design of Digital Rights Management Systems” IEEE Internet Computing Vol. 6, No. 3 pp. 59-65, May 2003.
40.L. Jean Camp & Stephen Lewis, “The Economics of Information Security” Springer-Verlag 2004.
41.L. Jean Camp, “Identity Theft: Causes, Consequences, Possible Cures.” Springer-Verlag 2007.
Farzeneh Asgapour, Debin Liu and L. Jean Camp, “Computer Security Mental Models of Experts and non-Experts”, Usable Security 07, (Tobago) 16 February 2007.
42.L. Jean Camp, “Privacy: from abstraction to applications”, Computers & Society, Sept. 1994, Vol. 24, No. 3, 8-15.
43.L. Jean Camp & Marvin Sirbu, “Critical issues in Internet commerce”, IEEE Communications, May, 1997
44.Marshall, John 1931. Moenjodaro and the Indus Civilization. 3 Vols. London.
45.Ahmad Hasan Dani, New Light on Central Asia, Sang-e-Meel Publication,1996
46.Ihsan H. Nadiem, Moenjodaro , The Heritage of Mankind, Sang-e-Meel Publication,2002
47.Asko Parpola, Deciphering the Indus Script, Cambridge, Cambridge University Press, 1994
48.Mohammed Rafique Mughal ,Ancient Cholistan Art and Architecture, Ferozsons Ltd., Lahore, 1997
49.Asko Parpola ,Deciphering the Indus Script: methods and select interpretations, Occasional Papers Series, Center for South Asia, University of Wisconsin-Madison, 1997
50.Gregory Possehl , The Indus Age: The Writing System , U. of Pennsylvania Press, 1996,
51.Richard Meadow , Harappa Excavations 1986-1990: A Multidisciplinary Approach to Third Millennium Urbanism, Prehistory Press, 1991,
52.Raymond and Bridget All chin, The Rise of Civilization in India and Pakistan,
Cambridge Univ. Press, 1982
53.Gregory Possehl, Harappa Civilization, Science Pub., 1993
54.Naida Kirkpatrick, The Indus Valley Understanding People in the Past,
Heinemann Library, April 2002
55.Iravatham Mahadevan, Terminal Ideograms in the Indus Script, in Gergeory L. Possehl, Harappan Civilization: A Contemporary Perspective, Oxford & IBH Publishing Co., 1982
56.Gregory Possehl ,The Indus Civilization A Contemporary Perspective,
Altamira Press, January
57.Ardeleanu-Jansen, Alexandra 1983. Stone sculptures from Moenjodaro. Interim Reports, Vol. I. ISMEO- Aachen University Mission. Aachen.pp.139-157.
58.Joshi J.P. & Asko Parpola 1987. Corpus of Indus Seals and Inscriptions (=CISI). Vol. I: Collections in India. Helsinki.
59.Knorozov Y.V. et al 1981. Proto-Indica 1979. Moscow.
60.Lal B.B. 1960. From Megalithic to the Harappa: tracing back the graffiti on pottery. Ancient India, 16, pp. 4-24.
61.Mahadevan I. 1977. The Indus Script: Texts, Concordance and Tables (=ISTCT). Archaeological Survey of India. New Delhi.1998.
Evolution of Ethno-Archaeological Model
1.Nazeer Ahmad Chaudhry, Integration of TCP/IP Protocol Suites with Cryptographic Security approved Ph. D. Electrical & Electronics Engg.) In Total Technology thesis at University of Bradford U.K.
2.Nazeer Ahmad , Secure MIS book draft sent to Artic House Norwood
3.Nazeer Ahmad, Secure MIS in Business Communication, B.M.A. Preston University Research Paper in MIS subject.
4.Nazeer Ahmad ,Protection of Radio Tele-printing Circuits, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1987,pp 25-29
5.Nazeer A. Chaudhry ,Protection of Speech and Data Communication Circuits , The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1988,pp 52-56
6.Nazeer Ahmad ,Neo-Communication Security Environments, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1990,pp 25-29
7.Nazeer Ahmad Chaudhry ,Communication Systems , MS Thesis MUET Jamshoro 1990-1992,
8.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
9.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Hilal Magazine , ISPR Publication , January 1995
10.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1994
11.N. A. Chaudhry , Tactical Nuclear Operations : Indian Option for 21st Century, Pakistan Defence Review, Volume 6, 1994, pp 80-92
12.N. A. Chaudhry , Integrated National Defence , Pakistan Army Green Book, 1991, pp343-346
13.N. A. Chaudhry , Safety Equipment for Nuclear Operations , T.S.O. Research Paper , E.M.E. College NUST Campus Rawalpindi, 1985
14.Nazeer Ahmad. Chaudhry , Pre- Evolution History Corps of Signals 1847-1947, SRC Publishers Hyderabad, 1992
15.Nazeer Ahmad. Chaudhry, Design and Development of Secrecy Electronics Communication System, M. Phil. ( Electronics Engg. ) thesis at MUET Jamshoro, 1993-1995
16.Nazeer Ahmad. Chaudhry , Electronics Warfare Doctrine Under Hostile Environments , Pakistan Army Green Book, 1991, pp 287-290
17.N. A. Chaudhry , Cryptographic and Computer Security , The Hilal Magazine , ISPR Publication , volume 24 , 19 January 1995
18.N. A. Chaudhry ,Evolution of Codes and Ciphers , The Hilal Magazine , ISPR Publication , 8 February 1995
19.N. A. Chaudhry , Cryptographic Security Systems , The Hilal Magazine , ISPR Publication , volume 20 , 15 December 1994
20.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
21.N. A. Chaudhry , Axiomatic Educational Strategy for 21st Century , Research Paper presented at IEEEP Lahore ,1995 and published in local press
22.Nazeer Ahmad , Quality Education , Pakistan Observer Daily, 18 November 1998
23.Nazir Ahmad Chaudhry, Education System & National Development , The Jung Daily, 6 February 1995
24.Nazir Ahmad Chaudhry , A Short History Of Lahore & Its Monuments, 2000, Sang-e-Meel Publisher Lahore
25.Nazeer Ahmad, Legal Settlement of Kashmir Problem , Pakistan Army Journal , U.N. and Kashmir Issue , Pakistan Observer Daily, 15 November 1994
26.Nazeer Chaudhry , Islamic Requirements of Justice System, , Daily Markaz, 22 February1998 Islamabad
27.Nazeer Chaudhry , Islamic System of Saudi Arabia , Daily Markaz, 8 September 1998 Islamabad
28.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Bazem –i- Alm –o-Fun Islamabad 2000
29.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 21 September,1998
30.Nazeer Chaudhry, How to Reduce Budget Deficit , Daily Markaz, 3 April,1999, 4 April,1999, 11 April,1999, Islamabad
31.Nazeer Ahmad , Solution to Public Problems , The Exclusive Weekly, Islamabad, 26 September 1996
32.Nazeer Chaudhry, Budget and Unemployment , Asas Daily , 20 June 1999
33.Nazeer Ahmad , Time to Shake Hands With India , The Exclusive Weekly, Islamabad, 16 July 1991
34.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Defense Digest Monthly, October 1992, pp 53-87
35.Nazeer Ahmad, Constitution of Pakistan and Peoples’ rights , 2004
36.Nazeer Ahmad , We can’t Progress Without Science Education, Pakistan Observer Daily, 2 November 1994
37.Nazeer Chaudhry, South Asian Economy and Kashmir , Al Akhbar Daily, 16 October 1999
38.Nazir Ahmad Chaudhry, Peace, Security &Development, Daily Markaz, 17 Agust,1998, Islamabad
39.Nazir Ahmad Chaudhry, Harappa : the cradle of our civilization , Sang-e-Meel Publication,2002
40.N. A. Chaudhry , Modern Technology Impacts of Defence , Pakistan Army Journal , 1994, pp62-74
41.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
42.Nazir Ahmad Chaudhry, Multan :glimpses, Sang-e-Meel Publication,2002
43.N.A. Chaudhry , Tourism Development in Pakistan , Friday News Weekly, 6 July 1999
44.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, September 1999
45.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
46.Nazir Ahmad Chaudhry, Basanat :a cultural festival of Lahore , Sang-e-Meel Publication,2001
47.Nazir Ahmad , Academic libraries in a developing society ,1984, Sang-e-Meel Publication
48.Nazeer Ahmad , 21st Century Challenges for Our Engineers, Pakistan Observer Daily, 11 December 1994
49.Nazir Ahmad , University library practices in developing countries ,1984, Sang-e-Meel Publication
50.Nazeer Ahmad , New Trends in Energy Generation, Pakistan Observer Daily, 2 November 1994
51.Nazir Ahmad, Oriental presses in the world ,1985, Sang-e-Meel Publication
52.Nazir Ahmad Chaudhry, Eastern Science of Medicine, Pakistan Observer Daily, 18 March 1995
53.N.A. Chaudhry, Kala Bagh Dam , Niwa –i- Waqat Daily, 14 July 1998
54.Nazir Ahmad Chaudhry , Ghulam Rasul Chaudhry , Irrigated Agriculture in Pakistan , Sang-e-Meel Publication,1988
55.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 22 July 1998, Islamabad
56.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 28 July 1998, Islamabad
57.Nazir Ahmad Chaudhry, Anarkali, archives and tomb of Sahib Jamal : a study in perspective , Sang-e-Meel Publication,2002,
58.Nazir Ahmad Chaudhry, Ground Water Resources in Pakistan, Sang-e-Meel Publication, 1974.Nazeer Chaudhry, Expected Attack on Atomic Instillations Pakistan , Osaf Daily 5June 1998, Islamabad
59.Nazeer Chaudhry, Regional Cooperation and Pakistani Forces, Markaz Daily 30 June 1999, Islamabad
60.Nazeer Chaudhry, Circulation of Money Al Akhbar Daily 17 February 2003, Islamabad
61.Nazeer Chaudhry, Solution of Unemployment Problem , Daily Subha, , 17 April 2004, Islamabad
62.Nazeer Chaudhry, Inflation, Unemployment and Terrorism, Daily Subha, , 9 August 2004, Islamabad
63.Nazeer Chaudhry, Social and Economic Welfare of Society , Daily Ehsas , 6 April 1999, Islamabad
64.Nazeer A. Chaudhry, Strategic Dimension of Pakistan, Submitted to Pakistan Defence Review, 2005
65.Nazeer A. Chaudhry, Solution to Kashmir Problem, Submitted to Pakistan Defence Review
66.Nazeer Chaudhry, How to End Terrorism, Daily Markaz , 8 November 1998 , Islamabad
From: N.A. Chaudhry : My thanks to A. Times for registration . Decrypted Secrets of Harappan Civilization 19oo-1300 B.C. can be used for peace and security in Asia and end of terrorism.Global trade through IVC ( Indus Valley Civilization) worth $7.5 billions and trading of largest oil & gas reserves worth over $ 15 Trillions from central Asia is being blocked because , presnt Asians are not so civlized as compared with the Senate of tragers of Harappan States : Harappa , Mohenjodaro, Dholavera , Lothal and Gedrosia . Dani said during very long interview with me for approval of conclusions on 1st cryptanalysis model on IVC script. ,"South Asia was termed as golden sparrow and every one got the job at his door step . Grains and water was protected and we find best model of social security and protection of human rights.Many scholars tried the kicking mule ( IVC scripts ) to accept the daughter ( any of ancient language like Dravidian , Brahvi, and many others ) or at least to adopt it. Many scholars including Dani, B. B. Lal , Russian Professors , Steve Farmer and Michael from Harvard University , Fairservis and others who confirm our conclusions that we might stop forcing the mule to accept the given daughter. Sunskrit literature evolved in Ganga valley even ignores events like attack by Alender in Indus Valley but the literature evolved in1300-1000 B.C. era according to new dating was made to mention the dried up river Hakrra/ Kangra or Srawati( Mughal -1997) in 1990B.C. as flowing big river. After extensive travelling and research work and spending in 5 years including 7 day journey on helicopter , I conclude that this was excessive floods over 18 recorded by Mark & Possehl and change of coarse by indus that shifted Harappa culture to 2600-1900 B.C. to matured Harappan civilzation. Kot Diji culture (Khan -1965) 3500-2600B.C. was quite diffent culture with differnt mythology motifs and symbols having burials sacrfices and divine god like others. Matured Harappan civilization is different adopting global cult of sun god and King Priest was not a divine god. We are not including methimatical cryptanalysis and we ware not diagreeing to anything.. Dravidian the sopken language was not required to be in written form. Do we have any of local languages in written scripts. The answer on record is no . The oldest culture of stone age is Suma ( Sownan Valley ) 0.5 -2.5 million yera old along with bone of Peking man 0.5 m , Iwaja in Japan , a city under the sea at Indian Gujrat coast , oldest city near dead sea in Jordan and Mehrgarh in Gedrosia of 8000 B.C. We had history as sing subject in oldest culture of the world till 1960s and we have elders using counting system of 20s till 1970s in Suma. According to the research by General Kungham Aryan had left Suma ( the salt range & Kashmir in 1426 B.C. and it was being ruled by Anavas tribe. Aran started arriving around 2500 B.C. in small grups as cattle grazers but they had evolved sunskrit before 1900 B.C. seening a big flowing river Hakra. Dani, Mughal and others call it a seperate river but we call it previous alignment of Indus. The concept of roads and rivers is different for people like us actually moving the troops and their suppies. Let us consider my claim that global trading route and attacking route in South Asia before Grand Trunk road was rougly 10 km wide on both sides of G.T. road. Any one who disagree is posted as logistic commader. I ask him to move the treasure of Alender 7 tons of god and silver. Eva our VP on control desk give him published data that this treasure required 26000 mules and 5000 camels. One unit is 33 men and you require over dozen units for many purposes . Two camel load is required for one man. Muhammad of Ghazni attack for Somnat had 30000 troops and 2 camels were required for one soldier for water and rations. We requre the grazing grounds for cattle, local labour , water replenshment and replacement for sick animals . We require a herd of cattles for ration. It may requre few months to get the convoy moved after prepration of many months.
The terms Block Cipher and Stream Cipher are borrowed from modern cryptanalysis (1). The methods and maxims of cryptology were reviewed to find the decrypted secrets of Let us take a very simple example of a message to be encrypted 46 words and 252 characters with spaces and 204 without spaces.
“His Excellency The King Priest of Harappa State as Chairman of Senate for Global Trading Coordinator in South Asia is pleased to order the new seal and signatures to be taken as final orders for all priests to be enforced from 1 January 1900 B.C. “
Let me complement Marshal (1931) , Wheeler (1956), Mackay , Magan, Ghosh, Wolley , Ghosh, Roy (1953), Possel , Tosi (1993), Walter, Fairservis, Sfaffer , Vats(1940), B.B.Lal, Durani(1981), Jacobson, Terome(1986), Kenoyer (1985), Khan F.A.(1965), Ratnagar(1991) and many others who contributed to Indus Valley research. Iravatham Mahadevan seems to be greater scholar when he sys that he could n't decipher the scripts inpite of his over 40 yeras research work. Ahmad Hassan Dani , B.B. Lal and Russian professors are the greates who disagreed to excellent research work by Asko Parpola. Being student of topsecret science Cryptology since childhood , I was associated with code and ciphers. After long discussion with Dani about above researchers and scholars and his work with some of them , we came to the claim of decipherment by Jha N and Rajaram (2000) that I thought the broken seal by Mackay showing rear portion of bull being called hoof of a horse. Dani said smiling , " We am actually Vani from Central Asia hence I would like to apprecite the work by Brahamans ". Then added that government funding is very limited and any effort like the effort of Jha N and Rajaram has to be appreciated but we mightn't agree with decipherment if it is not correct. Then he narrated all the conversation with Parapola and finally he disagreed
My highest compliments to all concerned for excellent site."Sir, You have taken a right step to get those Swings removed from site of Harrapa" , Visitors thanked great scholar Dani when I visited his house in 2005. I had taken years to get it done by publishing many articles requesting peoples to create more facilities at cultural heritage sites. My kids and wife would had been cursing me for taking them to Harrapa quite often , My family was not craking Indus Scripts in 1989 because I had more than one computer as Manager Army Computer Club Okara but they had to crack Indus Scripts in 1995 becaue we had just one 486 computer for 3 kids and myself. What attraction kids and families had in ruins visiting 7th time.
“ What you think about round stone with stone round rod in the center and other on the top with hole in the center like grinding stone on top” , my expert visitor Egyptian asked on my 7th visit to Museum of Sasi & Punu two lovers near Twin port Karachi. Being from stone age cultural area , still using hand grinding in 1980 , acting as guide to my guest during last 6 tours , I thought it some sort of grinding though grinding stone are opposite to this , top has a wooen handle to move the stone , hole in the center has wooden piece a slot to where fulcrum from lower stone stone rest. Lower stone has a hole and tappered wooden piece is used for adjust ment of fuckrum. “ But how you would move this set for grinding , this is from tepmle used by issueless women “ , my expert visitor guided me on 7th visit.
My compliments to Thailand tourism , Ms Nani and the driver , she guided me in such an excellent fashon in 1995 that I still remember her. “ No guidence in the way , I would sit with driver , you have to be VIP not speaking a word “ , Nani gave the briefing on a cup of coffe before we started for visit of Royal Palace. She was such an excellent guide that she even gave out out cost of golden budda’s constume , golden bricks on the outer wall of golden temple. They had even kept book on Bhuddaism in my room. Bhudaism started from Taxila Pakistan but we have to make living model of previous prehistoric cultures of snake worshipers and other
Historical Perspective
1st success decryption of Indus Scripts confirmed through works of Dani, B B Lal , Mehdewan, Fair Server , Mark, Russian Professoers and many others in the century was approved by Dani in 2005. South Asia as most peaceful global trader and protector of global trading routes was known as ‘golden sparrow’.Everyone got job at his home and economy was stable. “ We must share our research work because there is no government support” Dani said . We have many secrets from Indus Script decryption that can make South Asia as most peaceful region for global trading. Global Peace Mega Project at. twitter.com/#!/nazeeraahmadch. We salute Anhazari for greatmove against anti corruption
Harappan civilization reached improbable heights and evolved amazing scripts .
Ancient inscriptions and pictorials starting from Mehrgarh Gedrosia 7000 BC till fall of civilization have always been an enigma. The glories of the ruined cities and their amazing un-deciphered script had many researchers imagining a gentle society of priests and scribes. Our decrypted secrets explain a culture that reached the heights of artistic achievement during 1900-1300 BC termed as Harappan civilization. New clues, unearthed from research on ruins and from our decrypted secrets point to new civilization of global trading termed as Matured Harappan
The settlement of Kot Diji culture mostly remained l hidden under the ruins of Mohenjodaro , Harappa and other big cities now known as Harappan Civilization 2600-1900 BC . Ethno-archaeological model is assuming much as it was when the first 50 hunting groups arrived in perhaps 8000 – 7000 BC connected with the arrival of Adam on earth. A dense forest , marshes and barren land where wild animals ruled was shared by manlike creatures . scarlet macaws, toucans, and vultures nest in towering tropical hardwoods. Scorpions , mountain , goats , fish , water buffalos lived together . These creatures and monkeys swing from branches and vines and howler monkeys bellow in the distance. It had been a land of jungle , marshes , mud, serpents and sweat, and tigers and horned tigers the lord of the jungle . The earliest arrivals of these creatures has been excavated in Samma Soan Valley of stone age where we find caves is probably had no choice—overcrowding elsewhere may have forced them into this forbidding environment. But once there, they mastered its challenges. Settling near rivers, lakes, and swamps, they learned to maximize the thin soil's productivity. They cleared the forest for maize, squash, and other crops by slashing and burning, much as today's Maya do, then re-enriched the land by alternating crops and letting fields lie fallow.
As populations grew, they adopted more intensive methods of cultivation—composting, terracing, irrigation. They filled in swamps to create fields and carried silt and muck from bottomlands to fertilize enclosed gardens. Artificial ponds yielded fish, and corrals held deer and other game flushed from the forest. The ancient Maya ultimately coaxed enough sustenance from the meager land for several million people, many times more than now live in the region.
Over the centuries, as the Maya learned to prosper in the rain forest, the settlements grew into city-states, and the culture became ever more refined. The Maya built elegant multiroom palaces with vaulted ceilings; their temples rose hundreds of feet toward the heavens. Ceramics, murals, and sculpture displayed their distinctive artistic style, intricate and colorful. Though they used neither the wheel nor metal tools, they developed a complete hieroglyphic writing system and grasped the concept of zero, adopting it for everyday calculations. They also had a 365-day year and were sophisticated enough to make leap-year-like corrections. They regularly observed the stars, predicted solar eclipses, and angled their ceremonial buildings so that they faced sunrise or sunset at particular times of year.
Mediating between the heavens and earth were the Maya kings—the kuhul ajaw, or holy lords, who derived their power from the gods. They functioned both as shamans, interpreting religion and ideology, and rulers who led their subjects in peace and war. Demarest and others have described the Maya centers as "theater states" in which the kuhul ajaw conducted elaborate public rituals to give metaphysical meaning to movements of the heavens, changes of the calendar, and the royal succession.
Behind the cloak of ritual, the Maya cities acted like states everywhere, making alliances, fighting wars, and trading for goods over territory that ultimately stretched from what is today southern Mexico through the Petén to the Caribbean coast of Honduras. Well-worn trails and stucco-paved causeways crisscrossed the forest, and canoes plied the rivers. But until Fire Is Born arrived, the Maya remained politically fragmented, the city-states charting their own courses in the jungle.
By 378 Waka was a prestigious center, boasting four main plazas, hundreds of buildings, temple mounds up to 300 feet (90 meters) tall, ceremonial palaces clad in painted stucco, and courtyards graced with carved limestone altars and monuments. A trading power, it occupied a strategic location on the San Pedro River, which flowed westward from the heart of the Petén. Its market was filled with Maya foodstuffs such as maize, beans, chilies, and avocados, along with chicle harvested from sapodilla trees to make glue, and latex from rubber trees to make balls for ceremonial games. Exotic goods found their way to Waka as well. Jade for sculpture and jewelry and quetzal feathers for costumes came from the mountains to the south, and obsidian for weapons and pyrite for mirrors from the Mexican plateau to the west, the domain of Teotihuacan.
A sprawling metropolis of 100,000 people or more—perhaps the largest city in the world at the time—Teotihuacan left no records that epigraphers have been able to decipher. But its motives in dispatching Fire Is Born to the Maya region seem clear. Waka sat on a promontory overlooking a tributary of the San Pedro with a protected harbor, excellent for berthing large canoes. "It was a perfect staging area" for military action, notes Southern Methodist University archaeologist David Freidel, co-director of excavations at Waka. Which may be precisely what Fire Is Born had in mind.
Waka appears to have been key to the envoy's mission: to bring the entire central Petén into Teotihuacan's orbit, through persuasion if possible, force if necessary. His principal target was Tikal, a kingdom 50 miles (80 kilometers) east of Waka. Tikal was the most influential city-state in the central Petén. Bring Tikal into the fold, and the other cities would follow.
Fire Is Born's soldiers were probably shock troops, designed principally to display his bona fides and demonstrate good faith. He needed reinforcements, and he had come to Waka to get them. In return, he could offer the goodwill of his patron, a mysterious ruler known from inscriptions as Spear-thrower Owl, probably a highland king, perhaps even the lord of Teotihuacan.
Waka's ruler, Sun-faced Jaguar, apparently welcomed Fire Is Born. Based on hints in texts from Waka and other sources, Freidel, project co-director Héctor Escobedo, and epigrapher Stanley Guenter suggest that the two rulers cemented their alliance by building a fire shrine to house the sacred flame of Teotihuacan.
