View allAll Photos Tagged cryptography

Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.

 

Aqui teniu un parell de rotors de la famosa máquina de xifratge Enigma.

 

ca.wikipedia.org/wiki/M%c3%a0quina_Enigma

 

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

These are a couple of german Enigma's rotors (walzen), showing their electrical contacts.

 

www.youtube.com/watch?v=JJm4-lqRJDc

 

en.wikipedia.org/wiki/Enigma_machine

 

cryptomuseum.com/crypto/enigma/i/index.htm

 

The emulator (all the site is wonderful):

users.telenet.be/d.rijmenants/en/enigmasim.htm

 

en.wikipedia.org/wiki/Bletchley_Park

 

www.bletchleypark.org/

www.bletchleypark.org/content/museum.rhtm

 

For an impresive virtual visit, take a look to these videos:

 

www.youtube.com/watch?v=ZmMFp2FQPsY

Joon Ian Wong, Founder, Cryptographic Media, Alex Zhang, Mayor, Friends with Benefits and Meltem Demirors, CSO, CoinShares

 

(Morgan Brown/Shutterstock/CoinDesk)

(Candid street shot, London,UK). Hundreds of friends, but no one to talk to!

 

The U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create,” Apple CEO Tim Cook said. “They have asked us to build a backdoor to the iPhone. Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software – which does not exist today – would have the potential to unlock any iPhone in someone’s physical possession.”

 

Apple’s position on the matter is clear: acquiescing to the FBI’s request to develop a tool to unlock an iPhone, even if it belonged to a murderous terrorist, would set a dangerous precedent and slippery slope.

  

China is watching the dispute closely. Analysts say the Chinese government does take cues from United States when it comes to encryption regulations, and that it would most likely demand that multinational companies provide accommodations similar to those in United States.

 

Last year, Beijing backed off several proposals that would have mandated that foreign firms providing encryption keys for devices sold in China after heavy pressure from foreign trade groups. …

While it’s still not clear how the law might be carried out, it is possible a push from American law enforcement agencies to unlock iPhones would embolden Beijing to demand the same. China would also most likely push to acquire any technology that would allow it to unlock iPhones.

 

-------------------------------------------------

Never mind the FBI in the UK, GCHQ have been monitoring your communications for years, they didn't even bother to ask.

Edward Snowden, former intelligence contractor told the BBC's Panorama that UK intelligence agency GCHQ had the power to hack into phones without their owners' knowledge.

 

The UK government declined to comment.

----------------------------------------

1st March 2016

New UK Snooper’s charter still gives state wide hacking powers

 

The latest version of the Investigatory Powers Bill has failed to clarify tricky issues like encryption and gives police and security services wide-ranging powers

Rotor wheels on the Bombe exhibit at Bletchley Park, one of the devices which ultimately helped save lives and shorten the second world war. Polish contribution to the war effort is also noted.

Cinta perforada, un dels primers sistemes d'enmagatzematge d'informació per a màquines, en aquest cas formant part del que s'anomanaba Heath Robinson, un primitiu sistema de desxifratge de la complexa maquina Lorenz, emprada pel propi Hitler i els comandaments principals de la Wehrmacht. Heath Robinson comparava dues cintes identiques però en posicions diferents. La lectura es feia per mitjà de cel·lules fotoelectriques.

 

Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.

  

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

This punched tape was part of the primitive deciphering machine called Heath Robinson, used to crack the mighty Lorenz cipher, used by Hitler himself. It compared two streams with the same information, looking for patterns in it.

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

en.wikipedia.org/wiki/Heath_Robinson_%28codebreaking_mach...

 

en.wikipedia.org/wiki/Bletchley_Park

dark | light | closer

 

[1] [2] [3] [4] [5] [6] :: [semaphore] sensory

 

visual study in

perception of self

and the environment

in relation to the five

physical senses

  

From Wikipedia, the free encyclopedia

 

The Lockheed Martin F-22 Raptor is a fifth-generation, single-seat, twin-engine, all-weather stealth tactical fighter aircraft developed for the United States Air Force (USAF). The result of the USAF's Advanced Tactical Fighter (ATF) program, the aircraft was designed primarily as an air superiority fighter, but also has ground attack, electronic warfare, and signal intelligence capabilities. The prime contractor, Lockheed Martin, built most of the F-22's airframe and weapons systems and conducted final assembly, while Boeing provided the wings, aft fuselage, avionics integration, and training systems.

 

The aircraft was variously designated F-22 and F/A-22 before it formally entered service in December 2005 as the F-22A. Despite its protracted development and various operational issues, USAF officials consider the F-22 a critical component of the service's tactical air power. Its combination of stealth, aerodynamic performance, and situational awareness enable unprecedented air combat capabilities.

 

Service officials had originally planned to buy a total of 750 ATFs. In 2009, the program was cut to 187 operational production aircraft due to high costs, a lack of clear air-to-air missions due to delays in Russian and Chinese fighter programs, a ban on exports, and development of the more versatile F-35. The last F-22 was delivered in 2012.

  

Development

 

Origins

 

In 1981, the U.S. Air Force identified a requirement for an Advanced Tactical Fighter (ATF) to replace the F-15 Eagle and F-16 Fighting Falcon. Code named "Senior Sky", this air-superiority fighter program was influenced by emerging worldwide threats, including new developments in Soviet air defense systems and the proliferation of the Su-27 "Flanker"- and MiG-29 "Fulcrum"-class of fighter aircraft. It would take advantage of the new technologies in fighter design on the horizon, including composite materials, lightweight alloys, advanced flight control systems, more powerful propulsion systems, and most importantly, stealth technology. In 1983, the ATF concept development team became the System Program Office (SPO) and managed the program at Wright-Patterson Air Force Base. The demonstration and validation (Dem/Val) request for proposals (RFP) was issued in September 1985, with requirements placing strong emphasis on stealth and supercruise. Of the seven bidding companies, Lockheed and Northrop were selected on 31 October 1986. Lockheed teamed with Boeing and General Dynamics while Northrop teamed with McDonnell Douglas, and the two contractor teams undertook a 50-month Dem/Val phase, culminating in the flight test of two technology demonstrator prototypes, the YF-22 and the YF-23, respectively.

 

Dem/Val was focused on risk reduction and technology development plans over specific aircraft designs. Contractors made extensive use of analytical and empirical methods, including computational fluid dynamics, wind-tunnel testing, and radar cross-section calculations and pole testing; the Lockheed team would conduct nearly 18,000 hours of wind-tunnel testing. Avionics development was marked by extensive testing and prototyping and supported by ground and flying laboratories. During Dem/Val, the SPO used the results of performance and cost trade studies conducted by contractor teams to adjust ATF requirements and delete ones that were significant weight and cost drivers while having marginal value. The short takeoff and landing (STOL) requirement was relaxed in order to delete thrust-reversers, saving substantial weight. As avionics was a major cost driver, side-looking radars were deleted, and the dedicated infra-red search and track (IRST) system was downgraded from multi-color to single color and then deleted as well. However, space and cooling provisions were retained to allow for future addition of these components. The ejection seat requirement was downgraded from a fresh design to the existing McDonnell Douglas ACES II. Despite efforts by the contractor teams to rein in weight, the takeoff gross weight estimate was increased from 50,000 lb (22,700 kg) to 60,000 lb (27,200 kg), resulting in engine thrust requirement increasing from 30,000 lbf (133 kN) to 35,000 lbf (156 kN) class.

 

Each team produced two prototype air vehicles for Dem/Val, one for each of the two engine options. The YF-22 had its maiden flight on 29 September 1990 and in flight tests achieved up to Mach 1.58 in supercruise. After the Dem/Val flight test of the prototypes, on 23 April 1991, Secretary of the USAF Donald Rice announced the Lockheed team as the winner of the ATF competition. The YF-23 design was considered stealthier and faster, while the YF-22, with its thrust vectoring nozzles, was more maneuverable as well as less expensive and risky. The aviation press speculated that the Lockheed team's design was also more adaptable to the U.S. Navy's Navalized Advanced Tactical Fighter (NATF), but by 1992, the Navy had abandoned NATF.

  

Production and procurement

 

As the program moved to full-scale development, or the Engineering & Manufacturing Development (EMD) stage, the production version had notable differences from the YF-22, despite having a broadly similar shape. The swept-back angle of the leading edge was decreased from 48° to 42°, while the vertical stabilizers were shifted rearward and decreased in area by 20%. To improve pilot visibility, the canopy was moved forward 7 inches (18 cm), and the engine intakes moved rearward 14 inches (36 cm). The shapes of the wing and stabilator trailing edges were refined to improve aerodynamics, strength, and stealth characteristics. Increasing weight during development caused slight reductions in range and maneuver performance.

 

Prime contractor Lockheed Martin Aeronautics manufactured the majority of the airframe and performed final assembly at Dobbins Air Reserve Base in Marietta, Georgia; program partner Boeing Defense, Space & Security provided additional airframe components as well as avionics integration and training systems. The first F-22, an EMD aircraft with tail number 4001, was unveiled at Marietta, Georgia, on 9 April 1997, and first flew on 7 September 1997. Production, with the first lot awarded in September 2000, supported over 1,000 subcontractors and suppliers from 46 states and up to 95,000 jobs, and spanned 15 years at a peak rate of roughly two airplanes per month. In 2006, the F-22 development team won the Collier Trophy, American aviation's most prestigious award. Due to the aircraft's advanced nature, contractors have been targeted by cyberattacks and technology theft.

 

The USAF originally envisioned ordering 750 ATFs at a total program cost of $44.3 billion and procurement cost of $26.2 billion in fiscal year (FY) 1985 dollars, with production beginning in 1994. The 1990 Major Aircraft Review led by Secretary of Defense Dick Cheney reduced this to 648 aircraft beginning in 1996. By 1997, funding instability had further cut the total to 339, which was again reduced to 277 by 2003. In 2004, the Department of Defense (DoD) further reduced this to 183 operational aircraft, despite the USAF's preference for 381. A multi-year procurement plan was implemented in 2006 to save $15 billion, with total program cost projected to be $62 billion for 183 F-22s distributed to seven combat squadrons. In 2008, Congress passed a defense spending bill that raised the total orders for production aircraft to 187.

 

The first two F-22s built were EMD aircraft in the Block 1.0 configuration for initial flight testing, while the third was a Block 2.0 aircraft built to represent the internal structure of production airframes and enabled it to test full flight loads. Six more EMD aircraft were built in the Block 10 configuration for development and upgrade testing, with the last two considered essentially production quality jets. Production for operational squadrons consisted of 37 Block 20 training aircraft and 149 Block 30/35 combat aircraft; one of the Block 35 aircraft is dedicated to flight sciences at Edwards Air Force Base.

 

The numerous new technologies in the F-22 resulted in substantial cost overruns and delays. Many capabilities were deferred to post-service upgrades, reducing the initial cost but increasing total program cost. As production wound down in 2011, the total program cost is estimated to be about $67.3 billion, with $32.4 billion spent on Research, Development, Test and Evaluation (RDT&E) and $34.9 billion on procurement and military construction (MILCON) in then year dollars. The incremental cost for an additional F-22 was estimated at about $138 million in 2009.

 

Ban on exports

 

The F-22 cannot be exported under US federal law to protect its stealth technology and other high-tech features. Customers for U.S. fighters are acquiring earlier designs such as the F-15 Eagle and F-16 Fighting Falcon or the newer F-35 Lightning II, which contains technology from the F-22 but was designed to be cheaper, more flexible, and available for export. In September 2006, Congress upheld the ban on foreign F-22 sales. Despite the ban, the 2010 defense authorization bill included provisions requiring the DoD to prepare a report on the costs and feasibility for an F-22 export variant, and another report on the effect of F-22 export sales on U.S. aerospace industry.

 

Some Australian politicians and defense commentators proposed that Australia should attempt to purchase F-22s instead of the planned F-35s, citing the F-22's known capabilities and F-35's delays and developmental uncertainties. However, the Royal Australian Air Force (RAAF) determined that the F-22 was unable to perform the F-35's strike and close air support roles. The Japanese government also showed interest in the F-22 for its Replacement-Fighter program. The Japan Air Self-Defense Force (JASDF) would reportedly require fewer fighters for its mission if it obtained the F-22, thus reducing engineering and staffing costs. However, in 2009 it was reported that acquiring the F-22 would require increases to the Japanese government's defense budget beyond the historical 1 percent of its GDP. With the end of F-22 production, Japan chose the F-35 in December 2011. Israel also expressed interest, but eventually chose the F-35 because of the F-22's price and unavailability.

 

Production termination

 

Throughout the 2000s, the need for F-22s was debated, due to rising costs and the lack of relevant adversaries. In 2006, Comptroller General of the United States David Walker found that "the DoD has not demonstrated the need" for more investment in the F-22, and further opposition to the program was expressed by Secretary of Defense Donald Rumsfeld, Deputy Secretary of Defense Gordon R. England, Senator John McCain, and Chairman of U.S. Senate Committee on Armed Services Senator John Warner. The F-22 program lost influential supporters in 2008 after the forced resignations of Secretary of the Air Force Michael Wynne and the Chief of Staff of the Air Force General T. Michael Moseley.

 

In November 2008, Secretary of Defense Robert Gates stated that the F-22 was not relevant in post-Cold War conflicts such as irregular warfare operations in Iraq and Afghanistan, and in April 2009, under the new Obama Administration, he called for ending production in FY2011, leaving the USAF with 187 production aircraft. In July, General James Cartwright, Vice Chairman of the Joint Chiefs of Staff, stated to the Senate Committee on Armed Services his reasons for supporting termination of F-22 production. They included shifting resources to the multirole F-35 to allow proliferation of fifth-generation fighters for three service branches and preserving the F/A-18 production line to maintain the military's electronic warfare (EW) capabilities in the Boeing EA-18G Growler.[60] Issues with the F-22's reliability and availability also raised concerns. After President Obama threatened to veto further production, the Senate voted in July 2009 in favor of ending production and the House subsequently agreed to abide by the 187 production aircraft cap. Gates stated that the decision was taken in light of the F-35's capabilities, and in 2010, he set the F-22 requirement to 187 aircraft by lowering the number of major regional conflict preparations from two to one.

 

In 2010, USAF initiated a study to determine the costs of retaining F-22 tooling for a future Service Life Extension Program (SLEP).[66] A RAND Corporation paper from this study estimated that restarting production and building an additional 75 F-22s would cost $17 billion, resulting in $227 million per aircraft, or $54 million higher than the flyaway cost. Lockheed Martin stated that restarting the production line itself would cost about $200 million. Production tooling and associated documentation were subsequently stored at the Sierra Army Depot, allowing the retained tooling to support the fleet life cycle. There were reports that attempts to retrieve this tooling found empty containers, but a subsequent audit found that the tooling was stored as expected.

 

Russian and Chinese fighter developments have fueled concern, and in 2009, General John Corley, head of Air Combat Command, stated that a fleet of 187 F-22s would be inadequate, but Secretary Gates dismissed General Corley's concern. In 2011, Gates explained that Chinese fifth-generation fighter developments had been accounted for when the number of F-22s was set, and that the U.S. would have a considerable advantage in stealth aircraft in 2025, even with F-35 delays. In December 2011, the 195th and final F-22 was completed out of 8 test EMD and 187 operational aircraft produced; the aircraft was delivered to the USAF on 2 May 2012.

 

In April 2016, the House Armed Services Committee (HASC) Tactical Air and Land Forces Subcommittee proposed legislation that would direct the Air Force to conduct a cost study and assessment associated with resuming production of the F-22. Since the production halt directed in 2009 by then Defense Secretary Gates, lawmakers and the Pentagon noted that air warfare systems of Russia and China were catching up to those of the U.S. Lockheed Martin has proposed upgrading the Block 20 training aircraft into combat-coded Block 30/35 versions as a way to increase numbers available for deployment. On 9 June 2017, the Air Force submitted their report to Congress stating they had no plans to restart the F-22 production line due to economic and operational issues; it estimated it would cost approximately $50 billion to procure 194 additional F-22s at a cost of $206–$216 million per aircraft, including approximately $9.9 billion for non-recurring start-up costs and $40.4 billion for aircraft procurement costs.

 

Upgrades

 

The first aircraft with combat-capable Block 3.0 software flew in 2001. Increment 2, the first upgrade program, was implemented in 2005 for Block 20 aircraft onward and enabled the employment of Joint Direct Attack Munitions (JDAM). Certification of the improved AN/APG-77(V)1 radar was completed in March 2007, and airframes from production Lot 5 onward are fitted with this radar, which incorporates air-to-ground modes. Increment 3.1 for Block 30 aircraft onward provided improved ground-attack capability through synthetic aperture radar mapping and radio emitter direction finding, electronic attack and Small Diameter Bomb (SDB) integration; testing began in 2009 and the first upgraded aircraft was delivered in 2011. To address oxygen deprivation issues, F-22s were fitted with an automatic backup oxygen system (ABOS) and modified life support system starting in 2012.

 

Increment 3.2 for Block 35 aircraft is a two-part upgrade process; 3.2A focuses on electronic warfare, communications and identification, while 3.2B includes geolocation improvements and a new stores management system to show the correct symbols for the AIM-9X and AIM-120D.[83][84] To enable two-way communication with other platforms, the F-22 can use the Battlefield Airborne Communications Node (BACN) as a gateway. The planned Multifunction Advanced Data Link (MADL) integration was cut due to development delays and lack of proliferation among USAF platforms. The F-22 fleet is planned to start receiving Increment 3.2B as well as a software upgrade for cryptography capabilities and avionics stability in May 2019. A Multifunctional Information Distribution System-Joint (MIDS-J) radio that replaces the current Link-16 receive-only box is expected to be operational by 2020. Subsequent upgrades are also focusing on having an open architecture to enable faster future enhancements.

 

In 2024, funding is projected to begin for the F-22 mid-life upgrade (MLU), which is expected to include new sensors and antennas, hardware refresh, cockpit improvements, and a helmet mounted display and cuing system. Other enhancements being developed include IRST functionality for the AN/AAR-56 Missile Launch Detector (MLD) and more durable stealth coating based on the F-35's.

 

The F-22 was designed for a service life of 8,000 flight hours, with a $350 million "structures retrofit program". Investigations are being made for upgrades to extend their useful lives further. In the long term, the F-22 is expected to be superseded by a sixth-generation jet fighter to be fielded in the 2030s.

  

Design

 

Overview

 

The F-22 Raptor is a fifth-generation fighter that is considered fourth generation in stealth aircraft technology by the USAF.[91] It is the first operational aircraft to combine supercruise, supermaneuverability, stealth, and sensor fusion in a single weapons platform. The F-22 has four empennage surfaces, retractable tricycle landing gear, and clipped delta wings with reverse trailing edge sweep and leading edge extensions running to the upper outboard corner of the inlets. Flight control surfaces include leading-edge flaps, flaperons, ailerons, rudders on the canted vertical stabilizers, and all-moving horizontal tails (stabilators); for speed brake function, the ailerons deflect up, flaperons down, and rudders outwards to increase drag.

 

The aircraft's dual Pratt & Whitney F119-PW-100 augmented turbofan engines are closely spaced and incorporate pitch-axis thrust vectoring nozzles with a range of ±20 degrees; each engine has maximum thrust in the 35,000 lbf (156 kN) class. The F-22's thrust-to-weight ratio at typical combat weight is nearly at unity in maximum military power and 1.25 in full afterburner. Maximum speed without external stores is approximately Mach 1.8 at military power and greater than Mach 2 with afterburners.

 

The F-22's high cruise speed and operating altitude over prior fighters improve the effectiveness of its sensors and weapon systems, and increase survivability against ground defenses such as surface-to-air missiles. The aircraft is among only a few that can supercruise, or sustain supersonic flight without using fuel-inefficient afterburners; it can intercept targets which subsonic aircraft would lack the speed to pursue and an afterburner-dependent aircraft would lack the fuel to reach. The F-22's thrust and aerodynamics enable regular combat speeds of Mach 1.5 at 50,000 feet (15,000 m). The use of internal weapons bays permits the aircraft to maintain comparatively higher performance over most other combat-configured fighters due to a lack of aerodynamic drag from external stores. The aircraft's structure contains a significant amount of high-strength materials to withstand stress and heat of sustained supersonic flight. Respectively, titanium alloys and composites comprise 39% and 24% of the structural weight.

