View allAll Photos Tagged cryptography
Someone was working on their cryptography skills on the cover of this pattern book about 76 years ago.
After a four year absence from etsy, I decided to open my storefront again. Specializing in lunch bag designs, I thought it'd be fun to illustrate an author series. This is one of many author portraits I plan to offer. www.etsy.com/shop/sammo
Firefly wasn't as difficult as I thought, but no matter. I'll take anything that'll make my job easier. Anyway, I continued my run down south, the "better" part of Gotham. Yeah, so much better with Blackgate down there. Then again, central Gotham, where I just entered, had Arkham. I guess Gotham is just a filthily as everyone says. I made my across Morrison Bridge and found myself in Two-Face territory. Time to raise some hell. Or, at least it would've been if it wasn't abandoned. The most notable landmark was The Time and Motion Study Consulting Co. formerly owned by Temple Fugate, A.K.A The Clock King. Long ago his company went bust due to debt generated from a lawsuit. He blamed mayor hill because he ran the law firm that filed the lawsuit, and became the clock king to get his revenge. Even though his wardrobe was from the 1920s, he was still pretty good at the whole villain thing. He almost killed Hill TWICE, but guess who stopped it both times. Tall, dark, and moody himself. Fugate hasn't been seen in Gotham for a years, though. Rumors are he's in Star city. If so, he's Speedy's problem now. Anyway, I entered the old kings former castle, to see that the new residents have already started decorating. Two-Face had the split room gimmick in full swing everywhere I went, even in Fugates's old office. The office still had some of Fugate's old items. A suitcase full of legal papers from his lawsuit layed open on the floor, and there were some pocket watches on the desk. Also, a laptop. Something seemed weird. There were old PC's everywhere else in the building, I'd figure Fugate would have the same. I turned on the Laptop, and it asked for a log-in password. Time to bust out the cryptographic wa-cha-ma-call-it. Hacking the laptop, the password appeared on the crypto-thingamajig. "Duality". So this laptop was Two-Face property. It's mine now. Let's see what we have.....
Robin has liberated #46 Time and Motion Study Consulting Co., continuing his trek to take down Gothams worst.
Bletchley Park és un dels llocs més fascinants de la història del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informàtica i els ordinadors.
La 'Bombe' era una màquina creada per Alan Turing i Gordon Welchman a partir d'un model polonès, que permetia ajudar a desxifrar els codis de la famosa màquina Enigma del III Reich. Tot i que foren destruides totes després de la guerra, amb molt esforç ara han pogut reconstruir-ne una, que funciona com les seves predecesores.
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
The Bombe machine was a device created by Alan Turing and Gordon Welchman to help decyphering the famous german Enigma machine. Although all 'bombes' were destroyed after the war, the team in the museum has rebuilt this full-working bombe. That's why has the name "Phoenix".
www.jharper.demon.co.uk/bombe1.htm
en.wikipedia.org/wiki/Bletchley_Park
www.bletchleypark.org/content/museum.rhtm
For an impresive virtual visit, take a look to these videos:
3d render, glowing lines, neon lights, abstract psychedelic background, cube cage, ultraviolet, blue, spectrum vibrant colors, laser show
To buy this item, please visit womenstylestore.com
#WomenStyleStore #bodysuit #fashion #like #lingerie #sexy #love #body #bikini #model #style #swimsuit #baby #fitness #ootd #f #follow #instagood #l #photography #gym #fit #dress #fashionblogger #clothing #makeup #swimwear #beautiful #instafashion #beauty #bhfyp womenstylestore.com/index.php/product/cryptographic-hot-s...
By 1943, Bombes began arriving at the Navy's Nebraska Avenue Communications Annex at a rate of four per week. The WAVES in Dayton began transferring with the machines and were trained to operate the Bombes. By the end of the war, 121 Bobles ran 24 hours per day, searching for Enigma rotor settings. THe machines could search 456,976 setting in 20 minutes.
THe US Navy Bombes were faster than the British machines and the Navy could build them in large enough quantity to make a difference againt the ENIGMAs. Britain turned over the U-boat problem to the US Navy and even requested the US to build an additional fifty machines, of which only 26 were needed before production stopped. The original ninty six were sufficent to handle the U-boat messages, but the ground war was growing and Britain wanted assistance against German Army and Air Force Engma messages. Approximately 65% of the runs on the Bombes were German Navy. Once the daily settings had been retrieved, the Bombes switched over to a three rotor mode and worked against the German army and Air Force. They cound complete a three-rotor run in only fifty seconds.
Source: National Cryptologic Museum
Comment on the above
The four rotor system had 26^4 or 456,976 settings whilst the theree rotor system had 26^3 or 17,756 settings. It looks like the problem scale in a linear way as it took 50 seconds to check 17,756 setting (~350 per second) while the four rotor solution in 20 minutes is ~ 380 settings per second.
also think the designer Joseph Desch sounds like a remarkable engineer that I never heard of before.
Bombe on Wikipedia
Once the British had given the Americans the details about the bombe and its use, the US had the National Cash Register Company manufacture a great many additional bombes, which the US then used to assist in the code-breaking. These ran much faster than the British version, so fast that unlike the British model, which would freeze immediately (and ring a bell) when a possible solution was detected, the NCR model, upon detecting a possible solution, had to "remember" that setting and then reverse its rotors to back up to it (meanwhile the bell rang).
Source of following material : National Cryptologic Museum
Switch Banks tell the Bombe what plain to cipher letters to search for. Using menus sent to the Bombe deck by cryptanalysts, WAVES set each dial using special wrenches. 00 equates to the letter A and 25 to the letter Z. The dials work together in groups of two. One dial is set to the plain test letter and the other to its corresponding cipher letter as determined by cryptanalysts. There are sixteen sets of switch banks, however, only fourteen were required to complete a run. As the machine worked through the rotor settings, a correct hit was possible if the electrical path in all fourteen switch banks corresponded to each of their assigned plaintext/cipher combinations.
Wheel Banks represent the four rotors used on the German U-boat Enigma. Each column interconnects the four rotors, or commutators, in that column. The top commutator represented the fourth, or slowest, rotor on the Enigma, while the bottom wheel represented the rightmost, or fastest, rotor. The WAVES set the rotors according to the menu developed by the cryptanalysts. The first were set to 00, and each set after that corresponded to the plain/cipher link with the crib (the assumed plain test corresponding to the cipher text.) Usually this meant that each wheel bank stepped up one place from the one on its left. When the machine ran, each bottom rotor stepped forward, and the machine electrically checked to see if the assigned conditions were met. If not, as was usually the case, each bottom wheels moved one more place forward. However, the bottom commutator moved at 850 rpm, so it only took twenty minutes to complete a run of all 456,976 positions.
i09_0214 125
More art on my weblog: uair01.blogspot.com/
= = = = =
SEVEN SECRET ALPHABETS
Anthony Earnshaw
A very remarkable book. The replacement of a conventional capital letter at the beginning of a chapter by some kind of visual pun is as old as the illuminated book, but Earnshaw has succeeded in divorcing it from its customary aesthetic role, stripped it of any scene-setting function. His letters, comic or sinister, exist in their own right. Each image hides its secret until it finds its place. Even then it may prove evasive. The alphabets suggest an alternative reality where humour and disaster are interchangeable and the laws which govern nature are bent certainly, but only very little. An imagination in no way forced selects an apparently arbitrary image at a precise moment . . . Letters, those haphazardly invented signs, those abstract shapes we hear as sounds, take on a concrete meaning of their own.
Guardian
It is fair to say th at the author explores a landscape which suggests Magritte and Monty Python. The humour is austere, bleak and if not black, at least charcoal grey. As a feat of imagination the work is outstanding.
The Times Educational Supplement
Earnshaw has a devious, allusive, surrealist interest in letters. His imagination is full of wit; each image is a humorous vignette, an unlikely collusion of images in the form of a letter. Such shifting of context is the source of all humour. By providing a main-line to the unconscious and suggesting a revaluation of the essential symbols of which language is constituted, he makes his work compulsive and compulsory viewing.
Arts Review
JONATHAN CAPE
THIRTY BEDFORD SQUARE LONDON
by Eric Thacker and Anthony Earnshaw
MUSRUM
WINTERSOL
Corrigendum
THE ISBN FOR THE PAPERBACK EDITION OF
SEVEN SECRET ALPHABETS
BY ANTHONY EARNSHAW
SHOULD READ ISBN 022401383 I
FIRST PUBLISHED 1972
© 1972 BY ANTHONY EARNSHAW
JONATHAN CAPE LTD, 30 BEDFORD SQUARE, LONDON, WCI
ISBN 022400795 5
PRINTED AND BOUND IN GREAT BRITAIN BY
W & J MACKAY LIMITED, CHATHAM
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.
Bitcoin (₿) is a cryptocurrency invented in 2008 by an unknown person or group of people using the name Satoshi Nakamoto and started in 2009, when its implementation was released as open-source software.
"Cypherpunks is gripping, vital reading, explaining clearly the way in which corporate and government control of the internet poses a fundamental threat to our freedom and democracy". — Oliver Stone
"Obligatory reading for everyone interested in the reality of our freedoms." — Slavoj Zizek
"The power of this book is that it breaks a silence. It marks an insurrection of subjugated knowledge that is, above all, a warning to all." — John Pilger
Buy Cypherpunks Freedom and the Future of the Internet here: stores.ebay.co.uk/Iron-Man-Shop
Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.
Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?
The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.
Publication November 2012 • 192 pages
Paperback ISBN 978-1-939293-00-8 • Ebook ISBN 978-1-939293-01-5
Julian Assange is the editor in chief of WikiLeaks. An original contributor to the cypherpunk mailing list, Assange is the author of numerous software projects in line with the cypherpunk philosophy, including the Rubberhose encryption system and the original code for WikiLeaks. An 'ethical hacker' in his teens, and subsequently an activist and internet service provider to Australia during the 1990s, he is the co-author (with Sulette Dreyfus) of Underground, a history of the international hacker movement. "Julian is currently a refugee under the protection of the government of Ecuador, and lives in the Ecuadorian embassy in London."
Jacob Appelbaum is a staff research scientist at the University of Washington, and a developer and advocate for the Tor Project, which is an online anonymity system for everyday people to fight against surveillance and against internet censorship.
Andy Müller-Maguhn is a long time member of, and former spokesman for, the Chaos Computer Club in Germany. A specialist on surveillance he runs a company called Cryptophone, which markets secure voice communication devices to commercial clients.
Jérémie Zimmermann is the co-founder and spokesperson for the citizen advocacy group La Quadrature du Net, the most prominent European organization defending anonymity rights online and promoting awareness of regulatory attacks on online freedoms.
AN EXCHANGE FROM CYPHERPUNKS:
JULIAN:
I want to look at what I see as a difference between a US cypherpunk perspective and the European perspective, which I think is quite interesting. The US Second Amendment is the right to bear arms. Just recently I was watching some footage that a friend shot in the US on the right to bear arms, and above a firearms store it says 'Democracy, Locked and Loaded,' and that’s the way that you ensure that you don’t have totalitarian regimes – that people are armed and if they are pissed off enough, then they simply take their arms and they retake control by force. Whether that argument is still valid now is actually an interesting one because of the difference in the types of arms that have occurred over the past 30 years. So, we can look back to this declaration that code-making, providing secret cryptographic codes that the government couldn’t spy on, was in fact a munition, and this big war that we fought in the 1990s to try and make cryptography available to everyone, which we largely won.
JAKE:
In the West?
JULIAN:
In the West we largely won and it's in every browser – it is now perhaps being back-doored and subverted in different kinds of ways. The notion is that you cannot trust a government to implement the policies that it says that it is implementing, and so we must provide the underlying tools, cryptographic tools that we control, as a sort of use of force, in that if the ciphers are good no matter how hard it tries a government cannot break into your communications directly. Maybe it can put a bug in your house or whatever.
JAKE:
Force of authority is derived from violence. One must acknowledge with cryptography no amount of violence will ever solve the math problem.
JULIAN:
Exactly.
JAKE:
And this is the important key. It doesn't mean you can't be tortured, it doesn't mean that they can't try and bug your house or subvert it some way but it means that if they find an encrypted message it doesn't matter if they have the force of the authority behind everything that they do, they cannot solve that math problem. This is the thing though that is totally non-obvious to people that are non-technical and it has to be driven home. If we could solve all of those math problems, it would be a different story and, of course, the government will be able to solve those math problems if anyone could.
