Journal articles: 'United States. Air Force Weapons systems' – Grafiati (2024)

  • Bibliography
  • Subscribe
  • News
  • Referencing guides Blog Automated transliteration Relevant bibliographies by topics

Log in

Українська Français Italiano Español Polski Português Deutsch

We are proudly a Ukrainian website. Our country was attacked by Russian Armed Forces on Feb. 24, 2022.
You can support the Ukrainian Army by following the link: https://u24.gov.ua/. Even the smallest donation is hugely appreciated!

Relevant bibliographies by topics / United States. Air Force Weapons systems / Journal articles

To see the other types of publications on this topic, follow the link: United States. Air Force Weapons systems.

Author: Grafiati

Published: 4 June 2021

Last updated: 11 February 2022

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Consult the top 50 journal articles for your research on the topic 'United States. Air Force Weapons systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ball,S.J. "Military nuclear relations between the United States and Great Britain under the terms of the McMahon Act, 1946–1958." Historical Journal 38, no.2 (June 1995): 439–54. http://dx.doi.org/10.1017/s0018246x0001949x.

Full text

Abstract:

ABSTRACTThis article takes a fresh look at Anglo-American nuclear relations between 1946 and 1958. It concentrates on the relationship between the military establishments of the two countries in general and the ties between the United States air force and the Royal Air Force in particular. The article argues that an understanding of military relations is essential for an understanding of the high politics of the nuclear relationship. It is shown that senior officers in the armed services were the main ‘functional elite’ dealing with nuclear delivery systems and the planning for their use. Relations between these groups were personally and institutionally close and on the whole cordial. In Britain the link sustained optimism about the possibility of close nuclear co-operation in the 1940s and early 1950s and suppressed fears about the loss of nuclear independence in the late 1950s. In the United States it was recognized that military relations were an important channel through which to influence British nuclear policy. The article offers accounts, based on new archival research, of the nuclear aspect of the October 1947 Pentagon talks on the Middle East, Churchill's visit to the United States in January 1952 and the first Anglo-American joint nuclear targeting agreement – the Wilson/Alexander agreement of 12 March 1954. It reveals for the first time details of Plans E and X which equipped the RAF with American atomic and thermonuclear weapons between 1955 and 1958. The article concludes that the British nuclear force was becoming subordinated to the United States even before negotiations about Thor, Skybolt and Polaris missiles became central to the relationship.

APA, Harvard, Vancouver, ISO, and other styles

2

Hunter, Alex. "The Cycles of Defense Acquisition Reform and What Comes Next." Texas A&M Journal of Property Law 5, no.1 (October 2018): 37–56. http://dx.doi.org/10.37419/jpl.v5.i1.3.

Full text

Abstract:

Many aspects of war and national defense appear to run in cycles. Indeed, the identification and explanation of these cycles is a favorite pastime of military scholars. Historians and political scientists characterize war as alternating cycles of offensive and defensive dominance. The idea of cyclicality may in fact be hardwired into academic discussions and understandings of war. For example, early war theorist Carl von Clausewitz described an ever-changing character of war undergirded by war’s fundamentally unchanging nature. Because the dominant theoretical understanding of war is that it holds a mixture of both fixed and constantly evolving elements, our concept of war may inherently lend itself to the idea of cycles. At the same time, however, the identification of cycles in war and national defense can be seen empirically. For example, the United States defense budget since World War II is notoriously cyclical, running through peaks and troughs in constant dollar terms roughly every fifteen to twenty years. Since peak defense funding periods do not always align with periods of war, it is not the dynamics of war alone that drive cyclical United States defense budgets but a mix of phenomena that includes economic cycles. Hence, in noting the cyclical nature of many aspects of defense, historians must further investigate to determine what dynamics and constraints may be at play in driving the cycle. While commercial technology continues as a driver of acquisition speed, especially for IT; the decentralization of acquisition decision- making and the delegation of decision authority to the military de- partments will likely encourage different priority balances to emerge in different sectors of the acquisition system. The delegation of acquisition authority to the United States Army has resulted in a significant internal reorganization of its acquisition functions. The Army is, for the first time, establishing a command focused on bringing together the wide variety of acquisition stake- holders in one structure, the Army Futures Command. Army Futures Command will bring the system for deciding requirements for new capabilities together with the acquisition process. In effect, the Army consolidates acquisition responsibilities within the service more closely under the control of the Army Chief of Staff, to whom the commander of Army Futures Command will report. The Army Futures Command will pursue a new modernization strategy, built around six major priorities, and hopes to significantly accelerate the delivery of new capability. By centralizing responsibility for requirements setting and acquisition execution in one command, the Army hopes to reduce the friction (and timespan) of coordinating across the Army’s multiple major communities. By contrast, the United States Air Force plans to extend its delegation of acquisition authority from OSD by redelegating this authority down to program executive officers and empowering program managers. This redelegation may reflect the relative maturity of the Air Force’s major programs, such as the KC-46 tanker and the B-21 bomber, where the high level strategic issues are decided (notably in both cases with cost control as the major priority), and the focus is on program execution. Matters of program execution are often best handled at the program level or as close to it as possible. However, less mature parts of the Air Force acquisition portfolio, such as recent efforts to design new systems for command and control and systems de- signed to approach space as a warfighting domain, may use the same decentralized authority to achieve different objectives. Notably, Air Force acquisition executive Will Roper is using the prototyping authority granted by Congress to rapidly demonstrate critical high-performance technologies, such as hypersonic strike systems called for in the National Defense Strategy. Decentralizing and distributing acquisition authority within military departments may lead to a variety of microcosms within the acquisition system where the balance of acquisition priorities is different. Other trends, however, will impact the acquisition system across its entire scope. Another major trend is the increasing functionality of weapon systems defined by software over hardware. The capability seen in the Air Force’s flight lines, in the Army’s motor pools, or in the Navy’s homeports is increasingly determined by lines of code rather than steel and aluminum. This trend has major implications for the acquisition system because it presents challenges to its basic structure, which was originally de- signed around an industrial production model. Software-defined systems break down the boundaries around which many organizations and processes are organized. Software-based systems don’t graduate from development to production to sustainment like hardware-based systems, presenting challenges to government budgeting mechanisms that are leading to calls for new funding categories that can deal with the iterative nature of software development and production. Consider the idea that a system which can send and receive electrons may serve many purposes, such as a communications device, a sensor, a weapon, and an electronic defense system. Software-based capabilities are steadily spreading, and they are a powerful reason why Under Secretary of Defense Ellen Lord appointed a special assistant, Jeff Boleng, for software acquisition. Boleng will “help oversee the development of software development policies and standards across DoD and offer advice on commercial software development best practices to Pentagon leadership . . . .” Perhaps the perfect embodiment of this trend towards software-driven capabilities is in artificial intelligence. How this trend will affect the balance of acquisition priorities in the future is difficult to predict, but one thing seems likely: change will remain dynamic rather than static, leading to continuous acquisition reform cycles for the years to come.

APA, Harvard, Vancouver, ISO, and other styles

3

Alley,StephanieL., VhanceV.Valencia, AlfredE.Thal, and EdwardD.White. "Probabilistic Assessment of Failure for United States Air Force Building Systems." Journal of Performance of Constructed Facilities 31, no.5 (October 2017): 04017088. http://dx.doi.org/10.1061/(asce)cf.1943-5509.0001077.

Full text

APA, Harvard, Vancouver, ISO, and other styles

4

Gillingham,KentK. "The Spatial Disorientation Problem in the United States Air Force." Journal of Vestibular Research 2, no.4 (October1, 1992): 297–306. http://dx.doi.org/10.3233/ves-1992-2404.

Full text

Abstract:

Spatial disorientation (SD) in flight wastes hundreds of millions of dollars worth of defense capability annually and continues to kill aircrew. SD results primarily from inadequacies of human visual and vestibular sensory systems in the flying environment; but other factors, such as task saturation and distraction, precipitate it. The United States Air Force is conducting a three-pronged research and development effort to solve the SD problem. We are attempting 1) to elucidate further the mechanisms of visual and vestibular orientation and disorientation, 2) to develop ground-based and inflight training methods for demonstrating to pilots the potential for SD and the means of coping with it, and 3) to conceive and evaluate new ways to display flight control and performance information so that pilots can maintain accurate spatial orientation.

APA, Harvard, Vancouver, ISO, and other styles

5

Lambertson,PaulC., JohnH.Pletcher, and GaryE.Yale. "What the United States Air Force Is Doing Right About Systems Engineering." Journal of Aircraft 48, no.3 (May 2011): 771–76. http://dx.doi.org/10.2514/1.c031016.

Full text

APA, Harvard, Vancouver, ISO, and other styles

6

Hardy,DavidJ., and AllisonK.Mitrovich. "Preliminary Examination of Timesharing in United States Air Force ROTC Cadets." Perceptual and Motor Skills 107, no.1 (August 2008): 21–28. http://dx.doi.org/10.2466/pms.107.1.21-28.

Full text

APA, Harvard, Vancouver, ISO, and other styles

7

HARDY,DAVIDJ. "PRELIMINARY EXAMINATION OF TIMESHARING IN UNITED STATES AIR FORCE ROTC CADETS." Perceptual and Motor Skills 107, no.5 (2008): 21. http://dx.doi.org/10.2466/pms.107.5.21-28.

Full text

APA, Harvard, Vancouver, ISO, and other styles

8

Kellogg,RobertS., and KentK.Gillingham. "United States Air Force Experience with Simulator Sickness, Research and Training." Proceedings of the Human Factors Society Annual Meeting 30, no.5 (September 1986): 427–29. http://dx.doi.org/10.1177/154193128603000503.

Full text

Abstract:

With the advent of complex, wide-screen visual flight simulators in the United States Air Force, there has also developed a significant problem with simulator-induced sickness. This paper reviews the history of this problem in the Air Force as it is understood at present and discusses its possible impact on training. It also reviews preliminary studies conducted on one of the most advanced visual systems developed thus far, the General Electric Visual System Component Development Program (VSCDP) as well as future Air Force plans for research on this system.

APA, Harvard, Vancouver, ISO, and other styles

9

Horowitz,MichaelC. "The Ethics & Morality of Robotic Warfare: Assessing the Debate over Autonomous Weapons." Daedalus 145, no.4 (September 2016): 25–36. http://dx.doi.org/10.1162/daed_a_00409.

Full text

Abstract:

There is growing concern in some quarters that the drones used by the United States and others represent precursors to the further automation of military force through the use of lethal autonomous weapon systems (LAWS). These weapons, though they do not generally exist today, have already been the subject of multiple discussions at the United Nations. Do autonomous weapons raise unique ethical questions for warfare, with implications for just war theory? This essay describes and assesses the ongoing debate, focusing on the ethical implications of whether autonomous weapons can operate effectively, whether human accountability and responsibility for autonomous weapon systems are possible, and whether delegating life and death decisions to machines inherently undermines human dignity. The concept of LAWS is extremely broad and this essay considers LAWS in three categories: munition, platforms, and operational systems.

APA, Harvard, Vancouver, ISO, and other styles

10

Adkins, Mark, Michael Burgoon, and JayF.Nunamaker. "Using group support systems for strategic planning with the United States Air Force." Decision Support Systems 34, no.3 (February 2003): 315–37. http://dx.doi.org/10.1016/s0167-9236(02)00124-0.

Full text

APA, Harvard, Vancouver, ISO, and other styles

11

Bushey,DeanE. "Unmanned Aircraft Flights and Research at the United States Air Force Academy." Journal of Intelligent and Robotic Systems 54, no.1-3 (July9, 2008): 79–85. http://dx.doi.org/10.1007/s10846-008-9258-x.

Full text

APA, Harvard, Vancouver, ISO, and other styles

12

Beeman,MathewE., and Aubray Orduna. "An Evaluation of Education Methods Used to Train United States Air Force Air Medical Evacuation Crewmembers on Aircraft Systems." Air Medical Journal 37, no.3 (May 2018): 199–202. http://dx.doi.org/10.1016/j.amj.2018.02.008.

Full text

APA, Harvard, Vancouver, ISO, and other styles

13

Herby, Peter. "Third Session of the Review Conference of States Parties to the 1980 United Nations Convention on Certain Conventional Weapons (CCW)." International Review of the Red Cross 36, no.312 (May 1996): 361–68. http://dx.doi.org/10.1017/s002086040009001x.

Full text

Abstract:

After two years of tortuous negotiations and despite support for a total ban on anti-personnel mines by nearly half of the 51 States participating in the final session of the Review Conference of the 1980 United Nations Convention on Certain Conventional Weapons (CCW), held in Geneva from 22 April to 3 May 1996, only minimal restrictions on the use of antipersonnel landmines were finally adopted. Nine years after entry into force of amended Protocol II, anti-personnel mines will have to be detectable and those scattered outside of marked minefields, by air, artillery or other means, will have to self-destruct after 30 days. However, long-lived mines will remain available for production, export and use — including indiscriminate use. Regrettably, this modest legal response to a major international humanitarian crisis, though adopted by consensus, is unlikely to significantly reduce the horrendous level of mine casualties.

APA, Harvard, Vancouver, ISO, and other styles

14

McFarland, Tim, and Jai Galliott. "Autonomous Systems in a Military Context (Part 1)." International Journal of Robotics Applications and Technologies 4, no.2 (July 2016): 34–52. http://dx.doi.org/10.4018/ijrat.2016070103.

Full text

Abstract:

While some are reluctant to admit it, we are witnessing a fundamental shift in the way that advanced militaries conduct their core business of fighting. Increasingly autonomous ‘unmanned' systems are taking on the ‘dull, dirty and dangerous' roles in the military, leaving human war fighters to assume an oversight role or focus on what are often more cognitively demanding tasks. To this end, many military forces already hold unmanned systems that crawl, swim and fly, performing mine disposal, surveillance and more direct combat roles. Having found their way into the military force structure quite rapidly, especially in the United States, there has been extensive debate concerning the legality and ethicality of their use. These topics often converge, but what is legal will not necessarily be moral, and vice versa. The authors' contribution comes in clearly separating the two parts. In this paper, they provide a detailed survey of the legality of employing autonomous weapons systems in a military context.

APA, Harvard, Vancouver, ISO, and other styles

15

Pearson, Jay, Torrey Wagner, Justin Delorit, and Steven Schuldt. "Cost Analysis of Optimized Islanded Energy Systems in a Dispersed Air Base Conflict." Energies 13, no.18 (September8, 2020): 4677. http://dx.doi.org/10.3390/en13184677.

Full text

Abstract:

The United States Air Force has implemented a dispersed air base strategy to enhance mission effectiveness for near-peer conflicts. Asset dispersal places many smaller bases across a wide geographic area, which increases resupply requirements and logistical complexity. Hybrid energy systems reduce resupply requirements through sustainable, off-grid energy production. This paper presents a novel hybrid energy renewable delivery system (HERDS) model capable of (1) selecting the optimal hybrid energy system design that meets demand at the lowest net present cost and (2) optimizing the delivery of the selected system using existing Air Force cargo aircraft. The novelty of the model’s capabilities is displayed using Clark Air Base, Philippines as a case study. The HERDS model selected an optimal configuration consisting of a 676-kW photovoltaic array, an 1846-kWh battery system, and a 200-kW generator. This hybrid energy system predicts a 54% reduction in cost and an 88% reduction in fuel usage, as compared to the baseline Air Force system. The HERDS model is expected to support planners in their ongoing efforts to construct cost-effective sites that minimize the transport and logistic requirements associated with remote installations. Additionally, the results of this paper may be appropriate for broader civilian applications.

APA, Harvard, Vancouver, ISO, and other styles

16

Vijayalakshmi, CH. "Enhanced Capability, Reliability, and Productivity for Submerged Geophysical Mapping of Unexploded Weapons." Indonesian Journal of Electrical Engineering and Computer Science 8, no.2 (November1, 2017): 564. http://dx.doi.org/10.11591/ijeecs.v8.i2.pp564-566.

Full text

Abstract:

<p>This paper presents comes about because of innovation advancement endeavors throughout the most recent 6 years concentrated on submerged unexploded weapons (UXO) discovery and arrangement. Our approach abuses coordinated geo-referenced detecting advancements and have application for undertakings running from ports and harbor improvement to seaward vitality and wind cultivate improvement. Compelling discovery of UXO, accomplished through various innovations, uses techniques archived in the United States Air Force (USAF) Military Munitions Response Program (MMPR) Underwater Military Munitions Guidance Document, distributed in 2014. Evaluation stages and advances include: remotely worked vehicles (ROVs) for starting site observation; multibeam echo sounder (MBES) for bathymetry; sides can sonar (SSS) for ocean bottom target discovery; sub-base profiling for residue portrayal; stationary examining sonar for high resolution base conditions; attractive field mapping by means of towed, vessel-sent, base after wing or from a towed gliding stage for shallow-water settings; ROV-based optical and acoustic studies and target cross examinations; and ROV-based electromagnetic enlistment (EMI) exhibits for target cross examination and characterization. The specialized difficulties identifying with precise geo-situating of these frameworks and cases of co-enrollment results are examined in most recent 10 years, the GDC has encouraged unified control of more than 100 remotely executed ventures.</p>

APA, Harvard, Vancouver, ISO, and other styles

17

Haglund,DavidG. "Les missiles de croisière soviétiques aéroportés et la géopolitique de la défense aérienne de l’Amérique du Nord : Une nouvelle perspective du Nord canadien." Études internationales 19, no.2 (April12, 2005): 245–72. http://dx.doi.org/10.7202/702335ar.

Full text

Abstract:

Recent developments in the technology of weaponry have brought about a reconsideration of the "geopolitical" importance of Canadian northern spaces to the physical-security interests of the two superpowers, and especially of the United States. Those technological developments have been apparent in three areas : ballistic missile defence (BMD), nuclear-propelled (and sometimes-armed) submarines, and air-launched cruise missiles (ALCM). Both the BMD and nuclear-submarine issues have generated much debate of late in Canada ; considerably less attention has been accorded the analysis of developments in the domain of the ALCM. It is with this latter weapon-system and in particular with the manner in which Washington regards Soviet ALCMs, that this article is concerned. Argued here is the view that the perceived Soviet ALCM threat has been of major importance in the recent modernization of North American air-defence Systems. In addition to discussing the development and consequences of Soviet ALCMs, this article also explores the extent to which technological transformations in weapons-systems might also have the effect of achieving conceptual transformations in strategic analysis. A major sub-theme of the article is the contention that technological variables have been occasioning a reconsideration of the manner in which theorists of international relations and strategic studies have been assessing the relationship between geographical configuration and the perceived strategic significance of states. The article observes that the once-moribund field of "geopolitics" has been undergoing a modest revival among theorists, in part because of changes in those weapons technologies in discusses.

APA, Harvard, Vancouver, ISO, and other styles

18

Heaton,JohnA., AnneM.Murphy, Susan Allan, and Harald Pietz. "Legal Preparedness for Public Health Emergencies: TOPOFF 2 and other Lessons." Journal of Law, Medicine & Ethics 31, S4 (2003): 43–44. http://dx.doi.org/10.1111/j.1748-720x.2003.tb00745.x.

Full text

Abstract:

There is a fine balance between civil liberties and protection of the public’s health.Legislators, especially those in the western United States, are concerned about selling the Model State Act (“Act”) because of the loss of civil liberties. State constitutions give governors broad powers, such as declaring martial law and giving public health leaders the authority to act. State laws should consider issues such as property rights; taking of businesses and supplies; quarantine and isolation; due process; coordination among states, counties and cities; communication systems; conscription of doctors and nurses; and compensation. When two mock emergency response drills were held in New Mexico, concerns arose regarding opening records associated with dams, national laboratories, waste repositories, and three air force bases.

APA, Harvard, Vancouver, ISO, and other styles

19

Butenko,O., E.Tsuria, and S.Gordeev. "OF CREATING REMOTELY CONTROLLED COMBAT MODULES FOR LIGHT ARMORED VEHICLES." Наукові праці Державного науково-дослідного інституту випробувань і сертифікації озброєння та військової техніки, no.6 (December30, 2020): 33–41. http://dx.doi.org/10.37701/dndivsovt.6.2020.04.