 

The F-22's aerodynamics, relaxed stability, and powerful thrust-vectoring engines give it excellent maneuverability and energy potential across its flight envelope. The airplane has excellent high alpha (angle of attack) characteristics, capable of flying at trimmed alpha of over 60° while maintaining roll control and performing maneuvers such as the Herbst maneuver (J-turn) and Pugachev's Cobra. The flight control system and full-authority digital engine control (FADEC) make the aircraft highly departure resistant and controllable, thus giving the pilot carefree handling.

  

Stealth

 

The F-22 was designed to be highly difficult to detect and track by radar. Measures to reduce radar cross-section (RCS) include airframe shaping such as alignment of edges, fixed-geometry serpentine inlets and curved vanes that prevent line-of-sight of the engine faces and turbines from any exterior view, use of radar-absorbent material (RAM), and attention to detail such as hinges and pilot helmets that could provide a radar return. The F-22 was also designed to have decreased radio emissions, infrared signature and acoustic signature as well as reduced visibility to the naked eye. The aircraft's flat thrust-vectoring nozzles reduce infrared emissions of the exhaust plume to mitigate the threat of infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Additional measures to reduce the infrared signature include special topcoat and active cooling of leading edges to manage the heat buildup from supersonic flight.

 

Compared to previous stealth designs like the F-117, the F-22 is less reliant on RAM, which are maintenance-intensive and susceptible to adverse weather conditions. Unlike the B-2, which requires climate-controlled hangars, the F-22 can undergo repairs on the flight line or in a normal hangar. The F-22 has a Signature Assessment System which delivers warnings when the radar signature is degraded and necessitates repair. While the F-22's exact RCS is classified, in 2009 Lockheed Martin released information indicating that from certain angles the aircraft has an RCS of 0.0001 m² or −40 dBsm – equivalent to the radar reflection of a "steel marble". Effectively maintaining the stealth features can decrease the F-22's mission capable rate to 62–70%.

 

The effectiveness of the stealth characteristics is difficult to gauge. The RCS value is a restrictive measurement of the aircraft's frontal or side area from the perspective of a static radar. When an aircraft maneuvers it exposes a completely different set of angles and surface area, potentially increasing radar observability. Furthermore, the F-22's stealth contouring and radar absorbent materials are chiefly effective against high-frequency radars, usually found on other aircraft. The effects of Rayleigh scattering and resonance mean that low-frequency radars such as weather radars and early-warning radars are more likely to detect the F-22 due to its physical size. However, such radars are also conspicuous, susceptible to clutter, and have low precision. Additionally, while faint or fleeting radar contacts make defenders aware that a stealth aircraft is present, reliably vectoring interception to attack the aircraft is much more challenging. According to the USAF an F-22 surprised an Iranian F-4 Phantom II that was attempting to intercept an American UAV, despite Iran's assertion of having military VHF radar coverage over the Persian Gulf.

Man it feels good when you crack a code and open a door, and look whats behind it! Another riddler trophy! Concept art unlocked, Hooray!

"The quest for certainty blocks the search for meaning. Uncertainty is the very condition to impel man to unfold his powers."

– Erich Fromm, in 'Man for Himself' (1947), Ch. 3.

 

"Ants are more like the parts of an animal than entities on their own. They are mobile cells, circulating through a dense connective tissue of other ants in a matrix of twigs. The circuits are so intimately interwoven that the anthill meets all the essential criteria of an organism.

– Lewis Thomas, 'The Lives of a Cell: Notes of a Biology Watcher', "Antaeus in Manhattan" (1974).

 

"A good man, through obscurest aspirations,

Has still an instinct of the one true way."

– Johann Wolfgang von Goethe, 'Faust'.

 

The Lorenz SZ40, SZ42A and SZ42B were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin and the model name SZ was derived from Schlüsselzusatz, meaning cipher attachment. The instruments implemented a Vernam stream cipher.

British cryptographers, who referred to encrypted German teleprinter traffic as Fish, dubbed the machine and its traffic Tunny.

The SZ machines were in-line attachments to standard Lorenz teleprinters. An experimental link using SZ40 machines was started in June 1941. The enhanced SZ42 machines were brought into substantial use from mid-1942 onwards for high-level communications between the German High Command in Berlin, and Army Commands throughout occupied Europe. The more advanced SZ42A came into routine use in February 1943 and the SZ42B in June 1944.

Wireless telegraphy (WT) rather than land-line circuits was used for this traffic. These non-Morse (NoMo) messages were picked up by Britain's Y-stations at Knockholt and Denmark Hill and sent to Government Code and Cypher School at Bletchley Park (BP). Some were deciphered using hand methods before the process was partially automated, first with Robinson machines and then with the Colossus computers. The deciphered messages made an important contribution to Ultra military intelligence.

 

On 30 August 1941, a message of some 4,000 characters was transmitted from Athens to Vienna. However, the message was not received correctly at the other end, so (after the recipient sent an unencoded request for retransmission, which let the codebreakers know what was happening) the message was retransmitted with the same key settings (HQIBPEXEZMUG); a forbidden practice. Moreover, the second time the operator made a number of small alterations to the message, such as using abbreviations, making the second message somewhat shorter. From these two related ciphertexts, known to cryptanalysts as a depth, the veteran cryptanalyst Brigadier John Tiltman in the Research Section teased out the two plaintexts and hence the keystream. Then, after three months of the Research Section failing to diagnose the machine from the almost 4,000 characters of key, the task was handed to mathematician Bill Tutte. He applied a technique that he had been taught in his cryptographic training, of writing out the key by hand and looking for repetitions. Tutte did this with the original teleprinter 5-bit Baudot codes, which led him to his initial breakthrough of recognising a 41 character repetition. Over the following two months up to January 1942, Tutte and colleagues worked out the complete logical structure of the cipher machine. This remarkable piece of reverse engineering was later described as "one of the greatest intellectual feats of World War II".

After this cracking of Tunny, a special team of code breakers was set up under Ralph Tester, most initially transferred from Alan Turing's Hut 8. The team became known as the Testery. It performed the bulk of the subsequent work in breaking Tunny messages, but was aided by machines in the complementary section under Max Newman known as the Newmanry.

 

Several complex machines were built by the British to aid the attack on Tunny. The first was the British Tunny. This machine was designed by Bletchley Park, based on the reverse engineering work done by Tiltman's team in the Testery, to emulate the Lorenz Cipher Machine. When the pin wheel settings were found by the Testery, the Tunny machine was set up and run so that the messages could be printed.

A family of machines known as "Robinsons" were built for the Newmanry. These used two paper tapes, along with logic circuitry, to find the settings of the chi pin wheels of the Lorenz machine. The Robinsons had major problems keeping the two paper tapes synchronized and were relatively slow, reading only 2000 characters per second.

The most important machine was the Colossus of which ten were in use by the war's end. They were the world's first large-scale programmable electronic digital computers, the first becoming operational in December 1943. These were developed by senior engineer Tommy Flowers at the Post Office Research Station at Dollis Hill in London. Like the later ENIAC of 1946, Colossus did not have a stored program, and was programmed through plugboards and jumper cables. It was faster, more reliable and more capable than the Robinsons, so speeding up the process of finding the Lorenz chi pin wheel settings. Since Colossus generated the putative keys electronically, it only had to read one tape. It did so with an optical reader which, at 5000 characters per second, was driven much faster than the Robinsons' and meant that the tape travelled at almost 30 miles per hour (48 km/h). This, and the clocking of the electronics from the optically read paper tape sprocket holes, completely eliminated the Robinsons' synchronisation problems.

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.

 

Aquesta de la imatge és una maquina Enigma M4, del tipus emprat per la Kriegsmarine al final de la guerra. És molt facil d'identificar perque té 4 rotors en comptes de 3. Sense dubte és l'element més famós de la historia del xifratge i la criptologia.

 

ca.wikipedia.org/wiki/M%c3%a0quina_Enigma

 

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

This is a Kriegsmarine M4 model Enigma. You can identify it by the 4 rotors, when usually the earlier machines had only 3 rotors. The Enigma machine is without doubt the most famous icon in the history of cryptology

  

www.youtube.com/watch?v=JJm4-lqRJDc

 

en.wikipedia.org/wiki/Enigma_machine

 

cryptomuseum.com/crypto/enigma/i/index.htm

 

The emulator (all the site is wonderful):

users.telenet.be/d.rijmenants/en/enigmasim.htm

 

en.wikipedia.org/wiki/Bletchley_Park

 

www.bletchleypark.org/

www.bletchleypark.org/content/museum.rhtm

 

For an impresive virtual visit, take a look to these videos:

 

www.youtube.com/watch?v=ZmMFp2FQPsY

Die Luftwaffe (Air Force) ENIGMA

 

Like the Army, the Air Force relied on ENIGMA for coomunications security (COMSEC). As a result of radio intercept and timely analysis, which was aided by poor COMSEC on German radion nets, plans such as decisve air attacks known as the Battle of Britain were revealed to the British well in advance of the intended strike. The losses suffered by the German air force during this time were never regained.

Source National Cryptologic Museum (Added links to Wikipedia)

 

A slightly different view from Battle of Britain Wikipedia

Effect of signals intelligence

It is unclear how much the British intercepts of the Enigma cipher, used for high-security German radio communications, affected the battle. Ultra, the information obtained from Enigma intercepts, gave the highest echelons of the UK's command a view of German intentions but it seems little of this material filtered down to Hugh Dowding's desk. (It would have had little tactical value in any case.) However, the radio listening service (known as Y Service), monitoring the patterns of Luftwaffe radio traffic, contributed considerably to the early warning of raids

 

ENIGMA remains the best known German cryptographic machine of World War II.

 

ENIGMA cipher machine collection

  

i09_0214 100

She is the wind now, impossible to escape, impossible to touch.

 

Fighting she understand now is no different then seeing the solution to the complex cryptographic equations she has made an art of solving on the fly before the ICE hits. Down in the hi-tech dungeons of the GSC HQ they learn how fatal being on the wrong side of the equal sign is...

 

Then she is there, the inner chamber where the enslaved AI that controls the world we live in exists in huge processor arrays!

 

Sorry about this silliness, but I need to find out how this ends!

 

View On Black

 

episode 1 * episode 2 * episode 3 * episode 4

A blockchain, originally block chain, is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash of the previous block, a timestamp and transaction data. By design, a blockchain is inherently resistant to modification of the data. It is "an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way". For use as a distributed ledger, a blockchain is typically managed by a peer-to-peer network collectively adhering to a protocol for validating new blocks. Once recorded, the data in any given block cannot be altered retroactively without the alteration of all subsequent blocks, which requires collusion of the network majority. Blockchains are secure by design and are an example of a distributed computing system with high Byzantine fault tolerance. Decentralized consensus has therefore been achieved with a blockchain. This makes blockchains potentially suitable for the recording of events, medical records, and other records management activities, such as identity management,transaction processing, documenting provenance, food traceability or voting. Blockchain was invented by Satoshi Nakamoto in 2008 for use in the cryptocurrency bitcoin, as its public transaction ledger.The first work on a cryptographically secured chain of blocks was described in 1991 by Stuart Haber and W. Scott Stornetta.In 1992, Bayer, Haber and Stornetta incorporated Merkle trees to the design, which improved its efficiency by allowing several documents to be collected into one block.In 2002, David Mazières and Dennis Shasha proposed a network file system with decentralized trust: writers to the file system trust one another but not the network in between; they achieve file system integrity by writing signed commits to a shared, append-only signature chain that captures the root of the file system (which in turn is a Merkle Tree). This system can be viewed as a proto-blockchain in which all authorized clients can always write, whereas, in modern blockchains, a client who solves a cryptographic puzzle can write one block.[citation needed] In 2005, Nick Szabo proposed a blockchain-like system for decentralized property titles and his bit gold payment system that utilised chained proof-of-work and timestamping. However, Szabo's method of double-spending protection was vulnerable to Sybil attacks. The first blockchain was conceptualised by a person (or group of people) known as Satoshi Nakamoto in 2008. It was implemented the following year by Nakamoto as a core component of the cryptocurrency bitcoin, where it serves as the public ledger for all transactions on the network.Through the use of a blockchain, bitcoin became the first digital currency to solve the double spending problem without requiring a trusted authority and has been the inspiration for many additional applications. In August 2014, the bitcoin blockchain file size, containing records of all transactions that have occurred on the network, reached 20GB (gigabytes). In January 2015, the size had grown to almost 30GB, and from January 2016 to January 2017, the bitcoin blockchain grew from 50GB to 100GB in size.The words block and chain were used separately in Satoshi Nakamoto's original paper, but were eventually popularized as a single word, blockchain, by 2016. The term blockchain 2.0 refers to new applications of the distributed blockchain database, first emerging in 2014. The Economist described one implementation of this second-generation programmable blockchain as coming with "a programming language that allows users to write more sophisticated smart contracts, thus creating invoices that pay themselves when a shipment arrives or share certificates which automatically send their owners dividends if profits reach a certain level". Blockchain 2.0 technologies go beyond transactions and enable "exchange of value without powerful intermediaries acting as arbiters of money and information". They are expected to enable excluded people to enter the global economy, protect the privacy of participants, allow people to "monetize their own information", and provide the capability to ensure creators are compensated for their intellectual property. Second-generation blockchain technology makes it possible to store an individual's "persistent digital ID and persona" and are providing an avenue to help solve the problem of social inequality by "potentially changing the way wealth is distributed".:14–15 As of 2016, blockchain 2.0 implementations continue to require an off-chain oracle to access any "external data or events based on time or market conditions [that need] to interact with the blockchain". In 2016, the central securities depository of the Russian Federation (NSD) announced a pilot project, based on the Nxt blockchain 2.0 platform, that would explore the use of blockchain-based automated voting systems. IBM opened a blockchain innovation research center in Singapore in July 2016. A working group for the World Economic Forum met in November 2016 to discuss the development of governance models related to blockchain.[28] According to Accenture, an application of the diffusion of innovations theory suggests that blockchains attained a 13.5% adoption rate within financial services in 2016, therefore reaching the early adopters phase. Industry trade groups joined to create the Global Blockchain Forum in 2016, an initiative of the Chamber of Digital Commerce. A blockchain is a decentralized, distributed and public digital ledger that is used to record transactions across many computers so that the record cannot be altered retroactively without the alteration of all subsequent blocks and the collusion of the network. This allows the participants to verify and audit transactions inexpensively. A blockchain database is managed autonomously using a peer-to-peer network and a distributed timestamping server. They are authenticated by mass collaboration powered by collective self-interests.The result is a robust workflow where participants' uncertainty regarding data security is marginal. The use of a blockchain removes the characteristic of infinite reproducibility from a digital asset. It confirms that each unit of value was transferred only once, solving the long-standing problem of double spending. Blockchains have been described as a value-exchange protocol. This blockchain-based exchange of value can be completed more quickly, more safely and more cheaply than with traditional systems. A blockchain can assign title rights because it provides a record that compels offer and acceptance.

 

Blocks

Blocks hold batches of valid transactions that are hashed and encoded into a Merkle tree. Each block includes the cryptographic hash of the prior block in the blockchain, linking the two. The linked blocks form a chain.This iterative process confirms the integrity of the previous block, all the way back to the original genesis block.

 

Sometimes separate blocks can be produced concurrently, creating a temporary fork. In addition to a secure hash-based history, any blockchain has a specified algorithm for scoring different versions of the history so that one with a higher value can be selected over others. Blocks not selected for inclusion in the chain are called orphan blocks. Peers supporting the database have different versions of the history from time to time. They only keep the highest-scoring version of the database known to them. Whenever a peer receives a higher-scoring version (usually the old version with a single new block added) they extend or overwrite their own database and retransmit the improvement to their peers. There is never an absolute guarantee that any particular entry will remain in the best version of the history forever. Because blockchains are typically built to add the score of new blocks onto old blocks and because there are incentives to work only on extending with new blocks rather than overwriting old blocks, the probability of an entry becoming superseded goes down exponentially as more blocks are built on top of it, eventually becoming very low. For example, in a blockchain using the proof-of-work system, the chain with the most cumulative proof-of-work is always considered the valid one by the network. There are a number of methods that can be used to demonstrate a sufficient level of computation. Within a blockchain the computation is carried out redundantly rather than in the traditional segregated and parallel manner.

 

The block time is the average time it takes for the network to generate one extra block in the blockchain. Some blockchains create a new block as frequently as every five seconds. By the time of block completion, the included data becomes verifiable. In cryptocurrency, this is practically when the money transaction takes place, so a shorter block time means faster transactions. The block time for Ethereum is set to between 14 and 15 seconds, while for bitcoin it is 10 minutes.Express. Why is Ripple XRP falling today? Why is it crashing in value?Ripple price: Why is Ripple XRP falling today? Why is it… 'Ripple is first in line' - CEO reveals next cryptocurrency to catch up with bitcoin

'Ripple is first in line' - CEO reveals next cryptocurrency to…

Ripple price news: Why is XRP falling so fast? What's happening to Ripple?Ripple price news: Why is XRP falling so fast? What's happening… Bitcoin price BOOST: Big investors are FINALLY realising Bitcoin is GAME-CHANGING Bitcoin price WARNING: CEO says cryptocurrency has 'NOTHING to do with the real economy' BITCOIN has come under fire from the CEO of Euronext as the financial expert claimed the cryptocurrency "has nothing to do with the real economy".

Bitcoin price suffered a massive plunge as the cryptocurrency reached the value of $9,114.56, according to Coindesk at 10:37 pm on February. As the crypto-craze started to die down, Euronext CEO Stéphane Boujnah claims bitcoin cannot even be classified as a cryptocurrency. Speaking on Bloomberg, Mr Boujnah said Euronext will never open a bitcoin market. He said: "We will not create a bitcoin market because the mandate of Euronext is to power Pan-European capital markets to finance the real economy and bitcoin has nothing to do with the real economy. "Bitcoin has a lot to do with bitcoin. And we believe bitcoin is not a cryptocurrency.

"Bitcoin is at best a crypto asset. All currencies are assets but not all assets are currencies. "Clearly, bitcoin today is just like a piece of art, or just like a diamond, just like a Pokemon card.

"It can be anything to capture value but today people buy it because it goes up and because it’s not as serious and transparent as a lot of assets. "So great, good luck. Like any emerging assets, it’s very fancy, which is great, but this is not our mandate. "Our mandate is to be the place regulated, transparent, open, reliable. It’s not our mandate to be part of this new game in town." Despite the rollercoaster few months suffered by the crypto mania, bitcoin and other cryptocurrencies such as Ripple and ethereum still benefit from a "growing" appreciation among institutional investors, according to Dr Garrick Hileman, from the Cambridge University Centre for Alternative Finance.In an exclusive interview with Express.co.uk, Dr Hileman said: "Any breakthrough technology, and bitcoin and blockchain, are certainly breakthrough technologies, hype often outpaces the reality. “In terms of both of how mature the technology is, the rates of adoption. “We’ve seen this before with bitcoin and we’ve seen the price shoot up first in late 2013 when it first entered the mainstream public consciousness. “The price subsequently crashed 85 percent as security at a major exchange broke down and bitcoin’s were stolen. “So we’ve seen this kind of story repeat where bitcoin rises, gets hyped and then there’s a crash.” This section is transcluded from Fork (blockchain). A hard fork occurs when a blockchain splits into two incompatible separate chains. This is a consequence of the use of two incompatible sets of rules trying to govern the system. For example, Ethereum has hard-forked to "make whole" the investors in The DAO, which had been hacked by exploiting a vulnerability in its code. In 2014 the Nxt community was asked to consider a hard fork that would have led to a rollback of the blockchain records to mitigate the effects of a theft of 50 million NXT from a major cryptocurrency exchange. The hard fork proposal was rejected, and some of the funds were recovered after negotiations and ransom payment.

Decentralization

By storing data across its network, the blockchain eliminates the risks that come with data being held centrally. The decentralized blockchain may use ad-hoc message passing and distributed networking. Its network lacks centralized points of vulnerability that computer crackers can exploit; likewise, it has no central point of failure. Blockchain security methods include the use of public-key cryptography. A public key (a long, random-looking string of numbers) is an address on the blockchain. Value tokens sent across the network are recorded as belonging to that address. A private key is like a password that gives its owner access to their digital assets or the means to otherwise interact with the various capabilities that blockchains now support. Data stored on the blockchain is generally considered incorruptible. This is where blockchain has its advantage. While centralized data is more controllable, information and data manipulation are common. By decentralizing it, blockchain makes data transparent to everyone involved. Every node in a decentralized system has a copy of the blockchain. Data quality is maintained by massive database replication[9] and computational trust. No centralized "official" copy exists and no user is "trusted" more than any other. Transactions are broadcast to the network using software. Messages are delivered on a best-effort basis. Mining nodes validate transactions, add them to the block they are building, and then broadcast the completed block to other nodes. Blockchains use various time-stamping schemes, such as proof-of-work, to serialize changes. Alternate consensus methods include proof-of-stake. Growth of a decentralized blockchain is accompanied by the risk of node centralization because the computer resources required to process larger amounts of data become more expensive.

