...related matters are dealt with by different governmental organizations. The Department of Defense (DOD) is responsible for the operational nuclear stockpile (Arkin and Norris, 1997). In addition that, the Department of Defense is also involved in dismantling retired nuclear stockpile and other nuclear weapons (“The Nuclear Matters Handbook”, 2011). The Department of Energy (DOE) is responsible for carrying out research activities, producing nuclear weapons, and dismantling nuclear warheads and radioactive substances. The Department of Energy also handles nuclear weapons that are being repaired and carries out quality assurance activities to ensure maximum quality of the weapons produced (Arkin and Norris, 1997; “The Nuclear Matters Handbook”, 2011). The Department of Defense and the Department of Energy are jointly responsible for nuclear weapons under the National Nuclear Security Administration (NNSA). The NNSA itself is responsible for supervising and overlooking domains such as “design, evaluation, quality assurance, repair, modification, refurbishment, dismantlement, disposal, and security” of nuclear weapons that are under the charge of the DOE (“The Nuclear Matters Handbook”, 2011). On the other hand the DOD is primarily involved in handling all the nuclear weapons; it sets the requirements for the nuclear weapons; creates, fields, and maintains...
Words: 516 - Pages: 3
...has been said that the USSR was the first in the development of the computer and the internet in 1957. Although, these are only assumptions due to the lack of data recorded and the grudge held by the United States. The USSR launched a satellite called Sputnik to be the first artifical Earth satellite. In response to this, the United States created an organization called the Advanced Research Projects Agency (ARPA) within the Department of Defense to compete with the USSR’s advancements in technology. Soon the Advanced Research Projects Agency became the leader in science and computer technology. Later, in 1962 Paul Baran of the RAND Corporation was hired by the U.S. Air Force to do a study in order to find a network that could be used as a military defensive strategy in response to a nuclear military attack. Baran's finished document described several ways to accomplish this. His final proposal was a packet switched network. Between 1968 and 1972 the BBN had control of a contract awarded to them by the Advanced Research Projects Agency later renamed the Defense Advanced Research Projects Agency (DARPA). BBN had hubs in 4 relatively close University on the west coast including University of California Santa Barbara, University of Utah, University of California Los Angeles, and Stanford University. These schools were all connected with a...
Words: 1278 - Pages: 6
...surface, creating molecular forces of attraction” (Barrie). As more force is put on the gloves or pressure the stronger the grip to the surface, it is touching this is due to the forces of van der Waals and has to do with molecular attraction. Also, the larger the glove the more weight it can be able to support. Although these gloves can support a large amount of weight, the amount of effort it takes to release is quite minimal and easy due to the fact that the glove is compressing and less adhesive is holding it to the surface which then makes it easy to take off. The prototype came out recently and had been able to support up to 250 lbs. Currently they are still researching this and have received some help from DARPA, Defense Advanced Research Project Agency, which is funding their...
Words: 1128 - Pages: 5
...networks or users that comprise the Internet, but it is easily in the thousands and millions respectively. The Internet is also what we call a distributed system; there is no central archive. Technically, no one runs the Internet. HISTORY & DEVELOPMENT • In early 1970 – Defense Advance Research Project Agency (DARPA) of United States sponsored a research project that will design and develop an advanced mechanism for facilitating the flow of information between distributed computers. • Advance Research Project Agency (ARPA) funded the initial creation of the packet-switched network called the ARPANet. • Several other universities started joining the ARPANet and it reached a point when it had to be divided into two parts: 1. MILNet – for the military 2. ARPANet – for the non-military • By mid 1980’s – ARPANet had grown to more than 200 linked network with thousand of computers. • Recognizing the potential of ARPANet, a major network of research, education, and communication, the National Science Foundation (NSF) developed the NSFNet. • Different backbone network was created shortly after the NSFNet backbone was put into place. They are the NASANet (National Aeronautics and Space Agency), ESNet (Department of Energy) and other numerous organizations. • Today it has grown to what we call the...