JULIAN:
But it's just a fact. It just happens to be a fact about reality, such as that you can build atomic bombs, that there are math problems that you can create that even the strongest state cannot directly break. I think that was tremendously appealing to Californian libertarians and others who believed in this sort of 'democracy locked and loaded,' and here was a very intellectual way of doing it – of a couple of individuals with cryptography standing up to the full power of the strongest suit of power in the world. And we're still doing that a little bit, but I wonder, I have a view that the likely outcome is that those are really tremendously big economic forces and tremendously big political forces, like Jérémie was saying, and that the natural efficiencies of these technologies compared to the number of human beings will mean that slowly we will end up in a global totalitarian surveillance society. By totalitarian I mean a total surveillance, and that perhaps there'll just be the last free living people – and these last free living people are those who understand how to use this cryptography to defend against this complete, total surveillance, and some people who are completely off-grid, neo-Luddites that have gone into the cave, or traditional tribes-people. And these traditional people have none of the efficiencies of a modern economy so their ability to act is very small. Are we headed for that sort of scenario?
JÉRÉMIE:
First of all, if you look at it from a market perspective, I'm convinced that there is a market in privacy that has been mostly left unexplored, so maybe there will be an economic drive for companies to develop tools that will give users the individual ability to control their data and communication. Maybe this is one way that we can solve that problem. I'm not sure it can work alone, but this may happen and we may not know it yet. Also it is interesting to see that what you’re describing is the power of the hackers, in a way – 'hackers' in the primary sense of the term, not a criminal. A hacker is a technology enthusiast, is somebody who likes to understand how technology works, not to be trapped into technology but to make it work better. I suppose that when you were five or seven you had a screwdriver and tried to open devices to understand what it was like inside. So, this is what being a hacker is, and hackers built the Internet for many reasons, also because it was fun, and they have developed it and have given the Internet to everybody else. Companies like Google and Facebook saw the opportunity to build business models based on capturing users' personal data. But still we see a form of power in the hands of hackers and what is my primary interest these days is that we see these hackers gaining power, even in the political arenas. In the US there has been these SOPA (Stop Online Piracy Act) and PIPA (Protect IP Act) legislations – violent copyright legislation that basically gives Hollywood the power to order any Internet company to restrict access and to censor the internet.
JULIAN:
And banking blockades like the one we're suffering from.
JÉRÉMIE:
Exactly. What happened to WikiLeaks from the banking companies was becoming the standard method to fight the evil copyright pirates that killed Hollywood and so on. And we witnessed this tremendous uproar from civil society on the Internet – and not only in the US, it couldn't have worked if it was only US citizens who rose up against SOPA and PIPA. It was people all around the world that participated, and hackers were at the core of it and were providing tools to the others to help participate in the public debate.
Blockchain is a decentralised database or digital ledger of cryptocurrency or digital currency. It uses cryptography to keep secure payment transactions. It is public means everyone can see who present in the network. It is a chain of computers that must all approve an exchange before it can be verified and recorded. Explore us on :: xenixcoin.com/blockchain
Title: Telegram, in code, from Theodore Roosevelt to Admiral Dewey, 02/26/1898 - 02/26/1898
Creator(s): Department of the Navy. Office of the Chief of Naval Operations. Office of Naval Records and Library. (07/01/1919 - 09/1947)
Telegram, in code, from Theodore Roosevelt to Admiral Dewey, 02/26/1898 (ARC ID 300262); Naval Records Collection of the Office of Naval Records and Library, 1691 - 1945; Record Group 45; National Archives.
Persistent URL: arcweb.archives.gov/arc/action/ExternalIdSearch?id=300262
Access Restrictions: Unrestricted
Use Restrictions: Unrestricted
Commander Denniston's Office: Commander Alexander (Alastair) Denniston was the first Operational Director of the Government Code and Cypher School (GC&CS), and it was in this office that the “special relationship” between the UK and USA is said to have been born.
In early 1941, before they had entered the war, the first party of US officers arrived at Bletchley Park to understand more of the work undertaken there. They visited in high secrecy and Denniston told his secretary, Barbara Abernethy, to bring in the sherry and then depart and never breathe a word that they had entertained Americans.
It was also here that Commander Denniston welcomed all new recruits to the Top Secret Bletchley Park. Following meetings with the Polish Cypher Bureau in 1938, Denniston had recognised the need for academics and in particular mathematicians, to be involved in cryptographic work. He subsequently began planning for a proposed expansion of GC&CS by drawing up a list of so-called ‘men of the professor type’ who agreed in the event of war, to report to GC&CS’s new wartime base at Bletchley Park. This list included Codebreakers Alan Turing and Gordon Welchman but also, intriguingly, The Hobbit and Lord of the Rings author, JRR Tolkein who declined his place at GC&CS.
Pictures taken on a visit to Bletchley Park
Bletchley Park was the central site for Britain's codebreakers during World War Two. Run by the Government Code and Cypher School (GC&CS), it regularly penetrated the secret communications of the Axis Powers – most importantly the German Enigma and Lorenz ciphers. The official historian of World War II British Intelligence has written that the "Ultra" intelligence produced at Bletchley shortened the war by two to four years, and that without it the outcome of the war would have been uncertain
I thought people might enjoy the following story I found online. This plaque is on the church in Hemroulle, which is just outside Bastogne. If you look in my set of pictures for Battle of the Bulge or Band of Brothers, you'll see reference to a tank battle outside Hemroulle. This describes in detail that fight on Christmas Day. Pretty riveting reading. The tanks came in from the left of this plaque down towards Hemroulle.
Oh by the way, there's a picture in my set of where a German tank was knocked out by the 705th, that was part of the attack described below and is what the author refers to as part of the attack on Champs.
And another by the way. Did you ever hear the story of how the 502nd airborne desperately needed sheets, so they went to the mayor of a small town and asked the civilians for their bedsheets? That was this town, Hemroulle. A couple of years later, the commander of the 1st Battalion returned with sheets for the residents of Hemroulle!
Enjoy!
In stopping the last major German assault against Bastogne, the veteran gunners of the 463rd Parachute Field Artillery Battalion proved their skill to skeptical troops of the 101st Airborne Division
By Martin F. Graham
Sergeant Joseph Rogan took a long drag from a cigarette as he stared intently at the terrain that disappeared into the darkness and fog to his front. It was about 3:30 a.m. on December 25, 1944, and Rogan was spending his second Christmas overseas in a foxhole on the outskirts of Bastogne, Belgium. His partner, Corporal Restor Bryan, was resting in the corner of the hole, enjoying a rare moment when he could sleep in this intensely cold, snow-covered region.
Rogan and Bryan were forward observers for the 463rd Parachute Field Artillery Battalion. Their battalion command post was in the village of Hemroulle, about a mile northwest of Bastogne. A machine gun crew from Company A, 401st Glider Infantry Regiment, was within a stone's throw of the two men, and a third member of the 463rd, Corporal William Everhardt, was in a slit trench not far behind their position.
The sound of distant shells and bombs crashing around Champs did not even stir the exhausted infantry and artillerymen, leaving Rogan alone to think about home and happier Christmases. The 594 men of his artillery battalion should have been sleeping off their hangovers from Christmas Eve celebrations in Mourmelon, France. They had arrived there only 13 days earlier with orders to join the 17th Airborne Division once it came in from England. Instead, the holiday found them battling German tanks and troops desperately attempting to pierce the American defenses around Bastogne.
Never willing to dodge a fight, the 463rd's commander, Lt. Col. John Cooper, had volunteered his unit to Brig. Gen. Anthony McAuliffe, the 101st Airborne Division's acting commander, as soon as he heard the division was being rushed to Belgium to help repel a major enemy breakthrough. Cooper's zeal was a lucky break for the men of the 101st. The veterans of the 463rd had already distinguished themselves in combat in Sicily, Italy and southern France.
The 463rd's odyssey to this Christmas morning in Belgium began in February 1942, when the War Department authorized the creation of the first test parachute artillery battery. That experimental unit would become Battery B, 456th Parachute Field Artillery Battalion. Colonel Harrison B. Harden Jr. was designated the new battalion commander. The battalion's first combat jump was in Sicily on the evening of July 9, 1943, in support of the 82nd Airborne Division's 505th Parachute Infantry Regiment.
The battalion's primary mission was to fire at enemy troops and tanks utilizing a high arc, or indirect fire. During the intense Battle of Biazza Ridge, however, the battery had scored its first victory against enemy tanks using direct fire. Following the Sicilian campaign, the battalion was split up. Batteries C and D remained with the 82nd Airborne Division and transferred to England to prepare for the invasion of France. Headquarters Battery and Batteries A and B supported the 1st Special Service Force and participated in the Italian campaign battles for Monte Cassino, Anzio and Rome. In February 1944 the three batteries were redesignated the 463rd Parachute Field Artillery Battalion, with Major Hugh A. Neal as battalion commander. Neal's command was short-lived, however, for less than four months later an enemy shell seriously wounded him. He was replaced by Cooper, who remained the battalion commander for the duration of the war.
In early July, the 463rd received 200 replacements, which were used to create Batteries C and D. Now a complete battalion once again, the 463rd was attached to the 1st Airborne Task Force and jumped into southern France on August 15.
By the end of the month, the 463rd was transferred to the French Maritime Alps to assist in blocking any attempted German escape from France into Italy. At the beginning of December the battalion was transferred to Mourmelon, where it arrived on December 12. By then, a large number of the 463rd's members had been overseas more than 19 months.
The battalion was ordered to rest and refit while waiting for the 17th Airborne Division, then in training in England. As it awaited the arrival of its new division, the battalion was temporarily attached to the 101st Airborne Division for administration and rations.
A few of the artillery battalion commanders in the 101st, unfamiliar with the 463rd, thought the battalion consisted of a bunch of greenhorns just arriving from the States. During one dinner discussion between Cooper and officers from the 101st, a debate developed about the ability of a 75mm pack howitzer to knock out a German tank. At one point, Cooper said, "We certainly can knock out Mark IV tanks with a 75 pack howitzer." An artillery officer from the 101st responded, "Do not ever say, in your after-action reports, that you knocked out a tank, because General Anthony McAuliffe says you might disable, but you'll never knock out a tank." Incredulous, Cooper was quick to respond to the taunt. "We have spent more time waiting for our parachutes to open," he said, "than you guys have spent in combat since the invasion of Europe." Cooper would soon have an opportunity to back up his words with deeds.
Fate had placed Brig. Gen. Anthony McAuliffe, the 101st's artillery commander, in acting command of the division when word reached Mourmelon that the Germans had launched a major offensive in Belgium. Major General Maxwell Taylor, the 101st's commander, was in the United States, and his deputy, Brig. Gen. Gerald Higgins, was in England along with five senior divisional commanders and 16 junior officers to discuss the recently concluded operation in the Netherlands.
After being alerted by XVIII Airborne Corps headquarters, McAuliffe called a division staff meeting at 9 p.m. on December 17 to mobilize the division. To his shocked and sullen officers he announced, "All I know of the situation is that there has been a breakthrough, and we have got to get up there." He informed them that they should be ready to move out by truck the next morning for Werbomont, Belgium.
As the meeting broke up, Cooper approached McAuliffe and the acting division artillery commander, Colonel Thomas Sherburne, to remind them that his unit was only temporarily attached to the 101st and requested permission to join the division in its advance. McAuliffe directed Cooper to talk to Colonel Joseph H. "Bud" Harper of the 327th Glider Infantry Regiment, which lacked direct support artillery. Cooper found Harper, who had just made it back from England, and asked, "Do you need me?" Harper replied, "You're goddamn right." As a formality, Cooper returned to his battalion and gave his officers a choice of whether to stay and wait for the 17th or to join the 327th. To a man, the officers voted to go.
The division's convoy began leaving Mourmelon at 9 the next morning. Since the 463rd would be supporting the 327th, which was the last infantry regiment to leave, Cooper's battalion did not set out until 9:30 that evening. After more than a year of active campaigning Cooper knew that you could never have enough ammunition and directed the battalion's truck drivers to pass by Mourmelon's ammunition dump yard. "As we passed the ammo dump," Cooper remembered, "I turned and took the whole battalion through with orders to load as much 75mm ammo as we could carry in any vehicle, regardless of how crowded they were." This extra ammunition would come in very handy a few days later when the Germans cut all supply lines into Bastogne.
By the time the 463rd entered Belgium, the division's destination had changed from Werbomont to Bastogne. The 327th was directed to cover a position to the west of the town. Cooper's command deployed its guns around the small village of Hemroulle, about a mile northwest of Bastogne. The command post and fire direction center were set up in a house across the street from the village church, which was designated as the battalion aid station. While the primary mission of the 463rd was to support the thinly covered western and southern sector held by the 327th, it was called on daily to assist in repelling the Germans from the other sectors of the 101st's perimeter.