 

Openness

Open blockchains are more user-friendly than some traditional ownership records, which, while open to the public, still require physical access to view. Because all early blockchains were permissionless, controversy has arisen over the blockchain definition. An issue in this ongoing debate is whether a private system with verifiers tasked and authorized (permissioned) by a central authority should be considered a blockchain. Proponents of permissioned or private chains argue that the term "blockchain" may be applied to any data structure that batches data into time-stamped blocks. These blockchains serve as a distributed version of multiversion concurrency control (MVCC) in databases. Just as MVCC prevents two transactions from concurrently modifying a single object in a database, blockchains prevent two transactions from spending the same single output in a blockchain.[24]:30–31 Opponents say that permissioned systems resemble traditional corporate databases, not supporting decentralized data verification, and that such systems are not hardened against operator tampering and revision. Nikolai Hampton of Computerworld said that "many in-house blockchain solutions will be nothing more than cumbersome databases."Business analysts Don Tapscott and Alex Tapscott define blockchain as a distributed ledger or database open to anyone.

 

Permissionless

The great advantage to an open, permissionless, or public, blockchain network is that guarding against bad actors is not required and no access control is needed.This means that applications can be added to the network without the approval or trust of others, using the blockchain as a transport layer.

 

Bitcoin and other cryptocurrencies currently secure their blockchain by requiring new entries including a proof of work. To prolong the blockchain, bitcoin uses Hashcash puzzles developed by Adam Back in the 1990s.

 

Financial companies have not prioritised decentralized blockchains. In 2016, venture capital investment for blockchain related projects was weakening in the USA but increasing in China. Bitcoin and many other cryptocurrencies use open (public) blockchains. As of January 2018, bitcoin has the highest market capitalization.

 

Permissioned (private) blockchain

 

Permissioned blockchains use an access control layer to govern who has access to the network. In contrast to public blockchain networks, validators on private blockchain networks are vetted by the network owner. They do not rely on anonymous nodes to validate transactions nor do they benefit from the network effect. Permissioned blockchains can also go by the name of 'consortium' or 'hybrid' blockchains.

 

The New York Times noted in both 2016 and 2017 that many corporations are using blockchain networks "with private blockchains, independent of the public system."

 

Disadvantages

Nikolai Hampton pointed out in Computerworld that "There is also no need for a "51 percent" attack on a private blockchain, as the private blockchain (most likely) already controls 100 percent of all block creation resources. If you could attack or damage the blockchain creation tools on a private corporate server, you could effectively control 100 percent of their network and alter transactions however you wished." This has a set of particularly profound adverse implications during a financial crisis or debt crisis like the financial crisis of 2007–08, where politically powerful actors may make decisions that favor some groups at the expense of others.[citation needed] and "the bitcoin blockchain is protected by the massive group mining effort. It's unlikely that any private blockchain will try to protect records using gigawatts of computing power — it's time consuming and expensive."He also said, "Within a private blockchain there is also no 'race'; there's no incentive to use more power or discover blocks faster than competitors. This means that many in-house blockchain solutions will be nothing more than cumbersome databases."

 

Uses

Blockchain technology can be integrated into multiple areas. The primary use of blockchains today is as a distributed ledger for cryptocurrencies, most notably bitcoin.While a few central banks, in countries such as China, United States, Sweden, Singapore, South Africa and England are studying issuance of a Central Bank Issued Cryptocurrency (CICC), none have done so thus far.

 

General potentials

Blockchain technology has a large potential to transform business operating models in the long term. Blockchain distributed ledger technology is more a foundational technology—with the potential to create new foundations for global economic and social systems—than a disruptive technology, which typically "attack a traditional business model with a lower-cost solution and overtake incumbent firms quickly".Even so, there are a few operational products maturing from proof of concept by late 2016.The use of blockchains promises to bring significant efficiencies to global supply chains, financial transactions, asset ledgers and decentralized social networking.

 

As of 2016, some observers remain skeptical. Steve Wilson, of Constellation Research, believes the technology has been hyped with unrealistic claims.To mitigate risk businesses are reluctant to place blockchain at the core of the business structure.

 

This means specific blockchain applications may be a disruptive innovation, because substantially lower-cost solutions can be instantiated, which can disrupt existing business models. Blockchain protocols facilitate businesses to use new methods of processing digital transactions.[68] Examples include a payment system and digital currency, facilitating crowdsales, or implementing prediction markets and generic governance tools.

 

Blockchains alleviate the need for a trust service provider and are predicted to result in less capital being tied up in disputes. Blockchains have the potential to reduce systemic risk and financial fraud. They automate processes that were previously time-consuming and done manually, such as the incorporation of businesses.In theory, it would be possible to collect taxes, conduct conveyancing and provide risk management with blockchains.

 

As a distributed ledger, blockchain reduces the costs involved in verifying transactions, and by removing the need for trusted "third-parties" such as banks to complete transactions, the technology also lowers the cost of networking, therefore allowing several applications.

 

Starting with a strong focus on financial applications, blockchain technology is extending to activities including decentralized applications and collaborative organizations that eliminate a middleman.

 

Land registration

"Land is a financial source, if people can prove they own it, they can borrow against it."

Emmanuel Noah, CEO of Ghanian startup BenBen, New York Observer

Frameworks and trials such as the one at the Sweden Land Registry aim to demonstrate the effectiveness of the blockchain at speeding land sale deals.The Republic of Georgia is piloting a blockchain-based property registry.The Ethical and Fair Creators Association uses blockchain to help startups protect their authentic ideas.

 

The Government of India is fighting land fraud with the help of a blockchain.

 

In October 2017, one of the first international property transactions was completed successfully using a blockchain-based smart contract.

 

In the first half of 2018, an experiment will be conducted on the use of blocking technology to monitor the reliability of the Unified State Real Estate Register (USRER) data in the territory of Moscow.

 

The Big Four

Each of the Big Four accounting firms is testing blockchain technologies in various formats. Ernst & Young has provided cryptocurrency wallets to all (Swiss) employees,has installed a bitcoin ATM in their office in Switzerland, and accepts bitcoin as payment for all its consulting services. Marcel Stalder, CEO of Ernst & Young Switzerland, stated, "We don't only want to talk about digitalization, but also actively drive this process together with our employees and our clients. It is important to us that everybody gets on board and prepares themselves for the revolution set to take place in the business world through blockchains, [to] smart contracts and digital currencies."PwC, Deloitte, and KPMG have taken a different path from Ernst & Young and are all testing private blockchains.

 

Smart contracts

Blockchain-based smart contracts are contracts that can be partially or fully executed or enforced without human interaction.One of the main objectives of a smart contract is automated escrow. The IMF believes blockchains could reduce moral hazards and optimize the use of contracts in general.Due to the lack of widespread use their legal status is unclear.

 

Some blockchain implementations could enable the coding of contracts that will execute when specified conditions are met. A blockchain smart contract would be enabled by extensible programming instructions that define and execute an agreement.For example, Ethereum Solidity is an open-source blockchain project that was built specifically to realize this possibility by implementing a Turing-complete programming language capability to implement such contracts.

 

Nonprofit organizations

Level One Project from the Bill & Melinda Gates Foundation aims to use blockchain technology to help the two billion people worldwide who lack bank accounts.

Building Blocks project from the U.N.'s World Food Programme (WFP) aims to make WFP's growing cash-based transfer operations faster, cheaper, and more secure. Building Blocks commenced field pilots in Pakistan in January 2017 that will continue throughout spring.

Decentralized networks

The Backfeed project develops a distributed governance system for blockchain-based applications allowing for the collaborative creation and distribution of value in spontaneously emerging networks of peers.[88][89]

The Alexandria project is a blockchain-based Decentralized Library.

Tezos is a blockchain project that governs itself by voting of its token holders. Bitcoin blockchain performs as a cryptocurrency and payment system. Ethereum blockchain added smart contract system on top of a blockchain. Tezos blockchain will add an autonomy system – a decentralized code Development function on top of both bitcoin and Ethereum blockchains.

Governments and national currencies

The director of the Office of IT Schedule Contract Operations at the US General Services Administration, Mr. Jose Arrieta, disclosed at the 20 Sep ACT-IAC (American Council for Technology and Industry Advisory Council) Forum that its organization is using blockchain distributed ledger technology to speed up the FASt Lane process for IT Schedule 70 contracts through automation. Two companies, United Solutions (prime contractor) and Sapient Consulting (subcontractor) are developing for FASt Lane a prototype to automate and shorten the time required to perform the contract review process.

The Commercial Customs Operations Advisory Committee, a subcommittee of the U.S. Customs and Border Protection, is working on finding practical ways Blockchain could be implemented in its duties.[1]

Companies have supposedly been suggesting blockchain-based currency solutions in the following two countries:

 

e-Dinar, Tunisia's national currency, was the first state currency using blockchain technology.

eCFA is Senegal's blockchain-based national digital currency.

Some countries, especially Australia, are providing keynote participation in identify the various technical issues associated with developing, governing and using blockchains:

 

In April 2016 Standards Australia submitted a New Field of Technical Activity (NFTA) proposal on behalf of Australia for the International Organization for Standardization (ISO) to consider developing standards to support blockchain technology. The proposal for an NFTA to the ISO was intended to establish a new ISO technical committee for blockchain. The new committee would be responsible for supporting innovation and competition by covering blockchain standards topics including interoperability, terminology, privacy, security and auditing.[99] There have been several media releases[100] supporting blockchain integration to Australian businesses.

Banks

Don Tapscott conducted a two-year research project exploring how blockchain technology can securely move and store host "money, titles, deeds, music, art, scientific discoveries, intellectual property, and even votes".. Furthermore, major portions of the financial industry are implementing distributed ledgers for use in banking, and according to a September 2016 IBM study, this is occurring faster than expected.

 

Banks are interested in this technology because it has potential to speed up back office settlement systems.

 

Banks such as UBS are opening new research labs dedicated to blockchain technology in order to explore how blockchain can be used in financial services to increase efficiency and reduce costs.

 

Russia has officially completed its first government-level blockchain implementation. The state-run bank Sberbank announced 20 December 2017 that it is partnering with Russia's Federal Antimonopoly Service (FAS) to implement document transfer and storage via blockchain.

 

Deloitte and ConsenSys announced plans in 2016 to create a digital bank called Project ConsenSys.

 

R3 connects 42 banks to distributed ledgers built by Ethereum, Chain.com, Intel, IBM and Monax.

 

A Swiss industry consortium, including Swisscom, the Zurich Cantonal Bank and the Swiss stock exchange, is prototyping over-the-counter asset trading on a blockchain-based Ethereum technology.

 

Other financial companies.

The credit and debits payments company MasterCard has added three blockchain-based APIs for programmers to use in developing both person-to-person (P2P) and business-to-business (B2B) payment systems.

 

CLS Group is using blockchain technology to expand the number of currency trade deals it can settle.

 

VISA payment systems, Mastercard,Unionpay and SWIFT have announced the development and plans for using blockchain technology.

 

Prime Shipping Foundation is using blockchain technology to address issues related to the payments in the shipping industry.

 

Other uses

Blockchain technology can be used to create a permanent, public, transparent ledger system for compiling data on sales, storing rights data by authenticating copyright registration,[116] and tracking digital use and payments to content creators, such as musicians. In 2017, IBM partnered with ASCAP and PRS for Music to adopt blockchain technology in music distribution.Imogen Heap's Mycelia service, which allows managers to use a blockchain for tracking high-value parts moving through a supply chain, was launched as a concept in July 2016. Everledger is one of the inaugural clients of IBM's blockchain-based tracking service.

 

Kodak announced plans in 2018 to launch a digital token system for photograph copyright recording.

 

Another example where smart contracts are used is in the music industry. Every time a dj mix is played, the smart contracts attached to the dj mix pays the artists almost instantly.

 

An application has been suggested for securing the spectrum sharing for wireless networks.

 

New distribution methods are available for the insurance industry such as peer-to-peer insurance, parametric insurance and microinsurance following the adoption of blockchain.The sharing economy and IoT are also set to benefit from blockchains because they involve many collaborating peers.Online voting is another application of the blockchain. Blockchains are being used to develop information systems for medical records, which increases interoperability. In theory, legacy disparate systems can be completely replaced by blockchains.Blockchains are being developed for data storage, publishing texts and identifying the origin of digital art. Blockchains facilitate users could take ownership of game assets (digital assets),an example of this is Cryptokitties.

 

Notable non-cryptocurrency designs include:

 

Steemit – a blogging/social networking website and a cryptocurrency

Hyperledger – a cross-industry collaborative effort from the Linux Foundation to support blockchain-based distributed ledgers, with projects under this initiative including Hyperledger Burrow (by Monax) and Hyperledger Fabric (spearheaded by IBM)

Counterparty – an open source financial platform for creating peer-to-peer financial applications on the bitcoin blockchain

Quorum – a permissionable private blockchain by JPMorgan Chase with private storage, used for contract applications

Bitnation – a decentralized borderless "voluntary nation" establishing a jurisdiction of contracts and rules, based on Ethereum

Factom, a distributed registry

Tezos, decentralized voting.

Microsoft Visual Studio is making the Ethereum Solidity language available to application developers.

 

IBM offers a cloud blockchain service based on the open source Hyperledger Fabric project

 

Oracle Cloud offers Blockchain Cloud Service based on Hyperledger Fabric. Oracle has joined the Hyperledger consortium.

 

In August 2016, a research team at the Technical University of Munich published a research document about how blockchains may disrupt industries. They analyzed the venture funding that went into blockchain ventures. Their research shows that $1.55 billion went into startups with an industry focus on finance and insurance, information and communication, and professional services. High startup density was found in the USA, UK and Canada.

 

ABN Amro announced a project in real estate to facilitate the sharing and recording of real estate transactions, and a second project in partnership with the Port of Rotterdam to develop logistics tools.

 

Academic research

 

Blockchain panel discussion at the first IEEE Computer Society TechIgnite conference

In October 2014, the MIT Bitcoin Club, with funding from MIT alumni, provided undergraduate students at the Massachusetts Institute of Technology access to $100 of bitcoin. The adoption rates, as studied by Catalini and Tucker (2016), revealed that when people who typically adopt technologies early are given delayed access, they tend to reject the technology.

 

Journals

 

In September 2015, the first peer-reviewed academic journal dedicated to cryptocurrency and blockchain technology research, Ledger, was announced. The inaugural issue was published in December 2016. The journal covers aspects of mathematics, computer science, engineering, law, economics and philosophy that relate to cryptocurrencies such as bitcoin. There are also research platforms like Strategic coin that offer research for the blockchain and crypto space.

 

The journal encourages authors to digitally sign a file hash of submitted papers, which will then be timestamped into the bitcoin blockchain. Authors are also asked to include a personal bitcoin address in the first page of their papers.

 

Predictions

A World Economic Forum report from September 2015 predicted that by 2025 ten percent of global GDP would be stored on blockchains technology.

 

In early 2017, Harvard Business School professors Marco Iansiti and Karim R. Lakhani said the blockchain is not a disruptive technology that undercuts the cost of an existing business model, but is a foundational technology that "has the potential to create new foundations for our economic and social systems". They further predicted that, while foundational innovations can have enormous impact, "It will take decades for blockchain to seep into our economic and social infrastructure."

 

en.wikipedia.org/wiki/Blockchain

On the ProRev Crosshair: XGenPlus

 

XGenPlus is an E-mail server at its core, but it is efficiency and integration-oriented. It has a giant list of features, including Scheduling Integration (Reminders and Scheduled Mailing), Categorization (Folders, Categories), Group Emailing, Delivery Report, Read Receipt, IM, Blocking of Mail addresses, Advance Forwarding, Public-Private key cryptography system, Calendar and Meeting Manager with SMS integration, over and above the features offered by the other mail servers.

 

XGenPlus also gives you “Rights” management; a sender can define whether the recipient can Delete/Forward/Reply or Print the email or not! Yes, XgenPlus gives you mind control – you can finally rule the e-mail world and people will bend to your will!

 

It scores exceptionally well on performance, usability, features and the overall objective of making your inbox a peaceful place to live. The anti-spam is widely recognized and the server is more robust than any. The CPU license with unlimited users costs 2.5 Lacs, and the per user license costs Rs. 500 per annum, which is fine.

 

What does the Verdict Say? Watch to find out!

 

---

 

PROREV is a startup product review show where we dissect products to give you the best insights into technology, design, usability, features and pricing.

 

We review products and services created by startups, ranging from websites, SAAS products and cloud-based software to smartphones, powerbanks, VR headsets and various other technologies and gadgets.

 

All of this in the crispiest, snappiest and funniest startup product review show you will ever see.

 

This is TechPortal TV presents PROREV!

RPPC depicting a group of six Swedish soldiers.

Unknown photographer.

Date: 26/07/1907.

Sent to: Fröken (Miss) Valborg Hellsén of Stöde.

 

Symbols and numbers written on the front and reverse. May be a letter in code?

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

The design, and even existence, of these machines was one of the Nazis' biggest secrets. But that didn't stop cryptographers at Bletchley Park from figuring out precisely how they worked, despite never laying eyes nor hands on one...

 

Joon Ian Wong, Founder, Cryptographic Media, Alex Zhang, Mayor, Friends with Benefits and Meltem Demirors, CSO, CoinShares

 

(Morgan Brown/Shutterstock/CoinDesk)

Marks of intelligent, purposeful design are in these layers of rocks. Do you see them?

Sometime in the distant past, nobody knows exactly when, an Anasazi man and his son left their handprints on the rock wall above the Deer Creek slot canyon. It was a precarious place to stand, so it took bravery. Those prints remain today as signs of a vision quest or of a desire to maintain a memory of a good time with father and son.

 

"Intelligent design" theory is simply the logical process of distinguishing purposeful activity from natural activity or chance. It's routinely used in archaeology, cryptography, forensics and several other fields of science. It doesn't concern itself with who the designer is, but whether a phenomenon shows the intentional activity of a mind. We make these kinds of inferences all the time, as when we saw the handprints in this photo. We knew intuitively they were not created by wind and erosion. Not all cases are this easy. Intelligent design theory seeks to make those kinds of inferences logically and mathematically rigorous, so that we can distinguish between chance, natural law, and design, with a high probability of making a correct "inference to the best explanation." For example, if an astronomer claimed to witness an alien signal from space (SETI), other scientists would want to rigorously rule out chance or natural laws before making a design inference. The identity and motivations of the aliens would be interesting follow-up questions, but would fall outside the sphere of intelligent design theory itself.

南無妙法蓮華経日寛上人御本尊創価学会勤行

 

出典

 

池田大作, 2008-2018: わが友に贈る.

池田大作, 1996: 心の法華経.

ジョーダンテ, 1987: インナースペース.

桐村泰次, 1980: 日蓮大聖人正伝.

中村登, 1979: 日蓮.

池田大作, 1976: 続私の仏教観.

日亨堀, 1966: 日寛上人六巻抄.

渡辺邦男, 1958: 日蓮と蒙古大襲來.

日亨堀, 1952: 新編日蓮大聖人御書全集 (+ 就註法華経口伝).

鳩摩羅什, 406: 妙法蓮華經.

 

十大部 (五大部 +): 唱法華題目抄, 立正安国論, 開目抄, 観心本尊抄, 法華取要抄, 撰時抄, 報恩抄, 四信五品抄, 下山御消息, 本尊問答抄.

 

一念三千 = 十界² · 十如是 · 三世間

 

三基本: 信行学.

三証: 文証, 理証, 現証.

三身: 法身, 報身, 応身.

三世間: 欲界, 色界, 無色界 (→五陰, 眾生, 國土).

三諦: 假諦, 空諦, 中諦 (→如是相, 如是性, 如是體).

五蘊: 色, 受, 想, 行, 識.

六波羅蜜: 忍辱 (佛体), 般若 (佛座), 慈悲 (佛舎), 布施, 持戒, 禪定.

九識 (六根为 +三): , , , , , , 末那, 阿賴耶, 阿摩羅.

十界 (六道 +四): 地獄, 餓鬼, 畜生, 修羅, , , 聲聞, 緣覺, 菩薩, 佛.