Words: 265 - Pages: 2
...1. Describe the firm (who they are and what they do) and the amount of business they do with the federal government. Lockheed Martin was formed in 1995 by combining the businesses of Lockheed Corporation and Martin Marietta Corporation. Lockheed is based out of Maryland and is a global security and aerospace company and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. (Lockheed Martin Corporation, 2012) Lockheed divides its services into four broad major categories: Aeronautics Electronic Systems Information Systems & Global Solutions (IS&GS) Space Systems (Lockheed Martin Corporation, 2012) Majority of Lockheed Martin's business is with the U.S. Department of Defense and the U.S. federal government agencies. Lockheed Martin is the largest provider of IT services, systems integration, and training to the U.S. Government and employs approximately 120,000 in the U.S. and internationally. (Lockheed Martin Corporation, 2012) According to Lockheed’s 2011 Annual report 82% of that year’s net sales were attributed to the U.S. Government. In 2011 Lockheed had $46.5 billion in net sales. (Lockheed Martin Corporation, 2012, p. 3) As a U.S. Army Corps of Engineers employee I have daily contact with Lockheed Martin as they are the contractor providing technical support and referred to within the Corps as the Army Corps of Engineers Information Technology or more commonly...
Words: 1045 - Pages: 5
...Let’s go back in time and talk about the commencement of The Internet. The United States Department of Defense funded a project in which a team from their Advanced Research Projects Agency (ARPA) built a network called ARPANET. The Defense Communications Agency (DCA) took over the operation of ARPANET in the 1980s which began the widespread use by colleges, government agencies and contractors to communicate and exchange data electronically. The Internet, a proper name for the global collection of publicly accessible networks, also known as the World Wide Web (WWW) runs on two networking protocols called Transmission Control Protocol/Internet Protocol (TCP/IP). TCP ensures messages are delivered reliably while IP manages the routing of the transmissions from the sender to the receiver. TCP/IP is classified as public domain because it is owned by everyone and no one and funded by the public. A major milestone for the Internet occurred in 1992 with the number of hosts reaching one million and The Internet Society (ISOC) was chartered, the parent for the boards and task forces. The second generation proved to be successful with the creation of various forums, boards and task forces that set standards and controls for the Internet. Cloud computing emerged as a popular trend for the Internet during this period as well. Most of us are just learning about Cloud computing and asking questions like: What is it exactly? How much does it cost? Where does it reside in the Internet...
Words: 360 - Pages: 2
...In the early 1960's, the U.S. Department of Defense (DOD) became very concerned about the possible effects of nuclear attack on its computing facilities. As a result, it began to examine ways to connect their computers to each other and to weapons installations that were distributed all over the world. The DOD charged the Defense Advanced Research Projects Agency (now known as DARPA) to fund research that would lead to the creation of a worldwide network. The Advanced Research Projects Agency Network (ARPANET) was an experimental wide area network (WAN) that consisted of the four computers networked by DARPA researchers in 1969. These first four computers were located at the University of California at Los Angeles, SRI International, the University of California at Santa Barbara, and the University of Utah. By 1990, a network of networks, now known as the Internet, had grown from the four computers on the ARPANET to over 300,000 computers on many interconnected networks. As ARPANET grew to include more computers, researchers realized the need for each connected computer to conform the same set of rules. The Network Control Protocol (NCP) was developed as the first collection of rules for formatting, ordering, and error-checking data sent across a network. Vincent Cerf, who is often referred to as the Father of the Internet, along with his colleague Robert Kahn, developed the Transmission Control Protocol and the Internet Protocol (referred to by their combined acronym TCP/IP)...
Words: 763 - Pages: 4
...The High Frequency Active Auroral Research Program (HAARP) was an ionospheric research program jointly funded by the U.S. Air Force, the U.S. Navy, the University of Alaska[clarification needed], and the Defense Advanced Research Projects Agency (DARPA),[1] designed and built by BAE Advanced Technologies (BAEAT). Its purpose was to analyze the ionosphere and investigate the potential for developing ionospheric enhancement technology for radio communications and surveillance.[2] The HAARP program operated a major sub-arctic facility, named the HAARP Research Station, on an Air Force-owned site near Gakona, Alaska. The most prominent instrument at the HAARP Station is the Ionospheric Research Instrument (IRI), a high-power radio frequency transmitter facility operating in the high frequency (HF) band. The IRI is used to temporarily excite a limited area of the ionosphere. Other instruments, such as a VHF and a UHF radar, a fluxgate magnetometer, a digisonde (an ionospheric sounding device), and an induction magnetometer, were used to study the physical processes that occur in the excited region. Work on the HAARP Station began in 1993. The current working IRI was completed in 2007, and its prime contractor was BAE Systems Advanced Technologies.[1] As of 2008, HAARP had incurred around $250 million in tax-funded construction and operating costs. It was reported to be temporarily shut down in May 2013, awaiting a change of contractors. In May 2014, it was announced that the...