Along with moral support, Fire Is Born probably secured troops. His expeditionary force likely carried the spear-throwers and javelins typical of Teotihuacan and wore backshields covered with glittery pyrite, perhaps meant to dazzle the enemy when the soldiers spun around to hurl their weapons. Now warriors from the Petén, equipped with stone axes and short stabbing spears, swelled their ranks. As armor, many wore cotton vests stuffed with rock salt. Eleven hundred years later, the Spanish conquistadores shed their own metal armor in the sweltering rain forest in favor of these Maya "flak jackets."
The military expedition most likely set out for Tikal in war canoes, heading east, up the San Pedro River. Reaching the headwaters, the soldiers disembarked and marched either along the river or on the canyon rim overlooking it.
Garrisons probably dotted the route. News of the advancing column must have reached Tikal, and somewhere along the stretch of riverbank and roadway, perhaps at a break in the cliffs about 16 miles (26 kilometers) from the city, Tikal's army tried to stop Fire Is Born's advance. Inscribed slabs, called stelae, later erected at Tikal suggest that the defenders were routed. Fire Is Born's forces continued their march on the city. By January 16, 378—barely a week after his arrival in Waka—the conqueror was in Tikal.
The date is noted on Tikal's now famous Stela 31, which yielded early clues to Fire Is Born's importance when David Stuart of the University of Texas at Austin deciphered it in 2000. The second passage on the stela records what happened after the city fell: Tikal's king, Great Jaguar Paw, died that very day, probably at the hands of the vanquishers.
Fire Is Born appears to have dropped whatever pretense he had assumed as a goodwill ambassador. His forces destroyed most of Tikal's existing monuments—stelae put in place by 14 earlier rulers of Tikal. A new era had begun, and later monuments celebrated the victors. Stela 31, erected long after the conquest, describes Fire Is Born as Ochkin Kaloomte, or Lord of the West, probably referring to his origins in Teotihuacan. Some Maya experts have also suggested another meaning: that Fire Is Born represented a faction that had fled to the west—to Teotihuacan—after a coup d'état by Great Jaguar Paw's father years earlier and had now returned to power.
It apparently took Fire Is Born some time to pacify Tikal and its environs. But a year after his arrival, Tikal's monuments record that he presided over the ascension of a new, foreign king. Inscriptions identify him as the son of Spear-thrower Owl, Fire Is Born's patron in Teotihuacan. According to Stela 31, the new king was less than 20 years old, so Fire Is Born probably became Tikal's regent. He was certainly the city's de facto overlord.
In the years that followed the conquest, Tikal itself went on the offensive, expanding its reach across the Maya region. Fire Is Born appears to have masterminded the campaign, or at least inspired it. References to him have been identified in cities as distant as Palenque, more than 150 miles (240 kilometers) to the northwest. But the most poignant testimony to his empire-building comes from Uaxactún, just 12 miles (19 kilometers) from Tikal. There a mural shows a Maya nobleman giving homage to a warrior in Teotihuacan regalia—perhaps one of Fire Is Born's troops. A stela depicting a similar warrior guards a tomb where archaeologists found the remains of two women, one pregnant, a child, and an infant. Freidel and others have concluded that these were the remains of Uaxactún's royal family, slain by Tikal's forces. The king, presumably, was taken to Tikal and sacrificed there.
Decades after the arrival of Fire Is Born and long after he must have died, the aggressive rulers of Tikal continued to invoke Fire Is Born and his patron state, Teotihuacan. In 426, Tikal took over Copán, 170 miles (274 kilometers) to the south in present-day Honduras, and crowned its own king, Kinich Yax Kuk Mo, who became the founder of a new dynasty. A posthumous portrait shows him wearing a costume typical of central Mexico—a reference to Teotihuacan—and like Fire Is Born, he bore the title Lord of the West.
Some Mayanists believe that Tikal was acting as a vassal state for Teotihuacan, expanding its dominion throughout the Maya lowlands, with Fire Is Born acting as a kind of military governor. Others see him less as a conqueror and more as a catalyst who spurred Tikal to expand its own power and influence.
His fate is a mystery. There is no known record of his death, and no evidence that he ever ruled a Maya kingdom. But his prestige lived on. The Waka stela recording his arrival there wasn't erected until a generation later, indicating that even a long-ago visit from the great Fire Is Born was a matter of civic pride.
For more than a millennium, the Maya had entrusted their religious and temporal well-being to their god-kings. These leaders displayed their might and majesty in lavish rituals and pageants, in opulent art and architecture, and in written records of their triumphs, inscribed on stone, murals, and ceramics.
The system prospered—indeed, its excesses created the artistic achievements and learning that defined the Maya as one of the ancient world's great cultures—as long as the land could satisfy people's basic needs. This was easy at first when cities were small and resources relatively plentiful, but over time, growing populations, an expanding nobility, and rivalry between the city-states strained the limits of the environment.
Today the Petén, geographically the largest province in Guatemala, has a population of 367,000, living in isolated towns scattered through a forested wilderness. In the eighth century, by some estimates, ten million people lived in the Maya lowlands. The landscape was an almost unbroken fabric of intensely cultivated farms, gardens, and villages, linked by a web of trails and paved causeways connecting monumental city-states.
Maya farmers were well schooled in sophisticated techniques designed to get maximum production from delicate tropical soils. But beginning in the ninth century, studies of lake-bed sediments show, a series of prolonged droughts struck the Maya world, hitting especially hard in cities like Tikal, which depended on rain both for drinking water and to reinvigorate the swampland bajos where farmers grew their crops. River ports like Cancuén might have escaped water shortages, but across much of the Maya region the lake-bed sediments also show ancient layers of eroded soil, testimony to deforestation and overuse of the land.
When bad times came, there was little the kuhul ajaw could do to help their people. Monoculture farming—growing one staple food crop that could be accumulated and stored for hard times or for trade—could not be sustained in the rain forest. Instead, each city-state produced small quantities of many different food items, such as maize, beans, squash, and cacao. There was enough, at least at first, to feed the kingdom, but little left over.
Meanwhile, Maya society was growing dangerously top heavy. Over time, elite polygamy and intermarriage among royal families swelled the ruling class. The lords demanded jade, shells, feathers from the exotic quetzal bird, fancy ceramics, and other expensive ceremonial accoutrements to affirm their status in the Maya cosmos. A king who could not meet the requirements of his relatives risked alienating them.
The traditional rivalry among states only made matters worse. The kuhul ajaw strove to outdo their neighbors, building bigger temples and more elegant palaces and staging more elaborate public pageants. All of this required more labor, which required larger populations and, perhaps, more wars to exact tribute in forced labor from fallen enemies. Overtaxed, the Maya political system began to falter.
This period marked the golden age of Classic Maya civilization. The kuhul ajaw were in full flower in these two great alliances, competing in art and monuments as well as in frequent but limited wars. Calakmul defeated Tikal in a major battle in 562 but destroyed neither the city nor its population. Eventually Tikal rebounded and defeated Calakmul, subsequently building many of its most spectacular monuments.
Simon Martin, with Nikolai Grube of the University of Bonn, compares the Tikal-Calakmul rivalry to the superpower struggle of the 20th century, when the U.S. and the Soviet Union competed to outdo each other in fields ranging from weaponry to space travel. With neither side ever able to gain the upper hand, the Cold War arguably brought stability, and so did the standoff in the Maya world. "There was a certain degree of destruction" because of the rivalry, says Guatemalan archaeologist Héctor Escobedo. "But there was also equilibrium."
It did not last. Martin suggests the balance may have been intrinsically unstable, like the competition among the city-states of ancient Greece, or the nervous grappling between North and South in the United States prior to the Civil War. Or perhaps an overstressed environment finally caught up with the proud Maya powers, bringing a new edge of desperation to their rivalry. Either way, the unraveling began at the small garrison state of Dos Pilas, near the Pasión River downstream of Cancuén.
In 630 Tikal, trying to reassert a presence along Pasión River trade routes increasingly dominated by Calakmul, expanded an existing outpost near two large springs—pilas, in Spanish. The site had little else to recommend it. Dos Pilas grew no crops and sold nothing. Scholars call it a "predator state" that depended on tribute from the surrounding countryside. War, for Dos Pilas, was not only a ritual to glorify kings and appease gods. War was what Dos Pilas did to survive.
The kingdom's history of violence and duplicity began when Tikal installed one of its princes, Balaj Chan Kawiil, as Dos Pilas's ruler in 635. The garrison slapped together a fancy-looking capital for the young prince, using carved facades to mask loose and unstable construction fill. But in 658 Calakmul overran Dos Pilas and drove Balaj Chan Kawiil into exile.
We know the next chapter thanks to a thunderstorm that toppled a tree at Dos Pilas six years ago, exposing a carved stairway hidden beneath its roots. Inscriptions on the stairway reveal that Balaj Chan Kawiil returned two years after his exile—but as a Calakmul surrogate. Dos Pilas's turncoat king helped Calakmul cement its control over the Pasión Valley during the next two decades. Then Calakmul delivered fateful news. Its rulers ordered Balaj Chan Kawiil to fight his brother in Tikal itself.
For a time, fleeing nobles could find refuge in Cancuén, a quiet port at the headwaters of the Pasión River. Even as downriver cities sank into chaos during the eighth century, Cancuén prospered by trading luxury items and providing sumptuous lodgings for elite visitors. The architect of this golden age was King Taj Chan Ahk, who came to power in 757 at the age of 15. Cancuén had a long history as a strategic trading post, but Taj Chan Ahk transformed the city into a stunning ceremonial center. Its heart was a 270,000-square-foot (25,000 square meters), three-story royal palace with vaulted ceilings and 11 courtyards, made of solid limestone and elegantly placed on a riverside promontory. It was a perfect stage for a Maya god-king, and Taj Chan Ahk was master of the role, even as it was dying out elsewhere.
There is no evidence that Taj Chan Ahk ever fought a war or even won a battle. Instead he managed to dominate the upper Pasión Valley for nearly 40 years by coaxing advantage through patronage and alliances. An altar monument at Cancuén dated 790 shows him in action, engaged in a ceremonial ball game with an unknown noble, perhaps to celebrate a treaty or a state visit.
Taj Chan Ahk died in 795 and was succeeded by his son Kan Maax, who sought to trump his father by expanding the palace. But pomp and ritual—the old trappings of kingship—could no longer hold the Maya universe together. Within five years the spreading chaos had reached the gates of the city. In one terrible day its glory winked out, another light extinguished in the world of the Classic Maya.
Nazeer Ahmad Chaudhry
Independent Researcher from Pakistan
Author & Researcher: Decryption of Harappan Ciphers 1st successful solution in a century
President TPI Inc., President IT Genetics , Manager Asia Women Global Justice Group , Chairman Welfare Committee,
TPI has offered over 0.5 million free predicted solutions at all levels. Integrated solution based on Borderland Sciences, cryptanalysis, forecasting techniques Delphi, Scenarios and multi scenarios, war gaming and other spiritual techniques. We attach no claim with free predicted solutions. Error correction techniques and analysis may be carried out by users.
An analysis might be carried out if I can be of any use for establishing global peace by ending terrorism. I have been subjected to over 30 killing attacks, killing of over 10 members of my family and losses in millions. I have given details at petitions at Care-2, Peace pink, yahoo and other comments. Mega project research work aimed at establishing peace and security at global level by ending terrorism. I desire global board of directors sponsored by UNO to come forward for benefits of all.
I offer 1st decryption of Harappan Scripts in a century; the decrypted secrets not yet published have solution to many problems. The strategic location of Pakistan offer global trading of $ 7.5 billion per year to global community, oil and gas trading of over $ 15 trillions. I have been trained by over 250 foreign telecomm firms; I had lot of interaction with my friends from many countries as class fellows, R&D Engineer at Research Establishment, visit to Thailand, Ministry of Interior Saudi Arabia Border Guards, as operational engineer, as Zonal Manager of NGO and service in the army. I have given lot of material at Internet. My friends , colleagues , group members and others can carry out an analysis of mega project including integrated energy , renewable energy , befouls , safety and security of global trading, safe train link, herbal foods , new employments , new concepts in housing , overhauling of education systems , innovations and integration of new global technologies and many others.. We must establish an accountability system to stop official terrorists and corrupt gangs failing all the global projects.
Mega Project: Problems in offering Global Solutions
The establishment of global peace and stability by ending terrorism has been delayed due to 30 killing attacks on me, killing of 10 members of my family, loss in millions, terrorists attack on 3 sick and crippled women of 3 families, 11 of witnesses and me. Petitions have been registered. May I request global peace lovers to sign the petitions; they may not display their names.
Research Interests Nazeer ’s fundamental research is on discovering and understanding the problems and offering free solutions by forecasting/prediction through economic, social, organizational and technical interactions and techniques evolved through TPI Inc. Over 0.5 million free solutions have been offered at all level but aim of ending terrorism, corruption and prevention of fraud at any level has yet to achieve. Research Projects • Research in any field that can give protection to mankind from fraud, terrorism and human right protection. • Ethno-archaeological Model on Harappan Ciphers: Decryption of Harappan Cipher is over 30 years research project, the 1st successful cryptanalysis in the century • Axiomatic Education Strategy for 21st Century • Prevention of Fraud: Nazeer and his wife Hamida are heir to the lands & property of about 7 families hence an effort underground had been going on for killing of every member of this family. It is very interesting research work scanning the centuries how people slaughter others to become landlords by using fraud and terrorism. • Security and public policy was forced on Nazeer to accept almost all responsibilities in Home County being heir to 7 people. He suffered over 30 killing attacks, killing of 10 members of his family by the snakes brought up by them; the relatives of his step mother.
Contents
[hide]
•1 Education
o1.1 Experience
o1.2 Research Work
•2 Projects
o2.1 Publications:
[Edit] Education
B.Sc. Telecomm Engineering, B Sc Honors, Technical Graduate NUST-EME, LLB, PEC, MIE Pak, IEEEP, IEEE, IEEE Computer Society, IEEE- ISST
MBA , M. Phil. Electronics Engineering , MA , Cryptology NUST-MCS , Arabic AIOU , Ph D Total Technology approved researcher Bradford
•B.Sc. (Telecomm. Engineering), Member:PEC,IEEE &Computer Society IEEE USA MIE (Pak.)
•M.B.A. Preston Univ. 1995 , M.A.( Political Science), B.Sc. (Honors War Studies), L.L.B. , Arabic Diploma AIOU Islamabad
•Doctor of Philosophy in Total Technology at University of Bradford UK approved researcher in since 1995. M Phil at MUET was accepted for credit in Ph.D. Second part M.B.A completed from Preston University USA, Courses /research/ 15 years experience/foreign firm training from 250 firms as R&D engineer in cryptographic security completed. Member PEC , TSO graduate from NUST Campus ,Advance Cryptology Course , Refresher Cryptology Course from NUST
•M. Phil. (Electronics Engineering,) Cryptology (NUST), Technical Staff Course (NUST,, Ph.D. (Electrical/Electronics Engineering) approved researcher at Uni. of Bradford U.K. Masters of Science and M Phil at MUET Jamshoro Pakistan was got transferred for PhD
•M.B.A. from Preston University USA from Islamabad Campus getting 98 % in MIS, Organizational Communication and International Marketing subjects. (98 % marks in Information Theory in Advance Cryptology NUST Campus. M.A. (Political Science) from Sindh Uni.
[edit] Experience
•1996-1997 Telecommunication Engineers at Ministry of Interior Saudi Arabia Border Guards
•1978- 1994 Telecommunication Engineer in Sindh and Baluchistan Provinces , Technical Staff Course , Research & Development Engineer at Signals Research Establishment . Telecommunication Engineer and Communication officer in Army 1972-1994
•Teaching: Teaching Assistant and teaching staff for science and technology subjects at Higher Secondary School, Signal Training Center, Computer Clubs, Divisional Battle School NUST Campus MCS, National Institute of Computer Sciences
•Administration: Zonal Manager Hamdard Laboratories Rawalpindi Zone (1998-1999). 24 years experience in Pakistan Army
•Training: Training by foreign Telecom firms from USA, UK, Canada, China, France, Germany, Japan, South Korea, Norway, Sweden and many other countries as R&D Engineer.
Computers: Student Member IEEE USA (1994-95), Manager Army Computer Clubs at Okara and Hyderabad, Teaching Staff National Institute of Computer Sciences Rawalpindi (1995)
•Engineering: Student Member IEEE USA (1994-1997), Telecommunication Member Pakistan Engineering Council, Member Institute of Electrical Engineers Pakistan
[edit] Research Work
Decryption of Indus Valley Scripts has been my research work since last 30 years .This is 1st successful decryption in a century. Dani had confirmed the decryption in 2005 though 1st script was decrypted in 1995 when Secure MIS high security high compression book draft was approved by Artech House USA and Dorrance Publishers USA approved the draft for publication both books not yet published. Rolex Award also approved the research for an award.
B.B. Lal , Russian Professors , and US Scholars Farmer , Sprout , Fair Service, Mark , Durani , F.A. Khan, Mughal and many conclusions of the decryption supported by many other scholars through their written work.
•In 2004, Steve Farmer published, The Collapse of the Indus-Script Thesis: The Myth of a Literate Harappan Civilization, arguing that the Indus valley figures are merely a non-structured symbol system and do not represent a full language.
•In ancient cryptography used by Egyptians or code & ciphers used by lovers, diarists and underworld people, you don't require full language. As a kid, he had just a chance by compulsion to evolve coded language and a writing system to be read by kid girls who could just read Arabic without understanding it.
•All most all the population counted as the people of Indus Valley counted. He was 1st student to qualify Matric (O level) in 1968 and taught new science syllabus to his class as volunteer teacher because his science teacher declined to teach the syllabus unless he had undergone a course.
•He had over 50 of teacher’s 1st &2nd World War soldiers and there were few who had been living in the jungle. His county of 7 treasures in oldest Stone Age culture got electricity in 1990.They used ancient agricultural tools and animal transport like camels, horses, donkeys, bulls and buffalos were used.
[edit] Projects
•Large number of Design and modification projects in Telecommunication Engineering and Cryptology
•Research in any field that can give protection to mankind from fraud, terrorism and human right protection.
•Ethno-archaeological Model on Harappan Ciphers : Decryption of Harappan Cipher is over 30 years research project the 1st successful cryptanalysis in the century
•Axiomatic Education Strategy for 21st Century
•Prevention of Fraud: 50 years Research Work
•Security and public policy was forced on Nazeer to accept almost all responsibilities in Home County being heir to 7 people.
•Codes and Ciphers: Evolution of Coded Language based on Harappan Scripts
•Codes and Ciphers: Evolution of Written Script based on Harappan Scripts
•Design & Development of Maintenance Free Exchange for Desert Working
•Design & Development of Secrecy Electronics Communication System
•Cryptology : Design of High Security High Compression System
•Design & Development of Exchange for Nuclear Warfare
•Design & Development of Battery Charging and Lighting System on Wind Energy
•Design & Development of Energy Saying System
•Decryption of Moenjodaro Scripts
•Decryption of Matured Harappan Scripts
•Herbal Medicine : Medicated Foods and Treatment of Cancer
•Herbal Medicine : New Treatment for Asthma
•Evolution of Recycling Technologies for Low Cost Housing
•Evolution of Integrated Technologies for Energy Crisis
[edit] Publications:
1.Decryption of Moenjodaro Scripts approved in 1995 based on the Thesis: Integration of TCP/IP Protocol Suites with Cryptographic Security approved Ph. D. Electrical & Electronics Engg.) In Total Technology thesis at University of Bradford U.K. Not yet published.
2.Nazeer Ahmad , Secure MIS book draft sent to Artic House Norwood
3.Nazeer Ahmad, Secure MIS in Business Communication, Research Paper in MIS.
4.Nazeer Ahmad ,Protection of Radio Tele-printing Circuits, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1987,pp 25-29
5.Nazeer A. Chaudhry ,Protection of Speech and Data Communication Circuits , The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1988,pp 52-56
6.Nazeer Ahmad ,Neo-Communication Security Environments, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1990,pp 25-29
7.Nazeer Ahmad Chaudhry ,Communication Systems , MS Thesis MUET Jamshoro 1990-1992,
8.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
9.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Hilal Magazine , ISPR Publication , January 1995
10.N. A. Chaudhry , Tele-computers and Security Beyond Year 2000, The Qasid Magazine ,Military College of Signals , NUST Campus Rawalpindi, 1994
11.N. A. Chaudhry , Tactical Nuclear Operations : Indian Option for 21st Century, Pakistan Defense Review, Volume 6, 1994, pp 80-92
12.N. A. Chaudhry , Integrated National Defense , Pakistan Army Green Book, 1991, pp343-346
13.N. A. Chaudhry , Safety Equipment for Nuclear Operations , T.S.O. Research Paper , E.M.E. College NUST Campus Rawalpindi, 1985
14.Nazeer Ahmad. Chaudhry , Pre- Evolution History Corps of Signals 1847-1947, SRC Publishers Hyderabad, 1992
15.Nazeer Ahmad. Chaudhry, Design and Development of Secrecy Electronics Communication System, M. Phil. ( Electronics Engg. ) thesis at MUET Jamshoro, 1993-1995
16.Nazeer Ahmad. Chaudhry , Electronics Warfare Doctrine Under Hostile Environments , Pakistan Army Green Book, 1991, pp 287-290
17.Nazeer A. , Cryptographic and Computer Security , The Hilal Magazine ,19 January 1995
18.N. A. Chaudhry ,Evolution of Codes and Ciphers , The Hilal Magazine ,8 February 1995
19.N. A. Chaudhry , Cryptographic Security Systems , The Hilal Magazine , 15 December 1994
20.N. A. Chaudhry , Protection of Electronics & Electrical Equipment, The Hilal Magazine , ISPR Publication , volume 22 , 22-29 December 1994
21.N. A. Chaudhry , Axiomatic Educational Strategy for 21st Century , Research Paper presented at IEEEP Lahore ,1995 and published in local press
22.Nazeer Ahmad , Quality Education , Pakistan Observer Daily, 18 November 1998
23.Nazir Ahmad Chaudhry, Education System & National Development , The Jung Daily, 6 February 1995
24.Nazeer Ahmad, Legal Settlement of Kashmir Problem , Pakistan Army Journal , U.N. and Kashmir Issue , Pakistan Observer Daily, 15 November 1994
25.Nazeer Chaudhry , Islamic Requirements of Justice System, , Daily Markaz, 22 February1998
26.Nazeer Chaudhry , Islamic System of Saudi Arabia , Daily Markaz, 8 September 1998 Islamabad
27.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Bazem –i- Alm –o-Fun Islamabad 2000
28.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 21 September,1998
29.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 3 April,1999,
30.Nazeer Ahmad , Solution to National Problems , Daily Markaz, April,1999
31.Nazeer Ahmad , Solution to National Problems , Daily Markaz, 11 April,1999, Islamabad
32.Nazeer Ahmad , Solution to Public Problems , The Exclusive Weekly, Islamabad, 26 September 1996
33.Nazeer Chaudhry, Budget and Unemployment , Asas Daily , 20 June 1999
34.Nazeer Ahmad , Time to Shake Hands With India , The Exclusive Weekly, Islamabad, 16 July 1991
35.Nazeer Ahmad , Face Reading : Integration of Forecasting and Prediction Technologies for Solution of Problems , Defense Digest Monthly, October 1992, pp 53-87
36.Nazeer Ahmad , We can’t Progress Without Science Education, Pakistan Observer Daily, 2 November 1994
37.Nazeer Chaudhry, South Asian Economy and Kashmir , Al Akhbar Daily, 16 October 1999
38.Nazir Ahmad Chaudhry, Peace, Security &Development, Daily Markaz, 17 Agust,1998, Islamabad
39.N. A. Chaudhry , Modern Technology Impacts of Defense , Pakistan Army Journal , 1994, pp62-74
40.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
41.N.A. Chaudhry , Tourism Development in Pakistan , Friday News Weekly, 6 July 1999
42.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, September 1999
43.N.A. Chaudhry , Tourism Development , The Parwaz Monthly Islamabad, June 1999
44.Nazeer Ahmad , 21st Century Challenges for Our Engineers, Pakistan Observer , 11 December 1994
45.Nazeer Ahmad , New Trends in Energy Generation, Pakistan Observer Daily, 2 November 1994
46.Nazir Ahmad Chaudhry, Eastern Science of Medicine, Pakistan Observer Daily, 18 March 1995
47.N.A. Chaudhry, Kala Bagh Dam , Niwa –i- Waqat Daily, 14 July 1998
48.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 22 July 1998, Islamabad
49.Nazeer Chaudhry, Pakistan –US Relations, Markaz Daily 28 July 1998, 1974.