Full text

Abstract:

The article substantiates the need to create a remotely controlled combat module to equip light armored vehicles (LAV) manufactured at domestic enterprises of the defense complex. The main purpose of LAV is to perform some of the tasks of combined-arms battle and its support, namely: the transportation of personnel, the elimination of enemy’s manpower out of the battle formation, patrolling on the second and third lines of defense of the Joint Forces Operation. NATO nations procure the following remotely controlled combat modules: United States - M151 Protector RWS and PROTECTOR CROWS II (manufactured by Kongsberg, Norway); United Kingdom - Enforcer (Selex Galilleo, UK) and Protector (Kongsberg, Norway); Germany - light and heavy modules FLW 100 and FLW 200 (manufactured by Krauss-Maffei, Germany). Remote controlled combat modules occupy a significant niche in the arsenal of modern ground forces. At present, the Armed Forces of Ukraine do not have remotely controlled combat modules that can be used on light armored vehicles. When developing requirements for the remotely controlled combat module, it is advisable to consider the ability to perform basic combat missions by the light armored vehicles and the characteristics of the weapons that will be integrated into the remotely controlled combat module. Weapons that a light armored vehicle is equipped with are used in close combat to solve a large number of different fire missions. The remotely controlled combat module mounted on light armored vehicles is generally used to defeat the line-of-sight targets. The characteristics of weapons that may be integrated into the remotely controlled combat module and the proposed ammunition load are considered. In order to simplify design decisions when installing the remotely controlled combat modules on light armored vehicles and for the purpose of performing the task effectively, it is necessary to solve the problem of creating remotely controlled combat modules with a much smaller weight than existing models. Integration of the aforementioned remotely controlled combat modules into light armored vehicles will allow carrying out tasks on reinforcement of checkpoints, force protection of troops, сonvoy and patrol, destruction of fortified enemy objects, reconnaissance, as well as interception and destruction of manpower and armored vehicles, outside of the battle formations. The bulk delivery of light armored vehicles to the troops will further enhance the mobility of the warfare. Light armored vehicles can be used extensively by air assault troops, mountain assault and motorized infantry formations, territorial defense units.

APA, Harvard, Vancouver, ISO, and other styles

20

O’Connor,FrancisG., AaronD.Williams, Steve Blivin, Yuval Heled, Patricia Deuster, and ScottD.Flinn. "Guidelines for Return to Duty (Play) after Heat Illness: A Military Perspective." Journal of Sport Rehabilitation 16, no.3 (August 2007): 227–37. http://dx.doi.org/10.1123/jsr.16.3.227.

Full text

Abstract:

Since Biblical times, heat injuries have been a major focus of military medical personnel. Heat illness accounts for considerable morbidity during recruit training and remains a common cause of preventable nontraumatic exertional death in the United States military. This brief report describes current regulations used by Army, Air Force, and Navy medical personnel to return active duty warfighters who are affected by a heat illness back to full duty. In addition, a description of the profile system used in evaluating the different body systems, and how it relates to military return to duty, are detailed. Current guidelines require clinical resolution, as well as a profile that that protects a soldier through repeated heat cycles, prior to returning to full duty. The Israeli Defense Force, in contrast, incorporates a heat tolerance test to return to duty those soldiers afflicted by heat stroke, which is briefly described. Future directions for U.S. military medicine are discussed.

APA, Harvard, Vancouver, ISO, and other styles

21

Tavana, Madjid, TimothyE.Busch, and EleanorL.Davis. "Modeling Operational Robustness and Resiliency with High-Level Petri Nets." International Journal of Knowledge-Based Organizations 1, no.2 (April 2011): 17–38. http://dx.doi.org/10.4018/ijkbo.2011040102.

Full text

Abstract:

Military operations are highly complex workflow systems that require careful planning and execution. The interactive complexity and tight coupling between people and technological systems has been increasing in military operations, which leads to both improved efficiency and a greater vulnerability to mission accomplishment due to attack or system failure. Although the ability to resist and recover from failure is important to many systems and processes, the robustness and resiliency of workflow management systems has received little attention in literature. The authors propose a novel workflow modeling framework using high-level Petri nets (PNs). The proposed framework is capable of both modeling structure and providing a wide range of qualitative and quantitative analysis. The concepts of self-protecting and self-healing systems are captured by the robustness and resiliency measures proposed in this study. The proposed measures are plotted in a Cartesian coordinate system; a classification scheme with four quadrants (i.e., possession, preservation, restoration, and devastation) is proposed to show the state of the system in terms of robustness and resiliency. The authors introduce an overall sustainability index for the system based on the theory of displaced ideals. The application of the methodology in the evaluation of an air tasking order generation system at the United States Air Force is demonstrated.

APA, Harvard, Vancouver, ISO, and other styles

22

Coates,S., M.Pachter, and R.Murphey. "Optimal Control of a Dubins Car with a Capture Set and the Homicidal Chauffeur Differential Game * *The views expressed in this paper are those of the authors and do not reect the o_cial policy or position of the United States Air Force, Department of Defense, or the United States Government." IFAC-PapersOnLine 50, no.1 (July 2017): 5091–96. http://dx.doi.org/10.1016/j.ifacol.2017.08.775.

Full text

APA, Harvard, Vancouver, ISO, and other styles

23

Calatayud, Richard, and Edward Szymkowiak. "Temperature and Vibration Results from Captive-Store Flight Tests Provide a Reliability Improvement Tool." Journal of the IEST 35, no.5 (September1, 1992): 33–38. http://dx.doi.org/10.17764/jiet.2.35.5.g03qp115w742x2u8.

Full text

Abstract:

The ALQ-131 electronic countermeasure (ECM) system has provided the United States Air Force with proven self protection for many of its tactical fighter aircraft. The reliability and maintainability improvements of the ALQ-131 Block II has produced a system with a mean time between failures (MTBF) of 120 to 180 hours and greater than 95 percent availability for the 390 systems in theater during the Persian Gulf war. None of the aircraft carrying the ALQ-131 Block II was shot down, and at least 60 percent of the ALQ-131 Block IIs never needed maintenance and stayed on the aircraft throughout the air campaign. Due to classic reliability and maintainability approaches, the ALQ-131 has reached this high standard, but improved understanding of the environment experienced by the system will provide the next steps in reliability improvements. The capture of measured response data, as detailed in this paper, will provide a basis for developing life cycle and customer warranty tests which will guarantee to the customer that the ALQ-131 system will continue to perform reliably from takeoff to landing, and from mission to mission through the life of the system.

APA, Harvard, Vancouver, ISO, and other styles

24

Bubnova,N. "Russian Factor in Barack Obama’s Military-Political Strategy." World Economy and International Relations, no.6 (2015): 5–17. http://dx.doi.org/10.20542/0131-2227-2015-6-5-17.

Full text

Abstract:

Upon becoming president of the United States, Barack Obama formulated the policy of reset in the U.S.-Russia relations – as part of his grand project of improving international relations on a more equitable basis, with a bigger role for diplomacy and international alliances and less reliance on unilateral actions and the use of force. As part of resetting their relationship in the military-political field, the United States and Russia were able, in the first and part of the second tenure of Obama’s presidency, to claim some major achievements in the military-political field, such as signing the New START Treaty, working on further nuclear disarmament measures, and developing bilateral anti-terrorist activities. U.S.-Russia cooperation also resulted in Russia’s agreement to open up its air space and railways for NATO transports which helped the International Coalition to conduct operation in Afghanistan in its “surge” phase and then to successfully withdraw combat units from that country. U.S.-Russia relations were also instrumental in bridging the positions of the two countries with regard to Iran’s and North Korea’s nuclear problem, with Russia and China voting alongside with the United States on UN Security Council resolutions for sanctions against North Korea and Iran to make them comply with the nuclear safeguards. Yet in various regions of the world, Obama’s policy – initially announced as an innovative breakthrough strategy proved instead to be reactive, aimed not at future perspective, but at dealing with the emerging crises on a case by case basis: in Lybia, Syria, Iraq, Afghanistan, and then finally in Ukraine. The “pivot” to the Asia-Pacific, also announced by Obama’s administration, was formulated without consideration of Russia’s interests in the region, while at the same time causing turbulence in relations with China, and was finally overshadowed by the Ukrainian crisis and then the ISIS offensive in the Middle East. The reset fell prey to the contradictions in U.S.-Russia relations which particularly exacerbated after the events in Crimea and Eastern Ukraine and led to freezing of arms control negotiations and bilateral U.S.-Russia cooperation in the military-political field. The Ukrainian crisis is likely to have long-term negative consequences, and in particular will increase hawkish tendencies in U.S. politics. Yet this does not preclude and to the contrary increases the importance of seeking ways to strengthen stability, searching for possible measures for nuclear weapons limitations which would become applicable after bilateral relations improve. U.S.-Russia cooperation remains essential for resolving key international challenges as well as major regional problems.

APA, Harvard, Vancouver, ISO, and other styles

25

Hogrefe, Christian, Peng Liu, George Pouliot, Rohit Mathur, Shawn Roselle, Johannes Flemming, Meiyun Lin, and RokjinJ.Park. "Impacts of different characterizations of large-scale background on simulated regional-scale ozone over the continental United States." Atmospheric Chemistry and Physics 18, no.5 (March16, 2018): 3839–64. http://dx.doi.org/10.5194/acp-18-3839-2018.

Full text

Abstract:

Abstract. This study analyzes simulated regional-scale ozone burdens both near the surface and aloft, estimates process contributions to these burdens, and calculates the sensitivity of the simulated regional-scale ozone burden to several key model inputs with a particular emphasis on boundary conditions derived from hemispheric or global-scale models. The Community Multiscale Air Quality (CMAQ) model simulations supporting this analysis were performed over the continental US for the year 2010 within the context of the Air Quality Model Evaluation International Initiative (AQMEII) and Task Force on Hemispheric Transport of Air Pollution (TF-HTAP) activities. CMAQ process analysis (PA) results highlight the dominant role of horizontal and vertical advection on the ozone burden in the mid-to-upper troposphere and lower stratosphere. Vertical mixing, including mixing by convective clouds, couples fluctuations in free-tropospheric ozone to ozone in lower layers. Hypothetical bounding scenarios were performed to quantify the effects of emissions, boundary conditions, and ozone dry deposition on the simulated ozone burden. Analysis of these simulations confirms that the characterization of ozone outside the regional-scale modeling domain can have a profound impact on simulated regional-scale ozone. This was further investigated by using data from four hemispheric or global modeling systems (Chemistry – Integrated Forecasting Model (C-IFS), CMAQ extended for hemispheric applications (H-CMAQ), the Goddard Earth Observing System model coupled to chemistry (GEOS-Chem), and AM3) to derive alternate boundary conditions for the regional-scale CMAQ simulations. The regional-scale CMAQ simulations using these four different boundary conditions showed that the largest ozone abundance in the upper layers was simulated when using boundary conditions from GEOS-Chem, followed by the simulations using C-IFS, AM3, and H-CMAQ boundary conditions, consistent with the analysis of the ozone fields from the global models along the CMAQ boundaries. Using boundary conditions from AM3 yielded higher springtime ozone columns burdens in the middle and lower troposphere compared to boundary conditions from the other models. For surface ozone, the differences between the AM3-driven CMAQ simulations and the CMAQ simulations driven by other large-scale models are especially pronounced during spring and winter where they can reach more than 10 ppb for seasonal mean ozone mixing ratios and as much as 15 ppb for domain-averaged daily maximum 8 h average ozone on individual days. In contrast, the differences between the C-IFS-, GEOS-Chem-, and H-CMAQ-driven regional-scale CMAQ simulations are typically smaller. Comparing simulated surface ozone mixing ratios to observations and computing seasonal and regional model performance statistics revealed that boundary conditions can have a substantial impact on model performance. Further analysis showed that boundary conditions can affect model performance across the entire range of the observed distribution, although the impacts tend to be lower during summer and for the very highest observed percentiles. The results are discussed in the context of future model development and analysis opportunities.

APA, Harvard, Vancouver, ISO, and other styles

26

Schreiner, James. "Foreword by Guest Editor LTC James H. Schreiner, PhD, PMP, CPEM." Industrial and Systems Engineering Review 8, no.1 (March6, 2021): 1. http://dx.doi.org/10.37266/iser.2020v8i1.pp1.

Full text

Abstract:

FOREWORD This special issue of the Industrial and Systems Engineering Review highlights top papers from the 2020 annual General Donald R. Keith memorial capstone conference held at the United States Military Academy in West Point, NY. The conference was certainly a first of its kind virtual conference including asynchronous delivery of paper presentations followed by synchronous question and answer sessions with evaluation panels. Following a careful review of 63 total submissions, eleven were selected for publication in this journal. Unique to this year’s special edition is the mixed selection of seven project team capstone papers, and four honors research papers. Each paper incorporated features of systems or industrial engineering and presented detailed and reflective analysis on the topic. Although there are many elements which cut across the works, three general bodies of knowledge emerged in the papers including: systems engineering and decision analysis, systems design, modeling and simulation, and system dynamics. Systems Engineering and Decision Analysis topics included three unique contributions. Recognized as ‘best paper’ at the 2020 virtual conference, the work of Robinson et al. designed a multi-year predictive cost engineering model enabled through an MS O365 Power BI decision support interface to support U.S. Army Corps of Engineer (USACE) inland waterway national investment strategies. Schloo and Mittal’s work presents research in testing and evaluation of the Engagement Skills Trainer (EST) 2000 towards improving real-world soldier performance. Gerlica et al. employs a robust and scalable K-means clustering methodology to improve decision making in defensive shift schemes for Air Force Baseball outfield personnel. Systems Design works included three unique contributions. Binney et al. worked to design evaluation criteria for military occupational specialties associated with open-source intelligence (OSINT) analysts for the Army’s OSINT Office. Hales et al. interdisciplinary work aided in the design of search and identification systems to be incorporated on autonomous robotics to enable survivability improvements for the Army’s chemical, biological, radiological, nuclear, and explosives (CBRNE) units. Burke and Connell evaluated and designed a performance measurement-based assessment methodology for U.S. Pacific Command’s Key Leader Engagement process. System modeling and simulation included three unique contributions: Arderi et al. simulated and assessed how the Hyper-Enabled Operator (HEO) project improves situational awareness for U.S. Special Forces using the Infantry Warrior Simulation (IWARS). Blanks et al. employed a VBA module and Xpress software for a scheduling optimization model for enhancement of final exam scheduling at the U.S. Air Force Academy. Kelley and Mittal utilized a Batch Run Analysis and Simulation Studio (BRASS) program to batch multiple iterations of IWARS scenarios to study the integration of autonomous systems alongside military units. Finally, two unique contributions utilizing system dynamics (SD) modeling is presented: Dixon and Krueger developed a Vensim SD model to examine how policy recommendations across Central America could restrict gang activities while positively promoting women’s involvement in society. Cromer et al. utilized systems design approaches and a K-means clustering machine learning techniques to develop SD models in support of the U.S. Africa Command and Defense Threat Reduction Agency to examine the interdependence of threats across the Horn of Africa. Thank you and congratulations to the 2020 undergraduate scholars and all authors who provided meaningful contributions through steadfast intellectual efforts in their fields of study! Well done! LTC James H. Schreiner, PhD, PMP, CPEM Program Director, Systems and Decision Sciences (SDS) Department of Systems Engineering United States Military Academy Mahan Hall, Bldg 752, Room 423 West Point, NY 10996, USA james.schreiner@westpoint.edu

APA, Harvard, Vancouver, ISO, and other styles

27

Lu, Yi, Ying Qian, Huayan Huangfu, Shuguang Zhang, and Shan Fu. "Ensuring the Safety Sustainability of Large UAS: Learning from the Maintenance Risk Dynamics of USAF MQ-1 Predator Fleet in Last Two Decades." Sustainability 11, no.4 (February21, 2019): 1129. http://dx.doi.org/10.3390/su11041129.

Full text

Abstract:

The mishap statistics of large military unmanned aerial systems (UAS) reveal that human errors and organizational flaws pose great threats to their operation safety, especially considering the future application of derived civilian types. Moreover, maintenance accidents due to human factors have reached a significant level, but have received little attention in the existing research. To ensure the safety and sustainability of large UAS, we propose a system dynamics approach to model the maintenance risk mechanisms involving organizational, human, and technical factors, which made a breakthrough in the traditional event-chain static analysis method. Using the United States Air Force (USAF) MQ-1 Predator fleet case, the derived time-domain simulation represented the risk evolution process of the past two decades and verified the rationality of the proposed model. It was identified that the effects of maintainer human factors on the accident rate exceeded those of the technical systems in a long-term view, even though the technical reliability improvements had obvious initial effects on risk reduction. The characteristics of maintainer errors should be considered in system and maintenance procedure design to prevent them in a proactive way. It is also shown that the approach-derived SD model can be developed into a semi-quantitative decision-making support tool for improving the safety of large UAS in a risk-based view of airworthiness.

APA, Harvard, Vancouver, ISO, and other styles

28

Shao, Hui, John Derber, Xiang-Yu Huang, Ming Hu, Kathryn Newman, Donald Stark, Michael Lueken, et al. "Bridging Research to Operations Transitions: Status and Plans of Community GSI." Bulletin of the American Meteorological Society 97, no.8 (August1, 2016): 1427–40. http://dx.doi.org/10.1175/bams-d-13-00245.1.

Full text

Abstract:

Abstract With a goal of improving operational numerical weather prediction (NWP), the Developmental Testbed Center (DTC) has been working with operational centers, including, among others, the National Centers for Environmental Prediction (NCEP), National Oceanic and Atmospheric Administration (NOAA), National Aeronautics and Space Administration (NASA), and the U.S. Air Force, to support numerical models/systems and their research, perform objective testing and evaluation of NWP methods, and facilitate research-to-operations transitions. This article introduces the first attempt of the DTC in the data assimilation area to help achieve this goal. Since 2009, the DTC, NCEP’s Environmental Modeling Center (EMC), and other developers have made significant progress in transitioning the operational Gridpoint Statistical Interpolation (GSI) data assimilation system into a community-based code management framework. Currently, GSI is provided to the public with user support and is open for contributions from internal developers as well as the broader research community, following the same code transition procedures. This article introduces measures and steps taken during this community GSI effort followed by discussions of encountered challenges and issues. The purpose of this article is to promote contributions from the research community to operational data assimilation capabilities and, furthermore, to seek potential solutions to stimulate such a transition and, eventually, improve the NWP capabilities in the United States.

APA, Harvard, Vancouver, ISO, and other styles

29

Duncan,BreanW., FredericW.Adrian, and EricD.Stolen. "Isolating the lightning ignition regime from a contemporary background fire regime in east-central Florida, USA." Canadian Journal of Forest Research 40, no.2 (February 2010): 286–97. http://dx.doi.org/10.1139/x09-193.

Full text

Abstract:

Anthropogenic influences have altered most fire regimes. Fire management programs often try to mimic natural fire regimes to maintain fuels and sustain native fire-dependent species. Lightning is the natural ignition source in Florida, substantiating the need for understanding lightning fire incidence. Sixteen years of lightning data (1986–2003, excluding 1987 and 2002 due to missing data) from the NASA Cloud to Ground Lightning Surveillance System and fire ignition records were used to quantify the relationship between lightning incidence and ignitions on Kennedy Space Center, Merritt Island National Wildlife Refuge, and Cape Canaveral Air Force Station. There were 230 lightning fires with an average of 14 ignitions per year, primarily in July, and only one winter ignition. Precipitation influenced the efficiency of lightning ignitions, particularly July precipitation. We found that negative polarity strikes caused the majority of ignitions. Pine flatwoods was ignited more frequently than expected given equal chance of ignition among landcover types. About half (51%) of detected fires were instantaneous ignitions and the other 49% were delayed an average of 2 days. This information is useful for paramaterizing fire regime models and for mimicking the natural fire regime through fire prescriptions on these properties and throughout the southeastern United States. These methods may be useful in fire-maintained systems globally.

APA, Harvard, Vancouver, ISO, and other styles

30

Liu, Yongqiang, Scott Goodrick, and Gary Achtemeier. "The Weather Conditions for Desired Smoke Plumes at a FASMEE Burn Site." Atmosphere 9, no.7 (July12, 2018): 259. http://dx.doi.org/10.3390/atmos9070259.

Full text

Abstract:

Weather is an important factor that determines smoke development, which is essential information for planning smoke field measurements. This study identifies the synoptic systems that would favor to produce the desired smoke plumes for the Fire and Smoke Model Evaluation Experiment (FASMEE). Daysmoke and PB-Piedmont (PB-P) models are used to simulate smoke plume evolution during the day time and smoke drainage and fog formation during the nighttime for hypothetical prescribed burns on 5–8 February 2011 at the Stewart Army Base in the southeastern United States. Daysmoke simulation is evaluated using the measured smoke plume heights of two historical prescribed burns at the Eglin Air Force Base. The simulation results of the hypothetical prescribed burns show that the smoke plume is not fully developed with low plume height during the daytime on 5 February when the burn site is under the warm, moist, and windy conditions connected to a shallow cyclonic system and a cold front. However, smoke drainage and fog are formed during the nighttime. Well-developed smoke plumes, which rise mainly vertically, extend to a majority portion of the planetary boundary layer, and have steady clear boundaries, appear on both 6 and 7 February when the air is cool but dry and calm during a transition between two low-pressure systems. The plume rises higher on the second day, mainly due to lighter winds. The smoke on 8 February shows a loose structure of large horizontal dispersion and low height after passage of a deep low-pressure system with strong cool and dry winds. Smoke drainage and fog formation are rare for the nights during 5–8 February. It is concluded that prescribed burns conducted during a period between two low-pressure systems would likely generate the desired plumes for FASMEE measurement during daytime. Meanwhile, as the fire smolders into the night, the burns would likely lead to fog formation when the burn site is located in the warm and moist section of a low-pressure system or a cold front.