十如是: 相, 性, 體, 力, 作, 因, 緣, 果, 報, 本末究竟等.

十四誹謗 (謗法+怨嫉): 憍慢, 懈怠, 計我, 浅識, 著欲, 不解, 不信, 顰蹙, 疑惑, 誹謗, 軽善, 憎善, 嫉善, 恨善.

 

每日指導記号学隐写术暗号理論所见即所思⢱⢚⠷⣸⠓⢜

From: File Unit: Letters from Mrs. Rose O'Neal Greenhow, Also Notes, etc., in Her Handwriting (Record Group 59)

 

Created by: Department of State. (09/1789 - )

 

Subjects:

Greenhow, Rose O'Neal, 1817-1864

 

Persistent URL: research.archives.gov/description/1634036

 

Repository: National Archives at College Park - Archives II (College Park, MD)

   

Access Restrictions: Unrestricted

Use Restrictions: Unrestricted

 

claisebrook train station, perth

From Wikipedia, the free encyclopedia

 

The Lockheed Martin F-22 Raptor is a fifth-generation, single-seat, twin-engine, all-weather stealth tactical fighter aircraft developed for the United States Air Force (USAF). The result of the USAF's Advanced Tactical Fighter (ATF) program, the aircraft was designed primarily as an air superiority fighter, but also has ground attack, electronic warfare, and signal intelligence capabilities. The prime contractor, Lockheed Martin, built most of the F-22's airframe and weapons systems and conducted final assembly, while Boeing provided the wings, aft fuselage, avionics integration, and training systems.

 

The aircraft was variously designated F-22 and F/A-22 before it formally entered service in December 2005 as the F-22A. Despite its protracted development and various operational issues, USAF officials consider the F-22 a critical component of the service's tactical air power. Its combination of stealth, aerodynamic performance, and situational awareness enable unprecedented air combat capabilities.

 

Service officials had originally planned to buy a total of 750 ATFs. In 2009, the program was cut to 187 operational production aircraft due to high costs, a lack of clear air-to-air missions due to delays in Russian and Chinese fighter programs, a ban on exports, and development of the more versatile F-35. The last F-22 was delivered in 2012.

  

Development

 

Origins

 

In 1981, the U.S. Air Force identified a requirement for an Advanced Tactical Fighter (ATF) to replace the F-15 Eagle and F-16 Fighting Falcon. Code named "Senior Sky", this air-superiority fighter program was influenced by emerging worldwide threats, including new developments in Soviet air defense systems and the proliferation of the Su-27 "Flanker"- and MiG-29 "Fulcrum"-class of fighter aircraft. It would take advantage of the new technologies in fighter design on the horizon, including composite materials, lightweight alloys, advanced flight control systems, more powerful propulsion systems, and most importantly, stealth technology. In 1983, the ATF concept development team became the System Program Office (SPO) and managed the program at Wright-Patterson Air Force Base. The demonstration and validation (Dem/Val) request for proposals (RFP) was issued in September 1985, with requirements placing strong emphasis on stealth and supercruise. Of the seven bidding companies, Lockheed and Northrop were selected on 31 October 1986. Lockheed teamed with Boeing and General Dynamics while Northrop teamed with McDonnell Douglas, and the two contractor teams undertook a 50-month Dem/Val phase, culminating in the flight test of two technology demonstrator prototypes, the YF-22 and the YF-23, respectively.

 

Dem/Val was focused on risk reduction and technology development plans over specific aircraft designs. Contractors made extensive use of analytical and empirical methods, including computational fluid dynamics, wind-tunnel testing, and radar cross-section calculations and pole testing; the Lockheed team would conduct nearly 18,000 hours of wind-tunnel testing. Avionics development was marked by extensive testing and prototyping and supported by ground and flying laboratories. During Dem/Val, the SPO used the results of performance and cost trade studies conducted by contractor teams to adjust ATF requirements and delete ones that were significant weight and cost drivers while having marginal value. The short takeoff and landing (STOL) requirement was relaxed in order to delete thrust-reversers, saving substantial weight. As avionics was a major cost driver, side-looking radars were deleted, and the dedicated infra-red search and track (IRST) system was downgraded from multi-color to single color and then deleted as well. However, space and cooling provisions were retained to allow for future addition of these components. The ejection seat requirement was downgraded from a fresh design to the existing McDonnell Douglas ACES II. Despite efforts by the contractor teams to rein in weight, the takeoff gross weight estimate was increased from 50,000 lb (22,700 kg) to 60,000 lb (27,200 kg), resulting in engine thrust requirement increasing from 30,000 lbf (133 kN) to 35,000 lbf (156 kN) class.

 

Each team produced two prototype air vehicles for Dem/Val, one for each of the two engine options. The YF-22 had its maiden flight on 29 September 1990 and in flight tests achieved up to Mach 1.58 in supercruise. After the Dem/Val flight test of the prototypes, on 23 April 1991, Secretary of the USAF Donald Rice announced the Lockheed team as the winner of the ATF competition. The YF-23 design was considered stealthier and faster, while the YF-22, with its thrust vectoring nozzles, was more maneuverable as well as less expensive and risky. The aviation press speculated that the Lockheed team's design was also more adaptable to the U.S. Navy's Navalized Advanced Tactical Fighter (NATF), but by 1992, the Navy had abandoned NATF.

  

Production and procurement

 

As the program moved to full-scale development, or the Engineering & Manufacturing Development (EMD) stage, the production version had notable differences from the YF-22, despite having a broadly similar shape. The swept-back angle of the leading edge was decreased from 48° to 42°, while the vertical stabilizers were shifted rearward and decreased in area by 20%. To improve pilot visibility, the canopy was moved forward 7 inches (18 cm), and the engine intakes moved rearward 14 inches (36 cm). The shapes of the wing and stabilator trailing edges were refined to improve aerodynamics, strength, and stealth characteristics. Increasing weight during development caused slight reductions in range and maneuver performance.

 

Prime contractor Lockheed Martin Aeronautics manufactured the majority of the airframe and performed final assembly at Dobbins Air Reserve Base in Marietta, Georgia; program partner Boeing Defense, Space & Security provided additional airframe components as well as avionics integration and training systems. The first F-22, an EMD aircraft with tail number 4001, was unveiled at Marietta, Georgia, on 9 April 1997, and first flew on 7 September 1997. Production, with the first lot awarded in September 2000, supported over 1,000 subcontractors and suppliers from 46 states and up to 95,000 jobs, and spanned 15 years at a peak rate of roughly two airplanes per month. In 2006, the F-22 development team won the Collier Trophy, American aviation's most prestigious award. Due to the aircraft's advanced nature, contractors have been targeted by cyberattacks and technology theft.

 

The USAF originally envisioned ordering 750 ATFs at a total program cost of $44.3 billion and procurement cost of $26.2 billion in fiscal year (FY) 1985 dollars, with production beginning in 1994. The 1990 Major Aircraft Review led by Secretary of Defense Dick Cheney reduced this to 648 aircraft beginning in 1996. By 1997, funding instability had further cut the total to 339, which was again reduced to 277 by 2003. In 2004, the Department of Defense (DoD) further reduced this to 183 operational aircraft, despite the USAF's preference for 381. A multi-year procurement plan was implemented in 2006 to save $15 billion, with total program cost projected to be $62 billion for 183 F-22s distributed to seven combat squadrons. In 2008, Congress passed a defense spending bill that raised the total orders for production aircraft to 187.

 

The first two F-22s built were EMD aircraft in the Block 1.0 configuration for initial flight testing, while the third was a Block 2.0 aircraft built to represent the internal structure of production airframes and enabled it to test full flight loads. Six more EMD aircraft were built in the Block 10 configuration for development and upgrade testing, with the last two considered essentially production quality jets. Production for operational squadrons consisted of 37 Block 20 training aircraft and 149 Block 30/35 combat aircraft; one of the Block 35 aircraft is dedicated to flight sciences at Edwards Air Force Base.

 

The numerous new technologies in the F-22 resulted in substantial cost overruns and delays. Many capabilities were deferred to post-service upgrades, reducing the initial cost but increasing total program cost. As production wound down in 2011, the total program cost is estimated to be about $67.3 billion, with $32.4 billion spent on Research, Development, Test and Evaluation (RDT&E) and $34.9 billion on procurement and military construction (MILCON) in then year dollars. The incremental cost for an additional F-22 was estimated at about $138 million in 2009.

 

Ban on exports

 

The F-22 cannot be exported under US federal law to protect its stealth technology and other high-tech features. Customers for U.S. fighters are acquiring earlier designs such as the F-15 Eagle and F-16 Fighting Falcon or the newer F-35 Lightning II, which contains technology from the F-22 but was designed to be cheaper, more flexible, and available for export. In September 2006, Congress upheld the ban on foreign F-22 sales. Despite the ban, the 2010 defense authorization bill included provisions requiring the DoD to prepare a report on the costs and feasibility for an F-22 export variant, and another report on the effect of F-22 export sales on U.S. aerospace industry.

 

Some Australian politicians and defense commentators proposed that Australia should attempt to purchase F-22s instead of the planned F-35s, citing the F-22's known capabilities and F-35's delays and developmental uncertainties. However, the Royal Australian Air Force (RAAF) determined that the F-22 was unable to perform the F-35's strike and close air support roles. The Japanese government also showed interest in the F-22 for its Replacement-Fighter program. The Japan Air Self-Defense Force (JASDF) would reportedly require fewer fighters for its mission if it obtained the F-22, thus reducing engineering and staffing costs. However, in 2009 it was reported that acquiring the F-22 would require increases to the Japanese government's defense budget beyond the historical 1 percent of its GDP. With the end of F-22 production, Japan chose the F-35 in December 2011. Israel also expressed interest, but eventually chose the F-35 because of the F-22's price and unavailability.

 

Production termination

 

Throughout the 2000s, the need for F-22s was debated, due to rising costs and the lack of relevant adversaries. In 2006, Comptroller General of the United States David Walker found that "the DoD has not demonstrated the need" for more investment in the F-22, and further opposition to the program was expressed by Secretary of Defense Donald Rumsfeld, Deputy Secretary of Defense Gordon R. England, Senator John McCain, and Chairman of U.S. Senate Committee on Armed Services Senator John Warner. The F-22 program lost influential supporters in 2008 after the forced resignations of Secretary of the Air Force Michael Wynne and the Chief of Staff of the Air Force General T. Michael Moseley.

 

In November 2008, Secretary of Defense Robert Gates stated that the F-22 was not relevant in post-Cold War conflicts such as irregular warfare operations in Iraq and Afghanistan, and in April 2009, under the new Obama Administration, he called for ending production in FY2011, leaving the USAF with 187 production aircraft. In July, General James Cartwright, Vice Chairman of the Joint Chiefs of Staff, stated to the Senate Committee on Armed Services his reasons for supporting termination of F-22 production. They included shifting resources to the multirole F-35 to allow proliferation of fifth-generation fighters for three service branches and preserving the F/A-18 production line to maintain the military's electronic warfare (EW) capabilities in the Boeing EA-18G Growler.[60] Issues with the F-22's reliability and availability also raised concerns. After President Obama threatened to veto further production, the Senate voted in July 2009 in favor of ending production and the House subsequently agreed to abide by the 187 production aircraft cap. Gates stated that the decision was taken in light of the F-35's capabilities, and in 2010, he set the F-22 requirement to 187 aircraft by lowering the number of major regional conflict preparations from two to one.

 

In 2010, USAF initiated a study to determine the costs of retaining F-22 tooling for a future Service Life Extension Program (SLEP).[66] A RAND Corporation paper from this study estimated that restarting production and building an additional 75 F-22s would cost $17 billion, resulting in $227 million per aircraft, or $54 million higher than the flyaway cost. Lockheed Martin stated that restarting the production line itself would cost about $200 million. Production tooling and associated documentation were subsequently stored at the Sierra Army Depot, allowing the retained tooling to support the fleet life cycle. There were reports that attempts to retrieve this tooling found empty containers, but a subsequent audit found that the tooling was stored as expected.

 

Russian and Chinese fighter developments have fueled concern, and in 2009, General John Corley, head of Air Combat Command, stated that a fleet of 187 F-22s would be inadequate, but Secretary Gates dismissed General Corley's concern. In 2011, Gates explained that Chinese fifth-generation fighter developments had been accounted for when the number of F-22s was set, and that the U.S. would have a considerable advantage in stealth aircraft in 2025, even with F-35 delays. In December 2011, the 195th and final F-22 was completed out of 8 test EMD and 187 operational aircraft produced; the aircraft was delivered to the USAF on 2 May 2012.

 

In April 2016, the House Armed Services Committee (HASC) Tactical Air and Land Forces Subcommittee proposed legislation that would direct the Air Force to conduct a cost study and assessment associated with resuming production of the F-22. Since the production halt directed in 2009 by then Defense Secretary Gates, lawmakers and the Pentagon noted that air warfare systems of Russia and China were catching up to those of the U.S. Lockheed Martin has proposed upgrading the Block 20 training aircraft into combat-coded Block 30/35 versions as a way to increase numbers available for deployment. On 9 June 2017, the Air Force submitted their report to Congress stating they had no plans to restart the F-22 production line due to economic and operational issues; it estimated it would cost approximately $50 billion to procure 194 additional F-22s at a cost of $206–$216 million per aircraft, including approximately $9.9 billion for non-recurring start-up costs and $40.4 billion for aircraft procurement costs.

 

Upgrades

 

The first aircraft with combat-capable Block 3.0 software flew in 2001. Increment 2, the first upgrade program, was implemented in 2005 for Block 20 aircraft onward and enabled the employment of Joint Direct Attack Munitions (JDAM). Certification of the improved AN/APG-77(V)1 radar was completed in March 2007, and airframes from production Lot 5 onward are fitted with this radar, which incorporates air-to-ground modes. Increment 3.1 for Block 30 aircraft onward provided improved ground-attack capability through synthetic aperture radar mapping and radio emitter direction finding, electronic attack and Small Diameter Bomb (SDB) integration; testing began in 2009 and the first upgraded aircraft was delivered in 2011. To address oxygen deprivation issues, F-22s were fitted with an automatic backup oxygen system (ABOS) and modified life support system starting in 2012.

 

Increment 3.2 for Block 35 aircraft is a two-part upgrade process; 3.2A focuses on electronic warfare, communications and identification, while 3.2B includes geolocation improvements and a new stores management system to show the correct symbols for the AIM-9X and AIM-120D.[83][84] To enable two-way communication with other platforms, the F-22 can use the Battlefield Airborne Communications Node (BACN) as a gateway. The planned Multifunction Advanced Data Link (MADL) integration was cut due to development delays and lack of proliferation among USAF platforms. The F-22 fleet is planned to start receiving Increment 3.2B as well as a software upgrade for cryptography capabilities and avionics stability in May 2019. A Multifunctional Information Distribution System-Joint (MIDS-J) radio that replaces the current Link-16 receive-only box is expected to be operational by 2020. Subsequent upgrades are also focusing on having an open architecture to enable faster future enhancements.

 

In 2024, funding is projected to begin for the F-22 mid-life upgrade (MLU), which is expected to include new sensors and antennas, hardware refresh, cockpit improvements, and a helmet mounted display and cuing system. Other enhancements being developed include IRST functionality for the AN/AAR-56 Missile Launch Detector (MLD) and more durable stealth coating based on the F-35's.

 

The F-22 was designed for a service life of 8,000 flight hours, with a $350 million "structures retrofit program". Investigations are being made for upgrades to extend their useful lives further. In the long term, the F-22 is expected to be superseded by a sixth-generation jet fighter to be fielded in the 2030s.

  

Design

 

Overview

 

The F-22 Raptor is a fifth-generation fighter that is considered fourth generation in stealth aircraft technology by the USAF.[91] It is the first operational aircraft to combine supercruise, supermaneuverability, stealth, and sensor fusion in a single weapons platform. The F-22 has four empennage surfaces, retractable tricycle landing gear, and clipped delta wings with reverse trailing edge sweep and leading edge extensions running to the upper outboard corner of the inlets. Flight control surfaces include leading-edge flaps, flaperons, ailerons, rudders on the canted vertical stabilizers, and all-moving horizontal tails (stabilators); for speed brake function, the ailerons deflect up, flaperons down, and rudders outwards to increase drag.

 

The aircraft's dual Pratt & Whitney F119-PW-100 augmented turbofan engines are closely spaced and incorporate pitch-axis thrust vectoring nozzles with a range of ±20 degrees; each engine has maximum thrust in the 35,000 lbf (156 kN) class. The F-22's thrust-to-weight ratio at typical combat weight is nearly at unity in maximum military power and 1.25 in full afterburner. Maximum speed without external stores is approximately Mach 1.8 at military power and greater than Mach 2 with afterburners.

 

The F-22's high cruise speed and operating altitude over prior fighters improve the effectiveness of its sensors and weapon systems, and increase survivability against ground defenses such as surface-to-air missiles. The aircraft is among only a few that can supercruise, or sustain supersonic flight without using fuel-inefficient afterburners; it can intercept targets which subsonic aircraft would lack the speed to pursue and an afterburner-dependent aircraft would lack the fuel to reach. The F-22's thrust and aerodynamics enable regular combat speeds of Mach 1.5 at 50,000 feet (15,000 m). The use of internal weapons bays permits the aircraft to maintain comparatively higher performance over most other combat-configured fighters due to a lack of aerodynamic drag from external stores. The aircraft's structure contains a significant amount of high-strength materials to withstand stress and heat of sustained supersonic flight. Respectively, titanium alloys and composites comprise 39% and 24% of the structural weight.

 

The F-22's aerodynamics, relaxed stability, and powerful thrust-vectoring engines give it excellent maneuverability and energy potential across its flight envelope. The airplane has excellent high alpha (angle of attack) characteristics, capable of flying at trimmed alpha of over 60° while maintaining roll control and performing maneuvers such as the Herbst maneuver (J-turn) and Pugachev's Cobra. The flight control system and full-authority digital engine control (FADEC) make the aircraft highly departure resistant and controllable, thus giving the pilot carefree handling.

  

Stealth

 

The F-22 was designed to be highly difficult to detect and track by radar. Measures to reduce radar cross-section (RCS) include airframe shaping such as alignment of edges, fixed-geometry serpentine inlets and curved vanes that prevent line-of-sight of the engine faces and turbines from any exterior view, use of radar-absorbent material (RAM), and attention to detail such as hinges and pilot helmets that could provide a radar return. The F-22 was also designed to have decreased radio emissions, infrared signature and acoustic signature as well as reduced visibility to the naked eye. The aircraft's flat thrust-vectoring nozzles reduce infrared emissions of the exhaust plume to mitigate the threat of infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Additional measures to reduce the infrared signature include special topcoat and active cooling of leading edges to manage the heat buildup from supersonic flight.

 

Compared to previous stealth designs like the F-117, the F-22 is less reliant on RAM, which are maintenance-intensive and susceptible to adverse weather conditions. Unlike the B-2, which requires climate-controlled hangars, the F-22 can undergo repairs on the flight line or in a normal hangar. The F-22 has a Signature Assessment System which delivers warnings when the radar signature is degraded and necessitates repair. While the F-22's exact RCS is classified, in 2009 Lockheed Martin released information indicating that from certain angles the aircraft has an RCS of 0.0001 m² or −40 dBsm – equivalent to the radar reflection of a "steel marble". Effectively maintaining the stealth features can decrease the F-22's mission capable rate to 62–70%.

 

The effectiveness of the stealth characteristics is difficult to gauge. The RCS value is a restrictive measurement of the aircraft's frontal or side area from the perspective of a static radar. When an aircraft maneuvers it exposes a completely different set of angles and surface area, potentially increasing radar observability. Furthermore, the F-22's stealth contouring and radar absorbent materials are chiefly effective against high-frequency radars, usually found on other aircraft. The effects of Rayleigh scattering and resonance mean that low-frequency radars such as weather radars and early-warning radars are more likely to detect the F-22 due to its physical size. However, such radars are also conspicuous, susceptible to clutter, and have low precision. Additionally, while faint or fleeting radar contacts make defenders aware that a stealth aircraft is present, reliably vectoring interception to attack the aircraft is much more challenging. According to the USAF an F-22 surprised an Iranian F-4 Phantom II that was attempting to intercept an American UAV, despite Iran's assertion of having military VHF radar coverage over the Persian Gulf.