50.Nazeer Chaudhry, Expected Attack on Atomic Instillations Pakistan , Osaf Daily 5June 1998,
51.Nazeer Chaudhry, Regional Cooperation and Pakistani Forces, Markaz Daily 30 June 1999,
52.Nazeer Chaudhry, Circulation of Money Al Akhbar Daily 17 February 2003, Islamabad
53.Nazeer Chaudhry, Solution of Unemployment Problem , Daily Subha, , 17 April 2004
54.Nazeer Chaudhry, Inflation, Unemployment and Terrorism, Daily Subha, , 9 August 2004,
55.Nazeer Chaudhry, Social and Economic Welfare of Society , Daily Ehsas , 6 April 1999,
56.Nazeer A. Chaudhry, Strategic Dimension of Pakistan, Submitted to Pakistan Defense Review, 2005
57.Nazeer A. Chaudhry, Solution to Kashmir Problem, Submitted to Pakistan Defense Review ,1995
58.Nazeer Chaudhry, How to End Terrorism, Daily Markaz , 8 November 1998 , Islamabad
59.Nazeer Ahmad Chaudhry , Neo Scenario for Armed Forces of Pakistan , Pakistan Army Journal ( Urdu) , Winter 2009 , pp 25-42
60.ibid, PAJ, The J curve , Rise and Fall of Nations by Ian Beemer , Book Review , pp107-108
61.Nazeer Ahmad Chaudhry , Science & Technology : New Challenges for Defense , Pakistan Army Journal ( Urdu) , Summer 2009 , pp 15-25
62.ibid, PAJ , Curveball: Spies, Lies and the Con Man Who caused a War by Bob Dorgan , Book Review , pp- 85-87
63.Nazeer Ahmad Chaudhry , Nuclear Strategy for Future , Pakistan Army Journal ( Urdu) , Winter 2008 , pp 45-55
64.ibid, PAJ, the Failure of American Foreign Policy and Next Great Crisis in Middle East by Ali M. An sari , Book Review , pp104-106
65.Nazeer Ahmad Chaudhry , Defense Strategy for Future , Pakistan Army Journal ( Urdu) , Summer 2008 , pp 42-51
66.ibid, PAJ , Winning the Right War by Phillips H Gordon, Book Review , pp 85-87
The early news from the Pacific was bleak: the Pacific Fleet had taken a beating. With the battle line crippled, the undamaged American carriers assumed great importance. There were, on 7 December, only three in the Pacific: USS Enterprise (CV-6), USS Lexington (CV-2), and USS Saratoga (CV-3). USS Ranger (CV-4), USS Wasp (CV-7), and the recently commissioned USS Hornet (CV-8) remained in the Atlantic, Yorktown departed Norfolk on 16 December 1941 for the Pacific, her secondary gun galleries studded with new Oerlikon 20 mm guns. She reached San Diego 30 December 1941 and soon became flagship for Rear Admiral Frank Jack Fletcher's newly formed Task Force 17.
The carrier's first mission in her new theater was to escort a convoy carrying Marine reinforcements to American Samoa. Departing San Diego on 6 January 1942, Yorktown and her consorts covered the movement of marines to Tutuila and Pago Pago to augment the garrison already there.
Having safely covered that troop movement, Yorktown, in company with sister ship Enterprise, departed Samoan waters on 25 January. Six days later, TF8 (built around Enterprise), and TF17 (around Yorktown) parted company. The former headed for the Marshall Islands, the latter for the Gilberts, each to take part in some of the first American offensives of the war, the Marshalls-Gilberts raids.
At 05:17, Yorktown - screened by USS Louisville (CA-28) and USS St. Louis (CL-49) and four destroyers - launched 11 Douglas TBD-1 Devastators and 17 Douglas SBD-3 Dauntlesses, under the command of Comdr. Curtis W. Smiley. Those planes hit what Japanese shore installations and shipping they could find at Jaluit, but severe thunderstorms hampered the mission, and seven planes were lost. Other Yorktown planes attacked Japanese installations and ships at Makin and Mili Atolls.
The attack on the Gilberts by TF17 had apparently been a complete surprise since the American force encountered no enemy surface ships. A single four-engined Kawanishi H6K "Mavis" patrol flying boat attempted to attack American destroyers sent astern in hope of recovering the crews of planes overdue from the Jaluit mission. Antiaircraft fire from the destroyers drove off the intruder before he could cause any damage.
Later, another "Mavis"-or possibly the same one-came out of low clouds 15,000 yards (14,000 m) distant from Yorktown. The carrier withheld her antiaircraft fire in order not to interfere with the combat air patrol (CAP) fighters. Presently, the "Mavis", pursued by two F4F Wildcats, disappeared behind a cloud. Within five minutes, the enemy patrol plane fell out of the clouds and crashed in the water.
Although TF17 was slated to make a second attack on Jaluit, it was canceled because of heavy rainstorms and the approach of darkness. Therefore, the Yorktown force retired from the area.
Admiral Chester Nimitz later called the Marshalls-Gilberts raids "well conceived, well planned, and brilliantly executed." The results obtained by TFs 8 and 17 were noteworthy, Nimitz continued in his subsequent report, because the task forces had been obliged to make their attacks somewhat blindly, due to lack of hard intelligence data on the Japanese-mandated islands.
Yorktown subsequently put in at Pearl Harbor for replenishment before she put to sea on 14 February, bound for the Coral Sea. On 6 March, she rendezvoused with TF11 - formed around Lexington and under the command of Vice Admiral Wilson Brown - and headed towards Rabaul and Gasmata to attack Japanese shipping there in an effort to check the Japanese advance and to cover the landing of Allied troops at Nouméa, New Caledonia. However, as the two carriers - screened by a powerful force of eight heavy cruisers (including the Australian HMAS Australia and 14 destroyers - steamed toward New Guinea, the Japanese continued their advance toward Australia with a landing on 7 March at the Huon Gulf, in the Salamaua-Lae area on the eastern end of New Guinea.
Word of the Japanese operation prompted Admiral Brown to change the objective of TF11's strike from Rabaul to the Salamaua-Lae sector. On the morning of 10 March 1942, American carriers launched aircraft from the Gulf of Papua. Lexington flew off her air group commencing at 07:49 and, 21 minutes later, Yorktown followed suit. While the choice of the gulf as the launch point for the strike meant the planes would have to fly some 125 miles (200 km) across the Owen Stanley mountains - a range not known for the best flying conditions - that approach provided security for the task force and ensured surprise.
In the attacks that followed, Lexington's SBDs from Scouting Squadron 2 (VS-2) commenced dive-bombing Japanese ships at Lae at 0922. The carrier's torpedo and bomber squadrons (VT-2 and VB-2) attacked shipping at Salamaua at 09:38. Her fighters (VF-2) split up into four-plane attack groups: one strafed Lae and the other, Salamaua. Yorktown's planes followed on the heels of those from "Lady Lex." VB-5 and VT-5 attacked Japanese ships in the Salamaua area at 0950, while VS-5 went after auxiliaries moored close in shore at Lae. The fighters of VF-42 flew CAP over Salamaua until they determined there was no air opposition, then strafed surface objectives and small boats in the harbor.
After carrying out their missions, the American planes returned to their carriers, and 103 planes of the 104 launched were back safely on board by noon. One SBD-2 had been downed by Japanese antiaircraft fire. The raid on Salamaua and Lae was the first attack by many pilots of both carriers; and, while the resultant torpedo and bombing accuracy was inferior to that achieved in later actions, the operation gave the fliers invaluable experience which enabled them to do so well in the Battle of the Coral Sea and the Battle of Midway.
Task Force 11 retired at 20 knots (23 mph; 37 km/h) on a southeasterly course until dark, when the ships steered eastward at 15 knots (17 mph; 28 km/h) and made rendezvous with Task Group 11.7 (TG11.7), four heavy cruisers and four destroyers under the Australian Rear Admiral John Crace, which provided cover for the carriers on their approach to New Guinea.
Yorktown resumed her patrols in the Coral Sea area, remaining at sea into April, out of reach of Japanese land-based aircraft and ready to carry out offensive operations whenever the opportunity presented itself. After the Lae-Salamaua raid, the situation in the South Pacific seemed temporarily stabilized, and Yorktown and her consorts in TF17 put in to the undeveloped harbor at Tongatapu, in the Tonga Islands, for needed upkeep, having been at sea continuously since departing from Pearl Harbor on 14 February.
However, the enemy was soon on the move. To Admiral Nimitz, there seemed to be "excellent indications that the Japanese intended to make a seaborne attack on Port Moresby the first week in May." Yorktown accordingly departed Tongatapu on 27 April 1942, bound once more for the Coral Sea. TF11 - now commanded by Rear Admiral Aubrey W. Fitch, who had relieved Brown in Lexington - departed Pearl Harbor to join Fletcher's TF 17 and arrived in the vicinity of Yorktown's group, southwest of the New Hebrides Islands, on 1 May.
Battle of the Coral Sea
At 15:17 the next afternoon, two Dauntlesses from VS-5 sighted a Japanese submarine, running on the surface. Three Devastators took off from Yorktown, sped to the scene, and carried out an attack that only succeeded in driving the submarine under.
On the morning of 3 May, TF11 and TF17 were some 100 miles (160 km) apart, engaged in fueling operations. Shortly before midnight, Fletcher received word from Australian-based aircraft that Japanese transports were disembarking troops and equipment at Tulagi in the Solomon Islands. Arriving soon after the Australians had evacuated the place, the Japanese landed to commence construction of a seaplane base there to support their southward thrust.
Yorktown accordingly set course northward at 27 knots (31 mph; 50 km/h). By daybreak on 4 May, she was within striking distance of the newly established Japanese beachhead and launched her first strike at 0701-18 F4F-3's of VF-42, 12 TBD's of VT-5, and 28 SBD's from VS and BY-5. Yorktown's air group made three consecutive attacks on enemy ships and shore installations at Tulagi and Gavutu on the south coast of Florida Island in the Solomons. Expending 22 torpedoes and 76 1,000 pound bombs in the three attacks, Yorktown's planes sank the destroyer Kikuzuki, three minecraft and four barges. In addition, Air Group 5 destroyed five enemy seaplanes, all at the cost of two F4F's lost (the pilots were recovered) and one TBD (whose crew was lost).
Meanwhile, that same day, TF 44, a cruiser-destroyer force under Rear Admiral Crace (RN), joined Lexington's TF11, thus completing the composition of the Allied force on the eve of the crucial Battle of the Coral Sea.
Elsewhere, to the northward, eleven troop-laden transports - escorted by destroyers and covered by the light carrier Shōhō, four heavy cruisers, and a destroyer - steamed toward Port Moresby. In addition, another Japanese task force - formed around the two Pearl Harbor veterans, carriers Shōkaku and Zuikaku, and screened by two heavy cruisers and six destroyers - provided additional air cover.
On the morning of 6 May, Fletcher gathered all Allied forces under his tactical command as TF17. At daybreak on the 7th, he dispatched Crace, with the cruisers and destroyers under his command, toward the Louisiade archipelago to intercept any enemy attempt to move toward Port Moresby.
While Fletcher moved north with his two flattops and their screens in search of the enemy, Japanese search planes located the oiler USS Neosho (AO-23) and her escort, USS Sims (DD-409) and misidentified the former as a carrier. Two waves of Japanese planes — first high level bombers and then dive bombers — attacked the two ships. Sims, her antiaircraft battery crippled by gun failures, took three direct hits and sank quickly with a heavy loss of life. Neosho was more fortunate in that, even after seven direct hits and eight near-misses, she remained afloat until, on the 11th, her survivors were picked up by USS Henley (DD-391) and her hulk sunk by the rescuing destroyer.
Neosho and Sims had performed a valuable service, drawing off the planes that might otherwise have hit Fletcher's carriers. Meanwhile, Yorktown and Lexington's planes found Shōhō and sank her. One of Lexington's pilots reported this victory with the radio message, "Scratch one flattop".
That afternoon, Shōkaku and Zuikaku - still not located by Fletcher's forces - launched 27 bombers and torpedo planes to search for the American ships. Their flight proved uneventful until they ran into fighters from Yorktown and Lexington, who proceeded to down nine enemy planes in the ensuing dogfight.
Near twilight, three Japanese planes incredibly mistook Yorktown for their own carrier and attempted to land. The ship's gunfire, though, drove them off; and the enemy planes crossed Yorktown's bow and turned away out of range. Twenty minutes later, when three more enemy pilots made the mistake of trying to get into Yorktown's landing circle, the carrier's gunners splashed one of the trio.
However, the battle was far from over. The next morning, 8 May, a Lexington search plane spotted Admiral Takeo Takagi's carrier striking force - including Zuikaku and Shōkaku. Yorktown planes scored two bomb hits on Shōkaku, damaging her flight deck and preventing her from launching aircraft; in addition, the bombs set off explosions in gasoline storage tanks and destroyed an engine repair workshop. Lexington's Dauntlesses added another hit. Between the two American air groups, the hits killed 108 Japanese sailors and wounded 40 more.
While the American planes were occupying the Japanese flattops, however, Yorktown and Lexington - alerted by an intercepted message which indicated that the Japanese knew of their whereabouts - were preparing to fight off a retaliatory strike, which came shortly after 11:00.
American CAP Wildcats downed 17 planes, though some managed to slip through the defenses. "Kates" launched torpedoes from both sides of Lexington's bows. Two "fish" tore into "Lady Lex" on the port side; "Val" dive bombers added to the destruction with three bomb hits. Lexington developed a list, with three partially-flooded engineering spaces. Several fires raged below decks, and the carrier's elevators were put out of commission.
Meanwhile Yorktown was having problems of her own. Maneuvered by Captain Elliott Buckmaster, her commanding officer, the carrier dodged eight torpedoes. Attacked then by "Vals", the ship managed to evade all but one bomb. That one, however, penetrated the flight deck and exploded below decks, killing or seriously injuring 66 men.
Lexington's damage control parties brought the fires under control, and the ship was still able to continue flight operations despite the damage. The air battle itself ended shortly before noon on the 8th; within an hour, the carrier was on an even keel, although slightly down by the bow. However, an explosion caused by the ignition of gasoline vapors later caused a fire and tore apart the inside. Lexington was abandoned at 1707, and later sunk by USS Phelps.
The Japanese had won a tactical victory, inflicting comparatively heavier losses on the Allied force, but the Allies, in stemming the tide of Japan's conquests in the South and Southwest Pacific, had achieved a strategic victory. Yorktown had not achieved her part in the victory without cost, and had suffered enough damage to cause experts to estimate that at least three months in a yard would be required to put her back in fighting trim. However, there was little time for repairs, because Allied intelligence - most notably the cryptographic unit at Pearl Harbor - had gained enough information from decoded Japanese naval messages to estimate that the Japanese were on the threshold of a major operation aimed at the northwestern tip of the Hawaiian chain - two islets in a low coral atoll known as Midway.
Battle of Midway
Armed with this intelligence Admiral Nimitz began methodically planning Midway's defense, rushing all possible reinforcement in the way of men, planes and guns to Midway. In addition, he began gathering his naval forces - comparatively meager as they were - to meet the enemy at sea. As part of those preparations, he recalled TF16, Enterprise and Hornet (CV-8), to Pearl Harbor for a quick replenishment.
Yorktown, too, received orders to return to Hawaii; and she arrived at Pearl Harbor on 27 May. Performing a seeming miracle, yard workers there - laboring around the clock - made enough repairs to enable the ship to put to sea. Her air group - for the most part experienced but weary - was augmented by planes and crews from USS Saratoga (CV-3) which was then headed for Hawaiian waters after her modernization on the West Coast. Ready for battle, Yorktown sailed as the core of TF17 on 30 May.
Northeast of Midway, Yorktown, flying Rear Admiral Fletcher's flag, rendezvoused with TF16 under Rear Admiral Raymond A. Spruance and maintained a position 10 miles (16 km) to the northward of him.
Patrols, both from Midway itself and from the carriers, proceeded apace during those days in early June. On the morning of the 4th as dawn began to streak the eastern sky, Yorktown launched a 10-plane group of Dauntlesses from VB-5 which searched a northern semicircle for a distance of 100 miles (160 km) out but found nothing.
Meanwhile, PBYs flying from Midway had sighted the approaching Japanese and broadcast the alarm for the American forces defending the key atoll. Admiral Fletcher, in tactical command, ordered Admiral Spruance's TF16 to locate the enemy carrier force and strike them as soon as they were found.
Yorktown's search group returned at 0830, landing soon after the last of the six-plane CAP had left the deck. When the last of the Dauntlesses were recovered, the deck was hastily respotted for the launch of the ship's attack group - 17 Dauntlesses from VB-3; 12 Devastators from VT-3, and six Wildcats from "Fighting Three." Enterprise and Hornet, meanwhile, launched their attack groups.
The torpedo planes from the three American carriers located the Japanese striking force, but met disaster. Of the 41 planes from VT-8, VT-6, and VT-3, only six returned to Enterprise and Yorktown, collectively. None made it back to Hornet.
The destruction of the torpedo planes, however, had served a purpose. The Japanese CAP had broken off their high-altitude cover for their carriers and had concentrated on the Devastators, flying "on the deck." The skies above were thus left open for Dauntlesses arriving from Yorktown and Enterprise.
Virtually unopposed, Yorktown's dive-bombers pummeled Japanese aircraft carrier Sōryū, making three lethal hits with 1,000 pound bombs, turning her into an inferno.[2] Enterprise's planes, meanwhile, hit Japanese aircraft carrier Akagi and Japanese aircraft carrier Kaga - turning them, too into wrecks in short order. The bombs from the Dauntlesses caught all of the Japanese carriers in the midst of refueling and rearming operations, and the combination of bombs and gasoline proved explosive and disastrous to the Japanese.
Three Japanese carriers had been lost. A fourth however, still roamed at large - Japanese aircraft carrier Hiryū. Separated from her sisters, she launched a striking force of 18 "Vals" and soon located Yorktown.
As soon as the attackers had been picked up on Yorktown's radar at about 1329, she discontinued fueling her CAP fighters on deck and swiftly cleared for action. Her returning dive bombers were moved from the landing circle to open the area for antiaircraft fire. The Dauntlesses were ordered aloft to form a CAP. An auxiliary gasoline tank - of 800 gallons capacity - was pushed over the carrier's fantail, eliminating one fire hazard. The crew drained fuel lines and closed and secured all compartments.
All of Yorktown's fighters were vectored out to intercept the oncoming Japanese aircraft, and did so some 15 to 20 miles (32 km) out. The Wildcats attacked vigorously, breaking up what appeared to be an organized attack by some 18 "Vals" and 18 "Zeroes." "Planes were flying in every direction", wrote Captain Buckmaster after the action, "and many were falling in flames." The leader of the "Vals", Lieutenant Joichi Tomonaga, was probably shot down by the VF-3's commanding officer, Lieutenant Commander John S. Thach.[1].
Despite an intensive barrage and evasive maneuvering, three "Vals" scored hits. Two of them were shot down soon after releasing their bomb loads; the third went out of control just as his bomb left the rack. It tumbled in flight and hit just abaft number two elevator on the starboard side, exploding on contact and blasting a hole about 10 feet (3 m) square in the flight deck. Splinters from the exploding bomb decimated the crews of the two 1.1-inch (28 mm) gun mounts aft of the island and on the flight deck below. Fragments piercing the flight deck hit three planes on the hangar deck, starting fires. One of the aircraft, a Yorktown Dauntless, was fully fueled and carrying a 1,000 pound bomb. Prompt action by Lt. A. C. Emerson, the hangar deck officer, prevented a serious conflagration by activating the sprinkler system and quickly extinguishing the fire.
The second bomb to hit the ship came from the port side, pierced the flight deck, and exploded in the lower part of the funnel. It ruptured the uptakes for three boilers, disabled two boilers themselves, and extinguished the fires in five boilers. Smoke and gases began filling the firerooms of six boilers. The men at number one boiler, however, remained at their post despite their danger and discomfort and kept its fire going, maintaining enough steam pressure to allow the auxiliary steam systems to function.
A third bomb hit the carrier from the starboard side, pierced the side of number one elevator and exploded on the fourth deck, starting a persistent fire in the rag storage space, adjacent to the forward gasoline stowage and the magazines. The prior precaution of smothering the gasoline system with carbon dioxide undoubtedly prevented the gasoline from igniting.
While the ship recovered from the damage inflicted by the dive-bombing attack, her speed dropped to six knots; and then at 14:40, about 20 minutes after the bomb hit that had shut down most of the boilers, Yorktown slowed to a stop, dead in the water.
At about 15:40, Yorktown prepared to get steaming again; and, at 1550, the engine room force reported that they were ready to make 20 knots (23 mph; 37 km/h) or better. The ship was not yet out of the fight.
Simultaneously, with the fires controlled sufficiently to warrant the resumption of fueling, Yorktown began refueling the fighters then on deck; just then the ship's radar picked up an incoming air group at a distance of 33 miles (53 km). While the ship prepared for battle - again smothering gasoline systems and stopping the fueling of the planes on her flight deck - she vectored four of the six fighters of the CAP in the air to intercept the raiders. Of the 10 fighters on board, eight had as little as 23 gallons of fuel in their tanks. They were launched as the remaining pair of fighters of the CAP headed out to intercept the Japanese planes.
At 16:00, maneuvering Yorktown churned forward, making 20 knots (23 mph; 37 km/h). The fighters she had launched and vectored out to intercept had meanwhile made contact with the enemy. Yorktown received reports that the planes were "Kates." The Wildcats shot down at least three, but the rest began their approach while the carrier and her escorts mounted a heavy antiaircraft barrage.
Yorktown maneuvered radically, avoiding at least two torpedoes before another two struck the port side within minutes of each other, the first at 16:20. The carrier had been mortally wounded; she lost power and went dead in the water with a jammed rudder and an increasing list to port.
As the list progressed Commander C. E. Aldrich, the damage control officer, reported from central station that, without power, controlling the flooding looked impossible. The engineering officer, Lt. Cdr. J. F. Delaney, soon reported that all fires were out, but all power was lost and it was impossible to correct the list. Buckmaster ordered Aldrich, Delaney, and their men to secure and lay up on deck to put on life jackets.
The list, meanwhile, continued to increase. When it reached 26 degrees, Buckmaster and Aldrich agreed that capsizing was imminent. "In order to save as many of the ship's company as possible", the captain wrote later, he "ordered the ship to be abandoned."
Over the next few minutes the crew lowered the wounded into life rafts and struck out for the nearby destroyers and cruisers to be picked up by their boats, abandoning ship in good order. After the evacuation of all wounded, the executive officer, Commander I. D. Wiltsie, left the ship down a line on the starboard side. Buckmaster, meanwhile, toured the ship one last time, to see if any men remained. After finding no "live personnel", Buckmaster lowered himself into the water by means of a line over the stern, by which time water was lapping the port side of the hangar deck.
Salvage and sinking
After being picked up by the destroyer USS Hammann (DD-412), Buckmaster transferred to USS Astoria (CA-34) and reported to Rear Admiral Fletcher, who had shifted his flag to the heavy cruiser after the first dive-bombing attack. The two men agreed that a salvage party should attempt to save the ship, since she had stubbornly remained afloat despite the heavy list and imminent danger of capsizing.