APA, Harvard, Vancouver, ISO, and other styles

31

Kondratenko, Oleg. "Latin-Caribbean America in geostrategy of the Russian Federation." American History & Politics Scientific edition, no.7 (2019): 48–64. http://dx.doi.org/10.17721/2521-1706.2019.07.48-64.

Full text

Abstract:

The policy and implementation of geostrategy of the Russian Federation in relation to the countries of the Latin-Caribbean region are considered. Russia is increasingly trying to demonstrate the status of a strategic partner with respect to Latin American Caribbean countries through the conclusion of various partnership agreements. On this basis, since the 2000s, the Russian Federation has sought to regain its influence in those Latin American countries that were the traditional sphere of presence of the USSR during the Cold War. It has been established that Russia is trying to gain favour among Latin American countries by establishing economic relations, mainly of a commercial nature. The Russian Federation has significant contracts for the supply of weapons to Latin American countries and is involved in the implementation of a number of energy projects, including the construction of nuclear power plants. Russia is also trying to demonstrate its presence in the region through the manoeuvres of its long-range strategic aviation and naval forces. At the same time, Russia is resorting to the support of bankrupt Latin American regimes such as the government of N. Maduro in Venezuela. All this has only exacerbated the crisis in Venezuela and its autocratic rule and led to a double rule in the country. However, Russia risks being pushed out of the region by China and the United States, which consider Latin America as a proving ground for a strategy of geo-economic “conquest”. The key countries for implementing the strategy of restoring Russia’s presence in the region are: Cuba, Venezuela, Nicaragua and partly Brazil. The Russian Federation views these countries as strategic partners and a foothold for the further expansion of geopolitical and geo-economic influence in Latin America, as well as restrictions in the region of US influence. Against the backdrop of isolated manoeuvres by the Russian Air Force and the Navy, Moscow makes periodic statements about the rebuilding of former Soviet military bases in Latin American countries. However, such rhetoric of the Russian Federation can be regarded more as geopolitical PR in order to represent the virtual grandeur of Russia.

APA, Harvard, Vancouver, ISO, and other styles

32

GalyonDorman,SarahE. "The Effect of Corrosion Inhibitors on Environmental Fatigue Crack Growth in Al-Zn-Mg-Cu." Advanced Materials Research 891-892 (March 2014): 230–35. http://dx.doi.org/10.4028/www.scientific.net/amr.891-892.230.

Full text

Abstract:

Corrosion fatigue is an area of concern for the United States Air Force (USAF) and other Department of Defense (DoD) organizations. Often DoD corrosion prevention systems include chromate containing coatings, typically in the form of chromate conversion coatings and polymer primers. Chromate has been used successfully for many years within the DoD to prevent corrosion damage. However the environmental and personnel risks associated with chromate coatings have caused the USAF to pursue non-chromate containing corrosion prevention coatings [1]. To fully quantify chromate replacement coatings, an understanding of the effects that chromate has on corrosion fatigue crack growth rates must be fully characterized. Some researchers have shown that high levels of chromate added to 0.6 M NaCl full immersion corrosion fatigue tests on 7xxx series aluminum alloys slow the fatigue crack growth rate substantially [2,3]. The limitation of that research was that the amount of chromate present in the test solution environment was not connected to expected leach rates of chromate from polymeric coatings and a high solubility salt was used. The majority of DoD assets are protected from corrosion by polymer coatings loaded with corrosion inhibitors. For these coatings to slow fatigue crack propagation the corrosion inhibitors must become mobile as a consequence of hydration of the polymer coating matrix. Based on this mechanism of corrosion inhibitor release, the examination of atmospheric corrosion fatigue becomes important to help understand how inhibitors work in real world situations with hydrated salt layers rather than only fully immersed solutions.

APA, Harvard, Vancouver, ISO, and other styles

33

Harris,DavidT., Debbie Sakiestewa, RaymondF.Robledo, and Mark Witten. "Immunotoxicological Effects of Jp-8 Jet Fuel Exposure." Toxicology and Industrial Health 13, no.1 (January 1997): 43–55. http://dx.doi.org/10.1177/074823379701300104.

Full text

Abstract:

Chronic exposure to jet fuel has been shown to have adverse effects on human liver function, to cause emotional dysfunction, to cause abnormal electroencephalograms, to cause shortened attention spans, and to decrease sensorimotor speed (3–5). Due to the decision by the United States Air Force to implement the widespread use of JP-8 jet fuel in its operations, a thorough understanding of its potential effects upon exposed personnel is both critical and necessary. Exposure to potential environmental toxicants such as JP-8 may have significant effects on host systems beyond those readily visible (e.g., physiology, cardiology, respiratory, etc.); e.g., the immune system. Significant changes in immune consequences, even if short-lived, may have serious consequences for the exposed host that may impinge affect susceptibility to infectious agents. Major alterations in immune function that are long-lasting may result in an increased likelihood of development and/or progression of cancer, as well as autoimmune diseases. In the current study mice were exposed for 1h/day for 7 days to varying concentrations of aerosolized JP-8 jet fuel to simulate occupational exposures. Twenty-four hours after the last exposure the mice were analyzed for effects on their immune systems. It was observed that even at exposure concentrations as low as 100 mg/m3 detrimental effects on the immune system occurred. Decreases in viable immune cell numbers and immune organ weights were found. Jet fuel exposure resulted in losses of different immune cell subpopulations depending upon the immune organ being examined. Further, JP-8 exposure resulted in significantly decreased immune function, as analyzed by mitogenesis assays. Suppressed immune function could not be overcome by the addition of exogenous growth factors known to stimulate immune function. Thus, short-term, low concentration exposure of mice to JP-8 jet fuel caused significant toxicological effects on the immune system. It appears that the immune system may be the most sensitive indicator of toxicological damage due to JP-8 exposure, as effects were seen at concentrations of jet fuel that did not evidence change in other biological systems. Such changes may have significant effects on the health of the exposed individual.

APA, Harvard, Vancouver, ISO, and other styles

34

Khalili, Laleh. "THE LOCATION OF PALESTINE IN GLOBAL COUNTERINSURGENCIES." International Journal of Middle East Studies 42, no.3 (July15, 2010): 413–33. http://dx.doi.org/10.1017/s0020743810000425.

Full text

Abstract:

I begin with a pair of narratives:[Jenin] itself showed signs of the Government's wrath. It was in a shocking state, having the appearance of a front-line town in a modern war. Huge gaps were visible between the blocks of buildings and houses, while piles of rubble lay across the streets. . . . Many men had been arrested and detained, while many buildings, including shops and offices, had been demolished as a punitive measure by the military.On the fourth day, they managed to enter [the Jenin camp] because . . . this giant tank could simply run over booby traps, especially since they were very primitive booby traps. Once the army took over our street, they started shooting missiles from the air. On the fifth day they started shelling homes. A large number of people were killed or wounded. My neighbour's home was blown up by missiles . . . Close to us was a group of [detained] young men. They were handcuffed, naked, and lying on their stomachs . . . They would take each one of us and force us onto the ground, stomping on our backs and heads. One soldier would put his machine gun right on your head, and the other would tie you up.The first narrative dates from 1939, when the British finally suppressed the Arab Revolt; the second is from the Israeli counterinsurgency against Palestinians during the second intifada in 2002. What is striking about the two narratives is not only the similarity of “control” measures and the targeting of politically mobilized towns and villages across time but also the persistence of these techniques across different administrative/colonial systems. Further, these practices—house demolitions, detention of all men of a certain age, and the targeting of civilian spaces and populations—are familiar from other counterinsurgency contexts, whether British and French colonial wars in the 20th century or the 21st-century wars of the United States in Iraq and Afghanistan.

APA, Harvard, Vancouver, ISO, and other styles

35

Rolling,AugustJ., AaronR.Byerley, and CharlesF.Wisniewski. "Integrating Systems Engineering Into the USAF Academy Capstone Gas Turbine Engine Course." Journal of Engineering for Gas Turbines and Power 134, no.2 (December7, 2011). http://dx.doi.org/10.1115/1.4004397.

Full text

Abstract:

This paper is intended to serve as a template for incorporating technical management majors into a traditional engineering design course. In 2002, the Secretary of the Air Force encouraged the United States Air Force (USAF) Academy to initiate a new interdisciplinary academic major related to systems engineering. This direction was given in an effort to help meet the Air Force’s growing need for “systems” minded officers to manage the development and acquisition of its ever more complex weapons systems. The curriculum for the new systems engineering management (SEM) major is related to the “engineering of large, complex systems and the integration of the many subsystems that comprise the larger system” and differs in the level of technical content from the traditional engineering major. The program allows emphasis in specific cadet—selected engineering tracks with additional course work in human systems, operations research, and program management. Specifically, this paper documents how individual SEM majors have been integrated into aeronautical engineering design teams within a senior level capstone course to complete the preliminary design of a gas turbine engine. As the Aeronautical Engineering (AE) cadets performed the detailed engine design, the SEM cadets were responsible for tracking performance, cost, schedule, and technical risk. Internal and external student assessments indicate that this integration has been successful at exposing both the AE majors and the SEM majors to the benefits of “systems thinking” by giving all the opportunity to employ SE tools in the context of a realistic aircraft engine design project.

APA, Harvard, Vancouver, ISO, and other styles

36

Brandt, Marisa Renee. "Cyborg Agency and Individual Trauma: What Ender's Game Teaches Us about Killing in the Age of Drone Warfare." M/C Journal 16, no.6 (November6, 2013). http://dx.doi.org/10.5204/mcj.718.

Full text

Abstract:

During the War on Terror, the United States military has been conducting an increasing number of foreign campaigns by remote control using drones—also called unmanned aerial vehicles (UAVs) or remotely piloted vehicles (RPVs)—to extend the reach of military power and augment the technical precision of targeted strikes while minimizing bodily risk to American combatants. Stationed on bases throughout the southwest, operators fly weaponized drones over the Middle East. Viewing the battle zone through a computer screen that presents them with imagery captured from a drone-mounted camera, these combatants participate in war from a safe distance via an interface that resembles a video game. Increasingly, this participation takes the form of targeted killing. Despite their relative physical safety, in 2008 reports began mounting that like boots-on-the-ground combatants, many drone operators seek the services of chaplains or other mental health professionals to deal with the emotional toll of their work (Associated Press; Schachtman). Questions about the nature of the stress or trauma that drone operators experience have become a trope in news coverage of drone warfare (see Bumiller; Bowden; Saleton; Axe). This was exemplified in May 2013, when former Air Force drone pilot Brandon Bryant became a public figure after speaking to National Public Radio about his remorse for participating in targeted killing strikes and his subsequent struggle with post-traumatic stress (PTS) (Greene and McEvers). Stories like Bryant’s express American culture’s struggle to understand the role screen-mediated, remotely controlled killing plays in shifting the location of combatants’s sense of moral agency. That is, their sense of their ability to act based on their own understanding of right and wrong. Historically, one of the primary ways that psychiatry has conceptualized combat trauma has been as combatants’s psychological response losing their sense of moral agency on the battlefield (Lifton).This articleuses the popular science fiction novel Ender's Game as an analytic lens through which to examine the ways that screen-mediated warfare may result in combat trauma by investigating the ways in which it may compromise moral agency. The goal of this analysis is not to describe the present state of drone operators’s experience (see Asaro), but rather to compare and contrast contemporary public discourses on the psychological impact of screen-mediated war with the way it is represented in one of the most influential science fiction novels of all times (The book won the Nebula Award in 1985, the Hugo Award in 1986, and appears on both the Modern Library 100 Best Novels and American Library Association’s “100 Best Books for Teens” lists). In so doing, the paper aims to counter prevalent modes of critical analysis of screen-mediated war that cannot account for drone operators’s trauma. For decades, critics of postmodern warfare have denounced how fighting from inside tanks, the co*ckpits of planes, or at office desks has removed combatants from the experiences of risk and endangerment that historically characterized war (see Gray; Levidow & Robins). They suggest that screen-mediation enables not only physical but also cognitive and emotional distance from the violence of war-fighting by circ*mscribing it in a “magic circle.” Virtual worlds scholars adopted the term “magic circle” from cultural historian Johan Huizinga, who described it as the membrane that separates the time and space of game-play from those of real life (Salen and Zimmerman). While military scholars have long recognized that only 2% of soldiers can kill without hesitation (Grossman), critics of “video game wars” suggest that screen-mediation puts war in a magic circle, thereby creating cyborg human-machine assemblages capable of killing in cold blood. In other words, these critics argue that screen-mediated war distributes agency between humans and machines in such a way that human combatants do not feel morally responsible for killing. In contrast, Ender’s Game suggests that even when militaries utilize video game aesthetics to create weapons control interfaces, screen-mediation alone ultimately cannot blur the line between war and play and thereby psychically shield cyborg soldiers from combat trauma.Orson Scott Card’s 1985 novel Ender’s Game—and the 2013 film adaptation—tells the story of a young boy at an elite military academy. Set several decades after a terrible war between humans and an alien race called the buggers, the novel follows the life of a boy named Ender. At age 6, recruiters take Andrew “Ender” Wiggin from his family to begin military training. He excels in all areas and eventually enters officer training. There he encounters a new video game-like simulator in which he commands space ship battalions against increasingly complex configurations of bugger ships. At the novel’s climax, Ender's mentor, war hero Mazer Rackham, brings him to a room crowded with high-ranking military personnel in order to take his final test on the simulator. In order to win Ender opts to launch a massive bomb, nicknamed “Little Doctor”, at the bugger home world. The image on his screen of a ball of space dust where once sat the enemy planet is met by victory cheers. Mazer then informs Ender that since he began officer training, he has been remotely controlling real ships. The video game war was, "Real. Not a game" (Card 297); Ender has exterminated the bugger species. But rather than join the celebration, Ender is devastated to learn he has committed "xenocide." Screen-mediation, the novel shows, can enable people to commit acts that they would otherwise find heinous.US military advisors have used the story to set an agenda for research and development in augmented media. For example, Dr. Michael Macedonia, Chief Technology Officer of the Army Office for Simulation, Training, and Instrumentation told a reporter for the New York Times that Ender's Game "has had a lot of influence on our thinking" about how to use video game-like technologies in military operations (Harmon; Silberman; Mead). Many recent programs to develop and study video game-like military training simulators have been directly inspired by the book and its promise of being able to turn even a six-year-old into a competent combatant through well-structured human-computer interaction (Mead). However, it would appear that the novel’s moral regarding the psychological impact of actual screen-mediated combat did not dissuade military investment in drone warfare. The Air Force began using drones for surveillance during the Gulf War, but during the Global War on Terror they began to be equipped with weapons. By 2010, the US military operated over 7,000 drones, including over 200 weapons-ready Predator and Reaper drones. It now invests upwards of three-billion dollars a year into the drone program (Zucchino). While there are significant differences between contemporary drone warfare and the plot of Ender's Game—including the fact that Ender is a child, that he alone commands a fleet, that he thinks he is playing a game, and that, except for a single weapon of mass destruction, he and his enemies are equally well equipped—for this analysis, I will focus on their most important similarities: both Ender and actual drone operators work on teams for long shifts using video game-like technology to remotely control vehicles in aerial combat against an enemy. After he uses the Little Doctor, Mazer and Graff, Ender's long-time training supervisors, first work to circumvent his guilt by reframing his actions as heroic. “You're a hero, Ender. They've seen what you did, you and the others. I don't think there's a government on Earth that hasn't voted you their highest metal.” “I killed them all, didn't I?” Ender asked. “All who?” asked Graff. “The buggers? That was the idea.” Mazer leaned in close. “That's what the war was for.” “All their queens. So I killed all their children, all of everything.” “They decided that when they attacked us. It wasn't your fault. It's what had to happen.” Ender grabbed Mazer's uniform and hung onto it, pulling him down so they were face to face. “I didn't want to kill them all. I didn't want to kill anybody! I'm not a killer! […] but you made me do it, you tricked me into it!” He was crying. He was out of control. (Card 297–8)The novel up to this point has led us to believe that Ender at the very least understands that what he does in the game will be asked of him in real life. But his traumatic response to learning the truth reveals that he was in the magic circle. When he thinks he is playing a game, succeeding is a matter of ego: he wants to be the best, to live up to the expectations of his trainers that he is humanity’s last hope. When the magic circle is broken, Ender reconsiders his decision to use the Little Doctor. Tactics he could justify to win the game, reframed as real military tactics, threaten his sense of himself as a moral agent. Being told he is a hero provides no solace.Card wrote the novel during the Cold War, when computers were coming to play an increasingly large role in military operations. Historians of military technology have shown that during this time human behavior began to be defined in machine-like, functionalist terms by scientists working on cybernetic systems (see Edwards; Galison; Orr). Human skills were defined as components of large technological systems, such as tanks and anti-aircraft weaponry: a human skill was treated as functionally the same as a machine one. The only issue of importance was how all the components could work together in order to meet strategic goals—a cybernetic problem. The reasons that Mazer and Graff have for lying to Ender suggest that the author believed that as a form of technical augmentation, screen-mediation can be used to evacuate individual moral agency and submit human will to the command of the larger cybernetic system. Issues of displaced agency in the military cyborg assemblage are apparent in the following quote, in which Mazer compares Ender himself to the bomb he used to destroy the bugger home world: “You had to be a weapon, Ender. Like a gun, like the Little Doctor, functioning perfectly but not knowing what you were aimed at. We aimed you. We're responsible. If there was something wrong, we did it” (298). Questions of distributed agency have also surfaced in the drone debates. Government and military leaders have attempted to depersonalize drone warfare by assuring the American public that the list of targets is meticulously researched: drones kill those who we need killed. Drone warfare, media theorist Peter Asaro argues, has “created new and complex forms of human-machine subjectivity” that cannot be understood by considering the agency of the technology alone because it is distributed between humans and machines (25). While our leaders’s decisions about who to kill are central to this new cyborg subjectivity, the operators who fire the weapons nevertheless experience at least a retrospective sense of agency. As phenomenologist John Protevi notes, in the wake of wars fought by modern military networks, many veterans diagnosed with PTS still express guilt and personal responsibility for the outcomes of their participation in killing (Protevi). Mazer and Graff explain that the two qualities that make Ender such a good weapon also create an imperative to lie to him: his compassion and his innocence. For his trainers, compassion means a capacity to truly think like others, friend or foe, and understand their motivations. Graff explains that while his trainers recognized Ender's compassion as an invaluable tool, they also recognized that it would preclude his willingness to kill.It had to be a trick or you couldn't have done it. It's the bind we were in. We had to have a commander with so much empathy that he would think like the buggers, understand them and anticipate them. So much compassion that he could win the love of his underlings and work with them like a perfect machine, as perfect as the buggers. But somebody with that much compassion could never be the killer we needed. Could never go into battle willing to win at all costs. If you knew, you couldn't do it. If you were the kind of person who would do it even if you knew, you could never have understood the buggers well enough. (298)In learning that the game was real, Ender learns that he was not merely coming to understand a programmed simulation of bugger behavior, but their actual psychology. Therefore, his compassion has not only helped him understand the buggers’ military strategy, but also to identify with them.Like Ender, drone operators spend weeks or months following their targets, getting to know them and their routines from a God’s eye perspective. They both also watch the repercussions of their missions on screen. Unlike fighter pilots who drop bombs and fly away, drone operators use high-resolution cameras and fly much closer to the ground both when flying and assessing the results of their strikes. As one drone operator interviewed by the Los Angeles Times explained, "When I flew the B-52, it was at 30,000 to 40,000 feet, and you don't even see the bombs falling … Here, you're a lot closer to the actual fight, or that's the way it seems" (Zucchino). Brookings Institute scholar Peter Singer has argued that in this way screen mediation actually enables a more intimate experience of violence for drone operators than airplane pilots (Singer).The second reason Ender’s trainers give for lying is that they need someone not only compassionate, but also innocent of the horrors of war. The war veteran Mazer explains: “And it had to be a child, Ender,” said Mazer. “You were faster than me. Better than me. I was too old and cautious. Any decent person who knows what warfare is can never go into battle with a whole heart. But you didn't know. We made sure you didn't know" (298). When Ender discovers what he has done, he loses not only his innocence but his sense of himself as a moral agent. After such a trauma, his heart is no longer whole.Actual drone operators are, of course, not kept in a magic circle, innocent of the repercussions of their actions. Nor do they otherwise feel as though they are playing, as several have publicly stated. Instead, they report finding drone work tedious, and some even play video games for fun (Asaro). However, Air Force recruitment advertising makes clear analogies between the skills they desire and those of video game play (Brown). Though the first generations of drone operators were pulled from the ranks of flight pilots, in 2009 the Air Force began training them from the ground. Many drone operators, then, enter the role having no other military service and may come into it believing, on some level, that their work will be play.Recent military studies of drone operators have raised doubts about whether drone operators really experience high rates of trauma, suggesting that the stresses they experience are seated instead in occupational issues like long shifts (Ouma, Chappelle, and Salinas; Chappelle, Psy, and Salinas). But several critics of these studies have pointed out that there is a taboo against speaking about feelings of regret and trauma in the military in general and among drone operators in particular. A PTS diagnosis can end a military career; given the Air Force’s career-focused recruiting emphasis, it makes sense that few would come forward (Dao). Therefore, it is still important to take drone operator PTS seriously and try to understand how screen-mediation augments their experience of killing.While critics worry that warfare mediated by a screen and joystick leads to a “‘Playstation’ mentality towards killing” (Alston 25), Ender's Game presents a theory of remote-control war wherein this technological redistribution of the act of killing does not, in itself, create emotional distance or evacuate the killer’s sense of moral agency. In order to kill, Ender must be distanced from reality as well. While drone operators do not work shielded by the magic circle—and therefore do not experience the trauma of its dissolution—every day when they leave the cyborg assemblage of their work stations and rejoin their families they still have to confront themselves as individual moral agents and bear their responsibility for ending lives. In both these scenarios, a human agent’s combat trauma serves to remind us that even when their bodies are physically safe, war is hell for those who fight. This paper has illustrated how a science fiction story can be used as an analytic lens for thinking through contemporary discourses about human-technology relationships. However, the US military is currently investing in drones that are increasingly autonomous from human operators. This redistribution of agency may reduce incidence of PTS among operators by decreasing their role in, and therefore sense of moral responsibility for, killing (Axe). Reducing mental illness may seem to be a worthwhile goal, but in a world wherein militaries distribute the agency for killing to machines in order to reduce the burden on humans, societies will have to confront the fact that combatants’s trauma cannot be a compass by which to measure the morality of wars. Too often in the US media, the primary stories that Americans are told about the violence of their country’s wars are those of their own combatants—not only about their deaths and physical injuries, but their suicide and PTS. To understand war in such a world, we will need new, post-humanist stories where the cyborg assemblage and not the individual is held accountable for killing and morality is measured in lives taken, not rates of mental illness. ReferencesAlston, Phillip. “Report of the Special Rapporteur on Extrajudicial, Summary, or Arbitrary Executions, Addendum: Study on Targeted Killings.” United Nations Human Rights Council (2010). Asaro, Peter M. “The Labor of Surveillance and Bureaucratized Killing: New Subjectivities of Military Drone Operators”. Social Semiotics 23.2 (2013): 196-22. Associated Press. “Predator Pilots Suffering War Stress.” Military.com 2008. Axe, David. “How to Prevent Drone Pilot PTSD: Blame the ’Bot.” Wired June 2012.Bowden, Mark. “The Killing Machines: How to Think about Drones.” The Atlantic Sep. 2013.Brown, Melissa T. Enlisting Masculinity: The Construction of Gender in US Military Recruiting Advertising during the All-Volunteer Force. London: Oxford University Press, 2012. Bumiller, Elisabeth. “Air Force Drone Operators Report High Levels of Stress.” New York Times 18 Dec. 2011: n. pag. Card, Orson Scott. Ender’s Game. Tom Doherty Associates, Inc., 1985. Chappelle, Wayne, D. Psy, and Amber Salinas. “Psychological Health Screening of Remotely Piloted Aircraft (RPA) Operators and Supporting Units.” Paper presented at the Symposium on Mental Health and Well-Being across the Military Spectrum, Bergen, Norway, 12 April 2011: 1–12. Dao, James. “Drone Pilots Are Found to Get Stress Disorders Much as Those in Combat Do.” New York Times 22 Feb. 2013: n. pag. Edwards, Paul N. The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge: MIT Press, 1997.Galison, Peter. “The Ontology of the Enemy: Norbert Wiener and the Cybernetic Vision.” Critical Inquiry 21.1 (1994): 228.Gray, Chris Hables “Posthuman Soldiers in Postmodern War.” Body & Society 9.4 (2003): 215–226. 27 Nov. 2010.Greene, David, and Kelly McEvers. “Former Air Force Pilot Has Cautionary Tales about Drones.” National Public Radio 10 May 2013.Grossman, David. On Killing. Revised. Boston: Back Bay Books, 2009. Harmon, Amy. “More than Just a Game, But How Close to Reality?” New York Times 3 Apr. 2003: n. pag. Levidow, Les, and Robins. Cyborg Worlds: The Military Information Society. London: Free Association Books, 1989. Lifton, Robert Jay. Home from the War: Vietnam Veterans: Neither Victims nor Executioners. New York: Random House, 1973. Mead, Corey. War Play: Video Games and the Future of Armed Conflict. Boston: Houghton Mifflin Harcourt, 2013. Orr, Jackie. Panic Diaries: A Genealogy of Panic Disorder. Durham: Duke University Press, 2006.Ouma, J.A., W.L. Chappelle, and A. Salinas. Facets of Occupational Burnout among US Air Force Active Duty and National Guard/Reserve MQ-1 Predator and MQ-9 Reaper Operators. Air Force Research Labs Technical Report AFRL-SA-WP-TR-2011-0003. Wright-Patterson AFB, OH: Air Force Research Laboratory. 2011.Protevi, John. “Affect, Agency and Responsibility: The Act of Killing in the Age of Cyborgs.” Phenomenology and the Cognitive Sciences 7.3 (2008): 405–413. Salen, Katie, and Eric Zimmerman. Rules of Play: Game Design Fundamentals. Cambridge, MA: MIT Press, 2003. Saleton, William. “Ghosts in the Machine: Do Remote-Control War Pilots Get Combat Stress?” Slate.com Aug. 2008. Schachtman, Nathan. “Shrinks Help Drone Pilots Cope with Robo-Violence.” Wired Aug. 2008.Silberman, Steve. “The War Room.” Wired Sep. 2004: 1–5.Singer, P.W. Wired for War: The Robotics Revolution and Conflict in the Twenty-First Century. New York: Penguin Press, 2009. Zucchino, David. “Drone Pilots Have Front-Row Seat on War, from Half a World Away.” Los Angeles Times 21 Feb. 2010: n. pag.