On the 19th, the Germans cut off the 463rd supply train, which Cooper had sent back for more ammunition. The next day, they succeeded in blocking all roads into Bastogne and launched major assaults on the 101st's positions northeast and east of the town. Even with the extra ammunition they had brought with them, by the 22nd--after supporting efforts to repulse earlier German attacks--the battalion had little more than one day's worth of rations and ammunition left.
The temperature on the morning of the 23rd was 10 degrees above zero, and it remained painfully cold throughout the day. Despite the freezing temperatures, the men's morale improved somewhat when they looked up around noon to see the sky filled with red, yellow and blue parachutes dropped by 16 Douglas C-47s. It was an early Christmas for the "Battered Bastards of Bastogne." One of the planes was shot down by enemy fire and crash-landed near the 463rd's position.
Every morning during the siege the division's artillery commanders would gather to discuss their situation and to prepare for the day ahead. Remembering Cooper's earlier boast about his battery's effectiveness against enemy tanks, at every one of the meetings either Lt. Col. Edward Car-michael, the commander of the 321st Glider Field Artillery Battalion, or the commander of the 377th Parachute Field Artillery Battalion, Lt. Col. Harry Elkins, would ask, "Cooper, have you knocked any tanks out yet?" His answer was always, "No, not yet." That was about to change.
The 24th was clear and bright although still very cold. Another 160 planes dropped an additional 100 tons of supplies. Foragers from the 463rd found flour, sugar, lard and salt that had been left by the VIII Corps when it hastily departed Bastogne at the start of the German offensive. Even though they were surrounded, the morale of the men remained high. By the afternoon of the 24th, division headquarters was convinced that an attack was likely in the 327th's sector either that day or the next. For the past week, German troops and tanks had tried to puncture holes in the 101st's defenses east and south of Bastogne. Troop deployment to defend against these attacks had weakened defenses west and north of the city. Almost half of the 101st's line was now covered by the 327th.
On Christmas Eve, the 101st's operations officer, Lt. Col. Harry W.O. Kinnard, had regrouped the defenders around the perimeter of Bastogne, a line almost 16 miles long. Kinnard attached the 326th Airborne Engineer Battalion, two platoons of the 9th Armored Engineer Battalion and four platoons of the 705th Tank Destroyer Battalion to the 327th along with an amalgam of infantry, tank destroyers and tanks.
Sergeant Rogan knew little of divisional intelligence estimates, but he could hear the sound of armored vehicles being deployed in his front as the sun went down on Christmas Eve. Unknown to him and the others huddled nearby in their foxholes, these tanks and their supporting infantry were making final preparations to come crashing through their lines early the next morning.
Rogan, Bryan and Everhardt were acting as forward observers in support of the men of the 1st Battalion, 401st Glider Infantry Regiment, which was serving as the 327th's third battalion. Nearest to the three artillerymen were the 77 men of the 401st's Company A, commanded by 1st Lt. Howard Bowles. The lieutenant's men defended a large section of the flat, frozen plain west of Hemroulle. They were deployed across a 1,200-yard front line along a ridge about 25 feet high. There were two small woods on top of the ridge about 50 yards apart, with an open field between them. One of the woods concealed two tank destroyers. Two more tank destroyers were in a group of trees some 400 yards to the left of Company A's position. Company B of the 401st was dug in on the right side of Company A on the ridge, extending about 1,100 yards to a roadblock on the Champs to Mande St. Etienne road. The troops were also armed with machine guns and supported by four tank destroyers. The battalion's Company C was kept in reserve near the 463rd's command post at Hemroulle.
Anticipating an attack along his front, Cooper positioned outpost guards with telephone communications to battalion headquarters and battery commanders. He deployed the antitank guns in mutually supporting positions. Experience had taught him that a tank will attack a gun head-on, so he had another gun that would have a side shot at any approaching tank. Each of Cooper's guns had 20 rounds of hollow charge antitank ammo to provide direct fire against enemy armor. At about 3:30 a.m., Rogan radioed his battalion's operations officer, Major Victor Garrett, that he and his supporting company had been overrun by an enemy tank column accompanied by white-capped infantrymen, some riding on the back of the panzers. He informed Garrett that the tanks were moving toward Hemroulle.
Rogan had seen 18 whitewashed Mark IV tanks belonging to the 115th Panzergrenadier Regiment of the 15th Panzergrenadier Division move through his position and pass between the two wood lots. The column was accompanied by two battalions of the 77th Panzergrenadier Regiment. Each tank had 15 or 16 infantrymen, wearing white sheets, riding on it while others walked beside the tanks. As the Germans crossed Rogan's position, they fired rifles and flamethrowers, probing and trying to identify the American frontline positions. When they pierced Company A's line, the Germans killed four Americans, including Rogan's companion Restor Bryan, and wounded five. Allowing the tanks to pass, the survivors re-emerged from their holes and prepared to do battle with the infantry that was following behind the tanks.
After driving through what he believed was the weakly held American front line, at 4:15 a.m. the German tank commander radioed headquarters that his advance was proceeding successfully. He reported that the only evidence of American resistance were pockets of enemy infantry and tank destroyer fire. A half-hour later he informed his superiors that his panzers had reached the western edge of Bastogne. German headquarters was elated, but the celebration was short lived. Word of continued progress toward that long-sought objective never came; instead, German forward observers reported hearing the crash of artillery fire and mortars from the direction of Hemroulle.
The 18 Mark IVs and their accompanying grenadiers had actually only advanced to the outskirts of Hemroulle, mistaking it for Bastogne. As they approached the road between Hemroulle and Champs, the German armored force split up. Seven of the tanks headed in the direction of Champs, while the others moved to a ridge overlooking Hemroulle and parked.
Shortly after receiving reports of the enemy attack, Garrett woke Cooper with the information that German tanks had pulled off the road near one of the 463rd's outposts. The panzers had assembled behind a line of trees on a ridge overlooking Hemroulle. Garrett informed Cooper that the enemy tank crews had dismounted and appeared to be preparing breakfast. The artillerymen counted 11 tanks and a large number of German soldiers, including all of the tank crews.
Since it was too dark to positively confirm that these were truly enemy tanks, Garrett told his men to sit tight until they could see either the muzzle brakes on the tanks' guns or the crosses painted on the side. Cooper knew that American armor was on the way to relieve Bastogne and did not want to pour fire on friendly tank crews.
The panzers were directly in front of three of the 75mm guns deployed in antitank positions, about 500 to 600 yards away. Garrett directed the gun commanders to quietly bore sight their guns on the tanks and prepare to fire as soon as they could confirm that these were indeed the enemy. Cooper's plan was to have one of the three guns shoot the first tank in the line while the other two went after the remainder. All the battery's other guns would then fire at will. Garrett spoke with the commanders of the other guns, directing them to remain quiet and not begin firing until he gave the order, "Let the **** hit the fan."
Once the tanks began to move, the artillerymen could make out the muzzle breaks on the guns, and Garrett ordered, "Let the **** hit the fan." Cooper later remarked that with those words, all hell broke loose. Several tanks were immediately disabled by the 463rd's guns, their crews scurrying from the turrets of the burning panzers.
The artillery was quickly joined by soldiers from Batteries A, B and C with bazookas, machine guns and rifles firing at the tanks and the enemy infantry around them. Since most of men of the 401st were busy with the infantry that had followed the tanks on foot, Cooper's men were part of the thin buffer blocking the German armor and infantry from the center of Bastogne, less than a mile away.
As soon as the fighting began, Cooper called division headquarters and informed them that the 463rd had been attacked and would hold out as long as possible. To the question "Cooper, are you telling me the facts, that you are under attack?" Cooper replied, "If you don't believe it, look down this way, and you will see five spirals of smoke, which represents five tanks burning--no, there are six spirals of smoke, which makes six tanks burning."
Cooper did not know how long his battalion could hold out, but he was determined that his guns would slow the enemy advance, if not stop it. By 8:30 a.m. enemy infantry had approached to within 200 yards of the 463rd's command post in Hemroulle. Cooper ordered all classified documents and the M-209 cryptographic machine destroyed. Captain Victor Tofany of Battery D and the other battery commanders ordered their men to stack their barrack bags in a pile, ready to be burned if the enemy broke through.
There was no need. The fight in and around Hemroulle ended at about 9 a.m. with the destruction of the last of the German tanks that had attacked the town. The seven panzers that had veered away from the column heading toward Champs met the same fate. Although panzers knocked out two tank destroyers from the 705th Tank Destroyer Battalion, they were themselves destroyed by a combination of fire from American tank destroyers and bazookas fired by members of the 502nd Parachute Infantry Regiment near Champs.
While his battalion fought the tanks outside of Hemroulle, Rogan had been with the remaining men from the 401st as they shut the door behind the tanks and dealt with their supporting infantry. Brought out of reserve, C Company of the 401st joined the fight against the 115th until daybreak, when American artillery and mortars could deal with the enemy infantry, which was now outlined against the snow-covered slopes west of Hemroulle. Battered by increasingly accurate American artillery fire and the small arms of the 401st, the Germans tried to dig in and hold what they had gained, but the ground was frozen. Instead, they hugged the earth and waited for the artillery to stop. During a brief lull their commander, Colonel Wolfgang Maucke, had his men retreat to a hill southeast of Flamizoulle. Allied aircraft soon began battering Maucke's isolated men. By nightfall it became clear that the German force that attacked early on Christmas morning had been almost completely destroyed, with the bulk of the men dead, wounded or captured.
Soon after the fighting ended, Carson "Booger" Childress, a member of Battery B, radioed Cooper to tell him that he had captured one of the tanks in good running order. Childress informed Cooper that when the firing started, the tank crew had tried to get into the panzer, but it was hit on the turret, killing the first man trying to enter. The rest of the tank crew members ran for cover and were later captured by the 463rd's tank stalking party, commanded by Lieutenant Ross Scott. Cooper drove out to the tank and placed a white undershirt on the tube to identify it as captured. Ever the resourceful soldier, Childress figured out how to drive the Mark IV and followed Cooper back to his headquarters. The lieutenant colonel then called Colonel Sherburne, the acting division artillery commander, and told him that he had a Christmas present for him but that he would have to personally come to pick it up.
McAuliffe, Sherburne and a few commanders of other artillery battalions later arrived to view the scene of the Christmas Day battle. As they approached the wreck of each tank, McAuliffe asked, "Which gun knocked this out?" They could clearly see ricochet marks across the snow in front of two tanks and could see the gun from which the shot was fired. McAuliffe stated, "I give you credit for these two tanks." Cooper asked him whether these tanks were knocked out or disabled. He replied, "They're damn sure destroyed and knocked out." Cooper then turned to those present, including some of the officers who had been chiding him about the ineffectiveness of pack howitzers, informing them that his battalion had knocked out and destroyed at least two tanks with direct fire. The remaining tanks had been fired on from so many directions that McAuliffe and Sherburne felt it was not possible to confirm which weapon disabled them. Even though there had been other American tanks and antitank units in the vicinity, Cooper was convinced that since his guns had all 11 panzers in their sights, they had been responsible for the destruction of the entire force moving against Hemroulle. But as some of the tanks had moved after being struck, there was no way to confirm the kills. All that could be certain by the end of the day was that 18 panzers had attacked early on Christmas morning, and by 9 a.m., all had been destroyed, disabled or captured.
When Sherburne returned to his headquarters, he prepared his after-action report with a written commendation for the 463rd. Since it was impossible to prove that his battalion had destroyed more than two tanks, Stuart Seaton, the executive officer, and Cooper decided that in their report they would claim to have knocked out two panzers and captured one. Cooper did not want to begin a controversy with Sherburne by insisting that his battalion had actually knocked out eight tanks and captured one. Years later Cooper stated, "It is immaterial to me now what anybody thinks, but the battle Christmas morning at Hemroulle was strictly a 463rd encounter." Cooper and Rogan both received Silver Stars for gallantry in the action that Christmas morning. Bryan was posthumously awarded the Bronze Star.
The next day, December 26, Lt. Gen. George S. Patton Jr.'s 4th Armored Division broke through the German ring around Bastogne. The 463rd remained in Hemroulle providing support fire around the perimeter of Bastogne until January 15, 1945, when it joined the 101st in its final push into Germany. On January 31, Cooper received orders to transfer his command to the 17th Airborne Division, the unit his battalion was originally designated to join. General Maxwell Taylor, however, intervened by stating, "The 463rd is firmly united with this [the 101st] Division and any change will result in serious loss of morale and efficiency both to the division and the battalion." Headquarters then agreed, and the "Bastard Battalion" officially became a member of the Battered Bastards of Bastogne.
historynet.com/wwii/blhightide/index3.html
To all fans, my book, "From Toccoa to the Eagle's Nest: Discoveries in the Boosteps of the Band of Brothers" is now available on Amazon, Booksurge and Alibris Thanks Dalton
Taken at the National Cryptologic Museum, NSA.