While efforts to save Yorktown had been proceeding apace, her planes were still in action, joining those from USS Enterprise (CV-6) in striking the last Japanese carrier - Hiryū - late that afternoon. Taking four direct hits, the Japanese carrier was soon helpless. She was abandoned by her crew and left to drift out of control.
Yorktown, as it turned out, floated throughout the night. Two men were still alive on board her; one attracted attention by firing a machine gun, heard by the sole attending destroyer, Hughes. The escort picked up the men, one of whom later died.
Meanwhile, Buckmaster had selected 29 officers and 141 men to return to the ship in an attempt to save her. Five destroyers formed an antisubmarine screen while the salvage party boarded the listing carrier, the fire in the rag storage still smouldering on the morning of the 6th. USS Vireo (AT-144), summoned from Pearl and Hermes Reef, soon commenced towing the ship, although progress was painfully slow.
Yorktown's repair party went on board with a carefully predetermined plan of action to be carried out by men from each department - damage control, gunnery air engineering, navigation, communication, supply and medical. To assist in the work, Lt. Cdr. Arnold E. True brought his ship, USS Hammann (DD-412), alongside to starboard, aft, furnishing pumps and electric power.
By mid-afternoon, it looked as if the gamble to save the ship was paying off. The process of reducing topside weight was proceeding well - one 5-inch (127 mm) gun had been dropped over the side, and a second was ready to be cast loose; planes had been pushed over the side; the submersible pumps (powered by electricity provided by Hammann) had pumped a lot of water out of the engineering spaces. The efforts of the salvage crew had reduced the list about two degrees.
Unknown to Yorktown and the six nearby destroyers, Japanese submarine I-168 had achieved a favorable firing position. Remarkably - but perhaps understandably due to the debris and wreckage in the water in the vicinity - none of the destroyers picked up the approaching I-boat. At 15:36 lookouts spotted a salvo of four torpedoes approaching the ship from the starboard beam.
Hammann went to general quarters, a 20 millimeter gun going into action in an attempt to explode the torpedoes in the water. Her screws churning the water beneath her fantail as she tried to get underway - one torpedo hit Hammann directly amidships and broke her back. The destroyer jackknifed and went down rapidly.
Two torpedoes struck Yorktown just below the turn of the bilge at the after end of the island structure. The fourth torpedo passed just astern of the carrier.
About a minute after Hammann sank there was an underwater explosion, possibly caused by the destroyer's depth charges going off. The blast killed many of Hammann's and a few of Yorktown's men who had been thrown into the water. The concussion battered the already-damaged carrier's hull and caused tremendous shocks that carried away Yorktown's auxiliary generator, sent numerous fixtures from the hangar deck overhead crashing to the deck below, sheared rivets in the starboard leg of the foremast, and threw men in every direction, causing broken bones and several minor injuries.
All destroyers immediately commenced searches for the enemy submarine (which escaped) and commenced rescuing men from Hammann and Yorktown. Captain Buckmaster decided to postpone further attempts at salvage until the following day.
Vireo cut the tow and doubled back to Yorktown to pick up survivors, taking on board many men of the salvage crew while picking up men from the water. The little ship endured a terrific pounding from the larger ship but nevertheless stayed alongside to carry out her rescue mission. Later, while on board the tug, Buckmaster conducted a burial service, and two officers and an enlisted man from Hammann were buried at sea.
The second attempt at salvage was never made. Throughout the night of the 6th and into the morning of the 7th, Yorktown remained stubbornly afloat. By 05:30 on 7 June, however, the men in the ships nearby noted that the carrier's list was rapidly increasing to port. At 07:01, the ship turned over onto her port side and sank in 3,000 fathoms (5,500 m) of water, her battle flags flying.
Honors and rediscovery
Yorktown (CV-5) earned three battle stars for her World War II service, two of them for the significant part she had played in stopping Japanese expansion and turning the tide of the war at Coral Sea and at Midway.
On 19 May 1998, the wreck of Yorktown was found and photographed by renowned oceanographer Dr. Robert D. Ballard, discoverer of the wreck of the RMS Titanic. The wreck, 3 miles (5 km) beneath the surface, was surprisingly intact after having been on the sea bottom since 1942—much paint and equipment were still visible.
this is a scan from a print I recived from the Navy back in 1977
ISO 27001 ISMS Training Videos By Luv Johar
Security policy, Organization of information security, Asset management, Human resources security, Physical and environmental security, Communications and operations management, Access control, Information systems acquisition, development and maintenance, Information security incident management, Business continuity management, Regulatory compliance, Lead Auditors, Information Security Professionals, CTO, CISO, Ransomeware, Ransomeware virus, ransomeware attack, what is ransomeware, mac ransomeware, windows ransomeware, anti ransomeware, computer virus, encryption, malware, virus, infection agent, bitcoin, security, wannacry ransomeware, wanna cry, virus wannacry, wannacry patch, cyber attack, wannacry attack, wanna cry attack, ransomware meaning, ransomeware attacks, ransomeware prevention, ransomeware removal, ransomeware awareness, ransomeware antivirus, isms security, isms audit, isms implementation, isms 27001, isms scope, isms training, isms video, isms risk, isms policy, isms iso 27001, isms awareness training, Isms certification, ISMS audit, isms meaning, isms full form, isms policy, isms stands for, isms 27001, isms awareness, isms security, isms auditor, isms awareness trainings, isms audit reports, isms benefits, isms controls, isms checklist, isms clauses, isms trainings, isms course, isms documentation, isms documents list, isms define, isms explained, isms 27001 controls, isms 27001 manuals, isms 27001 audits, isms standards, isms 27001 standards, isms bestpractices, isms audit checklist, isms governance framework,Iso 27001 lead auditor training videos, iso 27001 tutorials, iso 27001 controls, iso 27001 implementation, iso 27001 risk assessment, iso 27001 lead implementer, iso 27001 lead auditor, iso 27001 lead implementer training, iso 27001 training, iso 27001 audit, iso 27001, iso 27001 awareness presentation, iso 27001 auditing checklist, iso 27001 bcm, iso 27001 business continuity, iso 27001 basics, iso 27001 certification, iso 27001 cbt nuggets, iso 27001 cryptography, iso 27001 certification guide, iso 27001, case study, iso 27001 context of the organization, iso 27001 documentation templates, iso 27001 exam, iso 27001 exam explained, iso 27001 free training, iso 27001 for beginners, iso 27001 foundation, iso 27001 framework, iso 27001 introduction, iso 27001 implementation steps, information security courses, information security interview questions, information security policy, information security management system, information security certifications, information security management, information security awareness, information security audit, information security awareness, information security audit checklist, an information security governance framework, an information security policy, an information security threat is, an information security management system, become a information security analyst, a career in information security, what is a information security, what is a information security officer, information security book, information security basics, information security blogs, information security breaches, information security best practices, information security consultant, information security concepts, information security certification in india, information security cia, c.i.a. information security, information security definition, information security domains, information security education and awareness, information security framework, information security forum, information security fundamentals, information security for beginners, information security for dummies, information security governance, information security goals, information security group, information security governance and risk management, information security guidelines, information security glossary, information security goals and objectives, information security handbook, information security interview questions and answers, information security incident, information security is characterized as the preservation of, information security is a matter of building and maintaining, information security incident management, information security importance, information security keywords, information security kpi, information security key points, information security key risk indicators, information security kpi metrics, information security kpi examples, information security key risk indicators examples, information security key performance indicators, information security lifecycle, information security objectives, principles of information security, definition of information security, importance of information security,
La SG-41 (Schlüsselgerät 41), màquina de xifratge alemanya molt poc coneguda, hauria estat la substituta de la famosissima Enigma, si la SGM hagués durat més.
cryptomuseum.com/crypto/sg41/index.htm
Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
The quite unknown German SG-41 (Schlüsselgerät 41) would had been the substitute of the World famous Enigma cipher machine, had WW2 ended later. It was a very different machine, and looks like it was harder to crack.
cryptomuseum.com/crypto/sg41/index.htm
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.
Aqui teniu un parell de rotors de la famosa máquina de xifratge Enigma.
ca.wikipedia.org/wiki/M%c3%a0quina_Enigma
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
These are a couple of german Enigma's rotors (walzen), showing their electrical contacts.
www.youtube.com/watch?v=JJm4-lqRJDc
en.wikipedia.org/wiki/Enigma_machine
cryptomuseum.com/crypto/enigma/i/index.htm
The emulator (all the site is wonderful):
users.telenet.be/d.rijmenants/en/enigmasim.htm
en.wikipedia.org/wiki/Bletchley_Park
www.bletchleypark.org/content/museum.rhtm
For an impresive virtual visit, take a look to these videos:
Joon Ian Wong, Founder, Cryptographic Media, Alex Zhang, Mayor, Friends with Benefits and Meltem Demirors, CSO, CoinShares
(Morgan Brown/Shutterstock/CoinDesk)
(Candid street shot, London,UK). Hundreds of friends, but no one to talk to!
The U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create,” Apple CEO Tim Cook said. “They have asked us to build a backdoor to the iPhone. Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software – which does not exist today – would have the potential to unlock any iPhone in someone’s physical possession.”
Apple’s position on the matter is clear: acquiescing to the FBI’s request to develop a tool to unlock an iPhone, even if it belonged to a murderous terrorist, would set a dangerous precedent and slippery slope.
China is watching the dispute closely. Analysts say the Chinese government does take cues from United States when it comes to encryption regulations, and that it would most likely demand that multinational companies provide accommodations similar to those in United States.
Last year, Beijing backed off several proposals that would have mandated that foreign firms providing encryption keys for devices sold in China after heavy pressure from foreign trade groups. …
While it’s still not clear how the law might be carried out, it is possible a push from American law enforcement agencies to unlock iPhones would embolden Beijing to demand the same. China would also most likely push to acquire any technology that would allow it to unlock iPhones.
-------------------------------------------------
Never mind the FBI in the UK, GCHQ have been monitoring your communications for years, they didn't even bother to ask.
Edward Snowden, former intelligence contractor told the BBC's Panorama that UK intelligence agency GCHQ had the power to hack into phones without their owners' knowledge.
The UK government declined to comment.
----------------------------------------
1st March 2016
New UK Snooper’s charter still gives state wide hacking powers
The latest version of the Investigatory Powers Bill has failed to clarify tricky issues like encryption and gives police and security services wide-ranging powers
Rotor wheels on the Bombe exhibit at Bletchley Park, one of the devices which ultimately helped save lives and shorten the second world war. Polish contribution to the war effort is also noted.
Falin Mynd is an audiovisual installation dedicated to the city of Milan that draws inspiration from the concept of the latent image in the photographic field: an invisible imprint left by the light on the film that is revealed only after its development. Similarly, the data generated by the inhabitants and visitors of the city of Milan produce abstract digital landscapes, leaving a trace from their analysis and interpretation in real-time. In this way, the work makes visible the indissoluble bond between individual and community, highlighting how the two entities influence one another changing the perception of the reality surrounding us made of places, people, colors, and sensations. The data thus constitute an invisible image of the city, a map of what is not manifest and which is revealed in Falin Mynd.
The project premiered on July 20th, 2020 at Malpensa airport as part of the "Nice to MEET you" project, curated by MEET Digital Culture Center with the support of SEA. Each cycle analyzes the tweets published in Milan, and each of them is assigned a geotag and an emotional value, a positivity/negativity index of the content obtained through a semantic analysis of the text. The analyzed tweets are then organized into clusters and displayed on the generated map based on the geolocated position and colored according to their emotional impact. We also used GDELT, a service that monitors the news published by the media, press agencies and newspapers around the world updated in real-time, to filter the news from Italy and archive the emotional value assigned to them. The average of the measured values becomes a sort of background noise that distorts and modifies some aspects of the generation of visual and sound elements. The sound of the work was developed starting from the concept of musical cryptography. This technique allows you to create a sequence of notes by encoding a non-musical content, typically a text. The texts of the tweets converted into binary format, create numerical sequences that are used as rhythmic impulses to trigger musical notes, also obtained from the conversion of the text. These melodic structures are then elaborated through the counterpoint composition technique of the canon. Sounds intertwine imitating each other progressively, creating polyphonic flows in continuous transformation. Twitter ->>> 🎶🎼
The notes extracted from the tweets are obtained starting from chords extended beyond the triad form, temporally following harmonic progressions. The positive and negative values released by GDELT are associated with a major or minor scale to express a "global" emotional sensation, taking advantage of the expressive nature given by the interval structure of the scales.
The entire design and programming were carried out with max / MSP and Javascript, then integrated within Ableton Live via M4L. ***I really loved this installation. I really don’t think people go on social media to waste their time. People search for information. People search for communication. People want to be a part of something whether emotionally or intellectually.****
Man it feels good when you crack a code and open a door, and look whats behind it! Another riddler trophy! Concept art unlocked, Hooray!
Cinta perforada, un dels primers sistemes d'enmagatzematge d'informació per a màquines, en aquest cas formant part del que s'anomanaba Heath Robinson, un primitiu sistema de desxifratge de la complexa maquina Lorenz, emprada pel propi Hitler i els comandaments principals de la Wehrmacht. Heath Robinson comparava dues cintes identiques però en posicions diferents. La lectura es feia per mitjà de cel·lules fotoelectriques.
Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
This punched tape was part of the primitive deciphering machine called Heath Robinson, used to crack the mighty Lorenz cipher, used by Hitler himself. It compared two streams with the same information, looking for patterns in it.
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
en.wikipedia.org/wiki/Heath_Robinson_%28codebreaking_mach...
From Wikipedia, the free encyclopedia
The Lockheed Martin F-22 Raptor is a fifth-generation, single-seat, twin-engine, all-weather stealth tactical fighter aircraft developed for the United States Air Force (USAF). The result of the USAF's Advanced Tactical Fighter (ATF) program, the aircraft was designed primarily as an air superiority fighter, but also has ground attack, electronic warfare, and signal intelligence capabilities. The prime contractor, Lockheed Martin, built most of the F-22's airframe and weapons systems and conducted final assembly, while Boeing provided the wings, aft fuselage, avionics integration, and training systems.
The aircraft was variously designated F-22 and F/A-22 before it formally entered service in December 2005 as the F-22A. Despite its protracted development and various operational issues, USAF officials consider the F-22 a critical component of the service's tactical air power. Its combination of stealth, aerodynamic performance, and situational awareness enable unprecedented air combat capabilities.
Service officials had originally planned to buy a total of 750 ATFs. In 2009, the program was cut to 187 operational production aircraft due to high costs, a lack of clear air-to-air missions due to delays in Russian and Chinese fighter programs, a ban on exports, and development of the more versatile F-35. The last F-22 was delivered in 2012.
Development
Origins
In 1981, the U.S. Air Force identified a requirement for an Advanced Tactical Fighter (ATF) to replace the F-15 Eagle and F-16 Fighting Falcon. Code named "Senior Sky", this air-superiority fighter program was influenced by emerging worldwide threats, including new developments in Soviet air defense systems and the proliferation of the Su-27 "Flanker"- and MiG-29 "Fulcrum"-class of fighter aircraft. It would take advantage of the new technologies in fighter design on the horizon, including composite materials, lightweight alloys, advanced flight control systems, more powerful propulsion systems, and most importantly, stealth technology. In 1983, the ATF concept development team became the System Program Office (SPO) and managed the program at Wright-Patterson Air Force Base. The demonstration and validation (Dem/Val) request for proposals (RFP) was issued in September 1985, with requirements placing strong emphasis on stealth and supercruise. Of the seven bidding companies, Lockheed and Northrop were selected on 31 October 1986. Lockheed teamed with Boeing and General Dynamics while Northrop teamed with McDonnell Douglas, and the two contractor teams undertook a 50-month Dem/Val phase, culminating in the flight test of two technology demonstrator prototypes, the YF-22 and the YF-23, respectively.
Dem/Val was focused on risk reduction and technology development plans over specific aircraft designs. Contractors made extensive use of analytical and empirical methods, including computational fluid dynamics, wind-tunnel testing, and radar cross-section calculations and pole testing; the Lockheed team would conduct nearly 18,000 hours of wind-tunnel testing. Avionics development was marked by extensive testing and prototyping and supported by ground and flying laboratories. During Dem/Val, the SPO used the results of performance and cost trade studies conducted by contractor teams to adjust ATF requirements and delete ones that were significant weight and cost drivers while having marginal value. The short takeoff and landing (STOL) requirement was relaxed in order to delete thrust-reversers, saving substantial weight. As avionics was a major cost driver, side-looking radars were deleted, and the dedicated infra-red search and track (IRST) system was downgraded from multi-color to single color and then deleted as well. However, space and cooling provisions were retained to allow for future addition of these components. The ejection seat requirement was downgraded from a fresh design to the existing McDonnell Douglas ACES II. Despite efforts by the contractor teams to rein in weight, the takeoff gross weight estimate was increased from 50,000 lb (22,700 kg) to 60,000 lb (27,200 kg), resulting in engine thrust requirement increasing from 30,000 lbf (133 kN) to 35,000 lbf (156 kN) class.
Each team produced two prototype air vehicles for Dem/Val, one for each of the two engine options. The YF-22 had its maiden flight on 29 September 1990 and in flight tests achieved up to Mach 1.58 in supercruise. After the Dem/Val flight test of the prototypes, on 23 April 1991, Secretary of the USAF Donald Rice announced the Lockheed team as the winner of the ATF competition. The YF-23 design was considered stealthier and faster, while the YF-22, with its thrust vectoring nozzles, was more maneuverable as well as less expensive and risky. The aviation press speculated that the Lockheed team's design was also more adaptable to the U.S. Navy's Navalized Advanced Tactical Fighter (NATF), but by 1992, the Navy had abandoned NATF.
Production and procurement
As the program moved to full-scale development, or the Engineering & Manufacturing Development (EMD) stage, the production version had notable differences from the YF-22, despite having a broadly similar shape. The swept-back angle of the leading edge was decreased from 48° to 42°, while the vertical stabilizers were shifted rearward and decreased in area by 20%. To improve pilot visibility, the canopy was moved forward 7 inches (18 cm), and the engine intakes moved rearward 14 inches (36 cm). The shapes of the wing and stabilator trailing edges were refined to improve aerodynamics, strength, and stealth characteristics. Increasing weight during development caused slight reductions in range and maneuver performance.
Prime contractor Lockheed Martin Aeronautics manufactured the majority of the airframe and performed final assembly at Dobbins Air Reserve Base in Marietta, Georgia; program partner Boeing Defense, Space & Security provided additional airframe components as well as avionics integration and training systems. The first F-22, an EMD aircraft with tail number 4001, was unveiled at Marietta, Georgia, on 9 April 1997, and first flew on 7 September 1997. Production, with the first lot awarded in September 2000, supported over 1,000 subcontractors and suppliers from 46 states and up to 95,000 jobs, and spanned 15 years at a peak rate of roughly two airplanes per month. In 2006, the F-22 development team won the Collier Trophy, American aviation's most prestigious award. Due to the aircraft's advanced nature, contractors have been targeted by cyberattacks and technology theft.
The USAF originally envisioned ordering 750 ATFs at a total program cost of $44.3 billion and procurement cost of $26.2 billion in fiscal year (FY) 1985 dollars, with production beginning in 1994. The 1990 Major Aircraft Review led by Secretary of Defense Dick Cheney reduced this to 648 aircraft beginning in 1996. By 1997, funding instability had further cut the total to 339, which was again reduced to 277 by 2003. In 2004, the Department of Defense (DoD) further reduced this to 183 operational aircraft, despite the USAF's preference for 381. A multi-year procurement plan was implemented in 2006 to save $15 billion, with total program cost projected to be $62 billion for 183 F-22s distributed to seven combat squadrons. In 2008, Congress passed a defense spending bill that raised the total orders for production aircraft to 187.
The first two F-22s built were EMD aircraft in the Block 1.0 configuration for initial flight testing, while the third was a Block 2.0 aircraft built to represent the internal structure of production airframes and enabled it to test full flight loads. Six more EMD aircraft were built in the Block 10 configuration for development and upgrade testing, with the last two considered essentially production quality jets. Production for operational squadrons consisted of 37 Block 20 training aircraft and 149 Block 30/35 combat aircraft; one of the Block 35 aircraft is dedicated to flight sciences at Edwards Air Force Base.
The numerous new technologies in the F-22 resulted in substantial cost overruns and delays. Many capabilities were deferred to post-service upgrades, reducing the initial cost but increasing total program cost. As production wound down in 2011, the total program cost is estimated to be about $67.3 billion, with $32.4 billion spent on Research, Development, Test and Evaluation (RDT&E) and $34.9 billion on procurement and military construction (MILCON) in then year dollars. The incremental cost for an additional F-22 was estimated at about $138 million in 2009.
Ban on exports
The F-22 cannot be exported under US federal law to protect its stealth technology and other high-tech features. Customers for U.S. fighters are acquiring earlier designs such as the F-15 Eagle and F-16 Fighting Falcon or the newer F-35 Lightning II, which contains technology from the F-22 but was designed to be cheaper, more flexible, and available for export. In September 2006, Congress upheld the ban on foreign F-22 sales. Despite the ban, the 2010 defense authorization bill included provisions requiring the DoD to prepare a report on the costs and feasibility for an F-22 export variant, and another report on the effect of F-22 export sales on U.S. aerospace industry.
Some Australian politicians and defense commentators proposed that Australia should attempt to purchase F-22s instead of the planned F-35s, citing the F-22's known capabilities and F-35's delays and developmental uncertainties. However, the Royal Australian Air Force (RAAF) determined that the F-22 was unable to perform the F-35's strike and close air support roles. The Japanese government also showed interest in the F-22 for its Replacement-Fighter program. The Japan Air Self-Defense Force (JASDF) would reportedly require fewer fighters for its mission if it obtained the F-22, thus reducing engineering and staffing costs. However, in 2009 it was reported that acquiring the F-22 would require increases to the Japanese government's defense budget beyond the historical 1 percent of its GDP. With the end of F-22 production, Japan chose the F-35 in December 2011. Israel also expressed interest, but eventually chose the F-35 because of the F-22's price and unavailability.
Production termination
Throughout the 2000s, the need for F-22s was debated, due to rising costs and the lack of relevant adversaries. In 2006, Comptroller General of the United States David Walker found that "the DoD has not demonstrated the need" for more investment in the F-22, and further opposition to the program was expressed by Secretary of Defense Donald Rumsfeld, Deputy Secretary of Defense Gordon R. England, Senator John McCain, and Chairman of U.S. Senate Committee on Armed Services Senator John Warner. The F-22 program lost influential supporters in 2008 after the forced resignations of Secretary of the Air Force Michael Wynne and the Chief of Staff of the Air Force General T. Michael Moseley.
In November 2008, Secretary of Defense Robert Gates stated that the F-22 was not relevant in post-Cold War conflicts such as irregular warfare operations in Iraq and Afghanistan, and in April 2009, under the new Obama Administration, he called for ending production in FY2011, leaving the USAF with 187 production aircraft. In July, General James Cartwright, Vice Chairman of the Joint Chiefs of Staff, stated to the Senate Committee on Armed Services his reasons for supporting termination of F-22 production. They included shifting resources to the multirole F-35 to allow proliferation of fifth-generation fighters for three service branches and preserving the F/A-18 production line to maintain the military's electronic warfare (EW) capabilities in the Boeing EA-18G Growler.[60] Issues with the F-22's reliability and availability also raised concerns. After President Obama threatened to veto further production, the Senate voted in July 2009 in favor of ending production and the House subsequently agreed to abide by the 187 production aircraft cap. Gates stated that the decision was taken in light of the F-35's capabilities, and in 2010, he set the F-22 requirement to 187 aircraft by lowering the number of major regional conflict preparations from two to one.