APA, Harvard, Vancouver, ISO, and other styles

37

"United States Strikes Syrian Government Airbase in Response to Chemical Weapons Attacks by Syrian Forces; Two Additional Strikes on Syrian Government Forces Justified by Defense of Troops Rationale." American Journal of International Law 111, no.3 (July 2017): 781–87. http://dx.doi.org/10.1017/ajil.2017.59.

Full text

Abstract:

On April 6, 2017, the United States launched air strikes against a Syrian government airfield, marking a new development in Syria's long-running civil war. U.S. involvement in the conflict had previously been limited to the provision of indirect support for some rebels and the use of direct force against certain nonstate actors, particularly Islamic State of Iraq and the Levant (ISIL). This changed in the wake of April 4, however, when a rebel-held town was hit by a nerve gas attack that killed more than eighty people—including at least thirty children—and injured hundreds more. The attack used Sarin or a Sarin-like substance, which causes death by asphyxiation, often accompanied by blue facial skin and foaming at the mouth. The United States concluded, along with many other states and the NGO Human Rights Watch, that the attack was perpetrated by Syria's Assad regime.

APA, Harvard, Vancouver, ISO, and other styles

38

Zvedre, Yevgeny. "In Search of a Legal Solution to the Weaponisation of Space: A Russian Perspective." National Security Journal, July9, 2020. http://dx.doi.org/10.36878/nsj20200201.06.

Full text

Abstract:

This article is primarily focused on the diplomatic efforts aimed at preventing the weaponisation of outer space, or development of weapon systems designed to destroy targets, either orbital or terrestrial, or from the ground in outer space. Along with that, a number of anti-satellite weapon projects that both the United States (US) and the Soviet Union/Russia have been developing since the 1950s are briefly described as examples of their military competition in space. Highlighted is the work that has been done within the United Nations (UN) context to develop a corpus of universal principles and norms governing international exploration of outer space as the common heritage of humankind, free from the use of force. The author also highlights the positive role that arms control treaties have been playing in preventing deployment of weapons in space. Particular emphasis is given to the potential consequences for global security should attack weapons appear in outer space, and to the importance of a further targeted effort by the international community to work out additional regulations strengthening space security. In this regard, draft treaties on the prevention of weapons in space introduced by Russia and China, and the European Union’s International Code of conduct for Space are emphasised.

APA, Harvard, Vancouver, ISO, and other styles

39

Vlajic, Nicholas, Melissa Davis, and Corey Stambaugh. "Nanometer Positional Control Using Magnetic Suspension for Vacuum-to-Air Mass Metrology." Journal of Dynamic Systems, Measurement, and Control 140, no.12 (July2, 2018). http://dx.doi.org/10.1115/1.4040504.

Full text

Abstract:

This paper explains the control scheme that is to be used in the magnetic suspension mass comparator (MSMC), an instrument designed to directly compare mass artifacts in air to those in vacuum, at the United States National Institute of Standards and Technology. More specifically, the control system is used to apply a magnetic force between two chambers to magnetically suspend the mass artifacts, which allows for a direct comparison (i.e., a calibration) between the mass held in air and a mass held in vacuum. Previous control efforts that have been demonstrated on a proof-of-concept (POC) of this system utilized proportional-integral-derivative (PID)-based control with measurements of the magnetic field as the control signal. Here, we implement state-feedback control using a laser interferometric displacement measurement with a noise floor of approximately 5 nm (root-mean-square). One of the unique features and main challenges in this system is that, in order to achieve the necessary accuracy (relative uncertainty of 20 × 10−9 in the MSMC), the magnetic suspension must not impose appreciable lateral forces or moments. Therefore, in this design, a single magnetic actuator is used to generate a suspension force in the vertical direction, while gravity and the symmetry of the magnetic field provide the lateral restoring forces. The combined optical measurement and state-feedback control strategy presented here demonstrate an improvement over the previously reported results with magnetic field measurements and a PID-based control scheme.

APA, Harvard, Vancouver, ISO, and other styles

40

Turner,GlonD., HenryC.degroli, and FredA.Antoon. "Low Cost Get-Away-Special (GAS) Furnace." MRS Proceedings 87 (1986). http://dx.doi.org/10.1557/proc-87-305.

Full text

Abstract:

AbstractA simple and inexpensive space shuttle experimental apparatus to conduct microgravity melting and solidification is presented. A Get-Away-Special (GAS) space furnace was initially developed as a student design project at the United States Air Force Academy and further refined at the NASA Lewis Research Center. The experiment package consists of a melting chamber, battery power system, temperature data recording systems, and electronic controller. The melting chamber is a thin-walled tube wrapped by heating resistance wire. Thermocouples are used to record the specimen thermal history. Power is supplied by two volt batteries wired to produce 360 watts. The millivolt output of the thermocouples is amplified, cold-junction compensated, and converted to a frequency which is then recorded on an off-the-shelf cassette stereo tape recorder. A back up data recording system which digitizes the amplified signal and records the data on EEPROMs (electrically erasable programmable read-only memory) has also been included. This experimental device demonstrates that basic science research can be kept simple and inexpensive.

APA, Harvard, Vancouver, ISO, and other styles

41

Buckman,R.W. "Development of High-Strength-Fabricable Tantalum-Base Alloys." MRS Proceedings 322 (1993). http://dx.doi.org/10.1557/proc-322-329.

Full text

Abstract:

AbstractIn the 1950s, Ta-7.5%W and the Ta-2.5%W were the only tantalum alloys of commercial significance. An intensive alloy development effort occurred between 1958 and 1968 in response to Air Force and Navy aerospace needs for high-temperature, oxidation-resistant alloys for rocket and air-breathing engines and airframe applications. Compatibility with oxidation-resistant coatings, high-temperature short-time strength, fabricability and weldability were of prime importance. These programs led to the development of Ta-10w%W, Ta-30w%Nb-7.5w%V, T-111(Ta-8w%W-2w%Hf), and T-222(Ta-10w%W-2.5w%Hf-O.Olw%C). T-111, with its demonstrated compatibility with liquid alkali metals, and combination of strength, fabricability and weldability, was selected by NASA as the baseline reference alloy for space nuclear power systems studies. Significant quantities of T- 111 and T-222 were produced in the 1960s. Today, however, production is limited to unalloyed tantalum and the tantalum-tungsten binaries because of the demand of the chemical industry for materials with outstanding acid corrosion resistance. To again produce T-11 and T-222 on a commercial basis will require relearning by the refractory metal alloy producers. The current lack of experience in the refractory metal industry with these high temperature alloys will necessitate recovery of the expertise needed for the United States to effectively compete in this technology arena.

APA, Harvard, Vancouver, ISO, and other styles

42

STANO,GeoffreyT., MatthewR.Smith, and ChristopherJ.Schultz. "Development and Evaluation of the GLM Stoplight Product for Lightning Safety." Journal of Operational Meteorology, July3, 2019, 92–104. http://dx.doi.org/10.15191/nwajom.2019.0707.

Full text

Abstract:

The launch of the Geostationary Lightning Mapper (GLM) aboard Geostationary Operational Environmental Satellite-R/S (GOES-16/17), provides new opportunities to support lightning safety, such as the 30-min hazard (“stoplight”) safety product developed by the National Aeronautics and Space Administration’s Short-term Prediction Research and Transition Center. This product plots the spatial extent where lightning occurred over the past 30 min and color codes the data in 10-min bins. Using GLM’s mapping of the spatial footprint of individual flashes, the product identifies when temporal rules for lightning safety have been met based on the needs of decision-support partners [commercial airlines, 10 min; United States Air Force (USAF) 45th Weather Squadron, 20 min; emergency management (EMA)/National Weather Service (NWS), 30 min]. The effort was guided by EMA partners requesting a product that quickly shows the location and age of lightning observations in an easy-to-interpret visualization. Analysis of lightning safety rules of thumb were performed in the framework of the GLM stoplight product to determine the number of times each of the partner criteria would be violated using an Eulerian-based approach simulating an integrated decision support point of view. The temporal criteria for commercial airlines, USAF, and EMA/NWS were violated 9.5%, 3.5%, and 1.4% of the time within this sample, respectively. Examples are provided to show the GLM 30-min hazard product in linear convection, multicellular convection, and electrified snowfall events. Illustrations also demonstrate how this GLM safety product and ground-based, lightning-location systems can work in tandem to maximize lightning safety protocols.

APA, Harvard, Vancouver, ISO, and other styles

43

"Aging aircraft issues in the United States Air Force Lincoln, J.W. Society for the Advancement of Material and Process Engineering, 1161 Parkview Drive, P.O. Box 2459, Covina, CA 91722, U.S.A. 1996. 42–53 Conference: Materials and Process Challenges: Aging Systems, Affordability, Alternative Applications. Vol. 41-I, Anaheim, CA, U.S.A. 24–28 Mar. 1996." International Journal of Fatigue 19, no.8-9 (September 1997): 659. http://dx.doi.org/10.1016/s0142-1123(97)87823-1.

Full text

APA, Harvard, Vancouver, ISO, and other styles

44

"Aging aricraft technology development in the United States Air Force Rudd J.L. Society for the Advancement of Material and Process Engineering. 1161 Parkview Drive, P.O. Box 2459, Covina, CA 91722, U.S.A. 1996. 54–64 Conference: Materials and Process Challenges: Aging Systems, Affordability, Alternative Applications, Vol. 41-I, Anaheim, CA, U.S.A. 24–28 Mar. 1996." International Journal of Fatigue 19, no.8-9 (September 1997): 659. http://dx.doi.org/10.1016/s0142-1123(97)87822-x.

Full text

APA, Harvard, Vancouver, ISO, and other styles

45

Meakins, Felicity. "Reknowing the Bicycle;." M/C Journal 3, no.6 (December1, 2000). http://dx.doi.org/10.5204/mcj.1884.

Full text

Abstract:

Different forms of transport have always had different effects on the cityscape, landscape, nationscape and airscape. Modes of moving from A to B have consumed, manipulated and divided this space, often requiring other activities to operate around it. This division is seen most obviously in roads and their effect on community (see for example The Castle), but also in other scapes such as the control of airspace through flight paths which has had a marked effect on, for example, the migratory flight paths of birds. With the adoption of new transport technologies, scapes are manipulated to accommodate the needs of this technology. The bicycle is an interesting example of a technology, which in its popularity last century began to affect the architecture of the landscape, before the automobile left its indelible imprint. With the disenchantment with cars in the Western world, it is interesting to ponder on the effect that bicycles are now having with the resurgence of their popularity. At this point, it must be noted that this is a purely Western orientated study and it would be worthwhile comparing these spatial effects to the scapes in a highly cycle-dominated country such as China. The popularity of bicycles peaked in the 1880-90s (Bardou et al. 7). This craze was partly due to the attraction of the technology, but also due to an associated sense of freedom and escape. This attitude to the bicycle is expressed in H.G. Wells's novella, Wheels of Chance (based in 1895) where the main character, a draper called Mr Hoopdriver, undertakes a cycling tour of the south coast of England. Freedom takes on two meanings -- firstly, Mr Hoopdriver finds a sense of freedom in being able to escape from his mundane life and travel the long distances solo and in a shorter time. He also observes another type of freedom in the form of the Young Lady in Grey who is also on a cycling tour. Mr Hoopdriver is shocked to see a woman exerting herself physically and wearing pants, yet realises that there is no question of women cycling side saddle wearing a skirt. It seems that in this form of transport, the emancipation of women progresses a little further. This freedom led to the enormous popularity of bicycles and as a result, bicycle organisations began to petition for the improvement and expansion of roads which were in a poor state due to the use of horses (Fink 8). And so bicycles began to impose their needs on the landscape and with the expansion of road networks, the landscape was altered markedly. Interestingly enough, these roadworks were one factor which led to the bicycle's demise in popularity and the accelerated manufacture of cars (Bardou et al. 9). At the time that roads were being improved, farmers in the United States were becoming distressed by the railway's monopolised power over mass transport. Due to the improved roads, the agricultural industry pushed towards using these roads for transporting produce. A number of automobiles had been designed and tested since Leonardo da Vinci first sketched the idea. 1860-90 had seen a number of reasonable size steam engines which had reasonable power/weight radio, and an electric car, invented by William Morrison (US) in 1890, had a running time of 13 hours at 14 mph (Fink 9). However, it was the internal combustion engine that revolutionised this form of transport, and it did not take long before the utopia was conceived. Not only could cars move faster than a horse and cart, they were originally deemed cleaner and healthier, according to an 1899 article from the Scientific American: The improvement in city conditions by the general adoption of the motorcar can hardly be overestimated. Streets clean, dustless and odourless, with light rubber tired vehicles moving swiftly and noiselessly over the smooth expanse, would eliminate a greater part of the nervousness, distraction, and strain of modern metropolitan life. (Conyngton 19660) There existed some initial resistance to the introduction of cars. Pedestrians, horse owners and cyclists began to feel that their road space was being impinged upon and speed laws were introduced to attempt to counteract the fanaticism (Flink 25). However, little could be done to dissuade the masses about the benefits of the car. Given the car's enormous popularity and the spatial needs of this vehicle, it is interesting to consider the architectural changes to the city and landscapes necessary to account for the requirements of the car. As the rail trucks needed tracks, so too the cars needed roads. Already existing roads in cities were altered significantly and in particular, enormous amounts of money were injected into building highways to link major cities. Examples of these projects are the now defunct Highway Trust Fund in the United States and the Pacific Highway system in Australia. These roads have always been built with great opposition from people whose homes or land were rezoned for use by governing bodies. The consumption and division of established city scapes to accommodate for the cars' needs has severely altered the spatial priorities. Leavitt (1970) suggests that previously cohesive neighbourhoods have become socially and spatially divided as a result. Small corner stores have closed down due to bypasses, neighbours cannot visit each other on foot due to uncrossable motorways, animals are killed as a result of normal routes being intersected by highways, and the airscape has become dominated by the engine fumes especially in places such as Mexico City. On a larger scale, it may be suggested that cars has had scape-altered effects on a national and transnational level. The rise of the use of motorised transport can be considered in conjunction with the growing popularity of communication systems, more specifically at this time, the telephone. Both the car and the telephone have changed the perception of space between previously distant neighbours. Travelling time and communication time have decreased as a result of the use of these devices, resulting in a greater unification of the nation state. The negative corollary to this is the disintegration of these nation states through war. The use of cars and the expanded and improved highway systems had devastating effects in World War II. The increased mobilisation of soldiers and weaponry increased the efficiency of destruction, resulting in razed city and landscapes and a shift in national borders and nation space. Thus the demands of cars have altered these scapes and subsequently dictate the use of this space. It may be suggested that the car no longer is a tool for humans, but tends to control human activity within the space it dominates. People must use a bypass to drive further for a loaf of bread which was previously bought from the corner shop now closed from a lack of business due to the same bypass. Commuters in Mexico City are forced back into cars to escape the hazardous chemicals now dominating this space. This almost master/servant relationship over space allocation in the land, city and airscapes led to the disenchantment with cars which began in the 70s. One of the results of this disenchantment was to reconsider the bicycle as an alternate, less impinging form of transport. It has taken a number of decades but, in terms of space and scapes, an interesting phenomenon is occurring with the resurgence of the popularity of bicycles in the Western world. Cycling advocate groups are highlighting the advantages of this mode of transport. Cycling is no longer discussed in the 1890 discourses of freedom and adventure, but in terms of the environment and health. The environmental rhetoric, in particular, can be framed in terms of space. For example, it may be suggested that bicycles do not tend to permeate the airscape to the degree that cars do. It is through these types of discourses that advocate groups have been arguing for the right to take back some of the space that cars have since subsumed. A struggle exists over this space. For example, in many European cities, bicycle lanes on the far left of the road (between the footpath and carlanes) have been drawn on many intra-urban roads. In Amsterdam, vehicle access is colour coded, with bikeways being marked by red bricks (Poindexter). The cityscape is not altered as a result, but challenges to the space already filled by cars are made. In Australian capital cities, these bikelanes are less successful. Many of these bike lanes exist where car parking is permitted and a line of parked cars potentially subsumes this designated space, such that it no longer exists. Thus many cyclists resort to using pathways, some specific to cyclists, others shared with pedestrians. Other innovations from the Netherlands, which have perpetuated this challenge to the car's control of space, are traffic lights with special signals for bicycles and right-of-way laws which include specific give way to cyclists rules (Poindexter). These practices question the dominion of cars in travelling spaces and go towards changing this transport paradigm. As natural resources are depleted further and little progress is made on green cars, bicycles may again find their niche. It will be interesting to see another architectural evolution of the city, land, air and nationscapes as this space changes to accommodate another shift in transport trends. References Bardou, Jean-Pierre, Jean-Jacques Chanaron, Patrick Fridenson and James Laux. The Automobile Revolution: The Impact of an Industry. Chapel Hill (US): North Carolina UP, 1982. Conyngton, Thomas. "Motor Carriages and Street Paving." Scientific American Supplement 48 (1899): 196660. Fink, James. The Car Culture. Cambridge: MIT Press, 1975. Leavitt, Helen. Superhighway -- Super Hoax. New York: Doubleday, 1970. Poindexter, Miles. "Are Bicycle Lanes the Answer?" Self-Propelled City 31 January 1999. 13 November 2000 <http://www.self-propelled-city.com>. Wells, H.G. The Wheels of Chance. London: Dent; New York: Dutton, 1935. Citation reference for this article MLA style: Felicity Meakins. "Reknowing the Bicycle; Renewing its Space." M/C: A Journal of Media and Culture 3.6 (2000). [your date of access] <http://www.api-network.com/mc/0012/bike.php>. Chicago style: Felicity Meakins, "Reknowing the Bicycle; Renewing its Space," M/C: A Journal of Media and Culture 3, no. 6 (2000), <http://www.api-network.com/mc/0012/bike.php> ([your date of access]). APA style: Felicity Meakins. (2000) Reknowing the bicycle; renewing its space. M/C: A Journal of Media and Culture 3(6). <http://www.api-network.com/mc/0012/bike.php> ([your date of access]).