Creative Commons photo courtesy of ideonexus, please feel free to use for your own purposes.
Geheimschreiber
Although the ENIGMA remains the best know German cryptographic machine of World War II, in the early 1940's the German military introduced several new cryptographic teletypewriters known under the name Geheimschreiber - sometimes translated as "private secretary", sometimes as "secret writer".
These machines offered on-line encryption and decryption, that is plain test could be typed directly into the machine, automatically converted to encrypted text, and sent directly to the transmitter. In addtion to security, these "secret writers" provided the Germans with the ability to encrypt large volumes of test at high speed.
Learning that the Germans had named an early version of these machines SWORDFISH, the British and Americans bestowed nicknames associated with fish on the machines and the communications links in which they were used. The two most famous are TUNNY and STURGEON.
Just as they developed the Bombe to assist decryption of ENIGMA , the British developed data processing to attack the fish family of machine ciphers. (I must add: This was a whale of a job!) This led to the construction of the COLOSSUS which British historian F. H. Hinsley is "justly claimed as a pioneer programmable electronic digital computer."
The 40 (SZ40) when first encountered in 1940 was nicknamed TUNNY by the British - after a fish better known to Americans as TUNA.
The Schlüsselzusatz SZ40, manufactured by the German firm Lorenz, was used by the German Army for high-level communications, generally between Army groups. It provided on-line encryption and decryption and was capable of handling large volumes f traffic at high speed. The TUNNY depended on wheels for encryption and decryption but unlike ENIGMA it did nut substitute letters but insted encrypted elements of the electrically generated Baudot code used in normal telegraphic transmissions.
Source: National Cryptologic Museum 13 February 2009 with some hyperlinks added
i09_0214 086
Illustrating the obscure… necessarily & purposefully difficult… crossing over style of recent philosophy, this blog entry is dealing with Thoth, ancient Egyptian god,obsession of Crowley and myself being a bibliophile (snicker*), general occult idol as inventor of magic, and subject of Plato’s attention w/r/t Thoth’s role as the mythical inventor of writing, which herein Plato’s Pharmacy is thoroughly deconstructed will answer this…Who was this mythical being? The movement of the act of writing, which seeks to replace speech by producing something (an object? a symbol) new and different (the written word) that somehow retains the shape, or aura, of that which it seeks to replace (the spoken word), and generally reminds one of three card monte, where you are the mark–relating both science and magic as the defining activities of this Trickster god, who is ultimately concerned with healing.The system of these traits brings into play an original kind of logic: the figure of Thoth is opposed to its other (father, sun, life, speech, origin or orient, etc.), but as that which at once supplements and supplants it. Thoth extends or opposes by repeating or replacing. By the same token, the figure of Thoth takes shape and takes its shape from the very thing it resists and substitutes for. But it thereby opposes itself, passes into its other, and this messenger-god is truly a god of the absolute passage between opposites. If he had any identity–but he is precisely the god of nonidentity–he would be that coincidentia oppositorum to which we will soon have recourse again. In distinguishing himself from his opposite, Thoth also imitates it, becomes its sign and representative, obeys it and conforms to it, replaces it, by violence if need be. He is thus [interesting almost typo here of theus for thus] the father’s other, the father, and the subversive movement of replacement. The god of writing is thus at once his father, his son, and himself. He cannot be assigned a fixed spot in the play of differences. Sly, slippery, and masked, and intriguer and a card, like Hermes, he is neither king nor jack, but rather a sort of joker, a floating signifier, a wild card, one who puts play into play.The god of resurrection is less interested in life or death than in death as a repetition of life and life as a rehearsal of death, in the awakening of life and in the recommencement of death. This is what numbers, of which he is also the inventor and patron, mean. Thoth repeats everything in the addition of the supplement: in adding to and doubling as the sun, he is other than the sun and the same as it; other than the good and the same, etc. Always taking a place not his own, a place one could call that of the dead or the dummy, he has neither a proper place nor a proper name. His propriety or property is impropriety or inappropriateness, the floating indetermination that allows for substitution and play. Play, of which he is also the inventor, as Plato himself reminds us. It is to him that we owe the games of dice and draughts. He would be the mediating movement of dialectics if he did not also mimic it, indefinitely preventing it, through this ironic doubling, from reaching some final fulfillment or eschatological reappropriation. Thoth is never present. Nowhere does he appear in person. No being-there can properly be his own.Every act of his is marked by this unstable ambivalence. This god of calculation, arithmetic, and rational science also presides over the occult sciences, astrology and alchemy. He is the god of magic formulas that calm the sea, of secret accounts, of hidden texts: an archetype of Hermes, god of cryptography no less of every other -graphy.
Science and magic, the passage between life and death, the supplement to evil and to lack: the priviledged domain of Thoth had, finally, to be medicine. All his powers are summed up and find employment there. The god of writing, who knows how to put an end to life, can also heal the sick. And even the dead. The steles of Horus on the Crocodiles tell of how the king of the gods sends Thoth down to heal Harsiesis, who has been bitten by a snake in his mother’s absence. The god of writing is thus also a god of medicine. Of “medicine”: both a science and an occult drug. Of the remedy and the poison. The god of writing is the god of the pharmakon. And it is writing as a pharmakon that he presents to the king in the Phaedrus, with a humility as unsettling as a dare.–Jacques Derrida, Plato’s Pharmacy
From Wikipedia, the free encyclopedia
The Lockheed Martin F-22 Raptor is a fifth-generation, single-seat, twin-engine, all-weather stealth tactical fighter aircraft developed for the United States Air Force (USAF). The result of the USAF's Advanced Tactical Fighter (ATF) program, the aircraft was designed primarily as an air superiority fighter, but also has ground attack, electronic warfare, and signal intelligence capabilities. The prime contractor, Lockheed Martin, built most of the F-22's airframe and weapons systems and conducted final assembly, while Boeing provided the wings, aft fuselage, avionics integration, and training systems.
The aircraft was variously designated F-22 and F/A-22 before it formally entered service in December 2005 as the F-22A. Despite its protracted development and various operational issues, USAF officials consider the F-22 a critical component of the service's tactical air power. Its combination of stealth, aerodynamic performance, and situational awareness enable unprecedented air combat capabilities.
Service officials had originally planned to buy a total of 750 ATFs. In 2009, the program was cut to 187 operational production aircraft due to high costs, a lack of clear air-to-air missions due to delays in Russian and Chinese fighter programs, a ban on exports, and development of the more versatile F-35. The last F-22 was delivered in 2012.
Development
Origins
In 1981, the U.S. Air Force identified a requirement for an Advanced Tactical Fighter (ATF) to replace the F-15 Eagle and F-16 Fighting Falcon. Code named "Senior Sky", this air-superiority fighter program was influenced by emerging worldwide threats, including new developments in Soviet air defense systems and the proliferation of the Su-27 "Flanker"- and MiG-29 "Fulcrum"-class of fighter aircraft. It would take advantage of the new technologies in fighter design on the horizon, including composite materials, lightweight alloys, advanced flight control systems, more powerful propulsion systems, and most importantly, stealth technology. In 1983, the ATF concept development team became the System Program Office (SPO) and managed the program at Wright-Patterson Air Force Base. The demonstration and validation (Dem/Val) request for proposals (RFP) was issued in September 1985, with requirements placing strong emphasis on stealth and supercruise. Of the seven bidding companies, Lockheed and Northrop were selected on 31 October 1986. Lockheed teamed with Boeing and General Dynamics while Northrop teamed with McDonnell Douglas, and the two contractor teams undertook a 50-month Dem/Val phase, culminating in the flight test of two technology demonstrator prototypes, the YF-22 and the YF-23, respectively.
Dem/Val was focused on risk reduction and technology development plans over specific aircraft designs. Contractors made extensive use of analytical and empirical methods, including computational fluid dynamics, wind-tunnel testing, and radar cross-section calculations and pole testing; the Lockheed team would conduct nearly 18,000 hours of wind-tunnel testing. Avionics development was marked by extensive testing and prototyping and supported by ground and flying laboratories. During Dem/Val, the SPO used the results of performance and cost trade studies conducted by contractor teams to adjust ATF requirements and delete ones that were significant weight and cost drivers while having marginal value. The short takeoff and landing (STOL) requirement was relaxed in order to delete thrust-reversers, saving substantial weight. As avionics was a major cost driver, side-looking radars were deleted, and the dedicated infra-red search and track (IRST) system was downgraded from multi-color to single color and then deleted as well. However, space and cooling provisions were retained to allow for future addition of these components. The ejection seat requirement was downgraded from a fresh design to the existing McDonnell Douglas ACES II. Despite efforts by the contractor teams to rein in weight, the takeoff gross weight estimate was increased from 50,000 lb (22,700 kg) to 60,000 lb (27,200 kg), resulting in engine thrust requirement increasing from 30,000 lbf (133 kN) to 35,000 lbf (156 kN) class.
Each team produced two prototype air vehicles for Dem/Val, one for each of the two engine options. The YF-22 had its maiden flight on 29 September 1990 and in flight tests achieved up to Mach 1.58 in supercruise. After the Dem/Val flight test of the prototypes, on 23 April 1991, Secretary of the USAF Donald Rice announced the Lockheed team as the winner of the ATF competition. The YF-23 design was considered stealthier and faster, while the YF-22, with its thrust vectoring nozzles, was more maneuverable as well as less expensive and risky. The aviation press speculated that the Lockheed team's design was also more adaptable to the U.S. Navy's Navalized Advanced Tactical Fighter (NATF), but by 1992, the Navy had abandoned NATF.
Production and procurement
As the program moved to full-scale development, or the Engineering & Manufacturing Development (EMD) stage, the production version had notable differences from the YF-22, despite having a broadly similar shape. The swept-back angle of the leading edge was decreased from 48° to 42°, while the vertical stabilizers were shifted rearward and decreased in area by 20%. To improve pilot visibility, the canopy was moved forward 7 inches (18 cm), and the engine intakes moved rearward 14 inches (36 cm). The shapes of the wing and stabilator trailing edges were refined to improve aerodynamics, strength, and stealth characteristics. Increasing weight during development caused slight reductions in range and maneuver performance.
Prime contractor Lockheed Martin Aeronautics manufactured the majority of the airframe and performed final assembly at Dobbins Air Reserve Base in Marietta, Georgia; program partner Boeing Defense, Space & Security provided additional airframe components as well as avionics integration and training systems. The first F-22, an EMD aircraft with tail number 4001, was unveiled at Marietta, Georgia, on 9 April 1997, and first flew on 7 September 1997. Production, with the first lot awarded in September 2000, supported over 1,000 subcontractors and suppliers from 46 states and up to 95,000 jobs, and spanned 15 years at a peak rate of roughly two airplanes per month. In 2006, the F-22 development team won the Collier Trophy, American aviation's most prestigious award. Due to the aircraft's advanced nature, contractors have been targeted by cyberattacks and technology theft.
The USAF originally envisioned ordering 750 ATFs at a total program cost of $44.3 billion and procurement cost of $26.2 billion in fiscal year (FY) 1985 dollars, with production beginning in 1994. The 1990 Major Aircraft Review led by Secretary of Defense Dick Cheney reduced this to 648 aircraft beginning in 1996. By 1997, funding instability had further cut the total to 339, which was again reduced to 277 by 2003. In 2004, the Department of Defense (DoD) further reduced this to 183 operational aircraft, despite the USAF's preference for 381. A multi-year procurement plan was implemented in 2006 to save $15 billion, with total program cost projected to be $62 billion for 183 F-22s distributed to seven combat squadrons. In 2008, Congress passed a defense spending bill that raised the total orders for production aircraft to 187.
The first two F-22s built were EMD aircraft in the Block 1.0 configuration for initial flight testing, while the third was a Block 2.0 aircraft built to represent the internal structure of production airframes and enabled it to test full flight loads. Six more EMD aircraft were built in the Block 10 configuration for development and upgrade testing, with the last two considered essentially production quality jets. Production for operational squadrons consisted of 37 Block 20 training aircraft and 149 Block 30/35 combat aircraft; one of the Block 35 aircraft is dedicated to flight sciences at Edwards Air Force Base.