In 2010, USAF initiated a study to determine the costs of retaining F-22 tooling for a future Service Life Extension Program (SLEP).[66] A RAND Corporation paper from this study estimated that restarting production and building an additional 75 F-22s would cost $17 billion, resulting in $227 million per aircraft, or $54 million higher than the flyaway cost. Lockheed Martin stated that restarting the production line itself would cost about $200 million. Production tooling and associated documentation were subsequently stored at the Sierra Army Depot, allowing the retained tooling to support the fleet life cycle. There were reports that attempts to retrieve this tooling found empty containers, but a subsequent audit found that the tooling was stored as expected.
Russian and Chinese fighter developments have fueled concern, and in 2009, General John Corley, head of Air Combat Command, stated that a fleet of 187 F-22s would be inadequate, but Secretary Gates dismissed General Corley's concern. In 2011, Gates explained that Chinese fifth-generation fighter developments had been accounted for when the number of F-22s was set, and that the U.S. would have a considerable advantage in stealth aircraft in 2025, even with F-35 delays. In December 2011, the 195th and final F-22 was completed out of 8 test EMD and 187 operational aircraft produced; the aircraft was delivered to the USAF on 2 May 2012.
In April 2016, the House Armed Services Committee (HASC) Tactical Air and Land Forces Subcommittee proposed legislation that would direct the Air Force to conduct a cost study and assessment associated with resuming production of the F-22. Since the production halt directed in 2009 by then Defense Secretary Gates, lawmakers and the Pentagon noted that air warfare systems of Russia and China were catching up to those of the U.S. Lockheed Martin has proposed upgrading the Block 20 training aircraft into combat-coded Block 30/35 versions as a way to increase numbers available for deployment. On 9 June 2017, the Air Force submitted their report to Congress stating they had no plans to restart the F-22 production line due to economic and operational issues; it estimated it would cost approximately $50 billion to procure 194 additional F-22s at a cost of $206–$216 million per aircraft, including approximately $9.9 billion for non-recurring start-up costs and $40.4 billion for aircraft procurement costs.
Upgrades
The first aircraft with combat-capable Block 3.0 software flew in 2001. Increment 2, the first upgrade program, was implemented in 2005 for Block 20 aircraft onward and enabled the employment of Joint Direct Attack Munitions (JDAM). Certification of the improved AN/APG-77(V)1 radar was completed in March 2007, and airframes from production Lot 5 onward are fitted with this radar, which incorporates air-to-ground modes. Increment 3.1 for Block 30 aircraft onward provided improved ground-attack capability through synthetic aperture radar mapping and radio emitter direction finding, electronic attack and Small Diameter Bomb (SDB) integration; testing began in 2009 and the first upgraded aircraft was delivered in 2011. To address oxygen deprivation issues, F-22s were fitted with an automatic backup oxygen system (ABOS) and modified life support system starting in 2012.
Increment 3.2 for Block 35 aircraft is a two-part upgrade process; 3.2A focuses on electronic warfare, communications and identification, while 3.2B includes geolocation improvements and a new stores management system to show the correct symbols for the AIM-9X and AIM-120D.[83][84] To enable two-way communication with other platforms, the F-22 can use the Battlefield Airborne Communications Node (BACN) as a gateway. The planned Multifunction Advanced Data Link (MADL) integration was cut due to development delays and lack of proliferation among USAF platforms. The F-22 fleet is planned to start receiving Increment 3.2B as well as a software upgrade for cryptography capabilities and avionics stability in May 2019. A Multifunctional Information Distribution System-Joint (MIDS-J) radio that replaces the current Link-16 receive-only box is expected to be operational by 2020. Subsequent upgrades are also focusing on having an open architecture to enable faster future enhancements.
In 2024, funding is projected to begin for the F-22 mid-life upgrade (MLU), which is expected to include new sensors and antennas, hardware refresh, cockpit improvements, and a helmet mounted display and cuing system. Other enhancements being developed include IRST functionality for the AN/AAR-56 Missile Launch Detector (MLD) and more durable stealth coating based on the F-35's.
The F-22 was designed for a service life of 8,000 flight hours, with a $350 million "structures retrofit program". Investigations are being made for upgrades to extend their useful lives further. In the long term, the F-22 is expected to be superseded by a sixth-generation jet fighter to be fielded in the 2030s.
Design
Overview
The F-22 Raptor is a fifth-generation fighter that is considered fourth generation in stealth aircraft technology by the USAF.[91] It is the first operational aircraft to combine supercruise, supermaneuverability, stealth, and sensor fusion in a single weapons platform. The F-22 has four empennage surfaces, retractable tricycle landing gear, and clipped delta wings with reverse trailing edge sweep and leading edge extensions running to the upper outboard corner of the inlets. Flight control surfaces include leading-edge flaps, flaperons, ailerons, rudders on the canted vertical stabilizers, and all-moving horizontal tails (stabilators); for speed brake function, the ailerons deflect up, flaperons down, and rudders outwards to increase drag.
The aircraft's dual Pratt & Whitney F119-PW-100 augmented turbofan engines are closely spaced and incorporate pitch-axis thrust vectoring nozzles with a range of ±20 degrees; each engine has maximum thrust in the 35,000 lbf (156 kN) class. The F-22's thrust-to-weight ratio at typical combat weight is nearly at unity in maximum military power and 1.25 in full afterburner. Maximum speed without external stores is approximately Mach 1.8 at military power and greater than Mach 2 with afterburners.
The F-22's high cruise speed and operating altitude over prior fighters improve the effectiveness of its sensors and weapon systems, and increase survivability against ground defenses such as surface-to-air missiles. The aircraft is among only a few that can supercruise, or sustain supersonic flight without using fuel-inefficient afterburners; it can intercept targets which subsonic aircraft would lack the speed to pursue and an afterburner-dependent aircraft would lack the fuel to reach. The F-22's thrust and aerodynamics enable regular combat speeds of Mach 1.5 at 50,000 feet (15,000 m). The use of internal weapons bays permits the aircraft to maintain comparatively higher performance over most other combat-configured fighters due to a lack of aerodynamic drag from external stores. The aircraft's structure contains a significant amount of high-strength materials to withstand stress and heat of sustained supersonic flight. Respectively, titanium alloys and composites comprise 39% and 24% of the structural weight.
The F-22's aerodynamics, relaxed stability, and powerful thrust-vectoring engines give it excellent maneuverability and energy potential across its flight envelope. The airplane has excellent high alpha (angle of attack) characteristics, capable of flying at trimmed alpha of over 60° while maintaining roll control and performing maneuvers such as the Herbst maneuver (J-turn) and Pugachev's Cobra. The flight control system and full-authority digital engine control (FADEC) make the aircraft highly departure resistant and controllable, thus giving the pilot carefree handling.
Stealth
The F-22 was designed to be highly difficult to detect and track by radar. Measures to reduce radar cross-section (RCS) include airframe shaping such as alignment of edges, fixed-geometry serpentine inlets and curved vanes that prevent line-of-sight of the engine faces and turbines from any exterior view, use of radar-absorbent material (RAM), and attention to detail such as hinges and pilot helmets that could provide a radar return. The F-22 was also designed to have decreased radio emissions, infrared signature and acoustic signature as well as reduced visibility to the naked eye. The aircraft's flat thrust-vectoring nozzles reduce infrared emissions of the exhaust plume to mitigate the threat of infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Additional measures to reduce the infrared signature include special topcoat and active cooling of leading edges to manage the heat buildup from supersonic flight.
Compared to previous stealth designs like the F-117, the F-22 is less reliant on RAM, which are maintenance-intensive and susceptible to adverse weather conditions. Unlike the B-2, which requires climate-controlled hangars, the F-22 can undergo repairs on the flight line or in a normal hangar. The F-22 has a Signature Assessment System which delivers warnings when the radar signature is degraded and necessitates repair. While the F-22's exact RCS is classified, in 2009 Lockheed Martin released information indicating that from certain angles the aircraft has an RCS of 0.0001 m² or −40 dBsm – equivalent to the radar reflection of a "steel marble". Effectively maintaining the stealth features can decrease the F-22's mission capable rate to 62–70%.
The effectiveness of the stealth characteristics is difficult to gauge. The RCS value is a restrictive measurement of the aircraft's frontal or side area from the perspective of a static radar. When an aircraft maneuvers it exposes a completely different set of angles and surface area, potentially increasing radar observability. Furthermore, the F-22's stealth contouring and radar absorbent materials are chiefly effective against high-frequency radars, usually found on other aircraft. The effects of Rayleigh scattering and resonance mean that low-frequency radars such as weather radars and early-warning radars are more likely to detect the F-22 due to its physical size. However, such radars are also conspicuous, susceptible to clutter, and have low precision. Additionally, while faint or fleeting radar contacts make defenders aware that a stealth aircraft is present, reliably vectoring interception to attack the aircraft is much more challenging. According to the USAF an F-22 surprised an Iranian F-4 Phantom II that was attempting to intercept an American UAV, despite Iran's assertion of having military VHF radar coverage over the Persian Gulf.
The Postcard
A postally unused Post Office Picture Card Series. On the divided back of the card is printed:
'Children (United Nations Year
of the Child).
(Alice's Adventures in Wonderland).
Reproduced from a stamp designed
by Edward Hughes ARCA FSIAD
and issued by the Post Office on the
18th. July 1979.
Postcard Price 8p.'
Charles Dodgson
Charles Lutwidge Dodgson, better known by his pen name Lewis Carroll, was an English writer of children's fiction, notably 'Alice's Adventures in Wonderland' and its sequel 'Through the Looking-Glass'.
He was noted for his facility with word play, logic, and fantasy. The poems 'Jabberwocky' and 'The Hunting of the Snark' are classified in the genre of literary nonsense.
Charles was also a mathematician, photographer, inventor, and Anglican deacon.
Carroll came from a family of high-church Anglicans, and developed a long relationship with Christ Church, Oxford, where he lived for most of his life as a scholar and teacher.
Alice Liddell, daughter of the Dean of Christ Church, Henry Liddell, is widely identified as the original for Alice in Wonderland, though Carroll always denied this.
Scholars are divided about whether his relationship with children included an erotic component.
In 1982, a memorial stone to Carroll was unveiled in Poets' Corner, Westminster Abbey. There are Lewis Carroll societies in many parts of the world dedicated to the enjoyment and promotion of his works.
Charles Dodgson - The Early Years
Dodgson's family was predominantly northern English, conservative and high-church Anglican. Most of Dodgson's male ancestors were army officers or Church of England clergy.
His paternal grandfather Charles Dodgson had been an army captain, killed in action in Ireland in 1803 when his two sons were hardly more than babies. The older of these sons – yet another Charles Dodgson – was Carroll's father. He went to Westminster School and then to Christ Church, Oxford.
Lewis Carroll's father reverted to the other family tradition and took holy orders. He was mathematically gifted, and won a double first degree, which could have been the prelude to a brilliant academic career. Instead, he married his first cousin Frances Jane Lutwidge in 1830 and became a country parson.
Dodgson was born on the 27th. January 1832 in All Saints' Vicarage at Daresbury, Cheshire, the eldest boy and the third child. Eight more children followed. When Charles was 11, his father was given the living of Croft-on-Tees in the North Riding of Yorkshire, and the whole family moved to the spacious rectory. This remained their home for the next 25 years.
Charles's father was an active and highly conservative cleric of the Church of England who later became the Archdeacon of Richmond and involved himself in the intense religious disputes that were dividing the church. He was high church, inclining toward Anglo-Catholicism. Young Charles was to develop an ambivalent relationship with his father's values, and with the Church of England as a whole.
Charles Dodgson's Education
During his early youth, Dodgson was educated at home. His "reading lists" preserved in the family archives testify to a precocious intellect: at the age of seven, he was reading books such as The Pilgrim's Progress.
He also spoke with a stammer - a condition shared by most of his siblings - that often inhibited his social life throughout his years. At the age of twelve he was sent to Richmond Grammar School in Richmond, North Yorkshire.
Charles Dodgson at Rugby
In 1846, Dodgson entered Rugby School where he was evidently unhappy, as he wrote some years after leaving:
"I cannot say that any earthly considerations would
induce me to go through my three years again. I can
honestly say that if I could have been secure from
annoyance at night, the hardships of the daily life
would have been comparative trifles to bear."
Dodgson did not claim he suffered from bullying, but cited little boys as the main targets of older bullies at Rugby. Stuart Dodgson Collingwood, who was Dodgson's nephew, wrote that:
"Even though it is hard for those who have only
known him as the gentle and retiring don to
believe it, it is nevertheless true that long after
he left school, his name was remembered as that
of a boy who knew well how to use his fists in
defence of a righteous cause, which was the
protection of the smaller boys."
Scholastically, though, he excelled with apparent ease. Mathematics master R. B. Mayor observed:
"I have not had a more promising boy
at his age since I came to Rugby."
The mathematics textbook that the young Dodgson used was
Francis Walkingame's 'The Tutor's Assistant; Being a Compendium of Arithmetic.' It still survives and contains an inscription in Latin, which translates as:
"This book belongs to Charles
Lutwidge Dodgson: hands off!"
Some pages also included annotations such as the one found on page 129, where he wrote "Not a fair question in decimals" next to a question.
Charles Dodgson at Oxford
Charles left Rugby at the end of 1849 and matriculated at the University of Oxford in May 1850 as a member of his father's old college, Christ Church.
He went into residence in January 1851. He had been at Oxford only two days when he received a summons home. His mother had died of "inflammation of the brain" - perhaps meningitis or a stroke - at the age of 47.
Charles' early academic career veered between high promise and irresistible distraction. He did not always work hard, but was exceptionally gifted, and achievement came easily to him.
In 1852, he obtained first-class honours in Mathematics Moderations, and was shortly thereafter nominated to a Studentship by his father's old friend Canon Edward Pusey.
In 1854, he obtained first-class honours in the Final Honours School of Mathematics, standing first on the list, graduating Bachelor of Arts. He remained at Christ Church studying and teaching, but the next year he failed an important scholarship through his self-confessed inability to apply himself to study.
Even so, his talent as a mathematician won him the Christ Church Mathematical Lectureship in 1855, which he continued to hold for the next 26 years. Despite early unhappiness,
Dodgson was to remain at Christ Church, in various capacities, until his death, including that of Sub-Librarian of the Christ Church library, where his office was close to the Deanery, where Alice Liddell lived.
Charles Dodgson's Health Issues
As a very young child, Charles suffered a fever that left him deaf in one ear. At the age of 17, he suffered a severe attack of whooping cough, which was probably responsible for his chronically weak chest in later life. In early childhood, he acquired a stammer, which he referred to as his "hesitation"; it remained throughout his life.
The young adult Charles Dodgson was about 6 feet (1.83 m) tall and slender, with curly brown hair and blue or grey eyes (depending on the account). He was described in later life as somewhat asymmetrical, and as carrying himself rather stiffly and awkwardly, although this might be on account of a knee injury sustained in middle age.
Charles Dodgson's Stammer
The stammer has always been a significant part of the image of Dodgson. While one apocryphal story says that he stammered only in adult company and was free and fluent with children, there is no evidence to support this idea. Many children of his acquaintance remembered the stammer, while many adults failed to notice it.
Dodgson himself seems to have been far more acutely aware of it than most people whom he met; it is said that he caricatured himself as the Dodo in Alice's Adventures in Wonderland, referring to his difficulty in pronouncing his last name, but this is one of the many supposed facts often repeated for which no first-hand evidence remains.
He did indeed refer to himself as the dodo, but whether or not this reference was to his stammer is simply speculation.
Dodgson's stammer did trouble him, but it was never so debilitating that it prevented him from applying his other personal qualities to do well in society. He lived in a time when people commonly devised their own amusements, and when singing and recitation were required social skills, the young Dodgson was well equipped to be an engaging entertainer.
He reportedly could sing tolerably well, and was not afraid to do so before an audience. He was adept at mimicry and storytelling, and was reputedly quite good at charades.
Charles Dodgson's Social Connections
In the interim between his early published writings and the success of the Alice books, Dodgson began to move in the pre-Raphaelite social circle. He first met John Ruskin in 1857 and became friendly with him.
Around 1863, he developed a close relationship with Dante Gabriel Rossetti and his family. He would often take pictures of the family in the garden of the Rossetti's house in Chelsea. He also knew William Holman Hunt and John Everett Millais, among other artists.
Charles knew fairy-tale author George MacDonald well - in fact it was the enthusiastic reception of Alice by the young MacDonald children that persuaded him to submit the work for publication.
Charles Dodgson's Politics, Religion, and Philosophy
In broad terms, Dodgson has traditionally been regarded as politically, religiously, and personally conservative. Martin Gardner labelled Dodgson as:
"A Tory who was awed by lords and
inclined to be snobbish towards
inferiors".
The Reverend W. Tuckwell, in his Reminiscences of Oxford (1900), regarded him as:
"Austere, shy, precise, absorbed in mathematical
reverie, watchfully tenacious of his dignity, stiffly
conservative in political, theological, social theory,
his life mapped out in squares like Alice's landscape".
Dodgson was ordained as a deacon in the Church of England on the 22nd. December 1861. In 'The Life and Letters of Lewis Carroll', the editor states that:
"His Diary is full of such modest depreciations of
himself and his work, interspersed with earnest
prayers (too sacred and private to be reproduced
here) that God would forgive him the past, and
help him to perform His holy will in the future."
When a friend asked him in 1897 about his religious views, Dodgson wrote in response that he was a member of the Church of England, but doubted if he was fully a 'High Churchman'. He added:
"I believe that when you and I come to lie down
for the last time, if only we can keep firm hold of
the great truths Christ taught us - our own utter
worthlessness and His infinite worth; and that He
has brought us back to our one Father, and made
us His brethren, and so brethren to one another -
we shall have all we need to guide us through the
shadows.
Most assuredly I accept to the full the doctrines
you refer to - that Christ died to save us, that we
have no other way of salvation open to us but
through His death, and that it is by faith in Him,
and through no merit of ours, that we are
reconciled to God; and most assuredly I can
cordially say I owe all to Him who loved me, and
died on the Cross of Calvary."
Dodgson also expressed interest in other fields. He was an early member of the Society for Psychical Research, and one of his letters suggests that he accepted as real what was then called 'thought reading.'
In 1895, Charles developed an argument on deductive reasoning in his article 'What the Tortoise Said to Achilles', which appeared in one of the early volumes of Mind. The article was reprinted in the same journal a hundred years later in 1995, with a subsequent article by Simon Blackburn entitled 'Practical Tortoise Raising.'
Charles Dodgson's Literary and Artistic Activities
From a young age, Dodgson wrote poetry and short stories, contributing heavily to the family magazine Mischmasch and later sending them to various magazines, enjoying moderate success.
Some time after 1850, he wrote puppet plays for his siblings' entertainment, of which one has survived: 'La Guida di Bragia'.
Between 1854 and 1856, his work appeared in the national publications The Comic Times and The Train, as well as smaller magazines such as the Whitby Gazette and the Oxford Critic. Most of this output was humorous, sometimes satirical, but his standards and ambitions were exacting. In July 1855 he wrote:
"I do not think I have yet written anything
worthy of real publication (in which I do not
include the Whitby Gazette or the Oxonian
Advertiser), but I do not despair of doing
so someday."
In March 1856, he published his first piece of work under the name that would make him famous. A romantic poem called 'Solitude' appeared in The Train under the authorship of 'Lewis Carroll.'
This pseudonym was a play on his real name: Lewis was the anglicised form of Ludovicus, which was the Latin for Lutwidge, and Carroll an Irish surname similar to the Latin name Carolus, from which comes the name Charles. The pseudonym was chosen by editor Edmund Yates from a list of four submitted by Dodgson, the others being Edgar Cuthwellis, Edgar U. C. Westhill, and Louis Carroll.
The Alice Books
In 1856, Dean Henry Liddell arrived at Christ Church, bringing with him his young family, all of whom would figure largely in Dodgson's life over the following years, and would greatly influence his writing career.
Dodgson became close friends with Liddell's wife Lorina and their children, particularly the three sisters Lorina, Edith, and Alice Liddell.
Charles was widely assumed for many years to have derived his own 'Alice' from Alice Liddell; the acrostic poem at the end of Through the Looking-Glass spells out her name in full, and there are also many superficial references to her hidden in the text of both books.
Dodgson himself repeatedly denied in later life that his 'little heroine' was based on any real child, and he frequently dedicated his works to girls of his acquaintance, adding their names in acrostic poems at the beginning of the text.
Gertrude Chataway's name appears in this form at the beginning of The Hunting of the Snark, and it is not suggested that this means that any of the characters in the narrative are based on her.
Information is scarce (Dodgson's diaries for the years 1858–1862 are missing), but it seems clear that his friendship with the Liddell family was an important part of his life in the late 1850's, and he grew into the habit of taking the children on rowing trips (first the boy Harry, and later the three girls) accompanied by an adult friend to nearby Nuneham Courtenay or Godstow.
It was on one such expedition on the 4th. July 1862 that Dodgson invented the outline of the story that eventually became his first and greatest commercial success. He told the story to Alice Liddell, and she begged him to write it down, and Dodgson eventually (after much delay) presented her with a handwritten, illustrated manuscript entitled 'Alice's Adventures Under Ground' in November 1864.
Before this, the family of friend and mentor George MacDonald read Dodgson's incomplete manuscript, and the enthusiasm of the MacDonald children encouraged Dodgson to seek publication. In 1863, he took the unfinished manuscript to Macmillan the publisher, who liked it immediately.
After possible alternative titles were rejected - 'Alice Among the Fairies' and 'Alice's Golden Hour' - the work was finally published as Alice's Adventures in Wonderland in 1865 under the Lewis Carroll pen-name, which Dodgson had first used some nine years earlier.
The illustrations were by Sir John Tenniel; Dodgson evidently thought that a published book would need the skills of a professional artist. Annotated versions provide insights into many of the ideas and hidden meanings that are prevalent in these books.[ Critical literature has often proposed Freudian interpretations of the book as "a descent into the dark world of the subconscious", as well as seeing it as a satire upon contemporary mathematical advances.
The overwhelming commercial success of the first Alice book changed Dodgson's life in many ways. The fame of his alter ego Lewis Carroll soon spread around the world. He was inundated with fan mail, and with sometimes unwanted attention.
Indeed, according to one popular story, Queen Victoria herself enjoyed Alice in Wonderland so much that she commanded that he dedicate his next book to her, and was accordingly presented with his next work, a scholarly mathematical volume entitled 'An Elementary Treatise on Determinants.'
Dodgson himself vehemently denied this story, commenting:
"It is utterly false in every particular:
nothing even resembling it has
occurred."
It is also unlikely for other reasons. As T. B. Strong commented in a Times article:
"It would have been clean contrary to all
his practice to identify the author of Alice
with the author of his mathematical works".
Although Charles began earning quite substantial sums of money, he continued with his seemingly disliked post at Christ Church.
Late in 1871, he published the sequel Through the Looking-Glass, and What Alice Found There. Its somewhat darker mood possibly reflects changes in Dodgson's life. His father's death in 1868 plunged him into a depression that lasted some years.
The Hunting of the Snark
In 1876, Dodgson produced his next great work, The Hunting of the Snark, a fantastical 'nonsense' poem, with illustrations by Henry Holiday, exploring the adventures of a bizarre crew of nine tradesmen and one beaver, who set off to find the snark.
It received largely mixed reviews from Carroll's contemporary reviewers, but was enormously popular with the public, having been reprinted seventeen times between 1876 and 1908. It has seen various adaptations into musicals, opera, theatre, plays and music. Painter Dante Gabriel Rossetti reputedly became convinced that the poem was about him.
Sylvie and Bruno
In 1895, 30 years after the publication of his masterpieces, Carroll attempted a comeback, producing a two-volume tale of the fairy siblings Sylvie and Bruno. Carroll entwines two plots set in two alternative worlds, one set in rural England and the other in the fairytale kingdoms of Elfland, Outland, and others.
The fairytale world satirises English society, and more specifically the world of academia. Sylvie and Bruno came out in two volumes and is considered a lesser work, although it has remained in print for over a century.