APA, Harvard, Vancouver, ISO, and other styles

46

Brabazon, Tara. "A Red Light Sabre to Go, and Other Histories of the Present." M/C Journal 2, no.4 (June1, 1999). http://dx.doi.org/10.5204/mcj.1761.

Full text

Abstract:

If I find out that you have bought a $90 red light sabre, Tara, well there's going to be trouble. -- Kevin Brabazon A few Saturdays ago, my 71-year old father tried to convince me of imminent responsibilities. As I am considering the purchase of a house, there are mortgages, bank fees and years of misery to endure. Unfortunately, I am not an effective Big Picture Person. The lure of the light sabre is almost too great. For 30 year old Generation Xers like myself, it is more than a cultural object. It is a textual anchor, and a necessary component to any future history of the present. Revelling in the aura of the Australian release for Star Wars: The Phantom Menace, this paper investigates popular memory, an undertheorised affiliation between popular culture and cultural studies.1 The excitement encircling the Star Wars prequel has been justified in terms of 'hype' or marketing. Such judgements frame the men and women cuing for tickets, talking Yodas and light sabres as fools or duped souls who need to get out more. My analysis explores why Star Wars has generated this enthusiasm, and how cultural studies can mobilise this passionate commitment to consider notions of popularity, preservation and ephemerality. We'll always have Tattooine. Star Wars has been a primary popular cultural social formation for a generation. The stories of Luke Skywalker, Princess Leia, Han Solo, Chewbacca, Darth Vader, Yoda, C-3PO and R2D2 offer an alternative narrative for the late 1970s and 1980s. It was a comfort to have the Royal Shakespearian tones of Alec Guinness confirming that the Force would be with us, through economic rationalism, unemployment, Pauline Hanson and Madonna discovering yoga. The Star Wars Trilogy, encompassing A New Hope, The Empire Strikes Back and Return of the Jedi, was released between 1977 and 1983. These films have rarely slipped from public attention, being periodically 'brought back' through new cinematic and video releases. The currency of Star Wars is matched with the other great popular cultural formations of the post-war period: the James Bond series and Star Trek. One reason for the continued success of these programmes is that other writers, film makers and producers cannot leave these texts alone. Bond survives not only through Pierce Brosnan's good looks, but the 'Hey Baby' antics of Austin Powers. Star Trek, through four distinct series, has become an industry that will last longer than Voyager's passage back from the Delta Quadrant. Star Wars, perhaps even more effectively than the other popular cultural heavyweights, has enmeshed itself into other filmic and televisual programming. Films like Spaceballs and television quizzes on Good News Week keep the knowledge system and language current and pertinent.2 Like Umberto Eco realised of Casablanca, Star Wars is "a living example of living textuality" (199). Both films are popular because of imperfections and intertextual archetypes, forming a filmic quilt of sensations and affectivities. Viewers are aware that "the cliches are talking among themselves" (Eco 209). As these cinematic texts move through time, the depth and commitment of these (con)textual dialogues are repeated and reinscribed. To hold on to a memory is to isolate a moment or an image and encircle it with meaning. Each day we experience millions of texts: some are remembered, but most are lost. Some popular cultural texts move from ephemera to popular memory to history. In moving beyond individual reminiscences -- the personal experiences of our lifetime -- we enter the sphere of popular culture. Collective or popular memory is a group or community experience of a textualised reality. For example, during the Second World War, there were many private experiences, but certain moments arch beyond the individual. Songs by Vera Lynn are fully textualised experiences that become the fodder for collective memory. Similarly, Star Wars provides a sense-making mechanism for the 1980s. Like all popular culture, these texts allow myriad readership strategies, but there is collective recognition of relevance and importance. Popular memory is such an important site because it provides us, as cultural critics, with a map of emotionally resonant sites of the past, moments that are linked with specific subjectivities and a commonality of expression. While Star Wars, like all popular cultural formations, has a wide audience, there are specific readings that are pertinent for particular groups. To unify a generation around cultural texts is an act of collective memory. As Harris has suggested, "sometimes, youth does interesting things with its legacy and creatively adapts its problematic into seemingly autonomous cultural forms" (79). Generation X refers to an age cohort born between the mid-1960s and the mid-1970s. Finally cultural studies theorists have found a Grail subculture. Being depthless, ambivalent, sexually repressed and social failures, Xers are a cultural studies dream come true. They were the children of the media revolution. Star Wars is integral to this textualised database. A fan on the night of the first screening corrected a journalist: "we aren't Generation X, we are the Star Wars generation" (Brendon, in Miller 9). An infatuation and reflexivity with the media is the single framework of knowledge in which Xers operate. This shared understanding is the basis for comedy, and particularly revealed (in Australia) in programmes like The Panel and Good News Week. Television themes, lines of film dialogue and contemporary news broadcasts are the basis of the game show. The aesthetics of life transforms television into a real. Or, put another way, "individual lives may be fragmented and confused but McDonald's is universal" (Hopkins 17). A group of textual readers share a literacy, a new way of reading the word and world of texts. Nostalgia is a weapon. The 1990s has been a decade of revivals: from Abba to skateboards, an era of retro reinscription has challenged linear theories of history and popular culture. As Timothy Carter reveals, "we all loved the Star Wars movies when we were younger, and so we naturally look forward to a continuation of those films" (9). The 1980s has often been portrayed as a bad time, of Thatcher and Reagan, cold war brinkmanship, youth unemployment and HIV. For those who were children and (amorphously phrased) 'young adults' of this era, the popular memory is of fluorescent fingerless gloves, Ray Bans, 'Choose Life' t-shirts and bubble skirts. It was an era of styling mousse, big hair, the Wham tan, Kylie and Jason and Rick Astley's dancing. Star Wars action figures gave the films a tangibility, holding the future of the rebellion in our hands (literally). These memories clumsily slop into the cup of the present. The problem with 'youth' is that it is semiotically too rich: the expression is understood, but not explained, by discourses as varied as the educational system, family structures, leisure industries and legal, medical and psychological institutions. It is a term of saturation, where normality is taught, and deviance is monitored. All cultural studies theorists carry the baggage of the Birmingham Centre into any history of youth culture. The taken-for-granted 'youth as resistance' mantra, embodied in Resistance through Rituals and Subculture: The Meaning of Style, transformed young people into the ventriloquist's puppet of cultural studies. The strings of the dancing, smoking, swearing and drinking puppet took many years to cut. The feminist blade of Angela McRobbie did some damage to the fraying filaments, as did Dick Hebdige's reflexive corrections in Hiding in the Light. However, the publications, promotion and pedagogy of Gen X ended the theoretical charade. Gen X, the media sophisticates, played with popular culture, rather than 'proper politics.' In Coupland's Generation X, Claire, one of the main characters believed that "Either our lives become stories, or there's just no way to get through them." ... We know that this is why the three of us left our lives behind us and came to the desert -- to tell stories and to make our own lives worthwhile tales in the process. (8) Television and film are part of this story telling process. This intense connection generated an ironic and reflexive literacy in the media. Television became the basis for personal pleasures and local resistances, resulting in a disciplined mobilisation of popular cultural surfaces. Even better than the real thing. As the youngest of Generation Xers are now in their late twenties, they have moved from McJobs to careers. Robert Kizlik, a teacher trainer at an American community college expressed horror as the lack of 'commonsensical knowledge' from his new students. He conducted a survey for teachers training in the social sciences, assessing their grasp of history. There was one hundred percent recognition of such names as Madonna, Mike Tyson, and Sharon Stone, but they hardly qualify as important social studies content ... . I wondered silently just what it is that these students are going to teach when they become employed ... . The deeper question is not that we have so many high school graduates and third and fourth year college students who are devoid of basic information about American history and culture, but rather, how, in the first place, these students came to have the expectations that they could become teachers. (n. pag.) Kizlik's fear is that the students, regardless of their enthusiasm, had poor recognition of knowledge he deemed significant and worthy. His teaching task, to convince students of the need for non-popular cultural knowledges, has resulted in his course being termed 'boring' or 'hard'. He has been unable to reconcile the convoluted connections between personal stories and televisual narratives. I am reminded (perhaps unhelpfully) of one of the most famous filmic teachers, Mr Holland. Upon being attacked by his superiors for using rock and roll in his classes, he replied that he would use anything to instil in his students a love of music. Working with, rather than against, popular culture is an obvious pedagogical imperative. George Lucas has, for example, confirmed the Oprahfied spirituality of the current age. Obviously Star Wars utilises fables, myths3 and fairy tales to summon the beautiful Princess, the gallant hero and the evil Empire, but has become something more. Star Wars slots cleanly into an era of Body Shop Feminism, John Gray's gender politics and Rikki Lake's relationship management. Brian Johnson and Susan Oh argued that the film is actually a new religion. A long time ago in a galaxy far far away -- late 1970s California -- the known universe of George Lucas came into being. In the beginning, George created Star Wars. And the screen was without form, and void. And George said, 'Let there be light', and there was Industrial Light and Magic. And George divided the light from the darkness, with light sabres, and called the darkness the Evil Empire.... And George saw that it was good. (14) The writers underestimate the profound emotional investment placed in the trilogy by millions of people. Genesis narratives describe the Star Wars phenomenon, but do not analyse it. The reason why the films are important is not only because they are a replacement for religion. Instead, they are an integrated component of popular memory. Johnson and Oh have underestimated the influence of pop culture as "the new religion" (14). It is not a form of cheap grace. The history of ideas is neither linear nor traceable. There is no clear path from Plato to Prozac or Moses to Mogadon. Obi-Wan Kenobi is not a personal trainer for the ailing spirituality of our age. It was Ewan McGregor who fulfilled the Xer dream to be the young Obi Wan. As he has stated, "there is nothing cooler than being a Jedi knight" (qtd. in Grant 15). Having survived feet sawing in Shallow Grave and a painfully large enema in Trainspotting, there are few actors who are better prepared to carry the iconographic burden of a Star Wars prequel. Born in 1971, he is the Molly Ringwall of the 1990s. There is something delicious about the new Obi Wan, that hails what Hicks described as "a sense of awareness and self- awareness, of detached observation, of not taking things seriously, and a use of subtle dry humour" (79). The metaphoric light sabre was passed to McGregor. The pull of the dark side. When fans attend The Phantom Menace, they tend to the past, as to a loved garden. Whether this memory is a monument or a ruin depends on the preservation of the analogue world in the digital realm. The most significant theoretical and discursive task in the present is to disrupt the dual ideologies punctuating the contemporary era: inevitable technological change and progress.4 Only then may theorists ponder the future of a digitised past. Disempowered groups, who were denied a voice and role in the analogue history of the twentieth century, will have inequalities reified and reinforced through the digital archiving of contemporary life. The Web has been pivotal to the new Star Wars film. Lucasfilm has an Internet division and an official Website. Between mid November and May, this site has been accessed twenty million times (Gallott 15). Other sites, such as TheForce.net and Countdown to Star Wars, are a record of the enthusiasm and passion of fans. As Daniel Fallon and Matthew Buchanan have realised, "these sites represent the ultimate in film fandom -- virtual communities where like-minded enthusiasts can bathe in the aura generated by their favourite masterpiece" (27). Screensavers, games, desktop wallpaper, interviews and photo galleries have been downloaded and customised. Some ephemeral responses to The Phantom Menace have been digitally recorded. Yet this moment of audience affectivity will be lost without a consideration of digital memory. The potentials and problems of the digital and analogue environments need to be oriented into critical theories of information, knowledge, entertainment and pleasure. The binary language of computer-mediated communication allows a smooth transference of data. Knowledge and meaning systems are not exchanged as easily. Classifying, organising and preserving information make it useful. Archival procedures have been both late and irregular in their application.5 Bocher and Ihlenfeldt assert that 2500 new web sites are coming on-line every day ("A Higher Signal-to-Noise Ratio"). The difficulties and problems confronting librarians and archivists who wish to preserve digital information is revealed in the Australian government's PADI (Preserving Access to Digital Information) Site. Compared with an object in a museum which may lie undisturbed for years in a storeroom, or a book on a shelf, or even Egyptian hieroglyd on the wall of a tomb, digital information requires much more active maintenance. If we want access to digital information in the future, we must plan and act now. (PADI, "Why Preserve Access to Digital Information?") phics carve The speed of digitisation means that responsibility for preserving cultural texts, and the skills necessary to enact this process, is increasing the pressure facing information professionals. An even greater difficulty when preserving digital information is what to keep, and what to release to the ephemeral winds of cyberspace. 'Qualitative criteria' construct an historical record that restates the ideologies of the powerful. Concerns with quality undermine the voices of the disempowered, displaced and decentred. The media's instability through technological obsolescence adds a time imperative that is absent from other archival discussions.6 While these problems have always taken place in the analogue world, there was a myriad of alternative sites where ephemeral material was stored, such as the family home. Popular cultural information will suffer most from the 'blind spots' of digital archivists. While libraries rarely preserve the ephemera of a time, many homes (including mine) preserve the 'trash' of a culture. A red light sabre, toy dalek, Duran Duran posters and a talking Undertaker are all traces of past obsessions and fandoms. Passion evaporates, and interests morph into new trends. These objects remain in attics, under beds, in boxes and sheds throughout the world. Digital documents necessitate a larger project of preservation, with great financial (and spatial) commitments of technology, software and maintenance. Libraries rarely preserve the ephemera -- the texture and light -- of the analogue world. The digital era reduces the number of fan-based archivists. Subsequently forfeited is the spectrum of interests and ideologies that construct the popular memory of a culture. Once bits replace atoms, the recorded world becomes structured by digital codes. Only particular texts will be significant enough to store digitally. Samuel Florman stated that "in the digital age nothing need be lost; do we face the prospect of drowning in trivia as the generations succeed each other?" (n. pag.) The trivia of academics may be the fodder (and pleasures) of everyday life. Digitised preservation, like analogue preservation, can never 'represent' plural paths through the past. There is always a limit and boundary to what is acceptable obsolescence. The Star Wars films suggests that "the whole palette of digital technology is much more subtle and supple; if you can dream it, you can see it" (Corliss 65). This film will also record how many of the dreams survive and are archived. Films, throughout the century, have changed the way in which we construct and remember the past. They convey an expressive memory, rather than an accurate history. Certainly, Star Wars is only a movie. Yet, as Rushkoff has suggested, "we have developed a new language of references and self-references that identify media as a real thing and media history as an actual social history" (32). The build up in Australia to The Phantom Menace has been wilfully joyful. This is a history of the present, a time which I know will, in retrospect, be remembered with great fondness. It is a collective event for a generation, but it speaks to us all in different ways. At ten, it is easy to be amazed and enthralled at popular culture. By thirty, it is more difficult. When we see Star Wars, we go back to visit our memories. With red light sabre in hand, we splice through time, as much as space. Footnotes The United States release of the film occurred on 19 May 1999. In Australia, the film's first screenings were on 3 June. Many cinemas showed The Phantom Menace at 12:01 am, (very) early Thursday morning. The three main players of the GNW team, Paul McDermott, Mikey Robbins and Julie McCrossin, were featured on the cover of Australia's Juice magazine in costumes from The Phantom Menace, being Obi-Wan, Yoda and Queen Amidala respectively. Actually, the National Air and Space Museum had a Star Wars exhibition in 1997, titled "Star Wars: The Magic of Myth". For example, Janet Collins, Michael Hammond and Jerry Wellington, in Teaching and Learning with the Media, stated that "the message is simple: we now have the technology to inform, entertain and educate. Miss it and you, your family and your school will be left behind" (3). Herb Brody described the Net as "an overstuffed, underorganised attic full of pictures and documents that vary wildly in value", in "Wired Science". The interesting question is, whose values will predominate when the attic is being cleared and sorted? This problem is extended because the statutory provision of legal deposit, which obliges publishers to place copies of publications in the national library of the country in which the item is published, does not include CD-ROMs or software. References Bocher, Bob, and Kay Ihlenfeldt. "A Higher Signal-to-Noise Ratio: Effective Use of WebSearch Engines." State of Wisconsin Department of Public Instruction Website. 13 Mar. 1998. 15 June 1999 <http://www.dpi.state.wi.us/dpi/dlcl/lbstat/search2.php>. Brody, Herb. "Wired Science." Technology Review Oct. 1996. 15 June 1999 <http://www.techreview.com/articles/oct96/brody.php>. Carter, Timothy. "Wars Weary." Cinescape 39 (Mar./Apr. 1999): 9. Collins, Janet, Michael Hammond, and Jerry Wellington. Teaching and Learning with Multimedia. London: Routledge, 1997. Corliss, Richard. "Ready, Set, Glow!" Time 18 (3 May 1999): 65. Count Down to Star Wars. 1999. 15 June 1999 <http://starwars.countingdown.com/>. Coupland, Douglas. Generation X. London: Abacus, 1991. Eco, Umberto. Travels in Hyper-Reality. London: Picador, 1987. Fallon, Daniel, and Matthew Buchanan. "Now Screening." Australian Net Guide 4.5 (June 1999): 27. Florman, Samuel. "From Here to Eternity." MIT's Technology Review 100.3 (Apr. 1997). Gallott, Kirsten. "May the Web Be with you." Who Weekly 24 May 1999: 15. Grant, Fiona. "Ewan's Star Soars!" TV Week 29 May - 4 June 1999: 15. Hall, Stuart, and Tony Jefferson, eds. Resistance through Rituals. London: Hutchinson, 1976. Harris, David. From Class Struggle to the Politics of Pleasure: the Effects of Gramscianism on Cultural Studies. London: Routledge, 1992. Hebdige, Dick. Hiding in the Light. London: Routledge, 1988. Hopkins, Susan. "Generation Pulp." Youth Studies Australia Spring 1995. Johnson, Brian, and Susan Oh. "The Second Coming: as the Newest Star Wars Film Illustrates, Pop Culture Has Become a New Religion." Maclean's 24 May 1999: 14-8. Juice 78 (June 1999). Kizlik, Robert. "Generation X Wants to Teach." International Journal of Instructional Media 26.2 (Spring 1999). Lucasfilm Ltd. Star Wars: Welcome to the Official Site. 1999. 15 June 1999 <http://www.starwars.com/>. Miller, Nick. "Generation X-Wing Fighter." The West Australian 4 June 1999: 9. PADI. "What Digital Information Should be Preserved? Appraisal and Selection." Preserving Access to Digital Information (PADI) Website. 11 March 1999. 15 June 1999 <http://www.nla.gov.au/padi/what.php>. PADI. "Why Preserve Access to Digital Information?" Preserving Access to Digital Information (PADI) Website. <http://www.nla.gov.au/padi/why.php>. Rushkoff, Douglas. Media Virus. Sydney: Random House, 1994. Citation reference for this article MLA style: Tara Brabazon. "A Red Light Sabre to Go, and Other Histories of the Present." M/C: A Journal of Media and Culture 2.4 (1999). [your date of access] <http://www.uq.edu.au/mc/9906/sabre.php>. Chicago style: Tara Brabazon, "A Red Light Sabre to Go, and Other Histories of the Present," M/C: A Journal of Media and Culture 2, no. 4 (1999), <http://www.uq.edu.au/mc/9906/sabre.php> ([your date of access]). APA style: Tara Brabazon. (1999) A red light sabre to go, and other histories of the present. M/C: A Journal of Media and Culture 2(4). <http://www.uq.edu.au/mc/9906/sabre.php> ([your date of access]).