The numerous new technologies in the F-22 resulted in substantial cost overruns and delays. Many capabilities were deferred to post-service upgrades, reducing the initial cost but increasing total program cost. As production wound down in 2011, the total program cost is estimated to be about $67.3 billion, with $32.4 billion spent on Research, Development, Test and Evaluation (RDT&E) and $34.9 billion on procurement and military construction (MILCON) in then year dollars. The incremental cost for an additional F-22 was estimated at about $138 million in 2009.
Ban on exports
The F-22 cannot be exported under US federal law to protect its stealth technology and other high-tech features. Customers for U.S. fighters are acquiring earlier designs such as the F-15 Eagle and F-16 Fighting Falcon or the newer F-35 Lightning II, which contains technology from the F-22 but was designed to be cheaper, more flexible, and available for export. In September 2006, Congress upheld the ban on foreign F-22 sales. Despite the ban, the 2010 defense authorization bill included provisions requiring the DoD to prepare a report on the costs and feasibility for an F-22 export variant, and another report on the effect of F-22 export sales on U.S. aerospace industry.
Some Australian politicians and defense commentators proposed that Australia should attempt to purchase F-22s instead of the planned F-35s, citing the F-22's known capabilities and F-35's delays and developmental uncertainties. However, the Royal Australian Air Force (RAAF) determined that the F-22 was unable to perform the F-35's strike and close air support roles. The Japanese government also showed interest in the F-22 for its Replacement-Fighter program. The Japan Air Self-Defense Force (JASDF) would reportedly require fewer fighters for its mission if it obtained the F-22, thus reducing engineering and staffing costs. However, in 2009 it was reported that acquiring the F-22 would require increases to the Japanese government's defense budget beyond the historical 1 percent of its GDP. With the end of F-22 production, Japan chose the F-35 in December 2011. Israel also expressed interest, but eventually chose the F-35 because of the F-22's price and unavailability.
Production termination
Throughout the 2000s, the need for F-22s was debated, due to rising costs and the lack of relevant adversaries. In 2006, Comptroller General of the United States David Walker found that "the DoD has not demonstrated the need" for more investment in the F-22, and further opposition to the program was expressed by Secretary of Defense Donald Rumsfeld, Deputy Secretary of Defense Gordon R. England, Senator John McCain, and Chairman of U.S. Senate Committee on Armed Services Senator John Warner. The F-22 program lost influential supporters in 2008 after the forced resignations of Secretary of the Air Force Michael Wynne and the Chief of Staff of the Air Force General T. Michael Moseley.
In November 2008, Secretary of Defense Robert Gates stated that the F-22 was not relevant in post-Cold War conflicts such as irregular warfare operations in Iraq and Afghanistan, and in April 2009, under the new Obama Administration, he called for ending production in FY2011, leaving the USAF with 187 production aircraft. In July, General James Cartwright, Vice Chairman of the Joint Chiefs of Staff, stated to the Senate Committee on Armed Services his reasons for supporting termination of F-22 production. They included shifting resources to the multirole F-35 to allow proliferation of fifth-generation fighters for three service branches and preserving the F/A-18 production line to maintain the military's electronic warfare (EW) capabilities in the Boeing EA-18G Growler.[60] Issues with the F-22's reliability and availability also raised concerns. After President Obama threatened to veto further production, the Senate voted in July 2009 in favor of ending production and the House subsequently agreed to abide by the 187 production aircraft cap. Gates stated that the decision was taken in light of the F-35's capabilities, and in 2010, he set the F-22 requirement to 187 aircraft by lowering the number of major regional conflict preparations from two to one.
In 2010, USAF initiated a study to determine the costs of retaining F-22 tooling for a future Service Life Extension Program (SLEP).[66] A RAND Corporation paper from this study estimated that restarting production and building an additional 75 F-22s would cost $17 billion, resulting in $227 million per aircraft, or $54 million higher than the flyaway cost. Lockheed Martin stated that restarting the production line itself would cost about $200 million. Production tooling and associated documentation were subsequently stored at the Sierra Army Depot, allowing the retained tooling to support the fleet life cycle. There were reports that attempts to retrieve this tooling found empty containers, but a subsequent audit found that the tooling was stored as expected.
Russian and Chinese fighter developments have fueled concern, and in 2009, General John Corley, head of Air Combat Command, stated that a fleet of 187 F-22s would be inadequate, but Secretary Gates dismissed General Corley's concern. In 2011, Gates explained that Chinese fifth-generation fighter developments had been accounted for when the number of F-22s was set, and that the U.S. would have a considerable advantage in stealth aircraft in 2025, even with F-35 delays. In December 2011, the 195th and final F-22 was completed out of 8 test EMD and 187 operational aircraft produced; the aircraft was delivered to the USAF on 2 May 2012.
In April 2016, the House Armed Services Committee (HASC) Tactical Air and Land Forces Subcommittee proposed legislation that would direct the Air Force to conduct a cost study and assessment associated with resuming production of the F-22. Since the production halt directed in 2009 by then Defense Secretary Gates, lawmakers and the Pentagon noted that air warfare systems of Russia and China were catching up to those of the U.S. Lockheed Martin has proposed upgrading the Block 20 training aircraft into combat-coded Block 30/35 versions as a way to increase numbers available for deployment. On 9 June 2017, the Air Force submitted their report to Congress stating they had no plans to restart the F-22 production line due to economic and operational issues; it estimated it would cost approximately $50 billion to procure 194 additional F-22s at a cost of $206–$216 million per aircraft, including approximately $9.9 billion for non-recurring start-up costs and $40.4 billion for aircraft procurement costs.
Upgrades
The first aircraft with combat-capable Block 3.0 software flew in 2001. Increment 2, the first upgrade program, was implemented in 2005 for Block 20 aircraft onward and enabled the employment of Joint Direct Attack Munitions (JDAM). Certification of the improved AN/APG-77(V)1 radar was completed in March 2007, and airframes from production Lot 5 onward are fitted with this radar, which incorporates air-to-ground modes. Increment 3.1 for Block 30 aircraft onward provided improved ground-attack capability through synthetic aperture radar mapping and radio emitter direction finding, electronic attack and Small Diameter Bomb (SDB) integration; testing began in 2009 and the first upgraded aircraft was delivered in 2011. To address oxygen deprivation issues, F-22s were fitted with an automatic backup oxygen system (ABOS) and modified life support system starting in 2012.
Increment 3.2 for Block 35 aircraft is a two-part upgrade process; 3.2A focuses on electronic warfare, communications and identification, while 3.2B includes geolocation improvements and a new stores management system to show the correct symbols for the AIM-9X and AIM-120D.[83][84] To enable two-way communication with other platforms, the F-22 can use the Battlefield Airborne Communications Node (BACN) as a gateway. The planned Multifunction Advanced Data Link (MADL) integration was cut due to development delays and lack of proliferation among USAF platforms. The F-22 fleet is planned to start receiving Increment 3.2B as well as a software upgrade for cryptography capabilities and avionics stability in May 2019. A Multifunctional Information Distribution System-Joint (MIDS-J) radio that replaces the current Link-16 receive-only box is expected to be operational by 2020. Subsequent upgrades are also focusing on having an open architecture to enable faster future enhancements.
In 2024, funding is projected to begin for the F-22 mid-life upgrade (MLU), which is expected to include new sensors and antennas, hardware refresh, cockpit improvements, and a helmet mounted display and cuing system. Other enhancements being developed include IRST functionality for the AN/AAR-56 Missile Launch Detector (MLD) and more durable stealth coating based on the F-35's.
The F-22 was designed for a service life of 8,000 flight hours, with a $350 million "structures retrofit program". Investigations are being made for upgrades to extend their useful lives further. In the long term, the F-22 is expected to be superseded by a sixth-generation jet fighter to be fielded in the 2030s.
Design
Overview
The F-22 Raptor is a fifth-generation fighter that is considered fourth generation in stealth aircraft technology by the USAF.[91] It is the first operational aircraft to combine supercruise, supermaneuverability, stealth, and sensor fusion in a single weapons platform. The F-22 has four empennage surfaces, retractable tricycle landing gear, and clipped delta wings with reverse trailing edge sweep and leading edge extensions running to the upper outboard corner of the inlets. Flight control surfaces include leading-edge flaps, flaperons, ailerons, rudders on the canted vertical stabilizers, and all-moving horizontal tails (stabilators); for speed brake function, the ailerons deflect up, flaperons down, and rudders outwards to increase drag.
The aircraft's dual Pratt & Whitney F119-PW-100 augmented turbofan engines are closely spaced and incorporate pitch-axis thrust vectoring nozzles with a range of ±20 degrees; each engine has maximum thrust in the 35,000 lbf (156 kN) class. The F-22's thrust-to-weight ratio at typical combat weight is nearly at unity in maximum military power and 1.25 in full afterburner. Maximum speed without external stores is approximately Mach 1.8 at military power and greater than Mach 2 with afterburners.
The F-22's high cruise speed and operating altitude over prior fighters improve the effectiveness of its sensors and weapon systems, and increase survivability against ground defenses such as surface-to-air missiles. The aircraft is among only a few that can supercruise, or sustain supersonic flight without using fuel-inefficient afterburners; it can intercept targets which subsonic aircraft would lack the speed to pursue and an afterburner-dependent aircraft would lack the fuel to reach. The F-22's thrust and aerodynamics enable regular combat speeds of Mach 1.5 at 50,000 feet (15,000 m). The use of internal weapons bays permits the aircraft to maintain comparatively higher performance over most other combat-configured fighters due to a lack of aerodynamic drag from external stores. The aircraft's structure contains a significant amount of high-strength materials to withstand stress and heat of sustained supersonic flight. Respectively, titanium alloys and composites comprise 39% and 24% of the structural weight.
The F-22's aerodynamics, relaxed stability, and powerful thrust-vectoring engines give it excellent maneuverability and energy potential across its flight envelope. The airplane has excellent high alpha (angle of attack) characteristics, capable of flying at trimmed alpha of over 60° while maintaining roll control and performing maneuvers such as the Herbst maneuver (J-turn) and Pugachev's Cobra. The flight control system and full-authority digital engine control (FADEC) make the aircraft highly departure resistant and controllable, thus giving the pilot carefree handling.
Stealth
The F-22 was designed to be highly difficult to detect and track by radar. Measures to reduce radar cross-section (RCS) include airframe shaping such as alignment of edges, fixed-geometry serpentine inlets and curved vanes that prevent line-of-sight of the engine faces and turbines from any exterior view, use of radar-absorbent material (RAM), and attention to detail such as hinges and pilot helmets that could provide a radar return. The F-22 was also designed to have decreased radio emissions, infrared signature and acoustic signature as well as reduced visibility to the naked eye. The aircraft's flat thrust-vectoring nozzles reduce infrared emissions of the exhaust plume to mitigate the threat of infrared homing ("heat seeking") surface-to-air or air-to-air missiles. Additional measures to reduce the infrared signature include special topcoat and active cooling of leading edges to manage the heat buildup from supersonic flight.
Compared to previous stealth designs like the F-117, the F-22 is less reliant on RAM, which are maintenance-intensive and susceptible to adverse weather conditions. Unlike the B-2, which requires climate-controlled hangars, the F-22 can undergo repairs on the flight line or in a normal hangar. The F-22 has a Signature Assessment System which delivers warnings when the radar signature is degraded and necessitates repair. While the F-22's exact RCS is classified, in 2009 Lockheed Martin released information indicating that from certain angles the aircraft has an RCS of 0.0001 m² or −40 dBsm – equivalent to the radar reflection of a "steel marble". Effectively maintaining the stealth features can decrease the F-22's mission capable rate to 62–70%.
The effectiveness of the stealth characteristics is difficult to gauge. The RCS value is a restrictive measurement of the aircraft's frontal or side area from the perspective of a static radar. When an aircraft maneuvers it exposes a completely different set of angles and surface area, potentially increasing radar observability. Furthermore, the F-22's stealth contouring and radar absorbent materials are chiefly effective against high-frequency radars, usually found on other aircraft. The effects of Rayleigh scattering and resonance mean that low-frequency radars such as weather radars and early-warning radars are more likely to detect the F-22 due to its physical size. However, such radars are also conspicuous, susceptible to clutter, and have low precision. Additionally, while faint or fleeting radar contacts make defenders aware that a stealth aircraft is present, reliably vectoring interception to attack the aircraft is much more challenging. According to the USAF an F-22 surprised an Iranian F-4 Phantom II that was attempting to intercept an American UAV, despite Iran's assertion of having military VHF radar coverage over the Persian Gulf.