From Wikipedia, the free encyclopedia

 

The Lockheed Martin F-22 Raptor is a fifth-generation, single-seat, twin-engine, all-weather stealth tactical fighter aircraft developed for the United States Air Force (USAF). The result of the USAF's Advanced Tactical Fighter (ATF) program, the aircraft was designed primarily as an air superiority fighter, but also has ground attack, electronic warfare, and signal intelligence capabilities. The prime contractor, Lockheed Martin, built most of the F-22's airframe and weapons systems and conducted final assembly, while Boeing provided the wings, aft fuselage, avionics integration, and training systems.

 

The aircraft was variously designated F-22 and F/A-22 before it formally entered service in December 2005 as the F-22A. Despite its protracted development and various operational issues, USAF officials consider the F-22 a critical component of the service's tactical air power. Its combination of stealth, aerodynamic performance, and situational awareness enable unprecedented air combat capabilities.

 

Service officials had originally planned to buy a total of 750 ATFs. In 2009, the program was cut to 187 operational production aircraft due to high costs, a lack of clear air-to-air missions due to delays in Russian and Chinese fighter programs, a ban on exports, and development of the more versatile F-35. The last F-22 was delivered in 2012.

  

Development

 

Origins

 

In 1981, the U.S. Air Force identified a requirement for an Advanced Tactical Fighter (ATF) to replace the F-15 Eagle and F-16 Fighting Falcon. Code named "Senior Sky", this air-superiority fighter program was influenced by emerging worldwide threats, including new developments in Soviet air defense systems and the proliferation of the Su-27 "Flanker"- and MiG-29 "Fulcrum"-class of fighter aircraft. It would take advantage of the new technologies in fighter design on the horizon, including composite materials, lightweight alloys, advanced flight control systems, more powerful propulsion systems, and most importantly, stealth technology. In 1983, the ATF concept development team became the System Program Office (SPO) and managed the program at Wright-Patterson Air Force Base. The demonstration and validation (Dem/Val) request for proposals (RFP) was issued in September 1985, with requirements placing strong emphasis on stealth and supercruise. Of the seven bidding companies, Lockheed and Northrop were selected on 31 October 1986. Lockheed teamed with Boeing and General Dynamics while Northrop teamed with McDonnell Douglas, and the two contractor teams undertook a 50-month Dem/Val phase, culminating in the flight test of two technology demonstrator prototypes, the YF-22 and the YF-23, respectively.

 

Dem/Val was focused on risk reduction and technology development plans over specific aircraft designs. Contractors made extensive use of analytical and empirical methods, including computational fluid dynamics, wind-tunnel testing, and radar cross-section calculations and pole testing; the Lockheed team would conduct nearly 18,000 hours of wind-tunnel testing. Avionics development was marked by extensive testing and prototyping and supported by ground and flying laboratories. During Dem/Val, the SPO used the results of performance and cost trade studies conducted by contractor teams to adjust ATF requirements and delete ones that were significant weight and cost drivers while having marginal value. The short takeoff and landing (STOL) requirement was relaxed in order to delete thrust-reversers, saving substantial weight. As avionics was a major cost driver, side-looking radars were deleted, and the dedicated infra-red search and track (IRST) system was downgraded from multi-color to single color and then deleted as well. However, space and cooling provisions were retained to allow for future addition of these components. The ejection seat requirement was downgraded from a fresh design to the existing McDonnell Douglas ACES II. Despite efforts by the contractor teams to rein in weight, the takeoff gross weight estimate was increased from 50,000 lb (22,700 kg) to 60,000 lb (27,200 kg), resulting in engine thrust requirement increasing from 30,000 lbf (133 kN) to 35,000 lbf (156 kN) class.

 

Each team produced two prototype air vehicles for Dem/Val, one for each of the two engine options. The YF-22 had its maiden flight on 29 September 1990 and in flight tests achieved up to Mach 1.58 in supercruise. After the Dem/Val flight test of the prototypes, on 23 April 1991, Secretary of the USAF Donald Rice announced the Lockheed team as the winner of the ATF competition. The YF-23 design was considered stealthier and faster, while the YF-22, with its thrust vectoring nozzles, was more maneuverable as well as less expensive and risky. The aviation press speculated that the Lockheed team's design was also more adaptable to the U.S. Navy's Navalized Advanced Tactical Fighter (NATF), but by 1992, the Navy had abandoned NATF.

  

Production and procurement

 

As the program moved to full-scale development, or the Engineering & Manufacturing Development (EMD) stage, the production version had notable differences from the YF-22, despite having a broadly similar shape. The swept-back angle of the leading edge was decreased from 48° to 42°, while the vertical stabilizers were shifted rearward and decreased in area by 20%. To improve pilot visibility, the canopy was moved forward 7 inches (18 cm), and the engine intakes moved rearward 14 inches (36 cm). The shapes of the wing and stabilator trailing edges were refined to improve aerodynamics, strength, and stealth characteristics. Increasing weight during development caused slight reductions in range and maneuver performance.

 

Prime contractor Lockheed Martin Aeronautics manufactured the majority of the airframe and performed final assembly at Dobbins Air Reserve Base in Marietta, Georgia; program partner Boeing Defense, Space & Security provided additional airframe components as well as avionics integration and training systems. The first F-22, an EMD aircraft with tail number 4001, was unveiled at Marietta, Georgia, on 9 April 1997, and first flew on 7 September 1997. Production, with the first lot awarded in September 2000, supported over 1,000 subcontractors and suppliers from 46 states and up to 95,000 jobs, and spanned 15 years at a peak rate of roughly two airplanes per month. In 2006, the F-22 development team won the Collier Trophy, American aviation's most prestigious award. Due to the aircraft's advanced nature, contractors have been targeted by cyberattacks and technology theft.

 

The USAF originally envisioned ordering 750 ATFs at a total program cost of $44.3 billion and procurement cost of $26.2 billion in fiscal year (FY) 1985 dollars, with production beginning in 1994. The 1990 Major Aircraft Review led by Secretary of Defense Dick Cheney reduced this to 648 aircraft beginning in 1996. By 1997, funding instability had further cut the total to 339, which was again reduced to 277 by 2003. In 2004, the Department of Defense (DoD) further reduced this to 183 operational aircraft, despite the USAF's preference for 381. A multi-year procurement plan was implemented in 2006 to save $15 billion, with total program cost projected to be $62 billion for 183 F-22s distributed to seven combat squadrons. In 2008, Congress passed a defense spending bill that raised the total orders for production aircraft to 187.

 

The first two F-22s built were EMD aircraft in the Block 1.0 configuration for initial flight testing, while the third was a Block 2.0 aircraft built to represent the internal structure of production airframes and enabled it to test full flight loads. Six more EMD aircraft were built in the Block 10 configuration for development and upgrade testing, with the last two considered essentially production quality jets. Production for operational squadrons consisted of 37 Block 20 training aircraft and 149 Block 30/35 combat aircraft; one of the Block 35 aircraft is dedicated to flight sciences at Edwards Air Force Base.

 

The numerous new technologies in the F-22 resulted in substantial cost overruns and delays. Many capabilities were deferred to post-service upgrades, reducing the initial cost but increasing total program cost. As production wound down in 2011, the total program cost is estimated to be about $67.3 billion, with $32.4 billion spent on Research, Development, Test and Evaluation (RDT&E) and $34.9 billion on procurement and military construction (MILCON) in then year dollars. The incremental cost for an additional F-22 was estimated at about $138 million in 2009.

 

Ban on exports

 

The F-22 cannot be exported under US federal law to protect its stealth technology and other high-tech features. Customers for U.S. fighters are acquiring earlier designs such as the F-15 Eagle and F-16 Fighting Falcon or the newer F-35 Lightning II, which contains technology from the F-22 but was designed to be cheaper, more flexible, and available for export. In September 2006, Congress upheld the ban on foreign F-22 sales. Despite the ban, the 2010 defense authorization bill included provisions requiring the DoD to prepare a report on the costs and feasibility for an F-22 export variant, and another report on the effect of F-22 export sales on U.S. aerospace industry.

 

Some Australian politicians and defense commentators proposed that Australia should attempt to purchase F-22s instead of the planned F-35s, citing the F-22's known capabilities and F-35's delays and developmental uncertainties. However, the Royal Australian Air Force (RAAF) determined that the F-22 was unable to perform the F-35's strike and close air support roles. The Japanese government also showed interest in the F-22 for its Replacement-Fighter program. The Japan Air Self-Defense Force (JASDF) would reportedly require fewer fighters for its mission if it obtained the F-22, thus reducing engineering and staffing costs. However, in 2009 it was reported that acquiring the F-22 would require increases to the Japanese government's defense budget beyond the historical 1 percent of its GDP. With the end of F-22 production, Japan chose the F-35 in December 2011. Israel also expressed interest, but eventually chose the F-35 because of the F-22's price and unavailability.

 

Production termination

 

Throughout the 2000s, the need for F-22s was debated, due to rising costs and the lack of relevant adversaries. In 2006, Comptroller General of the United States David Walker found that "the DoD has not demonstrated the need" for more investment in the F-22, and further opposition to the program was expressed by Secretary of Defense Donald Rumsfeld, Deputy Secretary of Defense Gordon R. England, Senator John McCain, and Chairman of U.S. Senate Committee on Armed Services Senator John Warner. The F-22 program lost influential supporters in 2008 after the forced resignations of Secretary of the Air Force Michael Wynne and the Chief of Staff of the Air Force General T. Michael Moseley.

 

In November 2008, Secretary of Defense Robert Gates stated that the F-22 was not relevant in post-Cold War conflicts such as irregular warfare operations in Iraq and Afghanistan, and in April 2009, under the new Obama Administration, he called for ending production in FY2011, leaving the USAF with 187 production aircraft. In July, General James Cartwright, Vice Chairman of the Joint Chiefs of Staff, stated to the Senate Committee on Armed Services his reasons for supporting termination of F-22 production. They included shifting resources to the multirole F-35 to allow proliferation of fifth-generation fighters for three service branches and preserving the F/A-18 production line to maintain the military's electronic warfare (EW) capabilities in the Boeing EA-18G Growler.[60] Issues with the F-22's reliability and availability also raised concerns. After President Obama threatened to veto further production, the Senate voted in July 2009 in favor of ending production and the House subsequently agreed to abide by the 187 production aircraft cap. Gates stated that the decision was taken in light of the F-35's capabilities, and in 2010, he set the F-22 requirement to 187 aircraft by lowering the number of major regional conflict preparations from two to one.

 

In 2010, USAF initiated a study to determine the costs of retaining F-22 tooling for a future Service Life Extension Program (SLEP).[66] A RAND Corporation paper from this study estimated that restarting production and building an additional 75 F-22s would cost $17 billion, resulting in $227 million per aircraft, or $54 million higher than the flyaway cost. Lockheed Martin stated that restarting the production line itself would cost about $200 million. Production tooling and associated documentation were subsequently stored at the Sierra Army Depot, allowing the retained tooling to support the fleet life cycle. There were reports that attempts to retrieve this tooling found empty containers, but a subsequent audit found that the tooling was stored as expected.

 

Russian and Chinese fighter developments have fueled concern, and in 2009, General John Corley, head of Air Combat Command, stated that a fleet of 187 F-22s would be inadequate, but Secretary Gates dismissed General Corley's concern. In 2011, Gates explained that Chinese fifth-generation fighter developments had been accounted for when the number of F-22s was set, and that the U.S. would have a considerable advantage in stealth aircraft in 2025, even with F-35 delays. In December 2011, the 195th and final F-22 was completed out of 8 test EMD and 187 operational aircraft produced; the aircraft was delivered to the USAF on 2 May 2012.

 

In April 2016, the House Armed Services Committee (HASC) Tactical Air and Land Forces Subcommittee proposed legislation that would direct the Air Force to conduct a cost study and assessment associated with resuming production of the F-22. Since the production halt directed in 2009 by then Defense Secretary Gates, lawmakers and the Pentagon noted that air warfare systems of Russia and China were catching up to those of the U.S. Lockheed Martin has proposed upgrading the Block 20 training aircraft into combat-coded Block 30/35 versions as a way to increase numbers available for deployment. On 9 June 2017, the Air Force submitted their report to Congress stating they had no plans to restart the F-22 production line due to economic and operational issues; it estimated it would cost approximately $50 billion to procure 194 additional F-22s at a cost of $206–$216 million per aircraft, including approximately $9.9 billion for non-recurring start-up costs and $40.4 billion for aircraft procurement costs.

 

Upgrades

 

The first aircraft with combat-capable Block 3.0 software flew in 2001. Increment 2, the first upgrade program, was implemented in 2005 for Block 20 aircraft onward and enabled the employment of Joint Direct Attack Munitions (JDAM). Certification of the improved AN/APG-77(V)1 radar was completed in March 2007, and airframes from production Lot 5 onward are fitted with this radar, which incorporates air-to-ground modes. Increment 3.1 for Block 30 aircraft onward provided improved ground-attack capability through synthetic aperture radar mapping and radio emitter direction finding, electronic attack and Small Diameter Bomb (SDB) integration; testing began in 2009 and the first upgraded aircraft was delivered in 2011. To address oxygen deprivation issues, F-22s were fitted with an automatic backup oxygen system (ABOS) and modified life support system starting in 2012.

 

Increment 3.2 for Block 35 aircraft is a two-part upgrade process; 3.2A focuses on electronic warfare, communications and identification, while 3.2B includes geolocation improvements and a new stores management system to show the correct symbols for the AIM-9X and AIM-120D.[83][84] To enable two-way communication with other platforms, the F-22 can use the Battlefield Airborne Communications Node (BACN) as a gateway. The planned Multifunction Advanced Data Link (MADL) integration was cut due to development delays and lack of proliferation among USAF platforms. The F-22 fleet is planned to start receiving Increment 3.2B as well as a software upgrade for cryptography capabilities and avionics stability in May 2019. A Multifunctional Information Distribution System-Joint (MIDS-J) radio that replaces the current Link-16 receive-only box is expected to be operational by 2020. Subsequent upgrades are also focusing on having an open architecture to enable faster future enhancements.

 

In 2024, funding is projected to begin for the F-22 mid-life upgrade (MLU), which is expected to include new sensors and antennas, hardware refresh, cockpit improvements, and a helmet mounted display and cuing system. Other enhancements being developed include IRST functionality for the AN/AAR-56 Missile Launch Detector (MLD) and more durable stealth coating based on the F-35's.

 

The F-22 was designed for a service life of 8,000 flight hours, with a $350 million "structures retrofit program". Investigations are being made for upgrades to extend their useful lives further. In the long term, the F-22 is expected to be superseded by a sixth-generation jet fighter to be fielded in the 2030s.

  

Design

 

Overview

 

The F-22 Raptor is a fifth-generation fighter that is considered fourth generation in stealth aircraft technology by the USAF.[91] It is the first operational aircraft to combine supercruise, supermaneuverability, stealth, and sensor fusion in a single weapons platform. The F-22 has four empennage surfaces, retractable tricycle landing gear, and clipped delta wings with reverse trailing edge sweep and leading edge extensions running to the upper outboard corner of the inlets. Flight control surfaces include leading-edge flaps, flaperons, ailerons, rudders on the canted vertical stabilizers, and all-moving horizontal tails (stabilators); for speed brake function, the ailerons deflect up, flaperons down, and rudders outwards to increase drag.

 

The aircraft's dual Pratt & Whitney F119-PW-100 augmented turbofan engines are closely spaced and incorporate pitch-axis thrust vectoring nozzles with a range of ±20 degrees; each engine has maximum thrust in the 35,000 lbf (156 kN) class. The F-22's thrust-to-weight ratio at typical combat weight is nearly at unity in maximum military power and 1.25 in full afterburner. Maximum speed without external stores is approximately Mach 1.8 at military power and greater than Mach 2 with afterburners.

 

The F-22's high cruise speed and operating altitude over prior fighters improve the effectiveness of its sensors and weapon systems, and increase survivability against ground defenses such as surface-to-air missiles. The aircraft is among only a few that can supercruise, or sustain supersonic flight without using fuel-inefficient afterburners; it can intercept targets which subsonic aircraft would lack the speed to pursue and an afterburner-dependent aircraft would lack the fuel to reach. The F-22's thrust and aerodynamics enable regular combat speeds of Mach 1.5 at 50,000 feet (15,000 m). The use of internal weapons bays permits the aircraft to maintain comparatively higher performance over most other combat-configured fighters due to a lack of aerodynamic drag from external stores. The aircraft's structure contains a significant amount of high-strength materials to withstand stress and heat of sustained supersonic flight. Respectively, titanium alloys and composites comprise 39% and 24% of the structural weight.

 

The F-22's aerodynamics, relaxed stability, and powerful thrust-vectoring engines give it excellent maneuverability and energy potential across its flight envelope. The airplane has excellent high alpha (angle of attack) characteristics, capable of flying at trimmed alpha of over 60° while maintaining roll control and performing maneuvers such as the Herbst maneuver (J-turn) and Pugachev's Cobra. The flight control system and full-authority digital engine control (FADEC) make the aircraft highly departure resistant and controllable, thus giving the pilot carefree handling.

  

Stealth

 

The F-22 was designed to be highly difficult to detect and track by radar. Measures to reduce radar cross-section (RCS) include airframe shaping such as alignment of edges, fixed-geometry serpentine inlets and curved vanes that prevent line-of-sight of the engine faces and turbines from any exterior view, use of radar-absorbent material (RAM), and attention to detail such as hinges and pilot helmets that could provide a radar return. The F-22 was also designed to have decreased radio emissions, infrared signature and acoustic signature as well as reduced visibility to the naked eye. The aircraft's flat thrust-vectoring nozzles reduce infrared emissions of the exhaust plume to mitigate the threat of infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Additional measures to reduce the infrared signature include special topcoat and active cooling of leading edges to manage the heat buildup from supersonic flight.

 

Compared to previous stealth designs like the F-117, the F-22 is less reliant on RAM, which are maintenance-intensive and susceptible to adverse weather conditions. Unlike the B-2, which requires climate-controlled hangars, the F-22 can undergo repairs on the flight line or in a normal hangar. The F-22 has a Signature Assessment System which delivers warnings when the radar signature is degraded and necessitates repair. While the F-22's exact RCS is classified, in 2009 Lockheed Martin released information indicating that from certain angles the aircraft has an RCS of 0.0001 m² or −40 dBsm – equivalent to the radar reflection of a "steel marble". Effectively maintaining the stealth features can decrease the F-22's mission capable rate to 62–70%.

 

The effectiveness of the stealth characteristics is difficult to gauge. The RCS value is a restrictive measurement of the aircraft's frontal or side area from the perspective of a static radar. When an aircraft maneuvers it exposes a completely different set of angles and surface area, potentially increasing radar observability. Furthermore, the F-22's stealth contouring and radar absorbent materials are chiefly effective against high-frequency radars, usually found on other aircraft. The effects of Rayleigh scattering and resonance mean that low-frequency radars such as weather radars and early-warning radars are more likely to detect the F-22 due to its physical size. However, such radars are also conspicuous, susceptible to clutter, and have low precision. Additionally, while faint or fleeting radar contacts make defenders aware that a stealth aircraft is present, reliably vectoring interception to attack the aircraft is much more challenging. According to the USAF an F-22 surprised an Iranian F-4 Phantom II that was attempting to intercept an American UAV, despite Iran's assertion of having military VHF radar coverage over the Persian Gulf.

welcoming diverse new investors: Vy Capital, Coinbase, BlockTower Capital, Alameda Research, and the investment arms of Bernard Arnault, Marc Benioff, Nicolas Berggruen and Drake.

 

VentureBeat today: “MobileCoin has raised $66 million for its cryptocurrency payments platform that aims to democratize privacy for all. MobileCoin uses peer-to-peer networking for payments, so that transactions can be more easily kept private even while taking advantage of the blockchain, the transparent and secure digital ledger. The company bills its system as fast, safe, and easy-to-use, giving everyone the ability to transact digitally from nearly anywhere in the world. A cell phone transaction takes just seconds, in contrast to most cryptocurrency transactions that can take minutes to resolve.

 

When it comes to cryptocurrency transactions, MobileCoin is pretty unique. “People are really excited about what we’ve built because it’s really fast,” CEO Joshua Goldbard said. “It’s carbon negative, and it works on the cell phone. “It’s just something that really doesn’t exist in crypto.” The technology was built for mobility and convenience, with payments occurring right on your phone.

 

The San Francisco company has an opaque ledger and cryptographically protected transactions. The network uses forward secrecy to keep data from being compromised, ensuring that private information remains private.