APA, Harvard, Vancouver, ISO, and other styles

47

Quinan,C.L., and Hannah Pezzack. "A Biometric Logic of Revelation: Zach Blas’s SANCTUM (2018)." M/C Journal 23, no.4 (August12, 2020). http://dx.doi.org/10.5204/mcj.1664.

Full text

Abstract:

Ubiquitous in airports, border checkpoints, and other securitised spaces throughout the world, full-body imaging scanners claim to read bodies in order to identify if they pose security threats. Millimetre-wave body imaging machines—the most common type of body scanner—display to the operating security agent a screen with a generic body outline. If an anomaly is found or if an individual does not align with the machine’s understanding of an “average” body, a small box is highlighted and placed around the “problem” area, prompting further inspection in the form of pat-downs or questioning. In this complex security regime governed by such biometric, body-based technologies, it could be argued that nonalignment with bodily normativity as well as an attendant failure to reveal oneself—to become “transparent” (Hall 295)—marks a body as dangerous. As these algorithmic technologies become more pervasive, so too does the imperative to critically examine their purported neutrality and operative logic of revelation and readability.Biometric technologies are marketed as excavators of truth, with their optic potency claiming to demask masquerading bodies. Failure and bias are, however, an inescapable aspect of such technologies that work with narrow parameters of human morphology. Indeed, surveillance technologies have been taken to task for their inherent racial and gender biases (Browne; Pugliese). Facial recognition has, for example, been critiqued for its inability to read darker skin tones (Buolamwini and Gebru), while body scanners have been shown to target transgender bodies (Keyes; Magnet and Rodgers; Quinan). Critical security studies scholar Shoshana Magnet argues that error is endemic to the technological functioning of biometrics, particularly since they operate according to the faulty notion that bodies are “stable” and unchanging repositories of information that can be reified into code (Magnet 2).Although body scanners are presented as being able to reliably expose concealed weapons, they are riddled with incompetencies that misidentify and over-select certain demographics as suspect. Full-body scanners have, for example, caused considerable difficulties for transgender travellers, breast cancer patients, and people who use prosthetics, such as artificial limbs, colonoscopy bags, binders, or prosthetic genitalia (Clarkson; Quinan; Spalding). While it is not in the scope of this article to detail the workings of body imaging technologies and their inconsistencies, a growing body of scholarship has substantiated the claim that these machines unfairly impact those identifying as transgender and non-binary (see, e.g., Beauchamp; Currah and Mulqueen; Magnet and Rogers; Sjoberg). Moreover, they are constructed according to a logic of binary gender: before each person enters the scanner, transportation security officers must make a quick assessment of their gender/sex by pressing either a blue (corresponding to “male”) or pink (corresponding to “female”) button. In this sense, biometric, computerised security systems control and monitor the boundaries between male and female.The ability to “reveal” oneself is henceforth predicated on having a body free of “abnormalities” and fitting neatly into one of the two sex categorisations that the machine demands. Transgender and gender-nonconforming individuals, particularly those who do not have a binary gender presentation or whose presentation does not correspond to the sex marker in their documentation, also face difficulties if the machine flags anomalies (Quinan and Bresser). Drawing on a Foucauldian analysis of power as productive, Toby Beauchamp similarly illustrates how surveillance technologies not only identify but also create and reshape the figure of the dangerous subject in relation to normative configurations of gender, race, and able-bodiedness. By mobilizing narratives of concealment and disguise, heightened security measures frame gender nonconformity as dangerous (Beauchamp, Going Stealth). Although national and supranational authorities market biometric scanning technologies as scientifically neutral and exact methods of identification and verification and as an infallible solution to security risks, such tools of surveillance are clearly shaped by preconceptions and prejudgements about race, gender, and bodily normativity. Not only are they encoded with “prototypical whiteness” (Browne) but they are also built on “grossly stereotypical” configurations of gender (Clarkson).Amongst this increasingly securitised landscape, creative forms of artistic resistance can offer up a means of subverting discriminatory policing and surveillance practices by posing alternate visualisations that reveal and challenge their supposed objectivity. In his 2018 audio-video artwork installation entitled SANCTUM, UK-based American artist Zach Blas delves into how biometric technologies, like those described above, both reveal and (re)shape ontology by utilising the affectual resonance of sexual submission. Evoking the contradictory notions of oppression and pleasure, Blas describes SANCTUM as “a mystical environment that perverts sex dungeons with the apparatuses and procedures of airport body scans, biometric analysis, and predictive policing” (see full description at https://zachblas.info/works/sanctum/).Depicting generic mannequins that stand in for the digitalised rendering of the human forms that pass through body scanners, the installation transports the scanners out of the airport and into a queer environment that collapses sex, security, and weaponry; an environment that is “at once a prison-house of algorithmic capture, a sex dungeon with no genitals, a weapons factory, and a temple to security.” This artistic reframing gestures towards full-body scanning technology’s germination in the military, prisons, and other disciplinary systems, highlighting how its development and use has originated from punitive—rather than protective—contexts.In what follows, we adopt a methodological approach that applies visual analysis and close reading to scrutinise a selection of scenes from SANCTUM that underscore the sadomasoch*stic power inherent in surveillance technologies. Analysing visual and aural elements of the artistic intervention allows us to complicate the relationship between transparency and recognition and to problematise the dynamic of mandatory complicity and revelation that body scanners warrant. In contrast to a discourse of visibility that characterises algorithmically driven surveillance technology, Blas suggests opacity as a resistance strategy to biometrics' standardisation of identity. Taking an approach informed by critical security studies and queer theory, we also argue that SANCTUM highlights the violence inherent to the practice of reducing the body to a flat, inert surface that purports to align with some sort of “core” identity, a notion that contradicts feminist and queer approaches to identity and corporeality as fluid and changing. In close reading this artistic installation alongside emerging scholarship on the discriminatory effects of biometric technology, this article aims to highlight the potential of art to queer the supposed objectivity and neutrality of biometric surveillance and to critically challenge normative logics of revelation and readability.Corporeal Fetishism and Body HorrorThroughout both his artistic practice and scholarly work, Blas has been critical of the above narrative of biometrics as objective extractors of information. Rather than looking to dominant forms of representation as a means for recognition and social change, Blas’s work asks that we strive for creative techniques that precisely queer biometric and legal systems in order to make oneself unaccounted for. For him, “transparency, visibility, and representation to the state should be used tactically, they are never the end goal for a transformative politics but are, ultimately, a trap” (Blas and Gaboury 158). While we would simultaneously argue that invisibility is itself a privilege that is unevenly distributed, his creative work attempts to refuse a politics of visibility and to embrace an “informatic opacity” that is attuned to differences in bodies and identities (Blas).In particular, Blas’s artistic interventions titled Facial Weaponization Suite (2011-14) and Face Cages (2013-16) protest against biometric recognition and the inequalities that these technologies propagate by making masks and wearable metal objects that cannot be detected as human faces. This artistic-activist project contests biometric facial recognition and their attendant inequalities by, as detailed on the artist’s website,making ‘collective masks’ in workshops that are modelled from the aggregated facial data of participants, resulting in amorphous masks that cannot be detected as human faces by biometric facial recognition technologies. The masks are used for public interventions and performances.One mask explores blackness and the racist implications that undergird biometric technologies’ inability to detect dark skin. Meanwhile another mask, which he calls the “fa*g Face Mask”, points to the heteronormative underpinnings of facial recognition. Created from the aggregated facial data of queer men, this amorphous pink mask implicitly references—and contests—scientific studies that have attempted to link the identification of sexual orientation through rapid facial recognition techniques.Building on this body of creative work that has advocated for opacity as a tool of social and political transformation, SANCTUM resists the revelatory impulses of biometric technology by turning to the use and abuse of full-body imaging. The installation opens with a shot of a large, dark industrial space. At the far end of a red, spotlighted corridor, a black mask flickers on a screen. A shimmering, oscillating sound reverberates—the opening bars of a techno track—that breaks down in rhythm while the mask evaporates into a cloud of smoke. The camera swivels, and a white figure—the generic mannequin of the body scanner screen—is pummelled by invisible forces as if in a wind tunnel. These ghostly silhouettes appear and reappear in different positions, with some being whipped and others stretched and penetrated by a steel anal hook. Rather than conjuring a traditional horror trope of the body’s terrifying, bloody interior, SANCTUM evokes a new kind of feared and fetishized trope that is endemic to the current era of surveillance capitalism: the abstracted body, standardised and datafied, created through the supposedly objective and efficient gaze of AI-driven machinery.Resting on the floor in front of the ominous animated mask are neon fragments arranged in an occultist formation—hands or half a face. By breaking the body down into component parts— “from retina to fingerprints”—biometric technologies “purport to make individual bodies endlessly replicable, segmentable and transmissible in the transnational spaces of global capital” (Magnet 8). The notion that bodies can be seamlessly turned into blueprints extracted from biological and cultural contexts has been described by Donna Haraway as “corporeal fetishism” (Haraway, Modest). In the context of SANCTUM, Blas illustrates the dangers of mistaking a model for a “concrete entity” (Haraway, “Situated” 147). Indeed, the digital cartography of the generic mannequin becomes no longer a mode of representation but instead a technoscientific truth.Several scenes in SANCTUM also illustrate a process whereby substances are extracted from the mannequins and used as tools to enact violence. In one such instance, a silver webbing is generated over a kneeling figure. Upon closer inspection, this geometric structure, which is reminiscent of Blas’s earlier Face Cages project, is a replication of the triangulated patterns produced by facial recognition software in its mapping of distance between eyes, nose, and mouth. In the next scene, this “map” breaks apart into singular shapes that float and transform into a metallic whip, before eventually reconstituting themselves as a penetrative douche hose that causes the mannequin to spasm and vomit a pixelated liquid. Its secretions levitate and become the webbing, and then the sequence begins anew.In another scene, a mannequin is held upside-down and force-fed a bubbling liquid that is being pumped through tubes from its arms, legs, and stomach. These depictions visualise Magnet’s argument that biometric renderings of bodies are understood not to be “tropic” or “historically specific” but are instead presented as “plumbing individual depths in order to extract core identity” (5). In this sense, this visual representation calls to mind biometrics’ reification of body and identity, obfuscating what Haraway would describe as the “situatedness of knowledge”. Blas’s work, however, forces a critique of these very systems, as the materials extracted from the bodies of the mannequins in SANCTUM allude to how biometric cartographies drawn from travellers are utilised to justify detainment. These security technologies employ what Magnet has referred to as “surveillant scopophilia,” that is, new ways and forms of looking at the human body “disassembled into component parts while simultaneously working to assuage individual anxieties about safety and security through the promise of surveillance” (17). The transparent body—the body that can submit and reveal itself—is ironically represented by the distinctly genderless translucent mannequins. Although the generic mannequins are seemingly blank slates, the installation simultaneously forces a conversation about the ways in which biometrics draw upon and perpetuate assumptions about gender, race, and sexuality.Biometric SubjugationOn her 2016 critically acclaimed album HOPELESSNESS, openly transgender singer, composer, and visual artist Anohni performs a deviant subjectivity that highlights the above dynamics that mark the contemporary surveillance discourse. To an imagined “daddy” technocrat, she sings:Watch me… I know you love me'Cause you're always watching me'Case I'm involved in evil'Case I'm involved in terrorism'Case I'm involved in child molestersEvoking a queer sexual frisson, Anohni describes how, as a trans woman, she is hyper-visible to state institutions. She narrates a voyeuristic relation where trans bodies are policed as threats to public safety rather than protected from systemic discrimination. Through the seemingly benevolent “daddy” character and the play on ‘cause (i.e., because) and ‘case (i.e., in case), she highlights how gender-nonconforming individuals are predictively surveilled and assumed to already be guilty. Reflecting on daddy-boy sexual paradigms, Jack Halberstam reads the “sideways” relations of queer practices as an enactment of “rupture as substitution” to create a new project that “holds on to vestiges of the old but distorts” (226). Upending power and control, queer art has the capacity to both reveal and undermine hegemonic structures while simultaneously allowing for the distortion of the old to create something new.Employing the sublimatory relations of bondage, discipline, sadism, and masochism (BDSM), Blas’s queer installation similarly creates a sideways representation that re-orientates the logic of the biometric scanners, thereby unveiling the always already sexualised relations of scrutiny and interrogation as well as the submissive complicity they demand. Replacing the airport environment with a dark and foreboding mise-en-scène allows Blas to focus on capture rather than mobility, highlighting the ways in which border checkpoints (including those instantiated by the airport) encourage free travel for some while foreclosing movement for others. Building on Sara Ahmed’s “phenomenology of being stopped”, Magnet considers what happens when we turn our gaze to those “who fail to pass the checkpoint” (107). In SANCTUM, the same actions are played out again and again on spectral beings who are trapped in various states: they shudder in cages, are chained to the floor, or are projected against the parameters of mounted screens. One ghostly figure, for instance, lies pinned down by metallic grappling hooks, arms raised above the head in a recognisable stance of surrender, conjuring up the now-familiar image of a traveller standing in the cylindrical scanner machine, waiting to be screened. In portraying this extended moment of immobility, Blas lays bare the deep contradictions in the rhetoric of “freedom of movement” that underlies such spaces.On a global level, media reporting, scientific studies, and policy documents proclaim that biometrics are essential to ensuring personal safety and national security. Within the public imagination, these technologies become seductive because of their marked ability to identify terrorist attackers—to reveal threatening bodies—thereby appealing to the anxious citizen’s fear of the disguised suicide bomber. Yet for marginalised identities prefigured as criminal or deceptive—including transgender and black and brown bodies—the inability to perform such acts of revelation via submission to screening can result in humiliation and further discrimination, public shaming, and even tortuous inquiry – acts that are played out in SANCTUM.Masked GenitalsFeminist surveillance studies scholar Rachel Hall has referred to the impetus for revelation in the post-9/11 era as a desire for a universal “aesthetics of transparency” in which the world and the body is turned inside-out so that there are no longer “secrets or interiors … in which terrorists or terrorist threats might find refuge” (127). Hall takes up the case study of Umar Farouk Abdulmutallab (infamously known as “the Underwear Bomber”) who attempted to detonate plastic explosives hidden in his underwear while onboard a flight from Amsterdam to Detroit on 25 December 2009. Hall argues that this event signified a coalescence of fears surrounding bodies of colour, genitalia, and terrorism. News reports following the incident stated that Abdulmutallab tucked his penis to make room for the explosive, thereby “queer[ing] the aspiring terrorist by indirectly referencing his willingness … to make room for a substitute phallus” (Hall 289). Overtly manifested in the Underwear Bomber incident is also a desire to voyeuristically expose a hidden, threatening interiority, which is inherently implicated with anxieties surrounding gender deviance. Beauchamp elaborates on how gender deviance and transgression have coalesced with terrorism, which was exemplified in the wake of the 9/11 attacks when the United States Department of Homeland Security issued a memo that male terrorists “may dress as females in order to discourage scrutiny” (“Artful” 359). Although this advisory did not explicitly reference transgender populations, it linked “deviant” gender presentation—to which we could also add Abdulmutallab’s tucking of his penis—with threats to national security (Beauchamp, Going Stealth). This also calls to mind a broader discussion of the ways in which genitalia feature in the screening process. Prior to the introduction of millimetre-wave body scanning technology, the most common form of scanner used was the backscatter imaging machine, which displayed “naked” body images of each passenger to the security agent. Due to privacy concerns, these machines were replaced by the scanners currently in place which use a generic outline of a passenger (exemplified in SANCTUM) to detect possible threats.It is here worth returning to Blas’s installation, as it also implicitly critiques the security protocols that attempt to reveal genitalia as both threatening and as evidence of an inner truth about a body. At one moment in the installation a bayonet-like object pierces the blank crotch of the mannequin, shattering it into holographic fragments. The apparent genderlessness of the mannequins is contrasted with these graphic sexual acts. The penetrating metallic instrument that breaks into the loin of the mannequin, combined with the camera shot that slowly zooms in on this action, draws attention to a surveillant fascination with genitalia and revelation. As Nicholas L. Clarkson documents in his analysis of airport security protocols governing prostheses, including limbs and packies (silicone penis prostheses), genitals are a central component of the screening process. While it is stipulated that physical searches should not require travellers to remove items of clothing, such as underwear, or to expose their genitals to staff for inspection, prosthetics are routinely screened and examined. This practice can create tensions for trans or disabled passengers with prosthetics in so-called “sensitive” areas, particularly as guidelines for security measures are often implemented by airport staff who are not properly trained in transgender-sensitive protocols.ConclusionAccording to media technologies scholar Jeremy Packer, “rather than being treated as one to be protected from an exterior force and one’s self, the citizen is now treated as an always potential threat, a becoming bomb” (382). Although this technological policing impacts all who are subjected to security regimes (which is to say, everyone), this amalgamation of body and bomb has exacerbated the ways in which bodies socially coded as threatening or deceptive are targeted by security and surveillance regimes. Nonetheless, others have argued that the use of invasive forms of surveillance can be justified by the state as an exchange: that citizens should willingly give up their right to privacy in exchange for safety (Monahan 1). Rather than subscribing to this paradigm, Blas’ SANCTUM critiques the violence of mandatory complicity in this “trade-off” narrative. Because their operationalisation rests on normative notions of embodiment that are governed by preconceptions around gender, race, sexuality and ability, surveillance systems demand that bodies become transparent. This disproportionally affects those whose bodies do not match norms, with trans and queer bodies often becoming unreadable (Kafer and Grinberg). The shadowy realm of SANCTUM illustrates this tension between biometric revelation and resistance, but also suggests that opacity may be a tool of transformation in the face of such discriminatory violations that are built into surveillance.ReferencesAhmed, Sara. “A Phenomenology of Whiteness.” Feminist Theory 8.2 (2007): 149–68.Beauchamp, Toby. “Artful Concealment and Strategic Visibility: Transgender Bodies and U.S. State Surveillance after 9/11.” Surveillance & Society 6.4 (2009): 356–66.———. Going Stealth: Transgender Politics and U.S. Surveillance Practices. Durham, NC: Duke UP, 2019.Blas, Zach. “Informatic Opacity.” The Journal of Aesthetics and Protest 9 (2014). <http://www.joaap.org/issue9/zachblas.htm>.Blas, Zach, and Jacob Gaboury. 2016. “Biometrics and Opacity: A Conversation.” Camera Obscura: Feminism, Culture, and Media Studies 31.2 (2016): 154-65.Buolamwini, Joy, and Timnit Gebru. “Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification.” Proceedings of Machine Learning Research 81 (2018): 1-15.Browne, Simone. Dark Matters: On the Surveillance of Blackness. Durham, NC: Duke UP, 2015.Clarkson, Nicholas L. “Incoherent Assemblages: Transgender Conflicts in US Security.” Surveillance & Society 17.5 (2019): 618-30.Currah, Paisley, and Tara Mulqueen. “Securitizing Gender: Identity, Biometrics, and Transgender Bodies at the Airport.” Social Research 78.2 (2011): 556-82.Halberstam, Jack. The Queer Art of Failure. Durham: Duke UP, 2011.Hall, Rachel. “Terror and the Female Grotesque: Introducing Full-Body Scanners to U.S. Airports.” Feminist Surveillance Studies. Eds. Rachel E. Dubrofsky and Shoshana Amielle Magnet. Durham, NC: Duke UP, 2015. 127-49.Haraway, Donna. “Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective.” Feminist Studies 14.3 (1988): 575-99.———. Modest_Witness@Second_Millennium. FemaleMan_Meets_OncoMouse: Feminism and Technoscience. New York: Routledge, 1997.Kafer, Gary, and Daniel Grinberg. “Queer Surveillance.” Surveillance & Society 17.5 (2019): 592-601.Keyes, O.S. “The Misgendering Machines: Trans/HCI Implications of Automatic Gender Recognition.” Proceedings of the ACM on Human-Computer Interaction 2. CSCW, Article 88 (2018): 1-22.Magnet, Shoshana Amielle. When Biometrics Fail: Gender, Race, and the Technology of Identity. Durham: Duke UP, 2011.Magnet, Shoshana, and Tara Rodgers. “Stripping for the State: Whole Body Imaging Technologies and the Surveillance of Othered Bodies.” Feminist Media Studies 12.1 (2012): 101–18.Monahan, Torin. Surveillance and Security: Technological Politics and Power in Everyday Life. New York: Routledge, 2006.Packer, Jeremy. “Becoming Bombs: Mobilizing Mobility in the War of Terror.” Cultural Studies 10.5 (2006): 378-99.Pugliese, Joseph. “In Silico Race and the Heteronomy of Biometric Proxies: Biometrics in the Context of Civilian Life, Border Security and Counter-Terrorism Laws.” Australian Feminist Law Journal 23 (2005): 1-32.Pugliese, Joseph. Biometrics: Bodies, Technologies, Biopolitics New York: Routledge, 2010.Quinan, C.L. “Gender (In)securities: Surveillance and Transgender Bodies in a Post-9/11 Era of Neoliberalism.” Eds. Stef Wittendorp and Matthias Leese. Security/Mobility: Politics of Movement. Manchester: Manchester UP, 2017. 153-69.Quinan, C.L., and Nina Bresser. “Gender at the Border: Global Responses to Gender Diverse Subjectivities and Non-Binary Registration Practices.” Global Perspectives 1.1 (2020). <https://doi.org/10.1525/gp.2020.12553>.Sjoberg, Laura. “(S)he Shall Not Be Moved: Gender, Bodies and Travel Rights in the Post-9/11 Era.” Security Journal 28.2 (2015): 198-215.Spalding, Sally J. “Airport Outings: The Coalitional Possibilities of Affective Rupture.” Women’s Studies in Communication 39.4 (2016): 460-80.