"We stand today at the brink of a revolution in cryptography" -- the first sentence from the most famous cryptographic research paper ever written. In 1976 Whit Diffie and Martin Hellman discovered Public Key Cryptography which enabled the transformation of the ancient art of cryptography into a science. The consequences of their research have had huge implications to the everyday lives of billions of people around the globe. For instance, they provided the main concepts for the realisation of security in e-commerce, online banking, cable/satellite television, online stock trading, cloud computing, mobile phone communication, and many, many, many more applications.
In retrospect, Diffie and Hellman were standing on more than just the brink of a revolution in cryptography. It was the brink of a revolution in information technology, and public key cryptography was providing the bridge that allowed us to make it a reality. Welcome to the information age.
Motorola SECTEL 3500 STU-III phone installed with VDU (video display unit).
Allows encrypted video conferences, and attaches to larger screens & better cameras via RCA video/audio inputs and outputs in rear.
Requires 40w power adapter.
Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but
Certainly!
Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.
The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.
In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.
In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.
Location:Chartley, near Hixon, Staffordshire, England, UK
Date of Photograph:18 October 2002
OS Grid Reference:SK010285
Co-ordinates:52.85399°N: 1.98659°W
This is a distant view of the remains of Chartley Castle from the A518 road to the East.
Chartley Castle is strategically sited in a valley controlling passage from the Trent-Dove waterways to the North and East and The Severn Basin to the South-West.
It was started around 900AD as a timber structure, almost certainly to pre-empt Viking excursions to West Mercia. After the Conquest a large motte and bailey were dug into shape and in 1220 Ranulph de Blondeville, 4th Earl of Chester, built a magnificent edifice of mortared stone with a circular keep defended by a curtain wall. This outer work incorporated two half-towers which still stand in a ruinous, but impressive, state. There remain also fragments of the curtain wall, a twin-towered gatehouse and an angled tower. This motte-and-bailey castle, Chartley I, passed by marriage to the Ferrers estate.
Sometime around 1485, Chartley II, a moated manor house was built 300 meters West of Chartley I, and this is the premises thought to have accommodated Mary Stuart, Queen of Scots, when she was the prisoner of Shrewsbury. Chartley I was abandoned and Leland described it as a ruin in 1545. Chartley II, a half-timbered house, was burnt down in 1781, and replaced. But the replacement also burnt in 1847.
A much larger unmoated building 500 meters West of Chartley I, was called Chartley Castle Farm, but has recently been re-designated Chartley Castle ( III ), and is a bed-and-breakfast hotel. It contains a chair cover and a set of curtains said to have been made at Chartley II by The Queen of Scots. ( In the days when it was not infra dig to use your hands ).
Chartley is indelibly associated with secret messages, early cryptographic science and Renaissance espionage.
As is of course true of all such affairs the details are unclear and remain controversial. Around the start of 1586 English Government fears of Catholic restoration intensified and new laws were introduced to provide for the execution of anyone who might benefit from, as opposed actively to perpetrate, the placing of Mary Stuart upon the Throne of England. It seems that Elizabeth’s spymaster, Sir Francis Walsingham, orchestrated or at least manipulated a plot that would implicate Mary herself, and so pave the way for her personally to be killed.
Local Catholic gentry, principally Anthony Babington, aged 25, an infatuate of Mary, and John Ballard, Jesuit, were suitably framed.
A covert line of communication was developed between Chartley and double-agent Gilbert Gifford. Enciphered letters to and from Mary were smuggled concealed within the bungs of beer barrels.
Intercepted decrypts from Mary adverted to her supporters in France, whilst replies from Babington included treasonable remarks about his non-allegiance to Elizabeth. The mathematics of the coded messages is of some considerable historical interest in itself, involving early use of inferential statistics, including frequency analyses.
In an encrypt sent to Chartley in July 1586, Babington proposed to Mary that Elizabeth be assassinated, that Spain should invade England, and that the Protestant ministers Burghley and Walsingham should be killed.
Walsingham then arrested Babington when Babington applied for a passport to go to Spain. Babington’s six co-conspirators were quickly identified, probably by torture, and they were arrested on 15th August 1586. A total of fourteen men were convicted of treason and sentenced to be hanged, drawn, and quartered. This was an obscene and horrific method of slow killing reserved for low-born male traitors. The first group of seven, including Babington and Ballard, were killed on 20th September. It is said that the weeping and screaming of the tortured men was such that Elizabeth ordered that the second batch of seven be allowed to die in the noose before being butchered.
The Queen of Scots was taken to another prison at Fotheringhay. Elizabeth Tudor signed her cousin’s death warrant and on 8th February 1587 Mary Stuart was beheaded there. So inept was the deed that the Scotswoman was alive at the third blow, the second having sliced off the top of her cranium.
It is difficult to associate the romantic and pastoral, if somnolent, Staffordshire dell of today with those lurid and baleful events.
In 1603, Elizabeth died childless; Mary’s son James, “The Wisest Fool in Christendom”, ascended the English Throne, and The United Kingdom of Great Britain was born.
Geheimschreiber
Although the ENIGMA remains the best know German cryptographic machine of World War II, in the early 1940's the German military introduced several new cryptographic teletypewriters known under the name Geheimschreiber - sometimes translated as "private secretary", sometimes as "secret writer".
These machines offered on-line encryption and decryption, that is plain test could be typed directly into the machine, automatically converted to encrypted text, and sent directly to the transmitter. In addtion to security, these "secret writers" provided the Germans with the ability to encrypt large volumes of test at high speed.
Learning that the Germans had named an early version of these machines SWORDFISH, the British and Americans bestowed nicknames associated with fish on the machines and the communications links in which they were used. The two most famous are TUNNY and STURGEON.
Just as they developed the Bombe to assist decryption of ENIGMA , the British developed data processing to attack the fish family of machine ciphers. (I must add: This was a whale of a job!) This led to the construction of the COLOSSUS which British historian F. H. Hinsley is "justly claimed as a pioneer programmable electronic digital computer."
The 40 (SZ40) when first encountered in 1940 was nicknamed TUNNY by the British - after a fish better known to Americans as TUNA.
The Schlüsselzusatz SZ40, manufactured by the German firm Lorenz, was used by the German Army for high-level communications, generally between Army groups. It provided on-line encryption and decryption and was capable of handling large volumes f traffic at high speed. The TUNNY depended on wheels for encryption and decryption but unlike ENIGMA it did nut substitute letters but insted encrypted elements of the electrically generated Baudot code used in normal telegraphic transmissions.
Source: National Cryptologic Museum 13 February 2009 with some hyperlinks added
i09_0214 088
This image is excerpted from a U.S. GAO report:
www.gao.gov/products/GAO-23-106559
Science & Tech Spotlight: Securing Data for a Post-Quantum World
The Machine used to find potential settings for enigma decrypts - as recreated for the film 'Enigma'
New Scientist magazine contacted me about this photo having seen it on flickr - and it was featured in the July 2012 edition of the magazine.
---------
Mark Farrington Photography
If you like this photo or have any feedback, please leave a comment or favorite the image - constructive comments always appreciated.
All my photos can be viewed on Mark Farrington Photography
Top Sets: Black & White Photos | Photos of Hampshire | Photos of Dorset
Geheimschreiber
Although the ENIGMA remains the best know German cryptographic machine of World War II, in the early 1940's the German military introduced several new cryptographic teletypewriters known under the name Geheimschreiber - sometimes translated as "private secretary", sometimes as "secret writer".
These machines offered on-line encryption and decryption, that is plain test could be typed directly into the machine, automatically converted to encrypted text, and sent directly to the transmitter. In addtion to security, these "secret writers" provided the Germans with the ability to encrypt large volumes of test at high speed.
Learning that the Germans had named an early version of these machines SWORDFISH, the British and Americans bestowed nicknames associated with fish on the machines and the communications links in which they were used. The two most famous are TUNNY and STURGEON.
Just as they developed the Bombe to assist decryption of ENIGMA , the British developed data processing to attack the fish family of machine ciphers. (I must add: This was a whale of a job!) This led to the construction of the COLOSSUS which British historian F. H. Hinsley is "justly claimed as a pioneer programmable electronic digital computer."
The 40 (SZ40) when first encountered in 1940 was nicknamed TUNNY by the British - after a fish better known to Americans as TUNA.
The Schlüsselzusatz SZ40, manufactured by the German firm Lorenz, was used by the German Army for high-level communications, generally between Army groups. It provided on-line encryption and decryption and was capable of handling large volumes f traffic at high speed. The TUNNY depended on wheels for encryption and decryption but unlike ENIGMA it did nut substitute letters but insted encrypted elements of the electrically generated Baudot code used in normal telegraphic transmissions.
Source: National Cryptologic Museum 13 February 2009 with some hyperlinks added
i09_0214 087
Bletchley Park és un dels llocs més fascinants de la historia del segle XX. Aquí, durant la II Guerra Mundial i buscant la manera de desxifrar els codis militars alemanys, en sorgí la informatica i els ordinadors.
Aquesta maquina xifradora alemana, molt més complicada però amb menys fama que la Enigma, era emprada per les comunicacions més importants, entre Hitler i els seus comandaments d'exèrcits. En teoria, era quasi imposible de 'petar', però els anglesos ho feren possible, i de pasada inventaren els ordinadors! Mireu la foto del Colossus aquí al costat.
es.wikipedia.org/wiki/C%c3%b3digo_Lorenz
ca.wikipedia.org/wiki/Bletchley_Park
========================================================
enlarger.myd3.com/view/4424836606?share=yes
Bletchley Park is one of the most amazing historical places related to the XX Century in general and to WWII in particular. Here, during the colossal effort to crack the german military codes, computers and computing science were born (or at least had their main intial development).
This electromechanical cypher machine was used by Hitler and his generals for the most important messages. It is much more complex and difficult to crack than the much more famous Enigma machine, but even this one was in the end broken by the people in Bletchley Park. And as a side-product, they invented the computers! Look at my picture of the Colossus for more info.
www.youtube.com/watch?v=69uSSXzlmMY&feature=related
en.wikipedia.org/wiki/Lorenz_cipher
www.jproc.ca/crypto/tunny.html
en.wikipedia.org/wiki/Bletchley_Park
www.bletchleypark.org/content/museum.rhtm
For an impresive virtual visit, take a look to these videos:
BLOCK B BLETCHLEY PARK
Block B formed part of the Government Code and Cipher School at Bletchley Park and together with Block A (Monument HOB UID 1525270) was the first purpose built brick building for office accommodation on the site. Construction was completed in August 1942 and it originally housed the Naval Section dealing with non-Enigma cryptography in Western Europe, together with associated Research and Crib Sections, Japanese Cryptography and part of Air Section which included the German call-sign Research Section. By mid 1943 the Naval Section had taken over all the building and the Air Section had moved to Block F (Monument HOB UID 1525325).
Block B is a two storey, steel-framed building with pre-cast concrete floors and roofs, and brick walls. The building is attached to Block A to the west and has a dog-leg plan, with spurs to south, to the north, and to the east of the main entrance.
After departure of the Government Code and Cipher School in 1946 Block B, together with Block A , was used as a National Service Hostel by the Ministry of Labour. In 1949 it was part of the Emergency Teacher Training College which had been set up in the park. Alterations to the building took place throughout the 1950s. In 1977 the building had been taken over by the Civil Aviation Authority (CAA) mainly for office use. Following the departure of the CAA from the site in 1993 the building became the responsibility of Bletchley Park Trust and in 2004 was refurbished as new exhibition space for the Bletchley Park National Codes Centre Museum.
Check out Renewin' Strathewen
A benevolent social hack
Now published at seldomlogical.com/2009/09/12/a-benevolent-social-hack
"I wanted Alan Turing to be raised into the pantheon of great Britons, but I felt it would be hypocritical to do so without recognising that Britain treated him so badly" [0]
Today I witnessed a social hack by a UK hacker who in the space of a month turned around 60 years of history. What did it take? A simple idea, a measure of determination, some imagination and a bit of luck. What did he achieve? He persuaded the government of the United Kingdom with the help of fellow citizens, to acknowledge the maltreatment of a deceased fellow Hacker.
What is a Hacker?