Words: 269 - Pages: 2
...Countermeasures: Utilizing Intelligence Agencies over Biological Research ABSTRACT: The 21st century has seen a revolutionary biotechnology force, one that has led to developments in healthcare and other industries around the United States. Coupled with the growing development of biotechnology, however, is a force hoping to harness its power to create biological weapons. Presently, there are several nations pursuing biological weapons programs, making it easier for terrorist groups to gain access and attain advanced weaponry. Recently, terrorists have demonstrated their ability to execute acts of bio-terror without any moral repugnance or regret. Though these weapons have been taboo in past centuries, known for their sneakiness and deception, the use of biological weapons and the incidence of biological attack in the present century has –relatively speaking– dramatically increased. It is for this reason that congress and the federal government must intervene to prevent future bio-attack. The best method to stall further biological development within terrorist groups is by infiltration and detection via the Intelligence Community (IC). Unfortunately, we have diverted all our resources towards bio-terrorism research, without realizing that it is the further development and accessibility of biological weapons information that has promoted the spread of deadly knowledge within the terrorist community. Instead of trying to develop research plans for specific pathogenic agents, we...
Words: 4378 - Pages: 18
...quickly enacted when it was first thought up. It was a revolutionary process that was the result of visionary people who painstakingly brought forth the World Wide Web. These individuals saw a promising potential in allowing computers to share information on research and development in scientific and military fields. This is all started in 1962 when the U.S. Defense Advanced Research Projects Agency (DARPA) initiated a research program. They selected J.C.R. Licklider of MIT to head the work and develop it. Later Leonard Kleinrock of UCLA who developed the theory of packet switching, which was used to create the basis of Internet connections. His thesis was titled Communications Networks: Stochastic Flow and Delay. This thesis examined what packet-switching networking could look like. Lawrence Roberts of NIT confirmed Kleinrocks’ theory by connecting a Massachusetts computer with a California computer over dial up telephone lines. This proved that it could be done and when he later joined DARPA in 1966 he developed his plan for ARPANET. ARPANET, also known as the Internet “was brought online in 1965 under a contract let by the renamed Advanced Research Projects Agency (ARPA)” (Howe 2). It originally connected UCLA, Stanford Research Institute, UCSB, and the University of Utah. Soon after several other universities connected to ARPANET. In order for ARPANET to communicate via the telephone lines a series of protocols were developed Transmission Control Protocol (TCP) and Internet Protocol...
Words: 596 - Pages: 3
...Angela Jiongco Chapter2 Review questions # 1 and # 5 Exercise # Review question #1. In one or two paragraphs, describe how the internet changed form a government research project into a technology for business users. The internet began as a way for the military to control weapons systems while under attack. In the 60’s, the U.S. Department of Defense became worried about possible effects of nuclear attack on its computing facilities. The Defense Department realized that in the future they need powerful computers for coordination and control. The Defense Department funded a research at leading universities and institute with the goal of designing a worldwide network that could remain operational even the network were sabotage by the military enemy. The researchers were determined the best solution to accomplishing their goal was to create networks that do not require a central computer control network operations. However, at the time the only network existed was a single connection between sender and receiver from the leased telephone company line. There was a concerned of risk using single connection method for connecting computers, so the researchers developed a different method in communication using multiple channels. In 1969 the Department of Defense researchers in the Advanced Research Projects Agency (ARPA) use this direct connection network model to connect four computers; one each at University of California at Los Angeles, SRI International, University of California...