 

“On the customer side, we think we can deliver the lowest total cost to merchants and individuals for moving money around the world,” Goldbard said. “When you use a bank, it can take 30 to 45 days to get your money as a merchant. If you use Stripe or Venmo, it’s three to five days before it hits your bank account. With MobileCoin, you have possession of the funds in a second.”

 

Unlike other cryptocurrencies, MobileCoin was built to ensure that digital wallets can be easily recovered — and not lost forever. Even if merchants or users lose their phones, they can recover their account balance and transaction history by simply loading their account onto a new phone.

 

Overseas, MobileCoin has issued its own cryptocurrency, and the coins on the network are valued at more than $4 billion now. It has shown that it can be used for merchandise transactions on messenger platforms such as Mixi in Japan.

 

MobileCoin provides anti-fraud services and other services for merchants. MobileCoin charges just 0.004% transaction fees, and that goes to its foundation for improving the cryptocurrency.

 

“If we didn’t build MobileCoin, we would end up with things like Alipay, Facebook Libra, and others that would track every single transaction that people do,” Goldbard said. “And they’re not doing that necessarily to be helpful.”

 

And TechCrunch: "The newest round values the outfit at $1.066 billion. Signal founder Moxie Marlinspike told Wired that because MobileCoin is a so-called privacy coin designed to protect users’ identities and the details of their payments on a blockchain, that it’s an ideal fit for Signal. 'There’s a palpable difference in the feeling of what it’s like to communicate over Signal, knowing you’re not being watched or listened to, versus other communication platforms. I would like to get to a world where not only can you feel that when you talk to your therapist over Signal, but also when you pay your therapist for the session over Signal.'”

 

FD: Future Ventures is the second largest outside shareholder in MobileCoin.

 

Calcite, Paint

Thebes, Valley of the Kings, Tomb of Tutankhamun (KV 62).

New Kingdom, 18th Dynasty, Reign of Tutankhamun (1355-1346 BCE).

 

Tutankhamun's tomb held more than eighty vessels of oils and unguents, but thieves stole most of the contents. This container has a central frieze in which the royal throne name appears in a cryptographic writing, ensuring the survival of the king's name.

 

King Tut exhibit, Seattle Washington, 2012.

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

ИN

Deflowering Eyes

Igigi

 

www.saatchiart.com/print/New-Media-Deflowering-Eyes-Inna-...

 

en.wikipedia.org/wiki/Igigi

Igigi are the gods of heaven in the mythology of Mesopotamia.

The name has unknown origin. The signs for the names, and one of the options for the etymology of the igigi are i2-gi3-gi3, which are the same signs for 5-1-1 or 5-60-60 5*(60+60)=600 which are by some traditions All the gods.

Another option is to try to interpret the words themselves. Igi means (eye) in the Sumerian language, and it used as logogram in the Akkadian language, gi stands for (penetrate sexually). Therefore, Igigi could be translated to (Eyes in the sky, the watchers, who deflower).

Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.

 

Igigi/Igigu (a group of gods)

This Semitic term describes a group of possibly seven or eight gods. It is likely that the god Marduk was one of them, but the total membership in this group is unclear and likely changed over time.

Functions

Like the term Anunna, the term Igigu is equally complicated and in need of a comprehensive new study. Igigu, which is likely of Semitic origin, indicates a group of gods in the Mesopotamian pantheon. It is, however, not entirely clear what distinguishes the Igigu from the Anunna.

The story of Atrahasis, the Babylonian story of the Flood and a precursor to the flood story in the Gilgameš Epic (Tablet XI), offers some evidence on the relationship between the Annunaki and the Igigu. The poem begins with the lines "When the gods like men bore the work and suffered the toil, the toil of the gods was great, the work was heavy, the distress was much" (lines 1-4) (Lambert and Millard 1999 [1969]: 43). The composition continues: "The Seven great Anunnaki were making the Igigu suffer the work" (lines 5-6) (Lambert and Millard 1969 [1999]: 43). What follows is partly fragmentary, but seems to indicate that the Igigu gods did not want to work any more and therefore the Anunnaki had to find a solution. Ultimately, this led to the creation of humans, who from then on had to bear the gods' work. In this story it appears that the Igigu were subordinate to the Anunnaki (von Soden 1989: 341-2). It is unclear which deities were included in the Igigu group.

In the prologue to the famous Code of Hammurabi it is indicated that the Anunnaki elevated the god Marduk among the Igigu gods (for a translation see Roth 1997: 76-142; also see von Soden 1966: 144), but it is difficult to assess the significance of this passage.

Some mythological texts, such as the Anzu myth, speak of an assembly of the Igigu gods, but whether this might be an institutionalized assembly, as suggested by Kienast 1965: 146, remains doubtful.

Divine Genealogy and Syncretisms

As mentioned above, it is not clear how many and which gods belonged to the Igigu, although the god Marduk appears to belong to this group for certain. It is possible that the group included only seven (von Soden 1966), eight (Kienast 1965: 144) or ten (Black and Green 1998: 106) gods, but this is uncertain as well.

Other gods who may belong to this group are Ištar, Asarluhi, Naramṣit, Ninurta, Nuska, and Šamaš (Kienast 1965: 149). Some gods seem to belong to both the Anunnaki and the Igigu (Kienast 1965: 152), yet more research is needed to gain a better understanding of this situation in the first millennium BCE.

Cult Place(s)

We currently know of no cult places for the Igigu. Kienast (1965; 1976-80) has repeatedly suggested that the Igigu are only attested in literary and mythological texts. However, von Soden (1966) has brought forth some evidence that might indicate that there are very few theophoric personal names TT which invoke the Igigu, thus offering some evidence for their veneration.

Time Periods Attested

The term Igigu is first attested in texts from the Old Babylonian period (Kienast 1976-80: 40; von Soden 1989: 340) and only occurs in Akkadian contexts (Edzard 1976-80: 37). A Sumerian logographic equivalent of the term Igigu is nun-gal-e-ne, to be translated as "the great princes/sovereigns." This term is mentioned in a literary text that has been ascribed to the princess Enheduanna, daughter of king Sargon, the founder of the Old Akkadian dynasty (Inana C, ETCSL 4.7.3 l. 2). This particular composition is only attested in Old Babylonian manuscripts and it is unclear whether an older date can be proven. According to Edzard (1976-80: 39) it is possible that nun-gal-e-ne was originally an epithet of the Anunna gods that later became identified with the Igigu under influence from Akkadian.

The Igigu and Anunnaki are frequently attested in literary, mythological, and religious (incantations and prayers) texts until the end of the cuneiform tradition. The Igigu are mentioned, among others, in the Anzu myth (Foster 2005: 555-578), in Enāma eliš TT (Foster 2005: 436-486), and the Erra poem (Foster 2005: 880-913), all of which are attested in manuscripts of the first millennium BCE.

Iconography

Because this term describes a group of gods, there are no known images of the Igigu.

Name and Spellings

The etymology of this term is unclear. It has been suggested the term is of Old Akkadian (Kienast 1965: 157; 1976-80: 40) or of (Old) Amorite (von Soden 1966: 144) or possibly Arabic origins (von Soden 1989: 340). For the various spellings see Kienast 1965: 142.

Written forms:

logographic: dnun gal-e-ne, dnun-gal-meš;

syllabic and pseudo-logographic: i-gi-gu, i-gi-gi, di-gi4-gi4, di-gi4-gi4-ne, i-gi4-gu, dí-gì-gì (the latter appears first in ninth century BCE);

cryptographic: dgéš-u

Normalized forms:

Igigu, Igigi

Igigu in Online Corpora

The Corpus of Ancient Mesopotamian Scholarship

Nungalene in Online Corpora

The Electronic Text Corpus of Sumerian Literature

Further Reading

Edzard 1976-80, "[Igigu], Anunna und."

Kienast 1965, "Igigu und Anunnakku nach den akkadischen Quellen."

Kienast 1976-80, "Igigu, Anunnakku und."

von Soden 1966, "Die Igigu-Götter."

von Soden 1989, "Die Igigu-Götter in altbabylonischer Zeit."

Nicole Brisch

Nicole Brisch, 'Igigi/Igigu (a group of gods)', Ancient Mesopotamian Gods and Goddesses, Oracc and the UK Higher Education Academy, 2012 [oracc.museum.upenn.edu/amgg/listofdeities/igigi/]

Released under a Creative Commons Attribution Share-Alike license 3.0, 2011.

The Pennsylvania

Sumerian Dictionary

igi [EYE] (1133x: ED IIIb, Old Akkadian, Lagash II, Ur III, Early Old Babylonian, Old Babylonian, unknown) wr. igi; i-bi2; i-gi "eye; carved eye (for statues)" Akk. īnu

psd.museum.upenn.edu/epsd/epsd/e2510.html

The Pennsylvania Sumerian Dictionary Project is carried out in the Babylonian Section of the University of Pennsylvania Museum of Anthropology and Archaeology. It is funded by the National Endowment for the Humanities and private contributions.

____________________________________

Cycles of the earth, winds, Igigi it's all here and no wonder the church has been hiding the text. The smoke sedates the Elohim (judges) they have their Territories, Not demons nor angels but IGIGI; the Watchers the little big eyed guys who have been stealing my eggs while I sleep 1-4.

archive.org/details/bookofenochproph00laur

ia802707.us.archive.org/10/items/bookofenochproph00laur/b...

The book of Enoch the prophet

by Laurence, Richard, 1760-1838

Publication date 1883

Publisher London : Kegan Paul, Trench

Collection Princeton; americana

Digitizing sponsor Internet Archive

Contributor Princeton Theological Seminary Library

Language English.

Addeddate 2008-11-12 13:13:18

Call number 185459

Camera Canon 5D

External-identifier urn:oclc:record:1041620576[WorldCat (this item)]

Foldoutcount 0

Identifier bookofenochproph00laur

Identifier-ark ark:/13960/t16m3hr86

Lcamid

Missingpages

Openlibrary_edition OL23282189M

Openlibrary_work OL16734660W

Pages 244

Possible copyright status NOT_IN_COPYRIGHT

Ppi 500

Rcamid

Scandate 20081117214436

Scanfactors 4

Scanner scribe2.nyc.archive.org

Scanningcenter nyc

SHOW LESS

Full catalog record MARCXML

 

en.wikipedia.org/wiki/Watcher_(angel)#Grigori

Philo

According to PrEv 1.10.1-2 of Philo of Byblos, Sanchuniathon mentioned "some living beings who had no perception, out of whom intelligent beings came into existence, and they were called Zophasemin (Heb. șōpē-šāmayim, that is, 'Watchers of Heaven'). And they were formed like the shape of an egg."

The Old Testament Pseudepigrapha, volume 1, Apocalyptic Literature and Testaments

EDITED BY JAMES H. CHARLES WORTH, DUKE UNIVERSITY

DOUBLEDAY & COMPANY, INC. GARDEN CITY, NEW YORK

Library of Congress Catalog Card Number: ISBN: 0-385-09630-5 Copyright © 1983 by James H. Charlesworth All Rights Reserved Printed in the United States of America Designed by Joseph P. Ascherl Library of Congress Cataloging in Publication Data Main entry under title: Old Testament pseudepigrapha.

eclass.uoa.gr/modules/document/file.php/THEOL264/James%20...

____________________________________

Livius.org Articles on ancient history

www.livius.org/sources/content/anet/104-106-the-epic-of-a...

The Epic of Atraḥasis

The Epic of Atraḥasis is the fullest Mesopotamian account of the Great Flood, with Atraḥasis in the role of Noah. It was written in the seventeenth century BCE

The text is known from several versions: two were written by Assyrian scribes (one in the Assyrian, one in the Babylonian dialect), a third one (on three tablets) was written during the reign of king Ammi-saduqa of Babylonia (1647-1626 BCE). Parts are quoted in Tablet XI of the Epic of Gilgameš; other influences are in the Babylonian History by Berossus (quote). These texts can be used to reconstruct the lost parts of the Epic of Atraḥasis, while the overall structure is, of course, known from the Bible.

Summary

The conditions immediately after the Creation: the Lower Gods have to work very hard and start to complain

Revolt of the Lower Gods

Negotiations with the Great Gods

Proposal to create humans, to relieve the Lower Gods from their labor

Creation of the Man

Man's noisy behavior; new complaints from the gods

The supreme god Enlil's decision to extinguish mankind by a Great Flood

Atraḥasis is warned in a dream

Enki explains the dream to Atraḥasis (and betrays the plan)

Construction of the Ark

Boarding of the Ark

Departure

The Great Flood

The gods are hungry because there are no farmers left to bring sacrifices, and decide to spare Atraḥasis, even though he is a rebel

Regulations to cut down the noise: childbirth, infant mortality, and celibacy

The translation offered here is adapted from the one by B.R. Foster.

Translation

Complaints of the Lower Gods

[1] When the gods were man

they did forced labor, they bore drudgery.

Great indeed was the drudgery of the gods,

the forced labor was heavy, the misery too much:

[5] the seven great Anunna-gods were burdening

the Igigi-godsnote with forced labor.

[Lacuna]

[21] The gods were digging watercourses,

canals they opened, the life of the land.

The Igigi-gods were digging watercourses

canals they opened, the life of the land.

[25] The Igigi-gods dug the Tigris river

and the Euphrates thereafter.

Springs they opened from the depths,

wells ... they established.

...

They heaped up all the mountains.

[Several lines missing]

[34] ... years of drudgery.

[35] ... the vast marsh.

They counted years of drudgery,

... and forty years, too much!

... forced labor they bore night and day.

They were complaining, denouncing,

[40] muttering down in the ditch:

"Let us face up to our foreman the prefect,

he must take off our heavy burden upon us!

Enlil, counsellor of the gods, the warrior,

come, let us remove him from his dwelling;

[45] Enlil, counsellor of the gods, the warrior,

come, let us remove him from his dwelling!"

[Several lines missing]

[61] "Now them, call for battle,

battle let us join, warfare!"

The gods heard his words:

they set fire to their tools,

[65] they put fire to their spaces,

and flame to their workbaskets.

Off they went, one and all,

to the gate of the warrior Enlil's abode.

...

Insurrection of the Lower Gods

[70] It was night, half-way through the watch,

the house was surrounded, but the god did not know.

It was night, half-way through the watch,

Ekur was surrounded, but Enlil did not know!

[Several lines missing; the great gods send a messenger]

The Great Gods Send a Messenger

[132] Nusku opened his gate,

took his weapons and went ... Enlil.

In the assembly of all the gods,

[135] he knelt, stood up, expounded the command,

"Anu, your father,

your counsellor, the warrior Enlil,

your prefect, Ninurta,

and your bailiff Ennugi have sent me to say:

[140] 'Who is the instigator of this battle?

Who is the instigator of these hostilities?

Who declared war,

that battle has run up to the gate of Enlil?

In ...

[145] he transgressed the command of Enlil.'"

Reply by the Lower Gods

"Everyone of us gods has declared war;

...

We have set ... un the excvation,

excessive drudgery has killed us,

[150] our forced labor was heavy, the misery too much!

Now, everyone of us gods

has resolved on a reckoning with Enlil."

[The great gods decide to create man, to relieve the lower gods from their misery.]

Proposals by Ea, Belet-ili, and Enki

[a1] Ea made ready to speak,

and said to the gods, his brothers:

"What calumny do we lay to their charge?

Their forced labor was heavy, their misery too much!

[a5] Every day ...

the outcry was loud, we could hear the clamor.

There is ...

Belet-ili, the midwife, is present.note

Let her create, then, a human, a man,

[a10] Let him bear the yoke!

Let him bear the yoke!

Let man assume the drudgery of the god."

Belet-ili, the midwife, is present.

[190] Let the midwife create a human being!

Let man assume the drudgery of the god."

They summoned and asked the goddess

the midwife of the gods, wise Mami:note

"Will you be the birth goddess, creatress of mankind?

[195] Create a human being, that he bear the yoke,

let him bear the yoke, the task of Enlil,

let man assume the drudgery of the god."

Nintu made ready to speak,note

and said to the great gods:

[200] "It is not for me to do it,

the task is Enki's.

He it is that cleanses all,

let him provide me the clay so I can do the making."

Enki made ready to speak,

[205] and said to the great gods:

"On the first, seventh, and fifteenth days of the month,

let me establish a purification, a bath.

Let one god be slaughtered,

then let the gods be cleansed by immersion.

[210] Let Nintu mix clay with his flesh and blood.

Let that same god and man be thoroughly mixed in the clay.

Let us hear the drum for the rest of the time.

[215] From the flesh of the god let a spirit remain,

let it make the living know its sign,

lest he be allowed to be forgotten, let the spirit remain."

The great Anunna-gods, who administer destinies,

[220] answered "yes!" in the assembly.

The Creation of Man

On the first, seventh, and fifteenth days of the month,note

he established a purification, a bath.

They slaughtered Aw-ilu, who had the inspiration, in their assembly.

[225] Nintu mixed clay with his flesh and blood.

That same god and man were thoroughly mixed in the clay.

For the rest of the time they would hear the drum.

From the flesh of the god the spirit remained.

It would make the living know its sign.

[230] Lest he be allowed to be forgotten, the spirit remained.

After she had mixed the clay,

she summoned the Anunna, the great gods.

The Igigi, the great gods, spat upon the clay.

[235] Mami made rady to speak,

and said to the great gods:

"You ordered me the task and I have completed it!

You have slaughtered the god, along with his inspiration.

[240] I have done away with your heavy forced labor,

I have imposed your drudgery on man.

You have bestowed clamor upon mankind.

I have released the yoke, I have made restoration."

They heard this speech of hers,

[245] they ran, free of care, and kissed her feet, saying:

"Formerly we used to call you Mami,

now let your name be Belet-kala-ili:"note

[The human population increases and their noise disturbs the gods, who decide to wipe out mankind. The god Enki, however, sends a dream to Atrahasis. When the text resumes, Enki is still speaking.]

Enki explains Atraḥasis' dream

[i.b35] "Enlil committed an evil deed against the people."

[i.c11] Atraḥasis made ready to speak,

and said to his lord:

"Make me know the meaning of the dream.

let me know, that I may look out for its consequence."

[i.c15] Enki made ready to speak,

and said to his servant:

"You might say, 'Am I to be looking out while in the bedroom?'

Do you pay attention to message that I speak for your:

[i.c20] 'Wall, listen to me!

Reed wall, pay attention to all my words!

Flee the house, build a boat,

forsake possessions, and save life.

[i.c25] The boat which you build

... be equal ...

...

...

Roof her over like the depth,

[i.c30] so that the sun shall not see inside her.

Let her be roofed over fore and aft.

The gear should be very strong,

the pitch should be firm, and so give the boat strength.

I will shower down upon you later

[i.c35] a windfall of birds, a spate of fishes.'"

He opened the water clock and filled it,

he told it of the coming of the seven-day deluge.

Atraḥasis and the Elders

Atraḥasis received the command.

He assembled the Elders at his gate.

[i.c40] Atraḥasis made ready to speak,

and said to the Elders:

"My god does not agree with your god,

Enki and Enlil are constantly angry with each other.

They have expelled me from the land.

[i.c45] Since I have always reverenced Enki,

he told me this.

I can not live in ...

Nor can I set my feet on the earth of Enlil.

I will dwell with my god in the depths.

[i.c50] This he told me: ..."

Construction of the Ark

[ii.10] The Elders ...

The carpenter carried his axe,

the reedworker carried his stone,

the rich man carried the pitch,

the poor man brought the materials needed.

[Lacuna of about fifteen lines; the word Atraḥasis can be discerned.]

Boarding of the Ark

[ii.29] Bringing ...

[ii.30] whatever he had ...

Whatever he had ...

Pure animals he slaughtered, cattle ...

Fat animals he killed. Sheep ...

he choose and and brought on board.

[ii.35] The birds flying in the heavens,

the cattle and the ... of the cattle god,

the creatures of the steppe,

... he brought on board

...

[ii.40] he invited his people

... to a feast

... his family was brought on board.

While one was eating an another was drinking,

[ii.45] he went in and out; he could not sit, could not kneel,

for his heart was broken, he was retching gall.

Departure

The outlook of the weather changed.

Adadnote began to roar in the clouds.

[ii.50] The god they heard, his clamor.

He brought pitch to seal his door.

By the time he had bolted his door,

Adad was roaring in the clouds.

The winds were furious as he set forth,

[ii.55] He cut the mooring rope and released the boat.