You might have heard of Hackers in the media. [1] Those pesky 12 year-old boys and their computers at it again, breaking into Government computers and causing millions of dollars damage. If you believe the media, Hackers are also responsible for numerous other electronic sins when the most likely explanation is probably a poor choice of operating system. [2] Hackers have something of an image problem. In fact the term Hacker has been hijacked and misused. It used to mean a person who playfully enjoyed puzzles, reveled in understanding complicated and building new technology. Hackers tend to be benevolent. Less interested in exploiting for gain [3], more interested in mastery and exploits to show amongst their friends. [4]
Malevolent vs Benevolent
Instead, the media cottoned onto the term Hackers to describe malevolent behaviour and the broken understanding has persisted ever since. [5] So Instead of using the correct technical term Cracker, the term Hacker has now become synonymous with bad. Here is a simple way for you to correct this. Whenever you hear the term Hacker in the media, ask yourself, "is the behaviour benevolent or malevolent?" If it's malevolent substitute Hacker for Cracker. If the behaviour is benevolent you are getting a definition closer to the original idea describing a Hacker. So to summarise, Hackers are curious and benevolent by nature, enjoy understanding the and mastering the complex and creating new technology. [6]
A social hack
Just as Hackers enjoy creating new technology, sometimes malevolent Hackers, Crackers, try to engineer people for information. [7] Exploiting the cognitive biases of humans for personal gain. [8] I can only think of a few instances of social hacks being done for good instead of evil. [9] But today, I witnessed a benevolent social hack. An example illustrating the benevolence of Hackers. An existence proof of a good "social hack". But first a short detour into technology history.
If there is a birthplace of modern hackers you might be tempted to think MIT. [10] But you'd be wrong. Modern computer technology had it's birthplace in the United Kingdom. First there was Charles Babbage. Babbage created a mechanical calculating device, Ada Lovelace supplied the software programming. The first hardware and software development team. [11] Babbage and Lovelace might have supplied the early inspiration but it took the Second World War, another 83 years [12] to encourage the theoretical framework and a complete working example of what we now know as Computers to exist. And at the centre of all this was one man, Alan Mathison Turing. [13]
Alan Mathison Turing
Turing is the original Hacker. He excelled as a mathematician, code breaker and computer scientist and had a measurable effect on the infant science of computers with the creation of the Turing machine" [14] and the thought experiment, "Intelligent Machinery". [15] Turing also designed calculating machines, part electrical, part mechanical to crack the German Enigma and numerous other algorthyms to help crack encrypted messages vital for the German war machine. [16] In the mid to late 1940's, Turing continued to apply himself to the big problem of the time, outlined in "Computing Machinery and Intelligence" [17], software for the Manchester Mark 1 [18] and developed the "Turing Test" [19] as a means to test if a machine is in fact intelligent.
Turing was clearly a man of his time, able to influence the future course of computer technology for a better world. But Turing was also a man born into the wrong time. Turing's crime was his sexuality. In a time where sexual orientation was not a choice but law, Turing was persecuted. Turing was subject to unethical medical procedures by the UK Government. The same Allied government who turned to ordinary people like Turing to help to defeat Germany. To defeat the Nazi regime and put a stop to the extermination of Jews, Gypsies, homosexuals and anyone else who didn't fit the plan for a master race.
The idea behind a social hack is to somehow change the way people behave, perceive and judge. A social hack is much harder to achieve than a playing around with technology. A social hack relies on being able to persuade other people to do something they might not originally think of, want or imagine possible. A good social hack is done to improve some aspect of society for altruistic reasons.
Recognition, gratitude, apology
Almost a month ago a UK Hacker and nerd, John Graham-Cumming, wrote about [20] a petition [21] he organising to get the UK Government to formally apologise to Alan Turing. An apology for the mistreatment he received on behalf of the government. Well almost a month later after many emails, blog posts, twits later, John persuaded the Prime Minister, Gordon Brown on behalf of the government of United Kingdom to publicly apologise to Alan Turing for his maltreatment and recognise the importance of Turing's technical and scientific contribution to the war effort and science and technology in general. [22] The most rewarding surprise is the discovery of existing members of Turing's family who now get some closure on the matter. In 2012 it will be the centenary of the birth of Turing London on June 23. [23] For nerds and people who work in computing, the Turing year is going to be big. Maybe not as big as Y2K, but big enough.
So thank you John for this benevolent "social hack". A reminder that Hackers do good things. A reminder that in a just society, people and Hackers alike should be judged by their achievements and not their race, religion, sex or orientation.
Reference
[0] ABC News, Reuters, "Brown sorry for code-breaker's 'appalling' treatment",
[Accessed Saturday, 12th September 2009]
www.abc.net.au/news/stories/2009/09/12/2683906.htm
[1] mit.edu, Bruce Stirling, "The Hacker Crackdown",
[Accessed Friday, 11th September 2009]
www.mit.edu/hacker/hacker.html
[2] Wikipedia, Storm botnet: In 2007 a Storm botnet controlled by criminal gangs estimated to total between 150,000 to 1 million PC's to enable a distributed denial of service attack. It was reported that up to 80% of the machines involved used Microsoft Windows operating system.
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Storm_botnet
[3] It has been known for Hackers have exploited their knowledge to gain access and excessive CPU access and I suspect the fascination for lock picking probably has a very practical reason behind it. Historically this was a necessity as access to precious processing time was limited. Limited enough to hack a solution. You can read more about early Hackers here by "Eric Steven Raymond", "A Brief History of Hackerdom",
[Accessed Friday, 11th September 2009]
www.catb.org/~esr/writings/cathedral-bazaar/hacker-histor...
[4] Woz.org, Steve Wozniak, "Letters-General Questions Answered (Woz on hacking)",
[Accessed Friday, 11th September 2009]
www.woz.org/letters/general/59.html
[4] The confusion between Hackers and Crackers means to use the word Hacker means Bad to most people.
[5] catb.org, Eric Steven Raymond, "The basic difference is this: hackers build things, crackers break them."
[Accessed Friday, 11th September 2009]
catb.org/~esr/faqs/hacker-howto.html#what_is
[6] Scientific American, Herbert H. Thompson, "How I Stole Someone's Identity",
[Accessed Friday, 11th September 2009]
www.scientificamerican.com/article.cfm?id=anatomy-of-a-so...
[7] Wikipedia, "A cognitive biases is a hickup in rational thought that can be used by Crackers to socially engineer a human for malevolent (bad) reasons.",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/List_of_cognitive_biases
[8] Dashes.com, Anil Dash, "Bill Gates and the Greatest Tech Hack Ever" I have a bit of trouble with this one but it's worth looking at despite the involvement of Microsoft."
[Accessed Friday, 11th September 2009]
dashes.com/anil/2008/06/bill-gates-and-the-greatest-tech-hack-ever.html
[9] mitadmissions.org, Michael Snively, "Hacking/Snively's Blog: If you've never seen "Hackers" then you're depriving yourself and should make a point of getting on that train.* I get asked about hacking at MIT a lot, which is natural;"
[Accessed Friday, 11th September 2009]
www.mitadmissions.org/topics/life/hacks_traditions/hackin...
[10] Wikipedia, Ada Lovelace, "She is mainly known for having written a description of Charles Babbage's early mechanical general-purpose computer, the analytical engine. She is today appreciated as the "first programmer" since she was writing programs—that is, encoding an algorithm in a form to be processed by a machine—for a machine that Babbage had not yet built.",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Ada_Lovelace
[11] computerhistory.org, Charles Babbage, "1849 is the year Babbage is reported to have created a version of his analytical machine."
[Accessed Friday, 11th September 2009]
http:www.computerhistory.org/babbage/ number10.gov.uk
[12] alanturing.net, "Born 23 June 1912 in London, died 7 June 1954 in Cheshire, United Kingdom. Computer scientist, mathematician and cryptographer.",
[Accessed Friday, 11th September 2009]
[13] Wikipedia, "Turing machine",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Turing_machine#Informal_description
[14] Wikipedia, "Computing Machinery and Intelligence. A paper written in 1950 for 'Mind' in which Turing discusses artificial intelligence, proposes the 'Turing test' of intelligence and asks important questions such as, 'can machines think?'",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Computing_Machinery_and_Intelligence/
[15] Wikipedia, "Cryptanalysis: Where Turing works at Bletchley Park during the Second World War in order to crack German cryptographic cyphers."
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Alan_Turing#Cryptanalysis
[16] abelard.org, A. M. Turing, "Computing machinery and intelligence"
[Accessed Friday, 11th September 2009]
www.abelard.org/turpap/turpap.php
[17] computer50.org, "Manchester Mark 1: By April 1949 was generally available for computation in scientific research in the University. With the integration of a high speed magnetic drum by the Autumn (the ancestor of today's disc) this was the first machine with a fast electronic and magnetic two-level store. It in turn was the basis of the first commercially available computer, the Ferranti Mark 1, the first machine off the production line being delivered in February 1951."
[Accessed Friday, 11th September 2009]
www.computer50.org/mark1/MM1.html22
[18] Wikipedia, "Turing test",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Alan_Turing#Early_computers_and_the...
[19] jgc.org, John Graham-Cumming, "Alan Turing deserves an apology from the British Government",
[Accessed Friday, 11th September 2009]
www.jgc.org/blog/2009/06/alan-turing-deserves-apology-fro...
[20] number10.gov.uk, John Graham-Cumming, "number10.gov.uk: E-Petitions: Submitted by John Graham-Cumming – Deadline to sign up by: 20 January 2010 – Signatures: 31,172"
[Accessed Friday, 11th September 2009]
petitions.number10.gov.uk/turing/
[21] number10.gov.uk, "Treatment of Alan Turing was 'appalling'"
[Accessed Friday, 11th September 2009]
[22] cs.swan.ac.uk, "THE ALAN TURING YEAR",
[Accessed Friday, 11th September 2009]
next >>>
Thugs dealt with. Man, it gets duller and duller every time. Can't we get something different. Like ninjas with frickin' laser beams attached to their frickin' heads? That'd be fun to fight instead of these walking punching bags. Still, now that these guys where done, me and the ladies kept searching for my old buddy Harvey. What we found was this larger than normal door painter two-tone. C'mon Harv, you're better than this....
"Hmm, no keypad or anything..."
"Maybe it's controlled by a computer somewhere else around here?"
"Good thinking, Steph. Tim, you think you can find it?"
"Can I?! You're talking to the guy who found all the hidden pivots in Assassin's Creed 3! Of course this time I don't have gamefax..."
".....dork....."
"Shutup, Steph."
"Tim, just find the computer room or whatever. We gotta stop Two Face as fast as we can, and if he's behind here--"
"You bitches ain't getting behind that door. And you ain't leaving here alive, either."
Let's see here, 1, 2...10 thugs total, all armed with melee weapons. hell, I could do this by myself. But Barbara threw a smoke pellet at them a basically ordered me to start looking for that computer. Hated leaving the ladies, but I can't necessarily say no to Babs, so I was kinda screwed either way. Besides, finding the room wasn't hard. Found it about 30 second after Babs ordered me to start looking. And just one thug guarding it, too! Too easy! Well, I say that now. Now, I have to hack this computer to open the door, if it even opens the door to begin with.
"Okay, if I randomly type on the keys really fast like in all the movies, maybe I can--"
"ROBIN! Stop messing around and open that door!"
"Sheesh! That you, Babs? Didn't know the com. link was on. Scared the crap outta me..."
"Robin, Door! Now!"
"Alright! I'm on it. Sheesh..."
Alright, just get out my Cryptographic whatchamacallit and bypass my way through the passcode, and I'm in! Now i gotta look though these codes and see what control's the door and--
"Robin, you got it yet? They keep sending more goons!"
"Hold tight! I'm searching!"
No where in these files, maybe over here. No...c'mon, gotta be around here somewhere...
"Running out of options, Robin!"
Just keep going! I almost got it!"
Not in this cluster...or this one, maybe this one...AHA!
"Got it! Go my children!"
"Nice work, Robin. See you on the other--AHH!!"
"Batgirl? Do you reed? Barbara!"
Commander Alexander (Alastair) Guthie Denniston was appointed Head of the Government Code & Cypher School (GC&CS) in 1919 after serving in its predecessor Room 40 at the Admiralty, during WWI. In 1919 Room 40 was merged with the War Office team to form GC&CS, and in 1923 the Secret Intelligence service (MI6) took over responsibility. However, the daily running of GC&CS fell to Denniston.
In June 1938 Bletchley Park had been acquired to provide a wartime home for GC&CS. In the months before the war, Denniston toured the universities recruiting 'men of professor type'. having seen the success of the Polish mathematicians in breaking the German Enigma cipher he made the crucial decision to bring in the British mathematicians, like Alan Turing, who were so vital to the Codebreakers' success.
Denniston's management style was 'light touch'; he had the ability to motivate and encourage people to get the best out of them whatever thier age or background and he was patient which was an important skill when managing his often short-tempered and quirky colleagues. Denniston also realised that the cerebral and painstaking Codebreaking work needed to be offset with relaxation and recreation. During Denniston's time as head of GC&CS, the vital cryptographic information the Poles and the French had painstakingly compiled about Enigma was passed to the Britsh and the beginning of the "special relationship" with the USA was formed.