APA, Harvard, Vancouver, ISO, and other styles

48

Stockwell, Stephen. "The Manufacture of World Order." M/C Journal 7, no.6 (January1, 2005). http://dx.doi.org/10.5204/mcj.2481.

Full text

Abstract:

Since the fall of the Berlin Wall, and most particularly since 9/11, the government of the United States has used its security services to enforce the order it desires for the world. The US government and its security services appreciate the importance of creating the ideological environment that allows them full-scope in their activities. To these ends they have turned to the movie industry which has not been slow in accommodating the purposes of the state. In establishing the parameters of the War Against Terror after 9/11, one of the Bush Administration’s first stops was Hollywood. White House strategist Karl Rove called what is now described as the Beverley Hills Summit on 19 November 2001 where top movie industry players including chairman of the Motion Picture Association of America, Jack Valenti met to discuss ways in which the movie industry could assist in the War Against Terror. After a ritual assertion of Hollywood’s independence, the movie industry’s powerbrokers signed up to the White House’s agenda: “that Americans must be called to national service; that Americans should support the troops; that this is a global war that needs a global response; that this is a war against evil” (Cooper 13). Good versus evil is, of course, a staple commodity for the movie industry but storylines never require the good guys to fight fair so with this statement the White House got what it really wanted: Hollywood’s promise to stay on the big picture in black and white while studiously avoiding the troubling detail in the exercise extra-judicial force and state-sanctioned murder. This is not to suggest that the movie industry is a monolithic ideological enterprise. Alternative voices like Mike Moore and Susan Sarandon still find space to speak. But the established economics of the scenario trade are too strong for the movie industry to resist: producers gain access to expensive weaponry to assist production if their story-lines are approved by Pentagon officials (‘Pentagon provides for Hollywood’); the Pentagon finances movie and gaming studios to provide original story formulas to keep their war-gaming relevant to emerging conditions (Lippman); and the Central Intelligence Agency’s “entertainment liaison officer” assists producers in story development and production (Gamson). In this context, the moulding of story-lines to the satisfaction of the Pentagon and CIA is not even an issue, and protestations of Hollywood’s independence is meaningless, as the movie industry pursues patriotic audiences at home and seeks to garner hearts and minds abroad. This is old history made new again. The Cold War in the 1950s saw movies addressing the disruption of world order not so much by Communists as by “others”: sci-fi aliens, schlock horror zombies, vampires and werewolves and mad scientists galore. By the 1960s the James Bond movie franchise, developed by MI5 operative Ian Fleming, saw Western secret agents ‘licensed to kill’ with the justification that such powers were required to deal with threats to world order, albeit by fanciful “others” such as the fanatical scientist Dr. No (1962). The Bond villains provide a catalogue of methods for the disruption of world order: commandeering atomic weapons and space flights, manipulating finance markets, mind control systems and so on. As the Soviet Union disintegrated, Hollywood produced a wealth of material that excused the paranoid nationalism of the security services through the hegemonic masculinity of stars such as Sylvester Stallone, Arnold Schwarzenegger, Steven Seagal and Bruce Willis (Beasley). Willis’s Die Hard franchise (1988/1990/1995) characterised US insouciance in the face of newly created terrorist threats. Willis personified the strategy of the Reagan, first Bush and Clinton administrations: a willingness to up the ante, second guess the terrorists and cower them with the display of firepower advantage. But the 1997 instalment of the James Bond franchise saw an important shift in expectations about the source of threats to world order. Tomorrow Never Dies features a media tycoon bent on world domination, manipulating the satellite feed, orchestrating conflicts and disasters in the name of ratings, market share and control. Having dealt with all kinds of Cold War plots, Bond is now confronted with the power of the media itself. As if to mark this shift, Austin Powers: International Man of Mystery (1997) made a mockery of the creatively bankrupt conventions of the spy genre. But it was the politically corrupt use to which the security services could be put that was troubling a string of big-budget filmmakers in the late 90s. In Enemy of the State (1998), an innocent lawyer finds himself targeted by the National Security Agency after receiving evidence of a political murder motivated by the push to extend the NSA’s powers. In Mercury Rising (1998), a renegade FBI agent protects an autistic boy who cracks a top-secret government code and becomes the target for assassins from an NSA-like organisation. Arlington Road (1999) features a college professor who learns too much about terrorist organisations and has his paranoia justified when he becomes the target of a complex operation to implicate him as a terrorist. The attacks on September 11 and subsequent Beverley Hills Summit had a major impact on movie product. Many film studios edited films (Spiderman) or postponed their release (Schwarzenegger’s Collateral Damage) where they were seen as too close to actual events but insufficiently patriotic (Townsend). The Bond franchise returned to its staple of fantastical villains. In Die Another Day (2002), the bad guy is a billionaire with a laser cannon. The critical perspective on the security services disappeared overnight. But the most interesting development has been how fantasy has become the key theme in a number of franchises dealing with world order that have had great box-office success since 9/11, particularly Lord of the Rings (2001/2/3) and Harry Potter (2001/2/4). While deeply entrenched in the fantasy genre, each of these franchises also addresses security issues: geo-political control in the Rings franchise; the subterfuges of the Ministry for Muggles in the _Potter _franchise. Looking at world order through the supernatural lens has particular appeal to audiences confronted with everyday threats. These fantasies follow George Bush’s rhetoric of the “axis of evil” in normalising the struggle for world order in term of black and white with the expectation that childish innocence and naïve ingenuity will prevail. Only now with three years hindsight since September 11 can we begin to see certain amount of self-reflection by disenchanted security staff return to the cinema. In Man on Fire (2004) the burned-out ex-CIA assassin has given up on life but regains some hope while guarding a child only to have everything disintegrate when the child is killed and he sets out on remorseless revenge. Spartan (2004) features a special forces officer who fails to find a girl and resorts to remorseless revenge as he becomes lost in a maze of security bureaucracies and chance events. Security service personnel once again have their doubts but only find redemption in violence and revenge without remorse. From consideration of films before and after September 11, it becomes apparent that the movie industry has delivered on their promises to the Bush administration. The first response has been the shift to fantasy that, in historical terms, will be seen as akin to the shift to musicals in the Depression. The flight to fantasy makes the point that complex situations can be reduced to simple moral decisions under the rubric of good versus evil, which is precisely what the US administration requested. The second, more recent response has been to accept disenchantment with the personal costs of the War on Terror but still validate remorseless revenge. Quentin Tarantino’s Kill Bill franchise (2003/4) seeks to do both. Thus the will to world order being fought out in the streets of Iraq is sublimated into fantasy or excused as a natural response to a world of violence. It is interesting to note that television has provided more opportunities for the productive consideration of world order and the security services than the movies since September 11. While programs that have had input from the CIA’s “entertainment liaison officer” such as teen-oriented, Buffy-inspired Alias and quasi-authentic The Agency provide a no-nonsense justification for the War on Terror (Gamson), others such as 24, West Wing _and _Threat Matrix have confronted the moral problems of torture and murder in the War on Terrorism. 24 uses reality TV conventions of real-time plot, split screen exposition, unexpected interventions and a close focus on personal emotions to explore the interactions between a US President and an officer in the Counter Terrorism Unit. The CTU officer does not hesitate to summarily behead a criminal or kill a colleague for operational purposes and the president takes only a little longer to begin torturing recalcitrant members of his own staff. Similarly, the president in West Wing orders the extra-judicial death of a troublesome player and the team in Threat Matrix are ready to exceeded their powers. But in these programs the characters struggle with the moral consequences of their violent acts, particularly as family members are drawn into the plot. A running theme of Threat Matrix is the debate within the group of their choices between gung-ho militarism and peaceful diplomacy: the consequences of a simplistic, hawkish approach are explored when an Arab-American college professor is wrongfully accused of supporting terrorists and driven towards the terrorists because of his very ordeal of wrongful accusation. The world is not black and white. Almost half the US electorate voted for John Kerry. Television still must cater for liberal, and wealthy, demographics who welcome the extended format of weekly television that allows a continuing engagement with questions of good or evil and whether there is difference between them any more. Against the simple world view of the Bush administration we have the complexities of the real world. References Beasley, Chris. “Reel Politics.” Australian Political Studies Association Conference, University of Adelaide, 2004. Cooper, Marc. “Lights! Cameras! Attack!: Hollywood Enlists.” The Nation 10 December 2001: 13-16. Gamson, J. “Double Agents.” The American Prospect 12.21 (3 December 2001): 38-9. Lippman, John. “Hollywood Casts About for a War Role.” Wall Street Journal 9 November 2001: A1. “Pentagon Provides for Hollywood.” USA Today 29 March 2001. http://www.usatoday.com/life/movies/2001-05-17-pentagon-helps-hollywood.htm>. Townsend, Gary. “Hollywood Uses Selective Censorship after 9/11.” e.press 12 December 2002. http://www.scc.losrios.edu/~express/021212hollywood.html>. Citation reference for this article MLA Style Stockwell, Stephen. "The Manufacture of World Order: The Security Services and the Movie Industry." M/C Journal 7.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0501/10-stockwell.php>. APA Style Stockwell, S. (Jan. 2005) "The Manufacture of World Order: The Security Services and the Movie Industry," M/C Journal, 7(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0501/10-stockwell.php>.

APA, Harvard, Vancouver, ISO, and other styles

49

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no.5 (October1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text

Abstract:

On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusem*nt – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.

APA, Harvard, Vancouver, ISO, and other styles

50

Musgrove, Brian Michael. "Recovering Public Memory: Politics, Aesthetics and Contempt." M/C Journal 11, no.6 (November28, 2008). http://dx.doi.org/10.5204/mcj.108.

Full text

Abstract:

1. Guy Debord in the Land of the Long WeekendIt’s the weekend – leisure time. It’s the interlude when, Guy Debord contends, the proletarian is briefly free of the “total contempt so clearly built into every aspect of the organization and management of production” in commodity capitalism; when workers are temporarily “treated like grown-ups, with a great show of solicitude and politeness, in their new role as consumers.” But this patronising show turns out to be another form of subjection to the diktats of “political economy”: “the totality of human existence falls under the regime of the ‘perfected denial of man’.” (30). As Debord suggests, even the creation of leisure time and space is predicated upon a form of contempt: the “perfected denial” of who we, as living people, really are in the eyes of those who presume the power to legislate our working practices and private identities.This Saturday The Weekend Australian runs an opinion piece by Christopher Pearson, defending ABC Radio National’s Stephen Crittenden, whose program The Religion Report has been axed. “Some of Crittenden’s finest half-hours have been devoted to Islam in Australia in the wake of September 11,” Pearson writes. “Again and again he’s confronted a left-of-centre audience that expected multi-cultural pieties with disturbing assertions.” Along the way in this admirable Crusade, Pearson notes that Crittenden has exposed “the Left’s recent tendency to ally itself with Islam.” According to Pearson, Crittenden has also thankfully given oxygen to claims by James Cook University’s Mervyn Bendle, the “fairly conservative academic whose work sometimes appears in [these] pages,” that “the discipline of critical terrorism studies has been captured by neo-Marxists of a postmodern bent” (30). Both of these points are well beyond misunderstanding or untested proposition. If Pearson means them sincerely he should be embarrassed and sacked. But of course he does not and will not be. These are deliberate lies, the confabulations of an eminent right-wing culture warrior whose job is to vilify minorities and intellectuals (Bendle escapes censure as an academic because he occasionally scribbles for the Murdoch press). It should be observed, too, how the patent absurdity of Pearson’s remarks reveals the extent to which he holds the intelligence of his readers in contempt. And he is not original in peddling these toxic wares.In their insightful—often hilarious—study of Australian opinion writers, The War on Democracy, Niall Lucy and Steve Mickler identify the left-academic-Islam nexus as the brain-child of former Treasurer-cum-memoirist Peter Costello. The germinal moment was “a speech to the Australian American Leadership Dialogue forum at the Art Gallery of NSW in 2005” concerning anti-Americanism in Australian schools. Lucy and Mickler argue that “it was only a matter of time” before a conservative politician or journalist took the plunge to link the left and terrorism, and Costello plunged brilliantly. He drew a mental map of the Great Chain of Being: left-wing academics taught teacher trainees to be anti-American; teacher trainees became teachers and taught kids to be anti-American; anti-Americanism morphs into anti-Westernism; anti-Westernism veers into terrorism (38). This is contempt for the reasoning capacity of the Australian people and, further still, contempt for any observable reality. Not for nothing was Costello generally perceived by the public as a politician whose very physiognomy radiated smugness and contempt.Recycling Costello, Christopher Pearson’s article subtly interpellates the reader as an ordinary, common-sense individual who instinctively feels what’s right and has no need to think too much—thinking too much is the prerogative of “neo-Marxists” and postmodernists. Ultimately, Pearson’s article is about channelling outrage: directing the down-to-earth passions of the Australian people against stock-in-trade culture-war hate figures. And in Pearson’s paranoid world, words like “neo-Marxist” and “postmodern” are devoid of historical or intellectual meaning. They are, as Lucy and Mickler’s War on Democracy repeatedly demonstrate, mere ciphers packed with the baggage of contempt for independent critical thought itself.Contempt is everywhere this weekend. The Weekend Australian’s colour magazine runs a feature story on Malcolm Turnbull: one of those familiar profiles designed to reveal the everyday human touch of the political classes. In this puff-piece, Jennifer Hewett finds Turnbull has “a restless passion for participating in public life” (20); that beneath “the aggressive political rhetoric […] behind the journalist turned lawyer turned banker turned politician turned would-be prime minister is a man who really enjoys that human interaction, however brief, with the many, many ordinary people he encounters” (16). Given all this energetic turning, it’s a wonder that Turnbull has time for human interactions at all. The distinction here of Turnbull and “many, many ordinary people” – the anonymous masses – surely runs counter to Hewett’s brief to personalise and quotidianise him. Likewise, those two key words, “however brief”, have an unfortunate, unintended effect. Presumably meant to conjure a picture of Turnbull’s hectic schedules and serial turnings, the words also convey the image of a patrician who begrudgingly knows one of the costs of a political career is that common flesh must be pressed—but as gingerly as possible.Hewett proceeds to disclose that Turnbull is “no conservative cultural warrior”, “onfounds stereotypes” and “hates labels” (like any baby-boomer rebel) and “has always read widely on political philosophy—his favourite is Edmund Burke”. He sees the “role of the state above all as enabling people to do their best” but knows that “the main game is the economy” and is “content to play mainstream gesture politics” (19). I am genuinely puzzled by this and imagine that my intelligence is being held in contempt once again. That the man of substance is given to populist gesturing is problematic enough; but that the Burke fan believes the state is about personal empowerment is just too much. Maybe Turnbull is a fan of Burke’s complex writings on the sublime and the beautiful—but no, Hewett avers, Turnbull is engaged by Burke’s “political philosophy”. So what is it in Burke that Turnbull finds to favour?Turnbull’s invocation of Edmund Burke is empty, gestural and contradictory. The comfortable notion that the state helps people to realise their potential is contravened by Burke’s view that the state functions so “the inclinations of men should frequently be thwarted, their will controlled, and their passions brought into subjection… by a power out of themselves” (151). Nor does Burke believe that anyone of humble origins could or should rise to the top of the social heap: “The occupation of an hair-dresser, or of a working tallow-chandler, cannot be a matter of honour to any person… the state suffers oppression, if such as they, either individually or collectively, are permitted to rule” (138).If Turnbull’s main game as a would-be statesman is the economy, Burke profoundly disagrees: “the state ought not to be considered as nothing better than a partnership agreement in a trade of pepper and coffee, callico or tobacco, or some other such low concern… It is a partnership in all science; a partnership in all art; a partnership in every virtue, and in all perfection”—a sublime entity, not an economic manager (194). Burke understands, long before Antonio Gramsci or Louis Althusser, that individuals or social fractions must be made admirably “obedient” to the state “by consent or force” (195). Burke has a verdict on mainstream gesture politics too: “When men of rank sacrifice all ideas of dignity to an ambition without a distinct object, and work with low instruments and for low ends, the whole composition [of the state] becomes low and base” (136).Is Malcolm Turnbull so contemptuous of the public that he assumes nobody will notice the gross discrepancies between his own ideals and what Burke stands for? His invocation of Burke is, indeed, “mainstream gesture politics”: on one level, “Burke” signifies nothing more than Turnbull’s performance of himself as a deep thinker. In this process, the real Edmund Burke is historically erased; reduced to the status of stage-prop in the theatrical production of Turnbull’s mass-mediated identity. “Edmund Burke” is re-invented as a term in an aesthetic repertoire.This transmutation of knowledge and history into mere cipher is the staple trick of culture-war discourse. Jennifer Hewett casts Turnbull as “no conservative culture warrior”, but he certainly shows a facility with culture-war rhetoric. And as much as Turnbull “confounds stereotypes” his verbal gesture to Edmund Burke entrenches a stereotype: at another level, the incantation “Edmund Burke” is implicitly meant to connect Turnbull with conservative tradition—in the exact way that John Howard regularly self-nominated as a “Burkean conservative”.This appeal to tradition effectively places “the people” in a power relation. Tradition has a sublimity that is bigger than us; it precedes us and will outlast us. Consequently, for a politician to claim that tradition has fashioned him, that he is welded to it or perhaps even owns it as part of his heritage, is to glibly imply an authority greater than that of “the many, many ordinary people”—Burke’s hair-dressers and tallow-chandlers—whose company he so briefly enjoys.In The Ideology of the Aesthetic, Terry Eagleton assesses one of Burke’s important legacies, placing him beside another eighteenth-century thinker so loved by the right—Adam Smith. Ideology of the Aesthetic is premised on the view that “Aesthetics is born as a discourse of the body”; that the aesthetic gives form to the “primitive materialism” of human passions and organises “the whole of our sensate life together… a society’s somatic, sensational life” (13). Reading Smith’s Theory of Moral Sentiments, Eagleton discerns that society appears as “an immense machine, whose regular and harmonious movements produce a thousand agreeable effects”, like “any production of human art”. In Smith’s work, the “whole of social life is aestheticized” and people inhabit “a social order so spontaneously cohesive that its members no longer need to think about it.” In Burke, Eagleton discovers that the aesthetics of “manners” can be understood in terms of Gramscian hegemony: “in the aesthetics of social conduct, or ‘culture’ as it would later be called, the law is always with us, as the very unconscious structure of our life”, and as a result conformity to a dominant ideological order is deeply felt as pleasurable and beautiful (37, 42). When this conservative aesthetic enters the realm of politics, Eagleton contends, the “right turn, from Burke” onwards follows a dark trajectory: “forget about theoretical analysis… view society as a self-grounding organism, all of whose parts miraculously interpenetrate without conflict and require no rational justification. Think with the blood and the body. Remember that tradition is always wiser and richer than one’s own poor, pitiable ego. It is this line of descent, in one of its tributaries, which will lead to the Third Reich” (368–9).2. Jean Baudrillard, the Nazis and Public MemoryIn 1937, during the Spanish Civil War, the Third Reich’s Condor Legion of the Luftwaffe was on loan to Franco’s forces. On 26 April that year, the Condor Legion bombed the market-town of Guernica: the first deliberate attempt to obliterate an entire town from the air and the first experiment in what became known as “terror bombing”—the targeting of civilians. A legacy of this violence was Pablo Picasso’s monumental canvas Guernica – the best-known anti-war painting in art history.When US Secretary of State Colin Powell addressed the United Nations on 5 February 2003 to make the case for war on Iraq, he stopped to face the press in the UN building’s lobby. The doorstop was globally televised, packaged as a moment of incredible significance: history in the making. It was also theatre: a moment in which history was staged as “event” and the real traces of history were carefully erased. Millions of viewers world-wide were undoubtedly unaware that the blue backdrop before which Powell stood was specifically designed to cover the full-scale tapestry copy of Picasso’s Guernica. This one-act, agitprop drama was a splendid example of politics as aesthetic action: a “performance” of history in the making which required the loss of actual historical memory enshrined in Guernica. Powell’s performance took its cues from the culture wars, which require the ceaseless erasure of history and public memory—on this occasion enacted on a breathtaking global, rather than national, scale.Inside the UN chamber, Powell’s performance was equally staged-crafted. As he brandished vials of ersatz anthrax, the power-point behind him (the theatrical set) showed artists’ impressions of imaginary mobile chemical weapons laboratories. Powell was playing lead role in a kind of populist, hyperreal production. It was Jean Baudrillard’s postmodernism, no less, as the media space in which Powell acted out the drama was not a secondary representation of reality but a reality of its own; the overheads of mobile weapons labs were simulacra, “models of a real without origins or reality”, pictures referring to nothing but themselves (2). In short, Powell’s performance was anchored in a “semiurgic” aesthetic; and it was a dreadful real-life enactment of Walter Benjamin’s maxim that “All efforts to render politics aesthetic culminate in one thing: war” (241).For Benjamin, “Fascism attempts to organize the newly created proletarian masses without affecting the property structure which the masses strive to eliminate.” Fascism gave “these masses not their right, but instead a chance to express themselves.” In turn, this required “the introduction of aesthetics into politics”, the objective of which was “the production of ritual values” (241). Under Adolf Hitler’s Reich, people were able to express themselves but only via the rehearsal of officially produced ritual values: by their participation in the disquisition on what Germany meant and what it meant to be German, by the aesthetic regulation of their passions. As Frederic Spotts’ fine study Hitler and the Power of Aesthetics reveals, this passionate disquisition permeated public and private life, through the artfully constructed total field of national narratives, myths, symbols and iconographies. And the ritualistic reiteration of national values in Nazi Germany hinged on two things: contempt and memory loss.By April 1945, as Berlin fell, Hitler’s contempt for the German people was at its apogee. Hitler ordered a scorched earth operation: the destruction of everything from factories to farms to food stores. The Russians would get nothing, the German people would perish. Albert Speer refused to implement the plan and remembered that “Until then… Germany and Hitler had been synonymous in my mind. But now I saw two entities opposed… A passionate love of one’s country… a leader who seemed to hate his people” (Sereny 472). But Hitler’s contempt for the German people was betrayed in the blusterous pages of Mein Kampf years earlier: “The receptivity of the great masses is very limited, their intelligence is small, but their power of forgetting is enormous” (165). On the back of this belief, Hitler launched what today would be called a culture war, with its Jewish folk devils, loathsome Marxist intellectuals, incitement of popular passions, invented traditions, historical erasures and constant iteration of values.When Theodor Adorno and Max Horkheimer fled Fascism, landing in the United States, their view of capitalist democracy borrowed from Benjamin and anticipated both Baudrillard and Guy Debord. In their well-know essay on “The Culture Industry”, in Dialectic of Enlightenment, they applied Benjamin’s insight on mass self-expression and the maintenance of property relations and ritual values to American popular culture: “All are free to dance and enjoy themselves”, but the freedom to choose how to do so “proves to be the freedom to choose what is always the same”, manufactured by monopoly capital (161–162). Anticipating Baudrillard, they found a society in which “only the copy appears: in the movie theatre, the photograph; on the radio, the recording” (143). And anticipating Debord’s “perfected denial of man” they found a society where work and leisure were structured by the repetition-compulsion principles of capitalism: where people became consumers who appeared “s statistics on research organization charts” (123). “Culture” came to do people’s thinking for them: “Pleasure always means not to think about anything, to forget suffering even where it is shown” (144).In this mass-mediated environment, a culture of repetitions, simulacra, billboards and flickering screens, Adorno and Horkheimer concluded that language lost its historical anchorages: “Innumerable people use words and expressions which they have either ceased to understand or employ only because they trigger off conditioned reflexes” in precisely the same way that the illusory “free” expression of passions in Germany operated, where words were “debased by the Fascist pseudo-folk community” (166).I know that the turf of the culture wars, the US and Australia, are not Fascist states; and I know that “the first one to mention the Nazis loses the argument”. I know, too, that there are obvious shortcomings in Adorno and Horkheimer’s reactions to popular culture and these have been widely criticised. However, I would suggest that there is a great deal of value still in Frankfurt School analyses of what we might call the “authoritarian popular” which can be applied to the conservative prosecution of populist culture wars today. Think, for example, how the concept of a “pseudo folk community” might well describe the earthy, common-sense public constructed and interpellated by right-wing culture warriors: America’s Joe Six-Pack, John Howard’s battlers or Kevin Rudd’s working families.In fact, Adorno and Horkheimer’s observations on language go to the heart of a contemporary culture war strategy. Words lose their history, becoming ciphers and “triggers” in a politicised lexicon. Later, Roland Barthes would write that this is a form of myth-making: “myth is constituted by the loss of the historical quality of things.” Barthes reasoned further that “Bourgeois ideology continuously transforms the products of history into essential types”, generating a “cultural logic” and an ideological re-ordering of the world (142). Types such as “neo-Marxist”, “postmodernist” and “Burkean conservative”.Surely, Benjamin’s assessment that Fascism gives “the people” the occasion to express itself, but only through “values”, describes the right’s pernicious incitement of the mythic “dispossessed mainstream” to reclaim its voice: to shout down the noisy minorities—the gays, greenies, blacks, feminists, multiculturalists and neo-Marxist postmodernists—who’ve apparently been running the show. Even more telling, Benjamin’s insight that the incitement to self-expression is connected to the maintenance of property relations, to economic power, is crucial to understanding the contemptuous conduct of culture wars.3. Jesus Dunked in Urine from Kansas to CronullaAmerican commentator Thomas Frank bases his study What’s the Matter with Kansas? on this very point. Subtitled How Conservatives Won the Heart of America, Frank’s book is a striking analysis of the indexation of Chicago School free-market reform and the mobilisation of “explosive social issues—summoning public outrage over everything from busing to un-Christian art—which it then marries to pro-business policies”; but it is the “economic achievements” of free-market capitalism, “not the forgettable skirmishes of the never-ending culture wars” that are conservatism’s “greatest monuments.” Nevertheless, the culture wars are necessary as Chicago School economic thinking consigns American communities to the rust belt. The promise of “free-market miracles” fails ordinary Americans, Frank reasons, leaving them in “backlash” mode: angry, bewildered and broke. And in this context, culture wars are a convenient form of anger management: “Because some artist decides to shock the hicks by dunking Jesus in urine, the entire planet must remake itself along the lines preferred” by nationalist, populist moralism and free-market fundamentalism (5).When John Howard received the neo-conservative American Enterprise Institute’s Irving Kristol Award, on 6 March 2008, he gave a speech in Washington titled “Sharing Our Common Values”. The nub of the speech was Howard’s revelation that he understood the index of neo-liberal economics and culture wars precisely as Thomas Frank does. Howard told the AEI audience that under his prime ministership Australia had “pursued reform and further modernisation of our economy” and that this inevitably meant “dislocation for communities”. This “reform-dislocation” package needed the palliative of a culture war, with his government preaching the “consistency and reassurance” of “our nation’s traditional values… pride in her history”; his government “became assertive about the intrinsic worth of our national identity. In the process we ended the seemingly endless seminar about that identity which had been in progress for some years.” Howard’s boast that his government ended the “seminar” on national identity insinuates an important point. “Seminar” is a culture-war cipher for intellection, just as “pride” is code for passion; so Howard’s self-proclaimed achievement, in Terry Eagleton’s terms, was to valorise “the blood and the body” over “theoretical analysis”. This speaks stratospheric contempt: ordinary people have their identity fashioned for them; they need not think about it, only feel it deeply and passionately according to “ritual values”. Undoubtedly this paved the way to Cronulla.The rubric of Howard’s speech—“Sharing Our Common Values”—was both a homage to international neo-conservatism and a reminder that culture wars are a trans-national phenomenon. In his address, Howard said that in all his “years in politics” he had not heard a “more evocative political slogan” than Ronald Reagan’s “Morning in America”—the rhetorical catch-cry for moral re-awakening that launched the culture wars. According to Lawrence Grossberg, America’s culture wars were predicated on the perception that the nation was afflicted by “a crisis of our lack of passion, of not caring enough about the values we hold… a crisis of nihilism which, while not restructuring our ideological beliefs, has undermined our ability to organise effective action on their behalf”; and this “New Right” alarmism “operates in the conjuncture of economics and popular culture” and “a popular struggle by which culture can lead politics” in the passionate pursuit of ritual values (31–2). When popular culture leads politics in this way we are in the zone of the image, myth and Adorno and Horkheimer’s “trigger words” that have lost their history. In this context, McKenzie Wark observes that “radical writers influenced by Marx will see the idea of culture as compensation for a fragmented and alienated life as a con. Guy Debord, perhaps the last of the great revolutionary thinkers of Europe, will call it “the spectacle”’ (20). Adorno and Horkheimer might well have called it “the authoritarian popular”. As Jonathan Charteris-Black’s work capably demonstrates, all politicians have their own idiolect: their personally coded language, preferred narratives and myths; their own vision of who “the people” might or should be that is conjured in their words. But the language of the culture wars is different. It is not a personal idiolect. It is a shared vocabulary, a networked vernacular, a pervasive trans-national aesthetic that pivots on the fact that words like “neo-Marxist”, “postmodern” and “Edmund Burke” have no historical or intellectual context or content: they exist as the ciphers of “values”. And the fact that culture warriors continually mouth them is a supreme act of contempt: it robs the public of its memory. And that’s why, as Lucy and Mickler’s War on Democracy so wittily argues, if there are any postmodernists left they’ll be on the right.Benjamin, Adorno, Horkheimer and, later, Debord and Grossberg understood how the political activation of the popular constitutes a hegemonic project. The result is nothing short of persuading “the people” to collaborate in its own oppression. The activation of the popular is perfectly geared to an age where the main stage of political life is the mainstream media; an age in which, Charteris-Black notes, political classes assume the general antipathy of publics to social change and act on the principle that the most effective political messages are sold to “the people” by an appeal “to familiar experiences”—market populism (10). In her substantial study The Persuaders, Sally Young cites an Australian Labor Party survey, conducted by pollster Rod Cameron in the late 1970s, in which the party’s message machine was finely tuned to this populist position. The survey also dripped with contempt for ordinary people: their “Interest in political philosophy… is very low… They are essentially the products (and supporters) of mass market commercialism”. Young observes that this view of “the people” was the foundation of a new order of political advertising and the conduct of politics on the mass-media stage. Cameron’s profile of “ordinary people” went on to assert that they are fatally attracted to “a moderate leader who is strong… but can understand and represent their value system” (47): a prescription for populist discourse which begs the question of whether the values a politician or party represent via the media are ever really those of “the people”. More likely, people are hegemonised into a value system which they take to be theirs. Writing of the media side of the equation, David Salter raises the point that when media “moguls thunder about ‘the public interest’ what they really mean is ‘what we think the public is interested in”, which is quite another matter… Why this self-serving deception is still so sheepishly accepted by the same public it is so often used to violate remains a mystery” (40).Sally Young’s Persuaders retails a story that she sees as “symbolic” of the new world of mass-mediated political life. The story concerns Mark Latham and his “revolutionary” journeys to regional Australia to meet the people. “When a political leader who holds a public meeting is dubbed a ‘revolutionary’”, Young rightly observes, “something has gone seriously wrong”. She notes how Latham’s “use of old-fashioned ‘meet-and-greet’campaigning methods was seen as a breath of fresh air because it was unlike the type of packaged, stage-managed and media-dependent politics that have become the norm in Australia.” Except that it wasn’t. “A media pack of thirty journalists trailed Latham in a bus”, meaning, that he was not meeting the people at all (6–7). He was traducing the people as participants in a media spectacle, as his “meet and greet” was designed to fill the image-banks of print and electronic media. Even meeting the people becomes a media pseudo-event in which the people impersonate the people for the camera’s benefit; a spectacle as artfully deceitful as Colin Powell’s UN performance on Iraq.If the success of this kind of “self-serving deception” is a mystery to David Salter, it would not be so to the Frankfurt School. For them, an understanding of the processes of mass-mediated politics sits somewhere near the core of their analysis of the culture industries in the “democratic” world. I think the Frankfurt school should be restored to a more important role in the project of cultural studies. Apart from an aversion to jazz and other supposedly “elitist” heresies, thinkers like Adorno, Benjamin, Horkheimer and their progeny Debord have a functional claim to provide the theory for us to expose the machinations of the politics of contempt and its aesthetic ruses.ReferencesAdorno, Theodor and Max Horkheimer. "The Culture Industry: Enlightenment as Mass Deception." Dialectic of Enlightenment. London: Verso, 1979. 120–167.Barthes Roland. “Myth Today.” Mythologies. Trans. Annette Lavers. St Albans: Paladin, 1972. 109–58.Baudrillard, Jean. Simulations. New York: Semiotext(e), 1983.Benjamin, Walter. “The Work of Art in the Age of Mechanical Reproduction.” Illuminations. Ed. Hannah Arendt. Trans. Harry Zorn. New York: Schocken Books, 1969. 217–251.Burke, Edmund. Reflections on the Revolution in France. Ed. Conor Cruise O’Brien. Harmondsworth: Penguin, 1969.Charteris-Black, Jonathan. Politicians and Rhetoric: The Persuasive Power of Metaphor. Houndmills: Palgrave Macmillan, 2006.Debord, Guy. The Society of the Spectacle. Trans. Donald Nicholson-Smith. New York: Zone Books, 1994.Eagleton, Terry. The Ideology of the Aesthetic. Oxford: Basil Blackwell, 1990.Frank, Thomas. What’s the Matter with Kansas?: How Conservatives Won the Heart of America. New York: Henry Holt and Company, 2004.Grossberg, Lawrence. “It’s a Sin: Politics, Post-Modernity and the Popular.” It’s a Sin: Essays on Postmodern Politics & Culture. Eds. Tony Fry, Ann Curthoys and Paul Patton. Sydney: Power Publications, 1988. 6–71.Hewett, Jennifer. “The Opportunist.” The Weekend Australian Magazine. 25–26 October 2008. 16–22.Hitler, Adolf. Mein Kampf. Trans. Ralph Manheim. London: Pimlico, 1993.Howard, John. “Sharing Our Common Values.” Washington: Irving Kristol Lecture, American Enterprise Institute. 5 March 2008. ‹http://www.theaustralian.news.com.au/story/0,25197,233328945-5014047,00html›.Lucy, Niall and Steve Mickler. The War on Democracy: Conservative Opinion in the Australian Press. Crawley: University of Western Australia Press, 2006.Pearson, Christopher. “Pray for Sense to Prevail.” The Weekend Australian. 25–26 October 2008. 30.Salter, David. The Media We Deserve: Underachievement in the Fourth Estate. Melbourne: Melbourne UP, 2007. Sereny, Gitta. Albert Speer: His Battle with Truth. London: Picador, 1996.Spotts, Frederic. Hitler and the Power of Aesthetics. London: Pimlico, 2003.Wark, McKenzie. The Virtual Republic: Australia’s Culture Wars of the 1990s. St Leonards: Allen & Unwin, 1997.Young, Sally. The Persuaders: Inside the Hidden Machine of Political Advertising. Melbourne: Pluto Press, 2004.

APA, Harvard, Vancouver, ISO, and other styles

You might also be interested in the bibliographies on the topic 'United States. Air Force Weapons systems' for other source types:

Books

We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography
Journal articles: 'United States. Air Force Weapons systems' – Grafiati (2024)

References

Top Articles
Ari Kytsya Biography, Real Name, Age, Family Life, Affairs, Net Worth
“Murasaki Shikibu and Fujiwara no Michinaga”: Literature and Power in the Heian Court
jazmen00 x & jazmen00 mega| Discover
Tesla Supercharger La Crosse Photos
oklahoma city for sale "new tulsa" - craigslist
Kansas Craigslist Free Stuff
Brgeneral Patient Portal
Google Jobs Denver
Fototour verlassener Fliegerhorst Schönwald [Lost Place Brandenburg]
Gameday Red Sox
Barstool Sports Gif
Robot or human?
Shemal Cartoon
6th gen chevy camaro forumCamaro ZL1 Z28 SS LT Camaro forums, news, blog, reviews, wallpapers, pricing – Camaro5.com
Busted Newspaper S Randolph County Dirt The Press As Pawns
ocala cars & trucks - by owner - craigslist
National Office Liquidators Llc
[Birthday Column] Celebrating Sarada's Birthday on 3/31! Looking Back on the Successor to the Uchiha Legacy Who Dreams of Becoming Hokage! | NARUTO OFFICIAL SITE (NARUTO & BORUTO)
Lista trofeów | Jedi Upadły Zakon / Fallen Order - Star Wars Jedi Fallen Order - poradnik do gry | GRYOnline.pl
Best Mechanics Near You - Brake Masters Auto Repair Shops
Www.publicsurplus.com Motor Pool
683 Job Calls
Ihub Fnma Message Board
Scripchat Gratis
Sessional Dates U Of T
Gilchrist Verband - Lumedis - Ihre Schulterspezialisten
R Baldurs Gate 3
Progressbook Newark
Bfri Forum
Landing Page Winn Dixie
Rund um die SIM-Karte | ALDI TALK
Wcostream Attack On Titan
Netherforged Lavaproof Boots
Diana Lolalytics
Steven Batash Md Pc Photos
Ippa 番号
Dr Adj Redist Cadv Prin Amex Charge
Raising Canes Franchise Cost
Mandy Rose - WWE News, Rumors, & Updates
Lyca Shop Near Me
Download Diablo 2 From Blizzard
Guy Ritchie's The Covenant Showtimes Near Grand Theatres - Bismarck
Saline Inmate Roster
Spurs Basketball Reference
Breaking down the Stafford trade
Hello – Cornerstone Chapel
City Of Irving Tx Jail In-Custody List
Barback Salary in 2024: Comprehensive Guide | OysterLink
Cvs Minute Clinic Women's Services
Lira Galore Age, Wikipedia, Height, Husband, Boyfriend, Family, Biography, Net Worth
Where and How to Watch Sound of Freedom | Angel Studios
Home | General Store and Gas Station | Cressman's General Store | California
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 5803

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.