[Lacuna]

The Great Flood

[iii.5] ... the storm

... were yoked

Anzu rent the sky with his talons,

He ... the land

[iii.10] and broke its clamor like a pot.

... the flood came forth.

Its power came upn the peoples like a battle,

one person did not see another,

they could not recognize each other in the catastrophe.

[iii.15] The deluge belowed like a bull,

The wind resounded like a screaming eagle.

The darkness was dense, the sun was gone,

... like flies.

[iii.20] the clamor of the deluge.

[Lacuna. The gods find themselves hungry because there are no farmers left and sacrifices are no longer brought. When they discover that Atrahasis has survived, they make a plan to make sure that the noise will remain within limits: they invent childbirth, infant mortality, and celibacy.]

Mankind Punished

[iii.45] Enki made ready to speak,

and said to Nintu the birth goddess:

"You, birth goddess, creatress of destinies,

establish death for all peoples!

[iii.d1] "Now then, let there be a third woman among the people,

among the people are the woman who has borne

and the woman who has not borne.

Let there be also among the people the pasittu (she-demon):

[iii.d5] Let her snatch the baby from the lap who bore it.

And etablish high priestesses and priestesses,

let them be taboo,note and so cut down childbirth."

This page was created in 2007; last modified on 12 October 2020.

Home » Sources » Content » ANET » 104-106 The Epic of Atraḥasis

All content copyright © 1995–2020 Livius.org. All rights reserved.

____________________________________

Brain Magick: Exercises in Meta-Magick and Invocation by Philip H. Farber

archive.org/details/BrainMagic/Brain%20Magic

archive.org/stream/BrainMagic/mega-book-two-volumes-in-on...

"Satana-il was the supreme leader of an extraterrestrial race that accompanied the Anunnaki in their second landing on earth.

This galactic race was physically and genetically different from the An unna ki and the Igigi. Their duty was to serve the Anu nna ki.

They rebelled against the An unna ki and broke the laws of their leader by breeding with the women of the Earth.

Contrary to the general belief, the An unna ki were not the first extraterrestrial race to marry, or the have sexual relations with the women of earth."

____________________________________

archive.org/details/img20190908220021901

Ancient Creation Myths

by Alberta Parish

Publication date 2019-09-08

Topics Enlil, Enki, Anunnaki, Sumerians, ancient myths, Babylonians, Enuma Elish, Atrahasis, Noah, Genesis Flood, Sumerian flood myth

God: The Original Slavemaster by Alberta Parish

Ever since I was a child, I have always believed in a benevolent God called Yahweh and Jehovah that biblical writers claimed created mankind for the express purpose of his will. In a Christianized Western culture, I was taught that only through Jesus Christ could I have eternal life with him and Yahweh. The epic of Atrahasis, an Akkadian tablet dating from the 18th Century BCE, gives a completely different account of mankind's creation and how the universe was formed beginning with the primordial waters.

Atrahasis was the last Sumerian king before the Great Deluge who was saved from the flood by the Anunnaki god Enki who had rulership of the great deep. According to Atrahasis, Homo Sapiens were created to serve the Anunnaki, which were extraterrestrials that landed in the Persian Gulf region about 450,000 years ago in search of gold to repair their home planet Nibiru's ozone.They made the Igigi gods, who were lower gods, mine for gold. Enlil, the ruler of earth and sky, who is also the equivalent of the biblical God Yahweh, also made the Igigi build canals, reedbeds, rivers and mountains. They built the Tigris and Euphrates rivers, and after 3,600 years, rebelled against their oppressor, Enlil.

Atrahasis had recorded that the Igigi cast off their work tools and surrounded Enlil's temple demanding to be relieved of their hard labor. It was later decided that the Anunnaki would make a species that were intelligent enough to do the work that the Igigi had refused to do. This was mankind's original purpose for being created by these extraterrestrials. It was also decided that an Anunnaki had to be sacrificed to make mankind.

The epic of Atrahasis states, "They slaughtered Aw-ilu, who had the inspiration, in their assembly.

Nintu mixed clay with his flesh and blood.

That same god and man were thoroughly mixed in the clay...After she had mixed the clay, she summoned the Anunna, the great gods.

The Igigi, the great gods, spat upon the clay.

Mami made ready to speak, and said to the great gods: "You ordered me the task and I have completed it!

You have slaughtered the god, along with his inspiration.

I have done away with your heavy forced labor,

I have imposed your drudgery on man.

You have bestowed clamor upon mankind."

With the help of Enki, half-brother of Enlil, the mother goddess Nintu (i.e., Mami) formed seven males and seven females from fourteen pieces of clay. It was also after this event that the human population grew, because the first seven males and females were given the ability to reproduce. When the human population grew, Enlil complained of their noise. He then set about to reduce the population. First, he caused a drought and mankind was destroyed. But it did nothing to reduce the population. Then, pestilence followed. Still, the population continued to grow. Lastly, Enlil caused a great famine. Eventually, the people turned cannibal as a result of the famine. Finally, Enlil proposed a solution to destroy the human population through a flood.

Read the remainder of my essay at www.ancientcreationmyths.com.

Addeddate 2019-09-15 19:04:20

Identifier img20190908220021901

Scanner Internet Archive HTML5 Uploader 1.6.4

____________________________________

ETCSLtranslation

etcsl.orinst.ox.ac.uk/cgi-bin/etcsl.cgi?charenc=gcirc&amp...

© Copyright 2003, 2004, 2005, 2006 The ETCSL project, Faculty of Oriental Studies, University of Oxford

Updated 2006-12-19 by JE

Igigi Search the English translations

Result: 3 paragraph(s)

 

A hymn to Marduk for Abī-Ešuḫ (Abī-Ešuḫ A): c.2.8.5.1

King who gathers up the divine powers of heaven and earth, foremost son of Enki, Marduk, mighty lord, perfect hero, foremost of the Great Princes (a name for the Igigi gods), strong one of the Anuna, the great gods who have given him justice and judgment! Great prince, descendant of holy An, lord who decides destinies, who has everything in his grasp (?), wise, august knower of hearts, whose divinity is manifest, who shows concern for all that he looks upon! Your ancestor An, king of the gods, has made your lordship effective against the armies of heaven and earth.

 

A hymn to Inana (Inana C): c.4.07.3

The great-hearted mistress, the impetuous lady, proud among the Anuna gods and pre-eminent in all lands, the great daughter of Suen, exalted among the Great Princes (a name of the Igigi gods), the magnificent lady who gathers up the divine powers of heaven and earth and rivals great An, is mightiest among the great gods -- she makes their verdicts final. The Anuna gods crawl before her august word whose course she does not let An know; he dare not proceed against her command. She changes her own action, and no one knows how it will occur. She makes perfect the great divine powers, she holds a shepherd's crook, and she is their magnificent pre-eminent one. She is a huge shackle clamping down upon the gods of the Land. Her great awesomeness covers the great mountain and levels the roads.

 

The debate between Bird and Fish: c.5.3.5

"You are like a watchman living on the walls (?), ……! Fish, you kindled fire against me, you planted henbane. In your stupidity you caused devastation; you have spattered your hands with blood! Your arrogant heart will destroy itself by its own deeds! But I am Bird, flying in the heavens and walking on the earth. Wherever I travel to, I am there for the joy of its …… named. ……, O Fish, …… bestowed by the Great Princes (a name for the Igigi). I am of first-class seed, and my young are first-born young! …… went with uplifted head …… to the lustrous E-kur. …… until distant days. …… the numerous people say. How can you not recognise my pre-eminence? Bow your neck to the ground."

____________________________________

A song to Ninimma (Ninimma A): translation

web.archive.org/web/20060925024833/http://www-etcsl.orien...

SEGMENT A

1-18You are the seal-holder of the treasury of the ....... You are the caretaker of the great gods, you are ....... Ninimma, you are the lady of all the great rites in the E-kur. Lady, you are the ...... of Enlil, you are the heavenly scribe. You ...... the tablet of life.

1 line fragmentary

You, who bring the best corn, are the lady of the E-sara. The surveyor's gleaming line and the measuring rod suit you perfectly. You can hold your head high among the great princes. You are ....... You are ......, the cherished one.

1 line fragmentary

......; you are exceptional in wisdom. ...... joy ....... My lady, you were exalted already in the womb; you are resplendent like the sunlight. You are suited to the lapis-lazuli crown (?); you are the heavenly ....... ...... adorned with loveliness .......

1 line fragmentary

approx. 10 lines missing

 

SEGMENT B

1-11...... like a strong (?) ....... ...... of the E-kur ...... lady ....... ...... the forceful one of Nanna ....... You are profoundly intelligent, one who knows everything. You are the shining light which fills the exalted sanctuary. You are she who ...... by Enlil. You are ....... You are ....... You are most apt for the holy susbu rites and lustration rites.

1 line unclear

Ninimma of the holy divine plans, it is sweet to praise you!

 

SEGMENT C

1You are .......

 

Top | Home | Email us This composition: composite text | bibliography

 

Revision history

22.x.1999 : GZ : adapting translation

06.xii.1999 : JAB : proofreading

13.xii.1999 : GC : tagging

22.xii.1999 : ER : proofreading SGML

22.xii.1999 : ER : converting to HTML 4.0

7.ix.2001 : ER : header and footer reformatted; substantive content of file not changed

____________________________________

 

Inly, Bohdan

 

about.me/chekanart

 

China is a likely winner of the information age supply chain through ecommerce

 

Peace and Ecommerce, A Global Systems View

 

Attending a required Masters class “Policy, Law, and Ethics in Information Management” it was only ethical to admit that I worked three months drafting and publishing policy documents for Microsoft, which was now our current class assignment, to research Web based privacy policies and other related documents such as terms of use, conditions of use, code of conduct and learn more about them, with a diary of examples in the wild, and related materials.

 

The educational idea is that we would then be able to contribute meaningfully to creating policy statements and understand their underlying implications to end users and companies. But I had already done this work professionally, so it would be of questionable value for me to do the coursework on the same topic as if I had never done it before.

 

The instructor of the class, Glenn Von Tersch assigned me to present information on freedom of speech, a topic I fell in love with, and wanted to research more. But for my final research, I needed something else.

 

One of my favorite things to discuss in job interviews, or with anyone in earshot, is that I believe that the networked spread of ecommerce over the Web, filtering into even the poorest nations will aid in understanding through communication; that ecommerce leads to peace. In effect I believed that ecommerce contributes in a direct way to peace because it provides the fuel to grow and maintain the Internet. Also it seemed obvious that people and countries that are invested in and perform transactions with each other are less likely to go war against their own interests. Von Tersch said, “These topics you are interested in have more research value than freedom of speech, because 1st amendment rights have been heavily legislated, written about, and researched.” He mentioned something called “The McDonald’s Effect”, how having a McDonald’s outlet or franchise appears to contribute to peace between countries. So peace and ecommerce became my topic.

 

What I did not expect to discover is in human society war is considered the norm and peace the exception. I did not expect to learn about how ugly the 3rd world poverty creating monster of WTO became according to one economist, even though I live in Seattle where the initial protests were. I was surprised to know how Reganomics theory hangs on, like an old B-grade movie on late night TV, because someone somewhere in the supply chain makes money. I did not expect to find that privacy and intellectual rights are so tightly interwoven, or how they relate to conflict, security, potential world dominance and growth.

 

I had no way to guess that I would enjoy the study of economics – statistical, yes, nicely so, but dull no; as a global topic it is juicy-rotten, full of international spies, botched security, with rogue pirate computer chips, and unintended consequences.

 

Who can accurately predict how patterns of global economics relate to peace, privacy, property rights, policies and their outcome in the one breath away from today, the next 20-40 years? Who would think that China - the nation, McDonalds - the corporation, and Chicago crack dealers and their foot soldiers share so much in common when you view their information through these fascinating multi-dimensional facets?

 

One must be educated to search effectively for information. My knowledge about the nature of search is not just intellectual knowledge; this is conditionalized through my own experience of failure to produce relevant search results within massive library databases.

 

My education began with a simple query on the Web “peace + ecommerce” which returned from Google “Theses on the Balkan War,” by Mike Haynes, from the International Socialism Journal, “Capitalism is inherently a competitively expansionist and therefore conflict-ridden system” , effectively laying the blame for war on the US and Western capitalist nations and on anyone claiming to be fighting a war with good intentions. I read it, thinking I would not see this relate to my project – also surprising very similar material was presented in the global economic books I read later.

 

As mentioned the pursuit of ‘education justifies anything’, like looking at any results, so I also clicked on an article entitled “Dinosaur Extinction linked to change in Dinosaur Culture” I read it, and it made sense that something like author Daniel Quinn’s theory of “The Law of Limited Competition” is an operant factor in global markets today, with war being genocide, and countries struggling to win economically laying waste to the very place they live. A notable example is Beijing, the air pollution capital of the world struggling to host the Olympic Games this year. I stored that URL for future reference. The theory and the reality imply that in the race to catch up and compete in global economics, the Chinese are killing themselves off before they arrive at their desired goal.

 

Then I queried in several of the University of Washington interconnected and extensive library databases on the same thing “peace + ecommerce” and found in all of them, zero returns, “0 Results”. My teacher was surprised and advised me to extrapolate and offer conjecture on what was likely, if few sources were available. I notified a friend studying economics who emailed related articles. Very frustrated I tried related queries and turned up articles on the economies of war . How perverse, I thought. I contacted a librarian through the online tool and chatted with her, explaining my quest. She suggested I query on “economics and public policy”. “How is public policy related to peace and ecommerce?” I asked. “Try Conflict Resolution” she replied.

 

Thus the reason I couldn't find 'peace' is because the term used, in educated facet writers’ metadata which is designed to expose information to search, is 'conflict resolution' or ‘conflict prevention’. Oddly the social implication is that war is the norm. Maybe peace doesn’t exist anywhere. A reason I used 'ecommerce' instead of 'global economics' is due to consulting in that field for technology firms. Searching again returned few meaningful results -- the user interface was strange, very slow, and clunky. I longed for Google .

 

Then I remembered the “McDonald's Effect” our teacher mentioned, and quickly I located a reference on the Web, but it was deeply nested in a staggering number of oddly worded articles. I stopped without uncovering where the concept originated. The next night I searched again, and found the author Thomas Friedman and his related books. I briefly scanned all the related Wikipedia articles. I realized quickly that to become educated enough on my two topics, I had to some understanding of economics. This is because even to scrape by enough to search among the many interrelated topics one needs to know the central facet. Very esoteric topics require specialized language and deep knowledge of the subject.

 

More searches turned up substantial evidence that China lags behind other nations in ecommerce.

 

For years I worked in ecommerce designing interfaces (for Microsoft 2003 and Amazon 2007-2008), and working with supply chain software (as a director of an ecommerce company). But because I didn't realize that one could understand it better, and that it is not as dull as computer science and its requisite cash register receipts , I never tried.

 

The "McDonald's Effect" is named after "The Golden Arches Theory of Conflict Prevention" created by the author Thomas Friedman's slightly in cheek comments and his book, “The Lexus and the Olive Tree” (the update now titled "The Lexus and the Olive Tree: Understanding Globalization").

 

Those books led me to order Amazon ecommerce overnight book delivery, and I read, 'The World Is Flat?: A Critical Analysis of New York Times Bestseller by Thomas Friedman', 'Freakonomics: A Rogue Economist Explores the Hidden Side of Everything' , 'Making Globalization Work' which reports that there is hope in the world for peace. The Nobel Prize winning author helps the reader extrapolate based on significant knowledge of statistics and global economic analysis through his personal, professional, and academic connections.

 

Common Name Academic Name Book Title

 

McDonalds Effect Golden Arches Theory of Conflict Prevention,

 

aka democratic peace theory Lexus and the Olive Tree

 

Dell Theory The Dell Theory of Conflict Prevention The World is Flat, A Brief History of the Twenty-First Century

 

peace conflict prevention

 

ecommerce global economics

 

"In his book, The Lexus and the Olive Tree, Thomas L. Friedman proposed The Golden Arches Theory of Conflict Prevention, observing that no two countries with a McDonald's franchise had ever gone to war with one another, a version of the democratic peace theory."

 

"The Dell Theory stipulates: No two countries that are both part of a major global supply chain, like Dell's, will ever fight a war against each other as long as they are both part of the same global supply chain."

 

---------------------------------------------------------------------

 

Readings

 

The World Is Flat 3.0: A Brief History of the Twenty-first Century by Thomas Friedman

 

Larry Page, Google Co-Founder quoted by Thomas Friedman, p. 179, entire paragraph. “The more global Google’s user base becomes, the more powerful a flattener it becomes…”

 

From Friedman’s conversation with Google’s director of operations in China, Kai-Fu Lee, p. 181 entire paragraph ”In time individuals will have the power to find anything in the world at any time on all kinds of devices – and that will be enormously empowering.”

 

The Quiet Crisis, entire pages 368, 369, chapter on research in China, beating out American innovation in research. “The Chinese government gave Microsoft the right to grant post-docs.” “They work through their holidays because their dream is to get to Microsoft.”

 

“What are those?” She said the researchers get them from Microsoft every time they invent something that gets patented. How do you say Ferrari in Chinese.”

 

p. 370 “… whether we are going to implement or China is going to beat us to our own plan.” Council on Creativeness, regarding the Innovate America report, comment to Friedman by Deborah Wince-Smith.

 

Introduction p. X, Thomas Friedman, “Of course the world is not flat. But it isn’t round anymore either. I have been using the simple notion of flatness to describe how more people can plug, play, compete, connect, and collaborate with more equal power than ever before – which is what is happening in the world. … the essential impact of all the technological changes coming together in the world today. … My use of the word flat doesn’t mean equal (as in ‘equal incomes’) and never did. It means equalizing.”

 

The Lexus and the Olive Tree: Understanding Globalization by Thomas Friedman

 

Forward to the Anchor Edition, Thomas Friedman, “… my Golden Arches Theory – that no two countries that both have McDonald’s have ever fought a war again each other since they each got their McDonald’s.”

 

p. 7 “When I say that globalization has replaced the Cold War as the defining international system, what exactly do I mean?”

 

p. 8 “The cold war system was symbolized by a single word, the wall … “You can’t handle the truth,” Says Nickleson. “Son we live in a world that has walls…”

 

p. 8 “This Globalization system is also characterized by a single word: the Web. … we have gone from a system built around divisions and walls to a system built around integration and webs.”

 

p. 19 “What is information arbitrage? Arbitrage is a market terms. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

Chapter 3, p. 29. The Lexus and the Olive Tree

 

Photo: Jerusalem, December 29, 1998: Simon Biton places his cellular phone up to the Western Wall so a relative in France can say a prayer at the holy site. (Photo: Menahem Kahana, Agence France-Presse) [caused my spontaneous tears]

 

p. 47 “advertising jingle “Let us put a bank in your home” … office … newspaper … bookstore … brokerage firm … factory … investment firm … school in our homes.”

 

The World Is Flat?: A Critical Analysis of New York Times Bestseller by Thomas Friedman by Ronald Aronica and Mtetwa Ramdoo

 

Freakonomics [Revised and Expanded]: A Rogue Economist Explores the Hidden Side of Everything by Steven D. Levitt and Stephen J. Dubner

 

Chapter 5 “Why do Drug Dealers Still Live with Their Moms?” p. 89 “So how did the gang work? An awful lot like most American businesses, actually, though perhaps none more so than McDonald’s. In fact, if you were to hold a McDonald’s organizational chart and a Black Disciples org chart side by side, you could hardly tell the difference.”

 

p. 46 “There is a tale, “The ring of Gygnes,” … could any man resist the temptation of evil if he knew his acts could not be witnessed?”

 

p. 58 “Attendance at Klan meetings began to fall … of all the ideas Kennedy thought up to fight bigotry, this campaign was clearly the cleverest. … He turned the Klan’s secrecy against itself by making its private information public: he converted heretofore precious knowledge into ammunition for mockery.”

 

Making Globalization Work by Joseph E. Stiglitz

 

My favorite – the entire book was used to write this paper.

 

Web Resources

 

Please view attached Appendix www.crito.uci.edu/pubs/20... regarding the reasons one study concludes that hold China back in ecommerce.

 

[1] Waiting until the time is right, one is good at something, or has collected all the facts, without making any attempts isn’t effective. I had to begin someplace even if it is incomplete so I started with the World Wide Web. “If something is worth doing well, at all, it is also worth doing poorly.” I am not sure where that quote came from but I read it in an article where someone presented their reasoning.