Charles Dodgson's Photography (1856–1880)
In 1856, Dodgson took up the new art form of photography under the influence first of his uncle Skeffington Lutwidge, and later of his Oxford friend Reginald Southey. He soon excelled at the art, and became a well-known gentleman-photographer. Charles even toyed with the idea of making a living out of it in his early years.
A study by Roger Taylor and Edward Wakeling exhaustively lists every surviving print, and Taylor calculates that just over half of his surviving work depicts young girls, though about 60% of his original photographic portfolio is now missing.
Dodgson also made many studies of men, women, boys, and landscapes; his subjects also include skeletons, dolls, dogs, statues, paintings, and trees. His pictures of children were taken with a parent in attendance, and many of the pictures were taken in the Liddell garden because natural sunlight was required for good exposures.
Charles also found photography to be a useful entrée into higher social circles. During the most productive part of his career, he made portraits of notable sitters such as John Everett Millais, Ellen Terry, Dante Gabriel Rossetti, Michael Faraday, Lord Salisbury, and Alfred Lord Tennyson.
By the time that Dodgson abruptly ceased photography in 1880, over 24 years), he had established his own studio on the roof of Tom Quad. Over the course of 24 years he created around 3,000 images, and was an amateur master of the medium, although fewer than 1,000 images have survived time and deliberate destruction.
Charles stopped taking photographs because keeping his studio working was too time-consuming. He used the wet collodion process; commercial photographers who started using the dry-plate process in the 1870's took pictures more quickly.
Charles Dodgson's Inventions
In order to promote letter writing, Dodgson invented "The Wonderland Postage-Stamp Case" in 1889. This was a cloth-backed folder with twelve slots, two marked for inserting the most commonly used penny stamp, and one each for the other current denominations up to one shilling.
The folder was then put into a slipcase decorated with a picture of Alice on the front, and the Cheshire Cat on the back. It was intended to organize stamps wherever writing utensils were stored. Carroll expressly noted in 'Eight or Nine Wise Words about Letter-Writing' that it was not intended to be carried in a pocket or purse, as individual stamps could easily be carried on their own. The pack included a copy of a pamphlet version of this lecture.
Another invention was a writing tablet called the nyctograph that allowed note-taking in the dark, thus eliminating the need to get out of bed and strike a light when one woke with an idea. The device consisted of a gridded card with sixteen squares and a system of symbols representing an alphabet of Dodgson's design, using letter shapes similar to the Graffiti writing system on a Palm device.
Charles also devised a number of games, including an early version of what today is known as Scrabble. He appears to have invented - or at least certainly popularised - the 'doublet', a form of brain-teaser that is still popular today, changing one word into another by altering one letter at a time, each successive change always resulting in a genuine word.
The games and puzzles of Lewis Carroll were the subject of Martin Gardner's March 1960 Mathematical Games column in Scientific American.
Charles' other inventions include:
-- A rule for finding the day of the week for any date
-- A a means for justifying right margins on a typewriter
-- A steering device for a velociam (a type of tricycle)
-- Fairer elimination rules for tennis tournaments
-- A new type of postal money order
-- Rules for reckoning postage
-- Rules for a win in betting
-- Rules for dividing a number by various divisors
-- A cardboard scale for the Senior Common Room at Christ Church which, held next to a glass, ensured the right amount of liqueur for the price paid
-- A double-sided adhesive strip to fasten envelopes or mount things in books
-- A device for helping a bedridden invalid to read from a book placed sideways
-- At least two ciphers for cryptography.
Charles also proposed alternative systems of parliamentary representation. He proposed the so-called Dodgson's method. In 1884, he proposed a proportional representation system based on multi-member districts, each voter casting only a single vote, quotas as minimum requirements to take seats, and votes transferable by candidates through what is now called Liquid democracy.
Charles Dodgson's Mathematical Work
Within the academic discipline of mathematics, Dodgson worked primarily in the fields of geometry, linear and matrix algebra, mathematical logic, and recreational mathematics, producing nearly a dozen books under his real name.
Dodgson also developed new ideas in probability and linear algebra (e.g., the first printed proof of the Kronecker–Capelli theorem). He also researched the process of elections and committees; some of this work was not published until well after his death.
Charles Dodgson's Mathematical Logic
Charles' work in the field of mathematical logic attracted renewed interest in the late 20th. century. Martin Gardner's book on logic machines and diagrams, and William Warren Bartley's posthumous publication of the second part of Dodgson's symbolic logic book have sparked a re-evaluation of Dodgson's contributions to symbolic logic.
In his Symbolic Logic Part II, Dodgson introduced the Method of Trees, the earliest modern use of a truth tree.
Charles Dodgson's Algebra
Robbins' and Rumsey's investigation of Dodgson condensation, a method of evaluating determinants, led them to the alternating sign matrix conjecture, which is now a theorem.
Charles Dodgson's Recreational Mathematics
The discovery in the 1990's of additional ciphers that Dodgson had constructed, in addition to his 'Memoria Technica', showed that he had employed sophisticated mathematical ideas in their creation.
Charles Dodgson's Correspondence
Dodgson wrote and received as many as 98,721 letters, according to a special letter register which he devised. He documented his advice about how to write more satisfying letters in a missive entitled 'Eight or Nine Wise Words about Letter-Writing'.
Charles Dodgson - The Later Years
Dodgson's existence remained little changed over the final twenty years of his life, despite his growing wealth and fame. He continued to teach at Christ Church until 1881, and remained in residence there until his death.
Public appearances included attending the West End musical Alice in Wonderland (the first major live production of his Alice books) at the Prince of Wales Theatre on the 30th. December 1886.
The two volumes of his last novel, Sylvie and Bruno, were published in 1889 and 1893, but the intricacy of this work was apparently not appreciated by contemporary readers; it achieved nothing like the success of the Alice books, with disappointing reviews and sales of only 13,000 copies.
The only known occasion on which Charles travelled abroad was a trip to Russia in 1867 as an ecclesiastic, together with the Reverend Henry Liddon. He recounts the travel in his 'Russian Journal', which was first commercially published in 1935.
The Death of Charles Dodgson
Dodgson died of pneumonia following influenza on the 14th. January 1898 at his sisters' home, 'The Chestnuts', in Guildford, Surrey, just four days before the death of Henry Liddell. Charles was two weeks away from turning 66 years old.
His funeral service was held at the nearby St. Mary's Church, and he was laid to rest at the Mount Cemetery in Guildford.
Charles Dodgson's Sexuality
Some late twentieth-century biographers have suggested that Dodgson's interest in children had an erotic element, including Morton N. Cohen in his 1995 book 'Lewis Carroll: A Biography.'
Cohen, speculates that:
"Dodgson's sexual energies sought unconventional
outlets.
We cannot know to what extent sexual urges lay
behind Charles's preference for drawing and
photographing children in the nude. He contended
the preference was entirely aesthetic. But given his
emotional attachment to children as well as his
aesthetic appreciation of their forms, his assertion
that his interest was strictly artistic is naïve.
He probably felt more than he dared acknowledge,
even to himself."
Cohen goes on to note that:
"Dodgson apparently convinced many of his friends
that his attachment to the nude female child form
was free of any eroticism, however later generations
look beneath the surface."
He argues that Dodgson may have wanted to marry the 11-year-old Alice Liddell, and that this was the cause of the unexplained "break" with the family in June 1863, an event for which other explanations are offered.
Biographers Derek Hudson and Roger Lancelyn Green stop short of identifying Dodgson as a paedophile (Green also edited Dodgson's diaries and papers), but they concur that he had a passion for small female children and next to no interest in the adult world. Catherine Robson refers to Carroll as:
"The Victorian era's most
famous (or infamous) girl
lover".
Several other writers and scholars have challenged the evidential basis for Cohen's and others' views about Dodgson's sexual interests. Hugues Lebailly has endeavoured to set Dodgson's child photography within the "Victorian Child Cult", which perceived child nudity as essentially an expression of innocence.
Lebailly claims that studies of child nudes were mainstream and fashionable in Dodgson's time, and that most photographers made them as a matter of course. Lebailly states that child nudes even appeared on Victorian Christmas cards, implying a very different social and aesthetic assessment of such material.
Lebailly concludes that it has been an error of Dodgson's biographers to view his child-photography with 20th.- or 21st.-century eyes, and to have presented it as some form of personal idiosyncrasy, when it was consistent with the norms of the time.
Karoline Leach's re-appraisal of Dodgson focused on his controversial sexuality. She argues that the allegations of paedophilia rose initially from a misunderstanding of Victorian morals, as well as the mistaken idea - fostered by Dodgson's various biographers - that he had no interest in adult women.
Leach termed the traditional image of Dodgson "the Carroll Myth". She drew attention to the large amounts of evidence in his diaries and letters that he was also keenly interested in adult women, married and single, and enjoyed several relationships with them that would have been considered scandalous by the social standards of his time.
She also pointed to the fact that many of those whom he described as "child-friends" were girls in their late teens and even twenties. She argues that suggestions of paedophilia emerged only many years after his death, when his well-meaning family had suppressed all evidence of his relationships with women in an effort to preserve his reputation, thus giving a false impression of a man interested only in little girls.
Similarly, Leach points to a 1932 biography by Langford Reed as the source of the dubious claim that many of Carroll's female friendships ended when the girls reached the age of 14.
In addition to the biographical works that have discussed Dodgson's sexuality, there are modern artistic interpretations of his life and work that do so as well – in particular, Dennis Potter in his play 'Alice' and his screenplay for the motion picture 'Dreamchild', and Robert Wilson in his musical 'Alice'.
Charles Dodgson's Ordination
Dodgson had been groomed for the ordained ministry in the Church of England from a very early age, and was expected to be ordained within four years of obtaining his master's degree, as a condition of his residency at Christ Church.
Charles delayed the process for some time, but was eventually ordained as a deacon on the 22nd. December 1861. But when the time came a year later to be ordained as a priest, Dodgson appealed to the dean for permission not to proceed.
This was against college rules and, initially, Dean Liddell told him that he would have to consult the college ruling body, which would almost certainly have resulted in his being expelled.
However for unknown reasons, Liddell changed his mind overnight, and permitted him to remain at the college in defiance of the rules. Dodgson never became a priest, unique amongst senior students of his time.
There is no conclusive evidence about why Dodgson rejected the priesthood. Some have suggested that his stammer made him reluctant because he was afraid of having to preach. Wilson quotes letters by Dodgson describing difficulty in reading lessons and prayers rather than preaching in his own words.
However Dodgson did indeed preach in later life, even though not in priest's orders, so it seems unlikely that his impediment was a major factor affecting his choice.
Wilson also points out that the Bishop of Oxford, Samuel Wilberforce, who ordained Dodgson, had strong views against clergy going to the theatre, one of Dodgson's great interests. Charles was interested in minority forms of Christianity (he was an admirer of F. D. Maurice) and "alternative" religions such as theosophy.
Dodgson became deeply troubled by an unexplained sense of sin and guilt at this time (the early 1860's), and frequently expressed the view in his diaries that he was a "vile and worthless" sinner, unworthy of the priesthood. This feeling of sin and unworthiness may well have affected his decision to abandon being ordained into the priesthood.
The Missing Diaries
At least four complete volumes and around seven pages of text are missing from Dodgson's 13 diaries. The loss of the volumes remains unexplained; the pages have been removed by an unknown hand.
Most scholars assume that the diary material was removed by family members in the interests of preserving the family name, but this has not been proven. Except for one page, material is missing from his diaries for the period between 1853 and 1863 (when Dodgson was 21–31 years old).
This was a period when Dodgson began suffering great mental and spiritual anguish, and confessing to an overwhelming sense of his own sin. This was also the period of time when he composed his extensive love poetry, leading to speculation that the poems may have been autobiographical.
Many theories have been put forward to explain the missing material. A popular explanation for one missing page (27th. June 1863) is that it might have been torn out to conceal a proposal of marriage on that day to the 11-year-old Alice Liddell.
However, there has never been any evidence to suggest that this was so, and a paper offers some evidence to the contrary which was discovered by Karoline Leach in the Dodgson family archive in 1996.
This paper is known as the "Cut Pages in Diary" document, and was compiled by various members of Carroll's family after his death. Part of it may have been written at the time when the pages were destroyed, though this is unclear.
The document offers a brief summary of two diary pages that are missing, including the one for the 27th. June 1863. The summary for this page states that Mrs. Liddell told Dodgson that there was gossip circulating about him and the Liddell family's governess, as well as about his relationship with "Ina", presumably Alice's older sister Lorina Liddell.
The "break" with the Liddell family that occurred soon after was presumably in response to this gossip. An alternative interpretation has been made regarding Carroll's rumoured involvement with "Ina": Lorina was also the name of Alice Liddell's mother.
What is deemed most crucial and surprising is that the document seems to imply that Dodgson's break with the family was not connected with Alice at all; until a primary source is discovered, the events of the 27th. June 1863 will remain in doubt.
Charles Dodgson's Migraine and Epilepsy
In his diary for 1880, Dodgson recorded experiencing his first episode of migraine with aura, describing very accurately the process of "moving fortifications" that are a manifestation of the aura stage of the syndrome.
Unfortunately, there is no clear evidence to show whether this was his first experience of migraine per se, or whether he may have previously suffered the far more common form of migraine without aura. The latter seems most likely, given that migraine most commonly develops in the teens or early adulthood.
Another form of migraine aura called Alice in Wonderland syndrome has been named after Dodgson's little heroine because its manifestation can resemble the sudden size-changes in the book. It is also known as micropsia and macropsia, a brain condition affecting the way that objects are perceived.
For example, an afflicted person may look at a larger object such as a basketball and perceive it as if it were the size of a golf ball. Some authors have suggested that Dodgson may have suffered from this type of aura, and used it as an inspiration in his work, although there is no evidence that he did.
Dodgson also suffered two attacks in which he lost consciousness.They were diagnosed as "epileptiform" seizures. Some have concluded from this that he was a lifetime sufferer of this condition, but there is no evidence of this in his diaries beyond these two attacks.
Sadi Ranson has suggested that Carroll may have suffered from temporal lobe epilepsy, in which consciousness is not always completely lost but altered, and in which the symptoms mimic many of the same experiences as Alice in Wonderland.
Carroll had at least one incident in which he suffered full loss of consciousness and awoke with a bloody nose, which he recorded in his diary and noted that the episode left him not feeling himself for "quite sometime afterward". This attack was diagnosed as possibly "epileptiform" and Carroll himself later wrote of his "seizures" in the same diary.
Most of the standard diagnostic tests of today were not available in the nineteenth century. Yvonne Hart, consultant neurologist at the John Radcliffe Hospital, Oxford, has concluded that Dodgson very likely had migraine, and may have had epilepsy, but she emphasises that she would have considerable doubt about making a diagnosis of epilepsy without further information.
Charles Dodgson's Legacy
There are societies in many parts of the world dedicated to the enjoyment and promotion of Charles' works and the investigation of his life.
Copenhagen Street in Islington, north London is the location of the Lewis Carroll Children's Library.
In 1982, Charles' great-nephew unveiled a memorial stone to him in Poets' Corner, Westminster Abbey.
In January 1994, an asteroid, 6984 Lewiscarroll, was discovered and named after Carroll.
The Lewis Carroll Centenary Wood near his birthplace in Daresbury opened in 2000.
Born in All Saints' Vicarage, Daresbury, Cheshire, in 1832, Lewis Carroll is commemorated at All Saints' Church, Daresbury in its stained glass windows depicting characters from Alice's Adventures in Wonderland. In March 2012, the Lewis Carroll Centre, attached to the church, was opened.
"The quest for certainty blocks the search for meaning. Uncertainty is the very condition to impel man to unfold his powers."
– Erich Fromm, in 'Man for Himself' (1947), Ch. 3.
"Ants are more like the parts of an animal than entities on their own. They are mobile cells, circulating through a dense connective tissue of other ants in a matrix of twigs. The circuits are so intimately interwoven that the anthill meets all the essential criteria of an organism.
– Lewis Thomas, 'The Lives of a Cell: Notes of a Biology Watcher', "Antaeus in Manhattan" (1974).
"A good man, through obscurest aspirations,
Has still an instinct of the one true way."
– Johann Wolfgang von Goethe, 'Faust'.
The Lorenz SZ40, SZ42A and SZ42B were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin and the model name SZ was derived from Schlüsselzusatz, meaning cipher attachment. The instruments implemented a Vernam stream cipher.
British cryptographers, who referred to encrypted German teleprinter traffic as Fish, dubbed the machine and its traffic Tunny.
The SZ machines were in-line attachments to standard Lorenz teleprinters. An experimental link using SZ40 machines was started in June 1941. The enhanced SZ42 machines were brought into substantial use from mid-1942 onwards for high-level communications between the German High Command in Berlin, and Army Commands throughout occupied Europe. The more advanced SZ42A came into routine use in February 1943 and the SZ42B in June 1944.
Wireless telegraphy (WT) rather than land-line circuits was used for this traffic. These non-Morse (NoMo) messages were picked up by Britain's Y-stations at Knockholt and Denmark Hill and sent to Government Code and Cypher School at Bletchley Park (BP). Some were deciphered using hand methods before the process was partially automated, first with Robinson machines and then with the Colossus computers. The deciphered messages made an important contribution to Ultra military intelligence.
On 30 August 1941, a message of some 4,000 characters was transmitted from Athens to Vienna. However, the message was not received correctly at the other end, so (after the recipient sent an unencoded request for retransmission, which let the codebreakers know what was happening) the message was retransmitted with the same key settings (HQIBPEXEZMUG); a forbidden practice. Moreover, the second time the operator made a number of small alterations to the message, such as using abbreviations, making the second message somewhat shorter. From these two related ciphertexts, known to cryptanalysts as a depth, the veteran cryptanalyst Brigadier John Tiltman in the Research Section teased out the two plaintexts and hence the keystream. Then, after three months of the Research Section failing to diagnose the machine from the almost 4,000 characters of key, the task was handed to mathematician Bill Tutte. He applied a technique that he had been taught in his cryptographic training, of writing out the key by hand and looking for repetitions. Tutte did this with the original teleprinter 5-bit Baudot codes, which led him to his initial breakthrough of recognising a 41 character repetition. Over the following two months up to January 1942, Tutte and colleagues worked out the complete logical structure of the cipher machine. This remarkable piece of reverse engineering was later described as "one of the greatest intellectual feats of World War II".
After this cracking of Tunny, a special team of code breakers was set up under Ralph Tester, most initially transferred from Alan Turing's Hut 8. The team became known as the Testery. It performed the bulk of the subsequent work in breaking Tunny messages, but was aided by machines in the complementary section under Max Newman known as the Newmanry.
Several complex machines were built by the British to aid the attack on Tunny. The first was the British Tunny. This machine was designed by Bletchley Park, based on the reverse engineering work done by Tiltman's team in the Testery, to emulate the Lorenz Cipher Machine. When the pin wheel settings were found by the Testery, the Tunny machine was set up and run so that the messages could be printed.
A family of machines known as "Robinsons" were built for the Newmanry. These used two paper tapes, along with logic circuitry, to find the settings of the chi pin wheels of the Lorenz machine. The Robinsons had major problems keeping the two paper tapes synchronized and were relatively slow, reading only 2000 characters per second.
The most important machine was the Colossus of which ten were in use by the war's end. They were the world's first large-scale programmable electronic digital computers, the first becoming operational in December 1943. These were developed by senior engineer Tommy Flowers at the Post Office Research Station at Dollis Hill in London. Like the later ENIAC of 1946, Colossus did not have a stored program, and was programmed through plugboards and jumper cables. It was faster, more reliable and more capable than the Robinsons, so speeding up the process of finding the Lorenz chi pin wheel settings. Since Colossus generated the putative keys electronically, it only had to read one tape. It did so with an optical reader which, at 5000 characters per second, was driven much faster than the Robinsons' and meant that the tape travelled at almost 30 miles per hour (48 km/h). This, and the clocking of the electronics from the optically read paper tape sprocket holes, completely eliminated the Robinsons' synchronisation problems.
ENIGMA remains the best known German cryptographic machine of World War II.
Das Heer (Army) ENIGMA cipher machine
Die Luftwaffe (Air Force) ENIGMA
i09_0214 093
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.
Die Luftwaffe (Air Force) ENIGMA
Like the Army, the Air Force relied on ENIGMA for coomunications security (COMSEC). As a result of radio intercept and timely analysis, which was aided by poor COMSEC on German radion nets, plans such as decisve air attacks known as the Battle of Britain were revealed to the British well in advance of the intended strike. The losses suffered by the German air force during this time were never regained.
Source National Cryptologic Museum (Added links to Wikipedia)
A slightly different view from Battle of Britain Wikipedia
Effect of signals intelligence
It is unclear how much the British intercepts of the Enigma cipher, used for high-security German radio communications, affected the battle. Ultra, the information obtained from Enigma intercepts, gave the highest echelons of the UK's command a view of German intentions but it seems little of this material filtered down to Hugh Dowding's desk. (It would have had little tactical value in any case.) However, the radio listening service (known as Y Service), monitoring the patterns of Luftwaffe radio traffic, contributed considerably to the early warning of raids
ENIGMA remains the best known German cryptographic machine of World War II.
ENIGMA cipher machine collection
i09_0214 100
Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.
Aquesta de la imatge és una maquina Enigma M4, del tipus emprat per la Kriegsmarine al final de la guerra. És molt facil d'identificar perque té 4 rotors en comptes de 3. Sense dubte és l'element més famós de la historia del xifratge i la criptologia.
ca.wikipedia.org/wiki/M%c3%a0quina_Enigma
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
This is a Kriegsmarine M4 model Enigma. You can identify it by the 4 rotors, when usually the earlier machines had only 3 rotors. The Enigma machine is without doubt the most famous icon in the history of cryptology
www.youtube.com/watch?v=JJm4-lqRJDc
en.wikipedia.org/wiki/Enigma_machine
cryptomuseum.com/crypto/enigma/i/index.htm
The emulator (all the site is wonderful):
users.telenet.be/d.rijmenants/en/enigmasim.htm
en.wikipedia.org/wiki/Bletchley_Park
www.bletchleypark.org/content/museum.rhtm
For an impresive virtual visit, take a look to these videos:
Inside the AT&T TSD-3600E Telephone Security Device, an encrypting telephone from 1993 based on the controversial Clipper Chip
The Clipper chip was the flagship component of a controversial National Security Agency-designed "key escrow" cryptography scheme, in which intercepted encrypted traffic could be decrypted easily by law enforcement or intelligence agencies for surveillance purposes. The program was extremely controversial and, in the end, not a success. Aside from the obvious fundamental problems (the security risks of having a large database of citizen's keys, the need to implement cryptography in expensive secret hardware, etc), the Clipper architecture had technical flaws that made it possible to circumvent the escrow features and preclude the possibility of law enforcement access. (See "Protocol Failure in the Escrowed Encryption Standard" [pdf format], for details.)
AT&T (my employer at the time) was the first (and ultimately only) company to build a commercial product based on the ill-fated system. The AT&T TSD-3600, announced in 1992, was a voice encryption device designed to be installed in a standard telephone (between the phone base and the handset). Calls placed to other TSD-3600-equipped telephones could be automatically digitized (at 4800bps) and encrypted, making eavesdropping on the conversation (by legal or illegal means) effectively infeasible. When the US government learned of AT&T's plans to market the device, it worried that criminals might used them to thwart wiretaps. Plans for a new encryption system with a wiretap backdoor were hurriedly drawn up by the NSA, and AT&T was persuaded to replace the regular (non-escrowed) DES-based encryption scheme in the original TSD product with the new system, called the Clipper chip. The Clipper-based model TSD-3600E hit the market in 1993. As incentive for AT&T's cooperation, the government agreed to purchase a significant quantity of Clipper-equipped TSD-3600Es, which sold for over $1000 each in quantity.