Words: 661 - Pages: 3
...scientist started their genetic testing. Is the military trying to make their own Captain America and Master Chief with a few extra abilities? If so, who is leading the testing and what types of powers are they trying to give to our soldiers? To try to answer these questions I had to start with where did this conspiracy stemmed from. The Beginning of the End by Micheal T. Snyder has led me to the DARPA (the defense advanced research projects agency). Let us have a quick insight into this agency. The DARPA is an agency of the United States Department of Defense that is responsible for the development of new technologies for military use. Established in 1958 their original mission was to prevent technological surprises for example the launch of Sputnik. Over the years, the mission has expanded from preventing surprises to making technological surprises of our own. Could they be talking about super soldiers? Is it possible that this agency is not just working on technology? Could they really be using this as a cover to their super soldier testing? From all of the research that I have done I found that many people think so. Maybe the reason that many people think so is because...
Words: 1443 - Pages: 6
...not have the ability to transport data to any other network. 2. What is the history of the OSI reference model? How did it come about and why was it created? Use your textbook and Internet research to support your answer. In the late 1970s, two projects began independently, with the same goal: to define a unifying standard for the architecture of networking systems. One was administered by the International Organization for Standardization (ISO), while the other was undertaken by the International Telegraph and Telephone Consultative Committee, or CCITT (the abbreviation is from the French version of the name). These two international standards bodies each developed a document that defined similar networking models. In 1983, these two documents were merged together to form a standard called The Basic Reference Model for Open Systems Interconnection. 3. What is the history of the TCP/ IP model? Why was it created? Use your textbook and Internet research to support your answer. TCP/IP originated out of the investigative research into networking protocols that the US Department of Defense (DoD) initiated in 1969. In 1968, the DoD Advanced Research Projects Agency (ARPA) began researching the network technology that is called packet switching. The original focus of this research was that the network be able to survive loss of subnet hardware, with existing conversations not being broken off. In other words, DoD wanted connections to remain intact as long as the source and...
Words: 309 - Pages: 2
...Department of Defense which implements military polices. The DOD is lead by the Secretary of Defense, which is second in command to the president. The United States is second on the list countries with the most active military personnel with 1,429,000. China’s military is called the People’s Liberation Army and are the world’s largest military force with 2,285,000 active personnel. The People’s Liberation Army makes up 18% of China’s population. The PLA has five main branches, the PLA ground Force, PLA Navy, PLA Air Force, PLA Secondary Artillery Corps, and the PLA Reserve Force. The PLA is under the command of the Central Military Commission. The CMC is made up of an eleven-man commission that is responsible for all maters regarding the PLA. All members of the CMC are high-ranking generals or senior members of China’s Armed Forces. The Russian military is called the Armed Forces of the Russian Federation. The number of active troops that Russia’s Armed Forces has is 1,040,000 ranking them fifth on the list of most active personnel. The Commander-in-Chief of the Armed Forces of the Russian Federation is the President of Russia. Under the President the Ministry of Defense over see’s the day-to-day operations of the Russian Armed Forces. The United States, China, and Russia are very different from one another culturally and politically, but they all share a common goal of striving to become the world’s powerhouse, this is reflected in the expenditures of their defense budgets. ...
Words: 1597 - Pages: 7
...Abstract: Advanced cyberattacks on the public and private sectors at the local, national, and international level have prompted an increase in funding and support for the study of emerging cybersecurity technologies. The considerations for this paper are to discuss the emerging technologies and strategies that can be integrated across the public and private sector to improve cybersecurity on a local, national, and international level. New technologies need to dynamically assess networks real-time such as with the use of Remote Agents and Real-time forensic analysis. These technologies also need to make the attack space less predictable and constantly evolving such as through the use of moving target defense. Emerging Cybersecurity Technologies The E-government Act of 2000 was signed by President Bush to move toward a more 24-7 government. The dream was to eliminate the need to have to stand in line at the DMV for half a day just to pay annual vehicle registration fees (Barker, 2011). Security was certainly a concern, but it was not at the forefront of the move as government agencies would go through massive changes in equipment, manning, and practices in order to move information and programs online. Now, over a decade later we still see moves and changes taking place, such as the department of Veterans Affairs recently moving all of their applications, forms and records online. The expensive cost of getting the government caught up was expected with such an overhaul...
Words: 2624 - Pages: 11