In 1942 Denniston left Bletchley Park returning to Berkley Street in London where, as Deputy Director (Civil), he led the Diplomatic Section with great success. He remained with the Diplomatic Section past retirement age but he had been suffering from the effects of ill-health and resigned on May 1st 1945. In his retirement he taught languages at a school in Leatherhead and enjoyed time with his extended family, of which he was a well-loved and vibrant member. Denniston passed away, aged 79, on 1st January 1961; he did not survive to see the Codebreakers recieve the recognition they deserved for the vital work they had undertaken.
The Mansion at Bletchley Park houses a number of temporary and permanent exhibitions including: The Office of Alastair Denniston, Head of the Government Code and Cypher School, and the room where the US Special Relationship was born; The Library, atmospherically dressed as it would have looked during WW2 as a Naval Intelligence office and Wartime Garages, complete with WW2 vehicles.
Bletchley Park was the central site for British (and subsequently, Allied) codebreakers during World War II. It housed the Government Code and Cypher School (GC&CS), which regularly penetrated the secret communications of the Axis Powers – most importantly the German Enigma and Lorenz ciphers. According to the official historian of British Intelligence, the "Ultra" intelligence produced at Bletchley shortened the war by two to four years, and that without it the outcome of the war would have been uncertain.
Located in Milton Keynes, Buckinghamshire, Bletchley Park is open to the public, and receives hundreds of thousands of visitors annually.
The Enigma machine at Bletchley Park
PERMISSION TO USE: Please check the licence for this photo on Flickr. If the photo is marked with the Creative Commons licence, you are welcome to use this photo free of charge for any purpose including commercial. I am not concerned with how attribution is provided - a link to my flickr page or my name is fine. If used in a context where attribution is impractical, that's fine too. I enjoy seeing where my photos have been used so please send me links, screenshots or photos where possible. If the photo is not marked with the Creative Commons licence, only my friends and family are permitted to use it.
Telecomix Crypto Munitions Bureau works for the benefit of cipherspace. Cipherspace is the state of crypto anarchy. This means that your identity is anonymous as long as you stay protected. There are no identities or authorities in cipherspace, and it is not possible to enforce laws where there is no identity, or where there are no authorities.
Today there are several threats to the inhabitants of the internet. The politicians of oppressive regimes in the east and in the west, in north and south, are imposing surveillance. Surveillance of the entire networks. What people say to each other, what information is transmitted between bots and humans alike.
This aggression must be met with the strongest encryption algorithms available to modern computers. With onion and garlic routing it is possible to erect the fractal cipherspace. With distributed hash tables it is possible to create networks that has no central node. There is no one that controls the fractal cipherspace. Internet as we know it, turns into darknet.
Telecomix Crypto Munitions Bureau recommends that you use the following software: i2p, for anonymous and secure communications, Gnu Privacy Guard, for direct and verified communication. The onion router, TOR, to access the internets.
Telecomix Munitions is a defense bureau.
You can change the future of the internets by joining us in defending the networks and creating cipherspace.
You can help defending yourself and your friends, yes, all inhabitants of the networks.
By learning a few skills you can take control over technology.
Telecomix munitions are currently developing and promoting advanced security devices, which can endure even the harshest forms of government or corporation surveillance.
Your personal computer is an encryption device. Modern hardware can transform plain text to ciphertext with ease. So rapidly you barely notice the difference between unencrypted and encrypted data.
The laws of mathematics are infinitely stronger than the laws of nations and corporations, as the human laws are really only ink on paper. The laws of mathematics, on the other hand, are the laws that define our very universe. With the use of modern crypto algorithms we can use this fact to defend free speech and the integrity of both bots and humans. Information is nothing but numbers, numbers governed not by human laws, but by the laws of mathematics.
Networks that utilize the power of cryptography already exist. It will not be possible to stop the spread of the fractal cipherspace.
To find out more, come to telecomix.org or visit us in cipherspace on telecomix.i2p.
Feel free to visit my works on Deviant Art: xp0s3.deviantart.com/
Telecomix Crypto Munitions Bureau works for the benefit of cipherspace. Cipherspace is the state of crypto anarchy. This means that your identity is anonymous as long as you stay protected. There are no identities or authorities in cipherspace, and it is not possible to enforce laws where there is no identity, or where there are no authorities.
Today there are several threats to the inhabitants of the internet. The politicians of oppressive regimes in the east and in the west, in north and south, are imposing surveillance. Surveillance of the entire networks. What people say to each other, what information is transmitted between bots and humans alike.
This aggression must be met with the strongest encryption algorithms available to modern computers. With onion and garlic routing it is possible to erect the fractal cipherspace. With distributed hash tables it is possible to create networks that has no central node. There is no one that controls the fractal cipherspace. Internet as we know it, turns into darknet.
Telecomix Crypto Munitions Bureau recommends that you use the following software: i2p, for anonymous and secure communications, Gnu Privacy Guard, for direct and verified communication. The onion router, TOR, to access the internets.
Telecomix Munitions is a defense bureau.
You can change the future of the internets by joining us in defending the networks and creating cipherspace.
You can help defending yourself and your friends, yes, all inhabitants of the networks.
By learning a few skills you can take control over technology.
Telecomix munitions are currently developing and promoting advanced security devices, which can endure even the harshest forms of government or corporation surveillance.
Your personal computer is an encryption device. Modern hardware can transform plain text to ciphertext with ease. So rapidly you barely notice the difference between unencrypted and encrypted data.
The laws of mathematics are infinitely stronger than the laws of nations and corporations, as the human laws are really only ink on paper. The laws of mathematics, on the other hand, are the laws that define our very universe. With the use of modern crypto algorithms we can use this fact to defend free speech and the integrity of both bots and humans. Information is nothing but numbers, numbers governed not by human laws, but by the laws of mathematics.
Networks that utilize the power of cryptography already exist. It will not be possible to stop the spread of the fractal cipherspace.
To find out more, come to telecomix.org or visit us in cipherspace on telecomix.i2p.
Feel free to visit my works on Deviant Art: xp0s3.deviantart.com/
The Codebreakers by David Kahn
Because The Codebreakers dealt with several potentially sensitive subjects, like the National Security Agency, the US Intelligence and defense communities asked to review the manuscript prior to publication. After its review, the Department of Defense stated they "deplored the book" and "it would not be in the national interest to publish it." Kahn deleted certain portions related to NSA and the book was published without further incidence.
Source of material : National Cryptologic Museum
The Codebreakers (from Wikipedia article on David Kahn)
The Codebreakers comprehensively chronicles the history of cryptography from ancient Egypt to the time of its writing. It is widely regarded as the best account of the history of cryptography up to its publication. William Crowell, the former deputy director of the National Security Agency, was quoted in Newsday as saying "Before he (Kahn) came along, the best you could do was buy an explanatory book that usually was too technical and terribly dull." Kahn, then a journalist, was contracted to write a book on cryptology in 1961. He began writing it part-time, at one point quitting his regular job to work on it full time. The book was to include information on the National Security Agency (NSA), and according to the author James Bamford writing in 1982, the agency attempted to stop its publication, and considered various options, including publishing a negative review of Kahn's work in the press to discredit him. A committee of the United States Intelligence Board concluded that the book was "a possibly valuable support to foreign COMSEC authorities" and recommended "further low-key actions as possible, but short of legal action, to discourage Mr. Kahn or his prospective publishers". Kahn's publisher, the Macmillan company, handed over the manuscript to the Federal government for review without Kahn's permission on 4 March 1966. Kahn and Macmillan eventually agreed to remove some material from the manuscript, particularly concerning the relationship between the NSA and its British counterpart, the GCHQ.
The Codebreakers did not cover most of the history concerning the breaking of the German Enigma machine (which became public knowledge only in the 1970s). Nor did it cover the advent of strong cryptography in the public domain, beginning with the invention of public key cryptography and the specification of the Data Encryption Standard in the mid-1970s. This book was republished in 1996, and this new edition includes an additional chapter briefly covering the events since the original publication.
i09_0214 183
Telecomix Crypto Munitions Bureau works for the benefit of cipherspace. Cipherspace is the state of crypto anarchy. This means that your identity is anonymous as long as you stay protected. There are no identities or authorities in cipherspace, and it is not possible to enforce laws where there is no identity, or where there are no authorities.
Today there are several threats to the inhabitants of the internet. The politicians of oppressive regimes in the east and in the west, in north and south, are imposing surveillance. Surveillance of the entire networks. What people say to each other, what information is transmitted between bots and humans alike.
This aggression must be met with the strongest encryption algorithms available to modern computers. With onion and garlic routing it is possible to erect the fractal cipherspace. With distributed hash tables it is possible to create networks that has no central node. There is no one that controls the fractal cipherspace. Internet as we know it, turns into darknet.
Telecomix Crypto Munitions Bureau recommends that you use the following software: i2p, for anonymous and secure communications, Gnu Privacy Guard, for direct and verified communication. The onion router, TOR, to access the internets.
Telecomix Munitions is a defense bureau.
You can change the future of the internets by joining us in defending the networks and creating cipherspace.
You can help defending yourself and your friends, yes, all inhabitants of the networks.
By learning a few skills you can take control over technology.
Telecomix munitions are currently developing and promoting advanced security devices, which can endure even the harshest forms of government or corporation surveillance.
Your personal computer is an encryption device. Modern hardware can transform plain text to ciphertext with ease. So rapidly you barely notice the difference between unencrypted and encrypted data.
The laws of mathematics are infinitely stronger than the laws of nations and corporations, as the human laws are really only ink on paper. The laws of mathematics, on the other hand, are the laws that define our very universe. With the use of modern crypto algorithms we can use this fact to defend free speech and the integrity of both bots and humans. Information is nothing but numbers, numbers governed not by human laws, but by the laws of mathematics.
Networks that utilize the power of cryptography already exist. It will not be possible to stop the spread of the fractal cipherspace.
To find out more, come to telecomix.org or visit us in cipherspace on telecomix.i2p.
Feel free to visit my works on Deviant Art: xp0s3.deviantart.com/
Telecomix Crypto Munitions Bureau works for the benefit of cipherspace. Cipherspace is the state of crypto anarchy. This means that your identity is anonymous as long as you stay protected. There are no identities or authorities in cipherspace, and it is not possible to enforce laws where there is no identity, or where there are no authorities.
Today there are several threats to the inhabitants of the internet. The politicians of oppressive regimes in the east and in the west, in north and south, are imposing surveillance. Surveillance of the entire networks. What people say to each other, what information is transmitted between bots and humans alike.
This aggression must be met with the strongest encryption algorithms available to modern computers. With onion and garlic routing it is possible to erect the fractal cipherspace. With distributed hash tables it is possible to create networks that has no central node. There is no one that controls the fractal cipherspace. Internet as we know it, turns into darknet.
Telecomix Crypto Munitions Bureau recommends that you use the following software: i2p, for anonymous and secure communications, Gnu Privacy Guard, for direct and verified communication. The onion router, TOR, to access the internets.
Telecomix Munitions is a defense bureau.
You can change the future of the internets by joining us in defending the networks and creating cipherspace.
You can help defending yourself and your friends, yes, all inhabitants of the networks.
By learning a few skills you can take control over technology.
Telecomix munitions are currently developing and promoting advanced security devices, which can endure even the harshest forms of government or corporation surveillance.
Your personal computer is an encryption device. Modern hardware can transform plain text to ciphertext with ease. So rapidly you barely notice the difference between unencrypted and encrypted data.
The laws of mathematics are infinitely stronger than the laws of nations and corporations, as the human laws are really only ink on paper. The laws of mathematics, on the other hand, are the laws that define our very universe. With the use of modern crypto algorithms we can use this fact to defend free speech and the integrity of both bots and humans. Information is nothing but numbers, numbers governed not by human laws, but by the laws of mathematics.
Networks that utilize the power of cryptography already exist. It will not be possible to stop the spread of the fractal cipherspace.
To find out more, come to telecomix.org or visit us in cipherspace on telecomix.i2p.
Feel free to visit my works on Deviant Art: xp0s3.deviantart.com/
My 10yo's Girl Scout troop has asked parents to take turns teaching the girls something interesting. My turn was yesterday, and I spent a very noisy hour and half teaching them about cryptography. Did you know that fourth grade girls have LOTS of energy? The troop leader managed to find a patch for the session, a "mystery" patch. I'm pretty sure the Girl Scouts have a patch for everything...