Hobbled by the controversial key escrow features and the high retail price, the government ended up being the TSD's only major customer, and even most of the units they bought sat unopened in storage for over ten years. AT&T, for its part, eventually sold off the division that produced the product.
I'm aware of five different TSD-3600 models produced between 1992 and the product's cancellation, differing in the cipher algorithm used. The TSD-3600D was the original, using standard DES with a 56 bit key. (These were quickly recalled and disappeared from the market after Clipper was announced). The 3600F was an exportable model that used a proprietary 40 bit cipher that, I was told, was "embarassingly" weak even given the short key. The 3600P used a proprietary 56 bit cipher similar to DES (but not inter-operable with the 3600D). The 3600E was the first controversial key escrowed model, with the then-classified Skipjack cipher and key escrow features implemented on a tamper-resistant MYK-78T Clipper chip. A later model, the 3600S, included a Clipper chip but would also downgrade (or upgrade, depending on your opinion of key escrow) to the F or P ciphers when communicating with those models. All five models use a Diffie-Hellman key exchange (768 bit, if I recall correctly) to establish a session key, a 4 character hash of which is displayed on each unit's LCD. To detect "man-in-the-middle" attacks, users could verify (by voice) that their displayed hashes matched.
This photo shows an open unit with its main circuit board exposed. The MYK-78T Clipper chip is visible in the far right of the board. The gray handset module at the front is a removable part that matches the unit to the audio and electrical levels of particular telephones.
Rodenstock Gerogon 240mm/9, Sinar P, BetterLight Super 6K-HS. Full resolution (6000x8000) version available.
Disclaimer: No emulsions were harmed in the making of this image.
She is the wind now, impossible to escape, impossible to touch.
Fighting she understand now is no different then seeing the solution to the complex cryptographic equations she has made an art of solving on the fly before the ICE hits. Down in the hi-tech dungeons of the GSC HQ they learn how fatal being on the wrong side of the equal sign is...
Then she is there, the inner chamber where the enslaved AI that controls the world we live in exists in huge processor arrays!
Sorry about this silliness, but I need to find out how this ends!
RPPC depicting a group of six Swedish soldiers.
Unknown photographer.
Date: 26/07/1907.
Sent to: Fröken (Miss) Valborg Hellsén of Stöde.
Symbols and numbers written on the front and reverse. May be a letter in code?
The design, and even existence, of these machines was one of the Nazis' biggest secrets. But that didn't stop cryptographers at Bletchley Park from figuring out precisely how they worked, despite never laying eyes nor hands on one...
On the ProRev Crosshair: XGenPlus
XGenPlus is an E-mail server at its core, but it is efficiency and integration-oriented. It has a giant list of features, including Scheduling Integration (Reminders and Scheduled Mailing), Categorization (Folders, Categories), Group Emailing, Delivery Report, Read Receipt, IM, Blocking of Mail addresses, Advance Forwarding, Public-Private key cryptography system, Calendar and Meeting Manager with SMS integration, over and above the features offered by the other mail servers.
XGenPlus also gives you “Rights” management; a sender can define whether the recipient can Delete/Forward/Reply or Print the email or not! Yes, XgenPlus gives you mind control – you can finally rule the e-mail world and people will bend to your will!
It scores exceptionally well on performance, usability, features and the overall objective of making your inbox a peaceful place to live. The anti-spam is widely recognized and the server is more robust than any. The CPU license with unlimited users costs 2.5 Lacs, and the per user license costs Rs. 500 per annum, which is fine.
What does the Verdict Say? Watch to find out!
---
PROREV is a startup product review show where we dissect products to give you the best insights into technology, design, usability, features and pricing.
We review products and services created by startups, ranging from websites, SAAS products and cloud-based software to smartphones, powerbanks, VR headsets and various other technologies and gadgets.
All of this in the crispiest, snappiest and funniest startup product review show you will ever see.
This is TechPortal TV presents PROREV!
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.
日亨堀, 1952: 新編日蓮大聖人御書全集 (+ 就註法華経口伝).
十大部 (五大部 +五): 唱法華題目抄, 立正安国論, 開目抄, 観心本尊抄, 法華取要抄, 撰時抄, 報恩抄, 四信五品抄, 下山御消息, 本尊問答抄.
三証: 文証, 理証, 現証.
三世間: 欲界, 色界, 無色界 (→五陰, 眾生, 國土).
三諦: 假諦, 空諦, 中諦 (→如是相, 如是性, 如是體).
六波羅蜜: 忍辱 (佛体), 般若 (佛座), 慈悲 (佛舎), 布施, 持戒, 禪定.
九識 (六根为 +三): 眼, 耳, 鼻, 舌, 身, 意, 末那, 阿賴耶, 阿摩羅.
十界 (六道 +四): 地獄, 餓鬼, 畜生, 修羅, 人, 天, 聲聞, 緣覺, 菩薩, 佛.
十如是: 相, 性, 體, 力, 作, 因, 緣, 果, 報, 本末究竟等.
十四誹謗 (謗法+怨嫉): 憍慢, 懈怠, 計我, 浅識, 著欲, 不解, 不信, 顰蹙, 疑惑, 誹謗, 軽善, 憎善, 嫉善, 恨善.
Marks of intelligent, purposeful design are in these layers of rocks. Do you see them?
Sometime in the distant past, nobody knows exactly when, an Anasazi man and his son left their handprints on the rock wall above the Deer Creek slot canyon. It was a precarious place to stand, so it took bravery. Those prints remain today as signs of a vision quest or of a desire to maintain a memory of a good time with father and son.
"Intelligent design" theory is simply the logical process of distinguishing purposeful activity from natural activity or chance. It's routinely used in archaeology, cryptography, forensics and several other fields of science. It doesn't concern itself with who the designer is, but whether a phenomenon shows the intentional activity of a mind. We make these kinds of inferences all the time, as when we saw the handprints in this photo. We knew intuitively they were not created by wind and erosion. Not all cases are this easy. Intelligent design theory seeks to make those kinds of inferences logically and mathematically rigorous, so that we can distinguish between chance, natural law, and design, with a high probability of making a correct "inference to the best explanation." For example, if an astronomer claimed to witness an alien signal from space (SETI), other scientists would want to rigorously rule out chance or natural laws before making a design inference. The identity and motivations of the aliens would be interesting follow-up questions, but would fall outside the sphere of intelligent design theory itself.
From Wikipedia, the free encyclopedia
The Lockheed Martin F-22 Raptor is a fifth-generation, single-seat, twin-engine, all-weather stealth tactical fighter aircraft developed for the United States Air Force (USAF). The result of the USAF's Advanced Tactical Fighter (ATF) program, the aircraft was designed primarily as an air superiority fighter, but also has ground attack, electronic warfare, and signal intelligence capabilities. The prime contractor, Lockheed Martin, built most of the F-22's airframe and weapons systems and conducted final assembly, while Boeing provided the wings, aft fuselage, avionics integration, and training systems.
The aircraft was variously designated F-22 and F/A-22 before it formally entered service in December 2005 as the F-22A. Despite its protracted development and various operational issues, USAF officials consider the F-22 a critical component of the service's tactical air power. Its combination of stealth, aerodynamic performance, and situational awareness enable unprecedented air combat capabilities.
Service officials had originally planned to buy a total of 750 ATFs. In 2009, the program was cut to 187 operational production aircraft due to high costs, a lack of clear air-to-air missions due to delays in Russian and Chinese fighter programs, a ban on exports, and development of the more versatile F-35. The last F-22 was delivered in 2012.
Development
Origins
In 1981, the U.S. Air Force identified a requirement for an Advanced Tactical Fighter (ATF) to replace the F-15 Eagle and F-16 Fighting Falcon. Code named "Senior Sky", this air-superiority fighter program was influenced by emerging worldwide threats, including new developments in Soviet air defense systems and the proliferation of the Su-27 "Flanker"- and MiG-29 "Fulcrum"-class of fighter aircraft. It would take advantage of the new technologies in fighter design on the horizon, including composite materials, lightweight alloys, advanced flight control systems, more powerful propulsion systems, and most importantly, stealth technology. In 1983, the ATF concept development team became the System Program Office (SPO) and managed the program at Wright-Patterson Air Force Base. The demonstration and validation (Dem/Val) request for proposals (RFP) was issued in September 1985, with requirements placing strong emphasis on stealth and supercruise. Of the seven bidding companies, Lockheed and Northrop were selected on 31 October 1986. Lockheed teamed with Boeing and General Dynamics while Northrop teamed with McDonnell Douglas, and the two contractor teams undertook a 50-month Dem/Val phase, culminating in the flight test of two technology demonstrator prototypes, the YF-22 and the YF-23, respectively.
Dem/Val was focused on risk reduction and technology development plans over specific aircraft designs. Contractors made extensive use of analytical and empirical methods, including computational fluid dynamics, wind-tunnel testing, and radar cross-section calculations and pole testing; the Lockheed team would conduct nearly 18,000 hours of wind-tunnel testing. Avionics development was marked by extensive testing and prototyping and supported by ground and flying laboratories. During Dem/Val, the SPO used the results of performance and cost trade studies conducted by contractor teams to adjust ATF requirements and delete ones that were significant weight and cost drivers while having marginal value. The short takeoff and landing (STOL) requirement was relaxed in order to delete thrust-reversers, saving substantial weight. As avionics was a major cost driver, side-looking radars were deleted, and the dedicated infra-red search and track (IRST) system was downgraded from multi-color to single color and then deleted as well. However, space and cooling provisions were retained to allow for future addition of these components. The ejection seat requirement was downgraded from a fresh design to the existing McDonnell Douglas ACES II. Despite efforts by the contractor teams to rein in weight, the takeoff gross weight estimate was increased from 50,000 lb (22,700 kg) to 60,000 lb (27,200 kg), resulting in engine thrust requirement increasing from 30,000 lbf (133 kN) to 35,000 lbf (156 kN) class.
Each team produced two prototype air vehicles for Dem/Val, one for each of the two engine options. The YF-22 had its maiden flight on 29 September 1990 and in flight tests achieved up to Mach 1.58 in supercruise. After the Dem/Val flight test of the prototypes, on 23 April 1991, Secretary of the USAF Donald Rice announced the Lockheed team as the winner of the ATF competition. The YF-23 design was considered stealthier and faster, while the YF-22, with its thrust vectoring nozzles, was more maneuverable as well as less expensive and risky. The aviation press speculated that the Lockheed team's design was also more adaptable to the U.S. Navy's Navalized Advanced Tactical Fighter (NATF), but by 1992, the Navy had abandoned NATF.
Production and procurement
As the program moved to full-scale development, or the Engineering & Manufacturing Development (EMD) stage, the production version had notable differences from the YF-22, despite having a broadly similar shape. The swept-back angle of the leading edge was decreased from 48° to 42°, while the vertical stabilizers were shifted rearward and decreased in area by 20%. To improve pilot visibility, the canopy was moved forward 7 inches (18 cm), and the engine intakes moved rearward 14 inches (36 cm). The shapes of the wing and stabilator trailing edges were refined to improve aerodynamics, strength, and stealth characteristics. Increasing weight during development caused slight reductions in range and maneuver performance.
Prime contractor Lockheed Martin Aeronautics manufactured the majority of the airframe and performed final assembly at Dobbins Air Reserve Base in Marietta, Georgia; program partner Boeing Defense, Space & Security provided additional airframe components as well as avionics integration and training systems. The first F-22, an EMD aircraft with tail number 4001, was unveiled at Marietta, Georgia, on 9 April 1997, and first flew on 7 September 1997. Production, with the first lot awarded in September 2000, supported over 1,000 subcontractors and suppliers from 46 states and up to 95,000 jobs, and spanned 15 years at a peak rate of roughly two airplanes per month. In 2006, the F-22 development team won the Collier Trophy, American aviation's most prestigious award. Due to the aircraft's advanced nature, contractors have been targeted by cyberattacks and technology theft.
The USAF originally envisioned ordering 750 ATFs at a total program cost of $44.3 billion and procurement cost of $26.2 billion in fiscal year (FY) 1985 dollars, with production beginning in 1994. The 1990 Major Aircraft Review led by Secretary of Defense Dick Cheney reduced this to 648 aircraft beginning in 1996. By 1997, funding instability had further cut the total to 339, which was again reduced to 277 by 2003. In 2004, the Department of Defense (DoD) further reduced this to 183 operational aircraft, despite the USAF's preference for 381. A multi-year procurement plan was implemented in 2006 to save $15 billion, with total program cost projected to be $62 billion for 183 F-22s distributed to seven combat squadrons. In 2008, Congress passed a defense spending bill that raised the total orders for production aircraft to 187.
The first two F-22s built were EMD aircraft in the Block 1.0 configuration for initial flight testing, while the third was a Block 2.0 aircraft built to represent the internal structure of production airframes and enabled it to test full flight loads. Six more EMD aircraft were built in the Block 10 configuration for development and upgrade testing, with the last two considered essentially production quality jets. Production for operational squadrons consisted of 37 Block 20 training aircraft and 149 Block 30/35 combat aircraft; one of the Block 35 aircraft is dedicated to flight sciences at Edwards Air Force Base.
The numerous new technologies in the F-22 resulted in substantial cost overruns and delays. Many capabilities were deferred to post-service upgrades, reducing the initial cost but increasing total program cost. As production wound down in 2011, the total program cost is estimated to be about $67.3 billion, with $32.4 billion spent on Research, Development, Test and Evaluation (RDT&E) and $34.9 billion on procurement and military construction (MILCON) in then year dollars. The incremental cost for an additional F-22 was estimated at about $138 million in 2009.
Ban on exports
The F-22 cannot be exported under US federal law to protect its stealth technology and other high-tech features. Customers for U.S. fighters are acquiring earlier designs such as the F-15 Eagle and F-16 Fighting Falcon or the newer F-35 Lightning II, which contains technology from the F-22 but was designed to be cheaper, more flexible, and available for export. In September 2006, Congress upheld the ban on foreign F-22 sales. Despite the ban, the 2010 defense authorization bill included provisions requiring the DoD to prepare a report on the costs and feasibility for an F-22 export variant, and another report on the effect of F-22 export sales on U.S. aerospace industry.
Some Australian politicians and defense commentators proposed that Australia should attempt to purchase F-22s instead of the planned F-35s, citing the F-22's known capabilities and F-35's delays and developmental uncertainties. However, the Royal Australian Air Force (RAAF) determined that the F-22 was unable to perform the F-35's strike and close air support roles. The Japanese government also showed interest in the F-22 for its Replacement-Fighter program. The Japan Air Self-Defense Force (JASDF) would reportedly require fewer fighters for its mission if it obtained the F-22, thus reducing engineering and staffing costs. However, in 2009 it was reported that acquiring the F-22 would require increases to the Japanese government's defense budget beyond the historical 1 percent of its GDP. With the end of F-22 production, Japan chose the F-35 in December 2011. Israel also expressed interest, but eventually chose the F-35 because of the F-22's price and unavailability.
Production termination
Throughout the 2000s, the need for F-22s was debated, due to rising costs and the lack of relevant adversaries. In 2006, Comptroller General of the United States David Walker found that "the DoD has not demonstrated the need" for more investment in the F-22, and further opposition to the program was expressed by Secretary of Defense Donald Rumsfeld, Deputy Secretary of Defense Gordon R. England, Senator John McCain, and Chairman of U.S. Senate Committee on Armed Services Senator John Warner. The F-22 program lost influential supporters in 2008 after the forced resignations of Secretary of the Air Force Michael Wynne and the Chief of Staff of the Air Force General T. Michael Moseley.
In November 2008, Secretary of Defense Robert Gates stated that the F-22 was not relevant in post-Cold War conflicts such as irregular warfare operations in Iraq and Afghanistan, and in April 2009, under the new Obama Administration, he called for ending production in FY2011, leaving the USAF with 187 production aircraft. In July, General James Cartwright, Vice Chairman of the Joint Chiefs of Staff, stated to the Senate Committee on Armed Services his reasons for supporting termination of F-22 production. They included shifting resources to the multirole F-35 to allow proliferation of fifth-generation fighters for three service branches and preserving the F/A-18 production line to maintain the military's electronic warfare (EW) capabilities in the Boeing EA-18G Growler.[60] Issues with the F-22's reliability and availability also raised concerns. After President Obama threatened to veto further production, the Senate voted in July 2009 in favor of ending production and the House subsequently agreed to abide by the 187 production aircraft cap. Gates stated that the decision was taken in light of the F-35's capabilities, and in 2010, he set the F-22 requirement to 187 aircraft by lowering the number of major regional conflict preparations from two to one.
In 2010, USAF initiated a study to determine the costs of retaining F-22 tooling for a future Service Life Extension Program (SLEP).[66] A RAND Corporation paper from this study estimated that restarting production and building an additional 75 F-22s would cost $17 billion, resulting in $227 million per aircraft, or $54 million higher than the flyaway cost. Lockheed Martin stated that restarting the production line itself would cost about $200 million. Production tooling and associated documentation were subsequently stored at the Sierra Army Depot, allowing the retained tooling to support the fleet life cycle. There were reports that attempts to retrieve this tooling found empty containers, but a subsequent audit found that the tooling was stored as expected.
Russian and Chinese fighter developments have fueled concern, and in 2009, General John Corley, head of Air Combat Command, stated that a fleet of 187 F-22s would be inadequate, but Secretary Gates dismissed General Corley's concern. In 2011, Gates explained that Chinese fifth-generation fighter developments had been accounted for when the number of F-22s was set, and that the U.S. would have a considerable advantage in stealth aircraft in 2025, even with F-35 delays. In December 2011, the 195th and final F-22 was completed out of 8 test EMD and 187 operational aircraft produced; the aircraft was delivered to the USAF on 2 May 2012.
In April 2016, the House Armed Services Committee (HASC) Tactical Air and Land Forces Subcommittee proposed legislation that would direct the Air Force to conduct a cost study and assessment associated with resuming production of the F-22. Since the production halt directed in 2009 by then Defense Secretary Gates, lawmakers and the Pentagon noted that air warfare systems of Russia and China were catching up to those of the U.S. Lockheed Martin has proposed upgrading the Block 20 training aircraft into combat-coded Block 30/35 versions as a way to increase numbers available for deployment. On 9 June 2017, the Air Force submitted their report to Congress stating they had no plans to restart the F-22 production line due to economic and operational issues; it estimated it would cost approximately $50 billion to procure 194 additional F-22s at a cost of $206–$216 million per aircraft, including approximately $9.9 billion for non-recurring start-up costs and $40.4 billion for aircraft procurement costs.
Upgrades
The first aircraft with combat-capable Block 3.0 software flew in 2001. Increment 2, the first upgrade program, was implemented in 2005 for Block 20 aircraft onward and enabled the employment of Joint Direct Attack Munitions (JDAM). Certification of the improved AN/APG-77(V)1 radar was completed in March 2007, and airframes from production Lot 5 onward are fitted with this radar, which incorporates air-to-ground modes. Increment 3.1 for Block 30 aircraft onward provided improved ground-attack capability through synthetic aperture radar mapping and radio emitter direction finding, electronic attack and Small Diameter Bomb (SDB) integration; testing began in 2009 and the first upgraded aircraft was delivered in 2011. To address oxygen deprivation issues, F-22s were fitted with an automatic backup oxygen system (ABOS) and modified life support system starting in 2012.
Increment 3.2 for Block 35 aircraft is a two-part upgrade process; 3.2A focuses on electronic warfare, communications and identification, while 3.2B includes geolocation improvements and a new stores management system to show the correct symbols for the AIM-9X and AIM-120D.[83][84] To enable two-way communication with other platforms, the F-22 can use the Battlefield Airborne Communications Node (BACN) as a gateway. The planned Multifunction Advanced Data Link (MADL) integration was cut due to development delays and lack of proliferation among USAF platforms. The F-22 fleet is planned to start receiving Increment 3.2B as well as a software upgrade for cryptography capabilities and avionics stability in May 2019. A Multifunctional Information Distribution System-Joint (MIDS-J) radio that replaces the current Link-16 receive-only box is expected to be operational by 2020. Subsequent upgrades are also focusing on having an open architecture to enable faster future enhancements.
In 2024, funding is projected to begin for the F-22 mid-life upgrade (MLU), which is expected to include new sensors and antennas, hardware refresh, cockpit improvements, and a helmet mounted display and cuing system. Other enhancements being developed include IRST functionality for the AN/AAR-56 Missile Launch Detector (MLD) and more durable stealth coating based on the F-35's.
The F-22 was designed for a service life of 8,000 flight hours, with a $350 million "structures retrofit program". Investigations are being made for upgrades to extend their useful lives further. In the long term, the F-22 is expected to be superseded by a sixth-generation jet fighter to be fielded in the 2030s.
Design
Overview
The F-22 Raptor is a fifth-generation fighter that is considered fourth generation in stealth aircraft technology by the USAF.[91] It is the first operational aircraft to combine supercruise, supermaneuverability, stealth, and sensor fusion in a single weapons platform. The F-22 has four empennage surfaces, retractable tricycle landing gear, and clipped delta wings with reverse trailing edge sweep and leading edge extensions running to the upper outboard corner of the inlets. Flight control surfaces include leading-edge flaps, flaperons, ailerons, rudders on the canted vertical stabilizers, and all-moving horizontal tails (stabilators); for speed brake function, the ailerons deflect up, flaperons down, and rudders outwards to increase drag.
The aircraft's dual Pratt & Whitney F119-PW-100 augmented turbofan engines are closely spaced and incorporate pitch-axis thrust vectoring nozzles with a range of ±20 degrees; each engine has maximum thrust in the 35,000 lbf (156 kN) class. The F-22's thrust-to-weight ratio at typical combat weight is nearly at unity in maximum military power and 1.25 in full afterburner. Maximum speed without external stores is approximately Mach 1.8 at military power and greater than Mach 2 with afterburners.
The F-22's high cruise speed and operating altitude over prior fighters improve the effectiveness of its sensors and weapon systems, and increase survivability against ground defenses such as surface-to-air missiles. The aircraft is among only a few that can supercruise, or sustain supersonic flight without using fuel-inefficient afterburners; it can intercept targets which subsonic aircraft would lack the speed to pursue and an afterburner-dependent aircraft would lack the fuel to reach. The F-22's thrust and aerodynamics enable regular combat speeds of Mach 1.5 at 50,000 feet (15,000 m). The use of internal weapons bays permits the aircraft to maintain comparatively higher performance over most other combat-configured fighters due to a lack of aerodynamic drag from external stores. The aircraft's structure contains a significant amount of high-strength materials to withstand stress and heat of sustained supersonic flight. Respectively, titanium alloys and composites comprise 39% and 24% of the structural weight.
The F-22's aerodynamics, relaxed stability, and powerful thrust-vectoring engines give it excellent maneuverability and energy potential across its flight envelope. The airplane has excellent high alpha (angle of attack) characteristics, capable of flying at trimmed alpha of over 60° while maintaining roll control and performing maneuvers such as the Herbst maneuver (J-turn) and Pugachev's Cobra. The flight control system and full-authority digital engine control (FADEC) make the aircraft highly departure resistant and controllable, thus giving the pilot carefree handling.
Stealth
The F-22 was designed to be highly difficult to detect and track by radar. Measures to reduce radar cross-section (RCS) include airframe shaping such as alignment of edges, fixed-geometry serpentine inlets and curved vanes that prevent line-of-sight of the engine faces and turbines from any exterior view, use of radar-absorbent material (RAM), and attention to detail such as hinges and pilot helmets that could provide a radar return. The F-22 was also designed to have decreased radio emissions, infrared signature and acoustic signature as well as reduced visibility to the naked eye. The aircraft's flat thrust-vectoring nozzles reduce infrared emissions of the exhaust plume to mitigate the threat of infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Additional measures to reduce the infrared signature include special topcoat and active cooling of leading edges to manage the heat buildup from supersonic flight.