 

[2] You never know where something will come from in free rights actions or what it will mean later. For example the person at the center of the Alaskan “Bong hits For Jesus” case, Frederick Morse, now teaches English to Chinese students in China. As an adult it appears he has his head on straight in his wish to help others communicate, more so that those he fought in court.

 

From the CNN news article, published June 26, 2007, “In dissent, Justice John Paul Stevens said, "This case began with a silly nonsensical banner, (and) ends with the court inventing out of whole cloth a special First Amendment rule permitting the censorship of any student speech that mentions drugs, so long as someone could perceive that speech to contain a latent pro-drug message." He was backed by Justices David Souter and Ruth Bader Ginsburg.” www.cnn.com/2007/LAW/06/2... downloaded March 13, 2008

 

[3] Pentagon attack last June stole an "amazing amount" of data” Joel Hruska Published: March 06, 2008 - 07:13PM CT Pentagon attack last June stole an "amazing amount" of data... from “blueton tips us to a brief story about recent revelations from the Pentagon which indicate that the attack on their computer network in June 2007 was more serious than they originally claimed. A DoD official recently remarked that the hackers were able to obtain an "amazing amount" of data.

 

We previously discussed rumors that the Chinese People's Liberation Army was behind the attack. “CNN has an article about Chinese hackers who claim to have successfully stolen information from the Pentagon.” Quoting Ars Technica: "The intrusion was first detected during an IT restructuring that was underway at the time. By the time it was detected, malicious code had been in the system for at least two months, and was propagating via a known Windows exploit. The bug spread itself by e-mailing malicious payloads from one system on the network to another." Via email from Jeremy Hansen on Slashdot: News for nerds, stuff that matters

 

[4] “Chinese backdoors "hidden in router firmware" Matthew Sparkes, News [Security], Tuesday 4th March 2008 3:17PM, Tuesday 4th March 2008 Chinese backdoors "hidden in router firmware"... The UK's communication networks could be at risk from Chinese backdoors hidden in firmware, according to a security company.

 

SecureTest believes spyware could be easily built into Asian-manufactured devices such as switches and routers, providing a simple backdoor for companies or governments in the Far East to listen in on communications.

 

"Organisations should change their security policies and procedures immediately," says Ken Munro, managing director of SecureTest. "This is a very real loophole that needs closing. The government needs to act fast."

 

"Would they buy a missile from China, then deploy it untested into a Western missile silo and expect it to function when directed at the Far East? That's essentially what they're doing by installing network infrastructure produced in the Far East, such as switches and routers, untested into government and corporate networks."

 

Late last year MI5 sent a letter to 300 UK companies warning of the threat from Chinese hackers attempting to steal sensitive data. Reports at the time suggested that both Rolls Royce and Royal Dutch Shell had been subjected to "sustained spying assaults".

 

The issue has been debated by government for some time. In 2001, the then foreign secretary Robin Cook, warned that international computer espionage could pose a bigger threat to the UK than terrorism.

 

[5] Chip Piracy Might End With Public Key Cryptography. A Web Exclusive from Windows IT Pro Mark Joseph Edwards, Security News, InstantDoc #98491, Windows IT Pro “A group of researchers from two universities have proposed a way to prevent chip piracy. The technique uses public key cryptography to lock down circuitry.

 

In a whitepaper published this month, Jarrod A. Roy and Igor L. Markov (of the University of Michigan) and Farinaz Koushanfar (of Rice University) outline the problem and details of how their proposed technology will help solve it.

 

Chip designers sometimes outsource manufacturing and that opens the door to piracy, should someone copy the design plans. The copied plans are then used to created 'clone' chips for a wide range of devices, including computers, MP3 players, and more.

 

"Pirated chips are sometimes being sold for pennies, but they are exactly the same as normal chips," said Igor Markov, associate professor in the Department of Electrical Engineering and Computer Science at the University of Michigan. "They were designed in the United States and usually manufactured overseas, where intellectual property law is more lax. Someone copies the blueprints or manufactures the chips without authorization."

 

The groups propose the use of public key cryptography, which would be embedded into circuitry designs. Each chip would produce its own random identification number, which would be generated during an activation phase. Chips would not function until activated, and activation would take place in a manner somewhat similar to that seen with many applications in use today. Via email from Jeremy Hansen.Original source - EPIC: Ending Piracy of Integrated Circuits Jarrod A. Roy, Farinaz Koushanfar‡ and Igor L. Markov, The University of Michigan, Department of EECS, 2260 Hayward Ave., Ann Arbor, MI 48109-2121, Rice University, ECE and CS Departments, 6100 South Main, Houston, TX 77005 www.eecs.umich.edu/~imark... March 06, 2008

 

[6] Chapter 5 “Why do Drug Dealers Still Live with Their Moms?” p. 89 “So how did the gang work? An awful lot like most American businesses, actually, though perhaps none more so than McDonald’s. In fact, if you were to hold a McDonald’s organizational chart and a Black Disciples org chart side by side, you could hardly tell the difference.”

 

[7] Mike Haynes, Theses on the Balkan War, “Capitalism is inherently a competitively expansionist and therefore conflict ridden system” Issue 83 of INTERNATIONAL SOCIALISM JOURNAL Published Summer 1999 Copyright © International Socialism, pubs.socialistreviewindex... accessed March 3, 2008.

 

[8] Readings p.7 “When I say that globalization has replaced the Cold War as the defining international system, what exactly do I mean?” p. 8 “The cold war system was symbolized by a single word, the wall … “You can’t handle the truth,” Says Nicholson. “Son we live in a world that has walls…”p. 8 “This Globalization system is also characterized by a single word: the Web. … we have gone from a system built around divisions and walls to a system built around integration and webs.”

 

“What is information arbitrage? Arbitrage is a market term. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

[9] Shared by miles on Feb 13, 2006 3:39 pm that I located through a Gmail...

 

[10] “As it gears up to host the 2008 Olympic Games Beijing has been awarded an unwelcome new accolade: the air pollution capital of the world.Satellite data has revealed that the city is one of the worst environmental victims of China's spectacular economic growth, which has brought with it air pollution levels that are blamed for more than 400,000 premature deaths a year” Satellite data reveals Beijing as air pollution capital of world

 

[11] “What we call ‘war’ is not all bad,” according to Virginia Johnson a former governmental planning consultant, who reminded me, “Without conflict there is no life. You don’t want 'perfect peace' there is no movement. The human standard is actually what we broadly call 'war'; because without conflict, change, motion, growth we would learn nothing, we would have nothing, we would be dead.” Personal conversation, March 14, 2008, Seattle, Washington

 

[12] Readings Larry Page, Google Co-Founder quoted by Thomas Friedman, p. 179, entire paragraph. “The more global Google’s user base becomes, the more powerful a flattener it becomes…”

 

[13] Ranganathan, faceted classification, Five Laws of Library Science, S. R. Ranganathan - Wikipedia, www.boxesandarrows.com/vi... Personality, Matter, Energy, Space, and Time. (PMEST)

 

Personality—what the object is primarily “about.” This is considered the “main facet.”

 

Matter—the material of the object

 

Energy—the processes or activities that take place in relation to the object

 

Space—where the object happens or exists

 

Time—when the object occurs

 

[14] www.crito.uci.edu/pubs/20...

 

[15] I learned about supply chain management mainly from the supply chain wizard Marc Lamonica, Regional Chief Financial Officer at Sutter Connect, Sutter Shared Services, and our mutual friend Web entrepreneur and ecommerce product engineer Adam Kalsey, and Sacramento State University teacher Stuart Williams, of Blitzkeigsoftware.net, <a href="http://blitzkriegsoftware.net/St..." blitzkriegsoftware.net/St...

 

[16] Introduction to Computer software classes in the 1970s consisted of FORTRAN cash register receipt programming, which is by implication is what ecommerce actually does.

 

[17] Freakonomics is a must read book of comedy and connections.

 

[18] Golden Arches, definition on Wikipedia, the free encyclopedia Golden Arches - Wikipedia, accessed March 13, 2008

 

[19] Readings “The World Is Flat 3.0: A Brief History of the Twenty-first Century” by Thomas Friedman, p. 421

 

[20] Readings p. 19 “What is information arbitrage? Arbitrage is a market term. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

 

[21] “Conservation groups say acid rain falls on a third of China's territory and 70% of rivers and lakes are so full of toxins they can no longer be used for drinking water.” Satellite data reveals Beijing as air pollution capital of world, Jonathan Watts in Beijing The Guardian, Monday October 31 2005, Satellite data reveals Beijing as air pollution capital of world

 

[22] “…After watching Jobs unveil the iPhone, Alan Kay, a personal computer pioneer who has worked with him, put it this way who has worked with him, put it this way: "Steve understands desire." ... Fortune CNN Magazine March 5, 2008, http://money.cnn.com/2008/03/02/......

 

accessed March 5, 2008

 

[23] Mac Margolis, “How Brazil Reversed the Curse, Latin America used to suffer the deepest gap between rich and poor. Now it is the only region narrowing the divide. Upwardly Mobile: Middle-class Brazilians” How Brazil Reversed the Curse NEWSWEEK Nov 12, 2007 Issue

 

[24] Mike Haynes, Theses on the Balkan War, “Capitalism is inherently a competitively expansionist and therefore conflict ridden system” Issue 83 of INTERNATIONAL SOCIALISM JOURNAL Published Summer 1999 Copyright © International Socialism, pubs.socialistreviewindex... accessed March 3, 2008. “The optimism that the end of the Cold War might lead to a new world order has been shown to be false. The hope that it would release a peace dividend that would enable a new generosity in international relations has been belied by experience, as some of us sadly predicted it would.3 Though the arms burden has declined, there has been no outpouring of aid to Eastern Europe, no new 'Marshall Plan'. The result has been that the burden of change has fallen on the broad masses of the population, wrecking lives across the old Soviet bloc in general and in one of its poorest components in south eastern Europe in particular. According to the World Bank, the number of people living in poverty (defined as having less than $4 a day) in the former Soviet bloc has risen from 14 million in 1990 to 147 million in 1998.4 Worse still, the advanced countries have continued to reduce further the miserly sums they devote to aid to the even poorer areas of the world. The OECD countries are rhetorically committed to an aid target of 0.7 percent of their output. In 1990 they gave 0.35 percent, and by 1997 the figure had fallen to 0.22 percent, with the United States under this heading giving 0.09 percent of its output, a figure in startling contrast to the expenditure devoted to destruction.”5

 

[25] Readings p. 46 “There is a tale, “The ring of Gygnes,” … could any man resist the temptation of evil if he knew his acts could not be witnessed?”

 

[26] Readings p. 58 “Attendance at Klan meetings began to fall … of all the ideas Kennedy thought up to fight bigotry, this campaign was clearly the cleverest. … He turned the Klan’s secrecy against itself by making its private information public: he converted heretofore precious knowledge into ammunition for mockery.”

 

Some of the research in this paper on piracy was provided by Jeremy Hansen of Seattle, Washington, USA. Mr. Hansen's email regarding economics served to inform me on this topic. Teacher: Glenn Von Tersch.

Description: During the Second World War Ian Fleming served as a Commander in the Royal Navy as assistant to the Director of Naval Intelligence, Rear Admiral John Godfrey. This document outlines Fleming's plan to capture German Engima codebooks which he dubbed 'Operation Ruthless'.

 

Fleming's name for the operation and his description of the man needed as a "tough batchelor" can't help but recall his later creation of James Bond. The document, prepared after the war as a summary of the activities of Naval Intelligence, suggests Fleming volunteered himself for the mission.

 

Date: c.1946

 

Our Catalogue Reference: ADM 223/463 p38

 

This image is from the collections of The National Archives. Feel free to share it within the spirit of the Commons.

 

For high quality reproductions of any item from our collection please contact our image library.

The Lammasu or Lumasi represent the zodiacs, parent-stars, or constellations.They are depicted as protective deities because they encompass all life within them. In the Sumerian Epic of Gilgamesh they are depicted as physical deities as well, which is where the Lammasu iconography originates, these deities could be microcosms of their microcosmic zodiac, parent-star, or constellation. Although "lamassu" had a different iconography and portrayal in Sumerian culture, the terms lamassu, alad, and shedu evolved throughout the Assyro-Akkadian culture from the Sumerian culture to denote the Assyrian-winged-man-bull symbol and statues during the Neo-Assyrian empire. Female lamassus were called "apsasû".The motif of the Assyrian-winged-man-bull called Aladlammu and Lamassu interchangeably is not the lamassu or alad of Sumerian origin which were depicted with different iconography.[clarification needed] These monumental statues were called aladlammû or lamassu which meant "protective spirit".[3][clarification needed] In Hittite the Sumerian form dLAMMA is used both a name for the so-called "Tutelary deity" identified in certain later texts with Inara and a title given to various other tutelary or similar protective gods.In the Enûma Eliš they are both symbolized as the zodiacs, parent-stars, or constellations and as physical deities as well as was in the Epic of Gilgamesh.

2011, Mar. 25(Fri)@南海藝廊

入場時間︱19:20入場 19:30準時開始

入場費︱NT$.50

  

【 柔軟次攻擊 】

演出者︱ Sounds like O.range(聽起來好橘)

看起來很刺鼻

吃起來很低沈

摸起來很過飽和

聞起來很痛

 

聽起來好橘,創造視覺和聽覺的連串

e-Mail︱o.range.sounds.2O11@gmail.com

Website|sounds-like-orange.com/

 

表演簡介︱影響

人們會因為"一樣"而有歸屬感,漸漸遺忘"不一樣"的必要,為了安全,多數決將100個人變成1個人,用同一種面貌,做了同一個決定。

但100個人就該有100種樣子,就該存在一些不和諧的畫面與聲音。

 

演出者︱葉立傅

傅立葉轉換是一種線性的積分轉換。在物理學、聲學、光學、結構動力學、數論、組合數學、機率論、統計學、訊號處理、密碼學、海洋學、通訊等領域都有著廣泛的應用。例如在訊號處理中,傅立葉轉換的典型用途是將訊號分解成幅值分量和頻率分量。

 

但是你以為把狗倒過來就會變神嗎?

 

表演簡介︱

     ∞

f(x) = ∫  (A(u)*cos(ux) + B(u)*sin(ux)) du

    -∞

Lacking Sound Festival Listen 45

2011, Mar. 25(Fri)@Nan-Hai Gallery

Entrance Time︱19:20 Starts Punctually At 19:30

Entrance Fee︱NT$.50

 

【 Sub-Attack but Sweet 】

Artist︱ Sounds like O.range

It looks pungent

Tastes deep as bass

Touches more than saturated

Smells pain

 

It sounds orange, creating a thread between sight and hearing.

 

e-Mail︱o.range.sounds.2O11@gmail.com

Website|soundslikeOrange.com

 

Performance Introduction︱ Effect

Many tend to acquire belongingness by being all alike, forgetting the necessity of being different. To feel secure, 100 people have become a single unity, disguised in the same appearance, making the same decision.

 

100 people should have 100 faces, conflict and discord shall exist.

  

Artist︱ Reiruof

Fourier transform is a mathematical operation that transforms one complex-valued function of a real variable into another. It is largely applied to physics, acoustics, optics, structural mechanics, number theory, combinatorics, probability theory, statistics, signal processing, cryptography, oceanography, communication…etc. For example, on signal processing the Fourier transform decomposes signal into amplitude and frequency.

 

Well, you think dog in reverse makes it God?

    

Performance Introduction︱

     ∞

f(x) = ∫  (A(u)*cos(ux) + B(u)*sin(ux)) du

    -∞

Curator︱YAO, Chung-Han

Graphic Design︱Nat NIU

Project Manager︱Liang CHEN

 

指導單位︱台北市文化局 

主辦單位︱失聲祭團隊 lsf-taiwan.blogspot.com/

協辦單位︱國立臺北教育大學 南海藝廊 blog.roodo.com/nanhai/

Supervised by︱ Department of Cultural Affairs Taipei City Government

Organized by︱Lacking Sound Festival Team

In Cooperation with︱National Taipei University of Education Nan-Hai Gallery

 

Calcite, Paint

Thebes, Valley of the Kings, Tomb of Tutankhamun (KV 62).

New Kingdom, 18th Dynasty, Reign of Tutankhamun (1355-1346 BCE).

 

Tutankhamun's tomb held more than eighty vessels of oils and unguents, but thieves stole most of the contents. This container has a central frieze in which the royal throne name appears in a cryptographic writing, ensuring the survival of the king's name.

 

King Tut exhibit, Seattle Washington, 2012.

This map - part patchwork quilt, part appliqué - was sewn later in life by a lady who, as a child, had grown up living in a house within the grounds of Bletchley Park during the war. You can see the track round the grounds through the eyes of a child who used to cycle around the place while the code-breakers were at their work. Apparently the security guards used to give the children security passes to get in and out, but they kept losing them, thus presenting an even greater security risk. The guards all knew them anyway, so they gave up with the passes.

Bletchley Park és un dels llocs més fascinants de la historia del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informatica i els ordinadors.

 

Vista interna d'una maquina 'Bombe'. La 'Bombe' fou creada per Alan Turing i Gordon Welchman a partir d'un model polonès, que permetia ajudar a desxifrar els codis de la famosa maquina Enigma del III Reich. Tot i que foren destruides totes despres de la guerra, amb molt esforç ara han pogut reconstruir-ne una, que funciona com les seves predecesores.

 

ca.wikipedia.org/wiki/Bletchley_Park

 

========================================================

 

Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).

 

This is the back side of a Bombe machine, in Bletchley Park. The Bombe machine was a device created by Alan Turing and Gordon Welchman to help decyphering the famous german Enigma machine. Although all 'bombes' were destroyed after the war, the team in the museum has rebuilt this full-working bombe. That's why has the name "Phoenix".

 

en.wikipedia.org/wiki/Bombe

 

www.jharper.demon.co.uk/bombe1.htm

 

en.wikipedia.org/wiki/Bletchley_Park

 

www.bletchleypark.org/

 

www.bletchleypark.org/content/museum.rhtm

 

For an impresive virtual visit, take a look to these videos:

 

www.youtube.com/watch?v=ZmMFp2FQPsY

Blog: makaylalewis.co.uk/2013/11/20/sketchnotes-introduction-to...

 

©ALL RIGHTS RESERVED.

These photographs are presented here for viewing purposes ONLY. They are NOT royalty free images and may not be used for commercial or private use. Any such use of these images is strictly prohibited. Specifically, these images may not be copied, manipulated, be reproduced by any other means nor sold without prior written consent by the author.

More art on my weblog: uair01.blogspot.com/

 

= = = = =

 

SEVEN SECRET ALPHABETS

Anthony Earnshaw

 

A very remarkable book. The replacement of a conventional capital letter at the beginning of a chapter by some kind of visual pun is as old as the illuminated book, but Earnshaw has succeeded in divorcing it from its customary aesthetic role, stripped it of any scene-setting function. His letters, comic or sinister, exist in their own right. Each image hides its secret until it finds its place. Even then it may prove evasive. The alphabets suggest an alternative reality where humour and disaster are interchangeable and the laws which govern nature are bent certainly, but only very little. An imagination in no way forced selects an apparently arbitrary image at a precise moment . . . Letters, those haphazardly invented signs, those abstract shapes we hear as sounds, take on a concrete meaning of their own.

Guardian

 

It is fair to say th at the author explores a landscape which suggests Magritte and Monty Python. The humour is austere, bleak and if not black, at least charcoal grey. As a feat of imagination the work is outstanding.

The Times Educational Supplement

 

Earnshaw has a devious, allusive, surrealist interest in letters. His imagination is full of wit; each image is a humorous vignette, an unlikely collusion of images in the form of a letter. Such shifting of context is the source of all humour. By providing a main-line to the unconscious and suggesting a revaluation of the essential symbols of which language is constituted, he makes his work compulsive and compulsory viewing.

Arts Review

 

JONATHAN CAPE

THIRTY BEDFORD SQUARE LONDON

 

by Eric Thacker and Anthony Earnshaw

MUSRUM

WINTERSOL

Corrigendum

THE ISBN FOR THE PAPERBACK EDITION OF

SEVEN SECRET ALPHABETS

BY ANTHONY EARNSHAW

SHOULD READ ISBN 022401383 I

FIRST PUBLISHED 1972

© 1972 BY ANTHONY EARNSHAW

JONATHAN CAPE LTD, 30 BEDFORD SQUARE, LONDON, WCI

ISBN 022400795 5

PRINTED AND BOUND IN GREAT BRITAIN BY

W & J MACKAY LIMITED, CHATHAM

1 2 4 6 7 ••• 79 80