Compared to previous stealth designs like the F-117, the F-22 is less reliant on RAM, which are maintenance-intensive and susceptible to adverse weather conditions. Unlike the B-2, which requires climate-controlled hangars, the F-22 can undergo repairs on the flight line or in a normal hangar. The F-22 has a Signature Assessment System which delivers warnings when the radar signature is degraded and necessitates repair. While the F-22's exact RCS is classified, in 2009 Lockheed Martin released information indicating that from certain angles the aircraft has an RCS of 0.0001 m² or −40 dBsm – equivalent to the radar reflection of a "steel marble". Effectively maintaining the stealth features can decrease the F-22's mission capable rate to 62–70%.
The effectiveness of the stealth characteristics is difficult to gauge. The RCS value is a restrictive measurement of the aircraft's frontal or side area from the perspective of a static radar. When an aircraft maneuvers it exposes a completely different set of angles and surface area, potentially increasing radar observability. Furthermore, the F-22's stealth contouring and radar absorbent materials are chiefly effective against high-frequency radars, usually found on other aircraft. The effects of Rayleigh scattering and resonance mean that low-frequency radars such as weather radars and early-warning radars are more likely to detect the F-22 due to its physical size. However, such radars are also conspicuous, susceptible to clutter, and have low precision. Additionally, while faint or fleeting radar contacts make defenders aware that a stealth aircraft is present, reliably vectoring interception to attack the aircraft is much more challenging. According to the USAF an F-22 surprised an Iranian F-4 Phantom II that was attempting to intercept an American UAV, despite Iran's assertion of having military VHF radar coverage over the Persian Gulf.
From: File Unit: Letters from Mrs. Rose O'Neal Greenhow, Also Notes, etc., in Her Handwriting (Record Group 59)
Created by: Department of State. (09/1789 - )
Subjects:
Greenhow, Rose O'Neal, 1817-1864
Persistent URL: research.archives.gov/description/1634036
Repository: National Archives at College Park - Archives II (College Park, MD)
Access Restrictions: Unrestricted
Use Restrictions: Unrestricted
welcoming diverse new investors: Vy Capital, Coinbase, BlockTower Capital, Alameda Research, and the investment arms of Bernard Arnault, Marc Benioff, Nicolas Berggruen and Drake.
VentureBeat today: “MobileCoin has raised $66 million for its cryptocurrency payments platform that aims to democratize privacy for all. MobileCoin uses peer-to-peer networking for payments, so that transactions can be more easily kept private even while taking advantage of the blockchain, the transparent and secure digital ledger. The company bills its system as fast, safe, and easy-to-use, giving everyone the ability to transact digitally from nearly anywhere in the world. A cell phone transaction takes just seconds, in contrast to most cryptocurrency transactions that can take minutes to resolve.
When it comes to cryptocurrency transactions, MobileCoin is pretty unique. “People are really excited about what we’ve built because it’s really fast,” CEO Joshua Goldbard said. “It’s carbon negative, and it works on the cell phone. “It’s just something that really doesn’t exist in crypto.” The technology was built for mobility and convenience, with payments occurring right on your phone.
The San Francisco company has an opaque ledger and cryptographically protected transactions. The network uses forward secrecy to keep data from being compromised, ensuring that private information remains private.
“On the customer side, we think we can deliver the lowest total cost to merchants and individuals for moving money around the world,” Goldbard said. “When you use a bank, it can take 30 to 45 days to get your money as a merchant. If you use Stripe or Venmo, it’s three to five days before it hits your bank account. With MobileCoin, you have possession of the funds in a second.”
Unlike other cryptocurrencies, MobileCoin was built to ensure that digital wallets can be easily recovered — and not lost forever. Even if merchants or users lose their phones, they can recover their account balance and transaction history by simply loading their account onto a new phone.
Overseas, MobileCoin has issued its own cryptocurrency, and the coins on the network are valued at more than $4 billion now. It has shown that it can be used for merchandise transactions on messenger platforms such as Mixi in Japan.
MobileCoin provides anti-fraud services and other services for merchants. MobileCoin charges just 0.004% transaction fees, and that goes to its foundation for improving the cryptocurrency.
“If we didn’t build MobileCoin, we would end up with things like Alipay, Facebook Libra, and others that would track every single transaction that people do,” Goldbard said. “And they’re not doing that necessarily to be helpful.”
And TechCrunch: "The newest round values the outfit at $1.066 billion. Signal founder Moxie Marlinspike told Wired that because MobileCoin is a so-called privacy coin designed to protect users’ identities and the details of their payments on a blockchain, that it’s an ideal fit for Signal. 'There’s a palpable difference in the feeling of what it’s like to communicate over Signal, knowing you’re not being watched or listened to, versus other communication platforms. I would like to get to a world where not only can you feel that when you talk to your therapist over Signal, but also when you pay your therapist for the session over Signal.'”
FD: Future Ventures is the second largest outside shareholder in MobileCoin.
From Wikipedia, the free encyclopedia
The Lockheed Martin F-22 Raptor is a fifth-generation, single-seat, twin-engine, all-weather stealth tactical fighter aircraft developed for the United States Air Force (USAF). The result of the USAF's Advanced Tactical Fighter (ATF) program, the aircraft was designed primarily as an air superiority fighter, but also has ground attack, electronic warfare, and signal intelligence capabilities. The prime contractor, Lockheed Martin, built most of the F-22's airframe and weapons systems and conducted final assembly, while Boeing provided the wings, aft fuselage, avionics integration, and training systems.
The aircraft was variously designated F-22 and F/A-22 before it formally entered service in December 2005 as the F-22A. Despite its protracted development and various operational issues, USAF officials consider the F-22 a critical component of the service's tactical air power. Its combination of stealth, aerodynamic performance, and situational awareness enable unprecedented air combat capabilities.
Service officials had originally planned to buy a total of 750 ATFs. In 2009, the program was cut to 187 operational production aircraft due to high costs, a lack of clear air-to-air missions due to delays in Russian and Chinese fighter programs, a ban on exports, and development of the more versatile F-35. The last F-22 was delivered in 2012.
Development
Origins
In 1981, the U.S. Air Force identified a requirement for an Advanced Tactical Fighter (ATF) to replace the F-15 Eagle and F-16 Fighting Falcon. Code named "Senior Sky", this air-superiority fighter program was influenced by emerging worldwide threats, including new developments in Soviet air defense systems and the proliferation of the Su-27 "Flanker"- and MiG-29 "Fulcrum"-class of fighter aircraft. It would take advantage of the new technologies in fighter design on the horizon, including composite materials, lightweight alloys, advanced flight control systems, more powerful propulsion systems, and most importantly, stealth technology. In 1983, the ATF concept development team became the System Program Office (SPO) and managed the program at Wright-Patterson Air Force Base. The demonstration and validation (Dem/Val) request for proposals (RFP) was issued in September 1985, with requirements placing strong emphasis on stealth and supercruise. Of the seven bidding companies, Lockheed and Northrop were selected on 31 October 1986. Lockheed teamed with Boeing and General Dynamics while Northrop teamed with McDonnell Douglas, and the two contractor teams undertook a 50-month Dem/Val phase, culminating in the flight test of two technology demonstrator prototypes, the YF-22 and the YF-23, respectively.
Dem/Val was focused on risk reduction and technology development plans over specific aircraft designs. Contractors made extensive use of analytical and empirical methods, including computational fluid dynamics, wind-tunnel testing, and radar cross-section calculations and pole testing; the Lockheed team would conduct nearly 18,000 hours of wind-tunnel testing. Avionics development was marked by extensive testing and prototyping and supported by ground and flying laboratories. During Dem/Val, the SPO used the results of performance and cost trade studies conducted by contractor teams to adjust ATF requirements and delete ones that were significant weight and cost drivers while having marginal value. The short takeoff and landing (STOL) requirement was relaxed in order to delete thrust-reversers, saving substantial weight. As avionics was a major cost driver, side-looking radars were deleted, and the dedicated infra-red search and track (IRST) system was downgraded from multi-color to single color and then deleted as well. However, space and cooling provisions were retained to allow for future addition of these components. The ejection seat requirement was downgraded from a fresh design to the existing McDonnell Douglas ACES II. Despite efforts by the contractor teams to rein in weight, the takeoff gross weight estimate was increased from 50,000 lb (22,700 kg) to 60,000 lb (27,200 kg), resulting in engine thrust requirement increasing from 30,000 lbf (133 kN) to 35,000 lbf (156 kN) class.
Each team produced two prototype air vehicles for Dem/Val, one for each of the two engine options. The YF-22 had its maiden flight on 29 September 1990 and in flight tests achieved up to Mach 1.58 in supercruise. After the Dem/Val flight test of the prototypes, on 23 April 1991, Secretary of the USAF Donald Rice announced the Lockheed team as the winner of the ATF competition. The YF-23 design was considered stealthier and faster, while the YF-22, with its thrust vectoring nozzles, was more maneuverable as well as less expensive and risky. The aviation press speculated that the Lockheed team's design was also more adaptable to the U.S. Navy's Navalized Advanced Tactical Fighter (NATF), but by 1992, the Navy had abandoned NATF.
Production and procurement
As the program moved to full-scale development, or the Engineering & Manufacturing Development (EMD) stage, the production version had notable differences from the YF-22, despite having a broadly similar shape. The swept-back angle of the leading edge was decreased from 48° to 42°, while the vertical stabilizers were shifted rearward and decreased in area by 20%. To improve pilot visibility, the canopy was moved forward 7 inches (18 cm), and the engine intakes moved rearward 14 inches (36 cm). The shapes of the wing and stabilator trailing edges were refined to improve aerodynamics, strength, and stealth characteristics. Increasing weight during development caused slight reductions in range and maneuver performance.
Prime contractor Lockheed Martin Aeronautics manufactured the majority of the airframe and performed final assembly at Dobbins Air Reserve Base in Marietta, Georgia; program partner Boeing Defense, Space & Security provided additional airframe components as well as avionics integration and training systems. The first F-22, an EMD aircraft with tail number 4001, was unveiled at Marietta, Georgia, on 9 April 1997, and first flew on 7 September 1997. Production, with the first lot awarded in September 2000, supported over 1,000 subcontractors and suppliers from 46 states and up to 95,000 jobs, and spanned 15 years at a peak rate of roughly two airplanes per month. In 2006, the F-22 development team won the Collier Trophy, American aviation's most prestigious award. Due to the aircraft's advanced nature, contractors have been targeted by cyberattacks and technology theft.
The USAF originally envisioned ordering 750 ATFs at a total program cost of $44.3 billion and procurement cost of $26.2 billion in fiscal year (FY) 1985 dollars, with production beginning in 1994. The 1990 Major Aircraft Review led by Secretary of Defense Dick Cheney reduced this to 648 aircraft beginning in 1996. By 1997, funding instability had further cut the total to 339, which was again reduced to 277 by 2003. In 2004, the Department of Defense (DoD) further reduced this to 183 operational aircraft, despite the USAF's preference for 381. A multi-year procurement plan was implemented in 2006 to save $15 billion, with total program cost projected to be $62 billion for 183 F-22s distributed to seven combat squadrons. In 2008, Congress passed a defense spending bill that raised the total orders for production aircraft to 187.
The first two F-22s built were EMD aircraft in the Block 1.0 configuration for initial flight testing, while the third was a Block 2.0 aircraft built to represent the internal structure of production airframes and enabled it to test full flight loads. Six more EMD aircraft were built in the Block 10 configuration for development and upgrade testing, with the last two considered essentially production quality jets. Production for operational squadrons consisted of 37 Block 20 training aircraft and 149 Block 30/35 combat aircraft; one of the Block 35 aircraft is dedicated to flight sciences at Edwards Air Force Base.
The numerous new technologies in the F-22 resulted in substantial cost overruns and delays. Many capabilities were deferred to post-service upgrades, reducing the initial cost but increasing total program cost. As production wound down in 2011, the total program cost is estimated to be about $67.3 billion, with $32.4 billion spent on Research, Development, Test and Evaluation (RDT&E) and $34.9 billion on procurement and military construction (MILCON) in then year dollars. The incremental cost for an additional F-22 was estimated at about $138 million in 2009.
Ban on exports
The F-22 cannot be exported under US federal law to protect its stealth technology and other high-tech features. Customers for U.S. fighters are acquiring earlier designs such as the F-15 Eagle and F-16 Fighting Falcon or the newer F-35 Lightning II, which contains technology from the F-22 but was designed to be cheaper, more flexible, and available for export. In September 2006, Congress upheld the ban on foreign F-22 sales. Despite the ban, the 2010 defense authorization bill included provisions requiring the DoD to prepare a report on the costs and feasibility for an F-22 export variant, and another report on the effect of F-22 export sales on U.S. aerospace industry.
Some Australian politicians and defense commentators proposed that Australia should attempt to purchase F-22s instead of the planned F-35s, citing the F-22's known capabilities and F-35's delays and developmental uncertainties. However, the Royal Australian Air Force (RAAF) determined that the F-22 was unable to perform the F-35's strike and close air support roles. The Japanese government also showed interest in the F-22 for its Replacement-Fighter program. The Japan Air Self-Defense Force (JASDF) would reportedly require fewer fighters for its mission if it obtained the F-22, thus reducing engineering and staffing costs. However, in 2009 it was reported that acquiring the F-22 would require increases to the Japanese government's defense budget beyond the historical 1 percent of its GDP. With the end of F-22 production, Japan chose the F-35 in December 2011. Israel also expressed interest, but eventually chose the F-35 because of the F-22's price and unavailability.
Production termination
Throughout the 2000s, the need for F-22s was debated, due to rising costs and the lack of relevant adversaries. In 2006, Comptroller General of the United States David Walker found that "the DoD has not demonstrated the need" for more investment in the F-22, and further opposition to the program was expressed by Secretary of Defense Donald Rumsfeld, Deputy Secretary of Defense Gordon R. England, Senator John McCain, and Chairman of U.S. Senate Committee on Armed Services Senator John Warner. The F-22 program lost influential supporters in 2008 after the forced resignations of Secretary of the Air Force Michael Wynne and the Chief of Staff of the Air Force General T. Michael Moseley.
In November 2008, Secretary of Defense Robert Gates stated that the F-22 was not relevant in post-Cold War conflicts such as irregular warfare operations in Iraq and Afghanistan, and in April 2009, under the new Obama Administration, he called for ending production in FY2011, leaving the USAF with 187 production aircraft. In July, General James Cartwright, Vice Chairman of the Joint Chiefs of Staff, stated to the Senate Committee on Armed Services his reasons for supporting termination of F-22 production. They included shifting resources to the multirole F-35 to allow proliferation of fifth-generation fighters for three service branches and preserving the F/A-18 production line to maintain the military's electronic warfare (EW) capabilities in the Boeing EA-18G Growler.[60] Issues with the F-22's reliability and availability also raised concerns. After President Obama threatened to veto further production, the Senate voted in July 2009 in favor of ending production and the House subsequently agreed to abide by the 187 production aircraft cap. Gates stated that the decision was taken in light of the F-35's capabilities, and in 2010, he set the F-22 requirement to 187 aircraft by lowering the number of major regional conflict preparations from two to one.
In 2010, USAF initiated a study to determine the costs of retaining F-22 tooling for a future Service Life Extension Program (SLEP).[66] A RAND Corporation paper from this study estimated that restarting production and building an additional 75 F-22s would cost $17 billion, resulting in $227 million per aircraft, or $54 million higher than the flyaway cost. Lockheed Martin stated that restarting the production line itself would cost about $200 million. Production tooling and associated documentation were subsequently stored at the Sierra Army Depot, allowing the retained tooling to support the fleet life cycle. There were reports that attempts to retrieve this tooling found empty containers, but a subsequent audit found that the tooling was stored as expected.
Russian and Chinese fighter developments have fueled concern, and in 2009, General John Corley, head of Air Combat Command, stated that a fleet of 187 F-22s would be inadequate, but Secretary Gates dismissed General Corley's concern. In 2011, Gates explained that Chinese fifth-generation fighter developments had been accounted for when the number of F-22s was set, and that the U.S. would have a considerable advantage in stealth aircraft in 2025, even with F-35 delays. In December 2011, the 195th and final F-22 was completed out of 8 test EMD and 187 operational aircraft produced; the aircraft was delivered to the USAF on 2 May 2012.
In April 2016, the House Armed Services Committee (HASC) Tactical Air and Land Forces Subcommittee proposed legislation that would direct the Air Force to conduct a cost study and assessment associated with resuming production of the F-22. Since the production halt directed in 2009 by then Defense Secretary Gates, lawmakers and the Pentagon noted that air warfare systems of Russia and China were catching up to those of the U.S. Lockheed Martin has proposed upgrading the Block 20 training aircraft into combat-coded Block 30/35 versions as a way to increase numbers available for deployment. On 9 June 2017, the Air Force submitted their report to Congress stating they had no plans to restart the F-22 production line due to economic and operational issues; it estimated it would cost approximately $50 billion to procure 194 additional F-22s at a cost of $206–$216 million per aircraft, including approximately $9.9 billion for non-recurring start-up costs and $40.4 billion for aircraft procurement costs.
Upgrades
The first aircraft with combat-capable Block 3.0 software flew in 2001. Increment 2, the first upgrade program, was implemented in 2005 for Block 20 aircraft onward and enabled the employment of Joint Direct Attack Munitions (JDAM). Certification of the improved AN/APG-77(V)1 radar was completed in March 2007, and airframes from production Lot 5 onward are fitted with this radar, which incorporates air-to-ground modes. Increment 3.1 for Block 30 aircraft onward provided improved ground-attack capability through synthetic aperture radar mapping and radio emitter direction finding, electronic attack and Small Diameter Bomb (SDB) integration; testing began in 2009 and the first upgraded aircraft was delivered in 2011. To address oxygen deprivation issues, F-22s were fitted with an automatic backup oxygen system (ABOS) and modified life support system starting in 2012.
Increment 3.2 for Block 35 aircraft is a two-part upgrade process; 3.2A focuses on electronic warfare, communications and identification, while 3.2B includes geolocation improvements and a new stores management system to show the correct symbols for the AIM-9X and AIM-120D.[83][84] To enable two-way communication with other platforms, the F-22 can use the Battlefield Airborne Communications Node (BACN) as a gateway. The planned Multifunction Advanced Data Link (MADL) integration was cut due to development delays and lack of proliferation among USAF platforms. The F-22 fleet is planned to start receiving Increment 3.2B as well as a software upgrade for cryptography capabilities and avionics stability in May 2019. A Multifunctional Information Distribution System-Joint (MIDS-J) radio that replaces the current Link-16 receive-only box is expected to be operational by 2020. Subsequent upgrades are also focusing on having an open architecture to enable faster future enhancements.
In 2024, funding is projected to begin for the F-22 mid-life upgrade (MLU), which is expected to include new sensors and antennas, hardware refresh, cockpit improvements, and a helmet mounted display and cuing system. Other enhancements being developed include IRST functionality for the AN/AAR-56 Missile Launch Detector (MLD) and more durable stealth coating based on the F-35's.
The F-22 was designed for a service life of 8,000 flight hours, with a $350 million "structures retrofit program". Investigations are being made for upgrades to extend their useful lives further. In the long term, the F-22 is expected to be superseded by a sixth-generation jet fighter to be fielded in the 2030s.
Design
Overview
The F-22 Raptor is a fifth-generation fighter that is considered fourth generation in stealth aircraft technology by the USAF.[91] It is the first operational aircraft to combine supercruise, supermaneuverability, stealth, and sensor fusion in a single weapons platform. The F-22 has four empennage surfaces, retractable tricycle landing gear, and clipped delta wings with reverse trailing edge sweep and leading edge extensions running to the upper outboard corner of the inlets. Flight control surfaces include leading-edge flaps, flaperons, ailerons, rudders on the canted vertical stabilizers, and all-moving horizontal tails (stabilators); for speed brake function, the ailerons deflect up, flaperons down, and rudders outwards to increase drag.
The aircraft's dual Pratt & Whitney F119-PW-100 augmented turbofan engines are closely spaced and incorporate pitch-axis thrust vectoring nozzles with a range of ±20 degrees; each engine has maximum thrust in the 35,000 lbf (156 kN) class. The F-22's thrust-to-weight ratio at typical combat weight is nearly at unity in maximum military power and 1.25 in full afterburner. Maximum speed without external stores is approximately Mach 1.8 at military power and greater than Mach 2 with afterburners.
The F-22's high cruise speed and operating altitude over prior fighters improve the effectiveness of its sensors and weapon systems, and increase survivability against ground defenses such as surface-to-air missiles. The aircraft is among only a few that can supercruise, or sustain supersonic flight without using fuel-inefficient afterburners; it can intercept targets which subsonic aircraft would lack the speed to pursue and an afterburner-dependent aircraft would lack the fuel to reach. The F-22's thrust and aerodynamics enable regular combat speeds of Mach 1.5 at 50,000 feet (15,000 m). The use of internal weapons bays permits the aircraft to maintain comparatively higher performance over most other combat-configured fighters due to a lack of aerodynamic drag from external stores. The aircraft's structure contains a significant amount of high-strength materials to withstand stress and heat of sustained supersonic flight. Respectively, titanium alloys and composites comprise 39% and 24% of the structural weight.
The F-22's aerodynamics, relaxed stability, and powerful thrust-vectoring engines give it excellent maneuverability and energy potential across its flight envelope. The airplane has excellent high alpha (angle of attack) characteristics, capable of flying at trimmed alpha of over 60° while maintaining roll control and performing maneuvers such as the Herbst maneuver (J-turn) and Pugachev's Cobra. The flight control system and full-authority digital engine control (FADEC) make the aircraft highly departure resistant and controllable, thus giving the pilot carefree handling.
Stealth
The F-22 was designed to be highly difficult to detect and track by radar. Measures to reduce radar cross-section (RCS) include airframe shaping such as alignment of edges, fixed-geometry serpentine inlets and curved vanes that prevent line-of-sight of the engine faces and turbines from any exterior view, use of radar-absorbent material (RAM), and attention to detail such as hinges and pilot helmets that could provide a radar return. The F-22 was also designed to have decreased radio emissions, infrared signature and acoustic signature as well as reduced visibility to the naked eye. The aircraft's flat thrust-vectoring nozzles reduce infrared emissions of the exhaust plume to mitigate the threat of infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Additional measures to reduce the infrared signature include special topcoat and active cooling of leading edges to manage the heat buildup from supersonic flight.
Compared to previous stealth designs like the F-117, the F-22 is less reliant on RAM, which are maintenance-intensive and susceptible to adverse weather conditions. Unlike the B-2, which requires climate-controlled hangars, the F-22 can undergo repairs on the flight line or in a normal hangar. The F-22 has a Signature Assessment System which delivers warnings when the radar signature is degraded and necessitates repair. While the F-22's exact RCS is classified, in 2009 Lockheed Martin released information indicating that from certain angles the aircraft has an RCS of 0.0001 m² or −40 dBsm – equivalent to the radar reflection of a "steel marble". Effectively maintaining the stealth features can decrease the F-22's mission capable rate to 62–70%.
The effectiveness of the stealth characteristics is difficult to gauge. The RCS value is a restrictive measurement of the aircraft's frontal or side area from the perspective of a static radar. When an aircraft maneuvers it exposes a completely different set of angles and surface area, potentially increasing radar observability. Furthermore, the F-22's stealth contouring and radar absorbent materials are chiefly effective against high-frequency radars, usually found on other aircraft. The effects of Rayleigh scattering and resonance mean that low-frequency radars such as weather radars and early-warning radars are more likely to detect the F-22 due to its physical size. However, such radars are also conspicuous, susceptible to clutter, and have low precision. Additionally, while faint or fleeting radar contacts make defenders aware that a stealth aircraft is present, reliably vectoring interception to attack the aircraft is much more challenging. According to the USAF an F-22 surprised an Iranian F-4 Phantom II that was attempting to intercept an American UAV, despite Iran's assertion of having military VHF radar coverage over the Persian Gulf.
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.