Information Age Anthology Vol II

Total Page:16

File Type:pdf, Size:1020Kb

Information Age Anthology Vol II DoD C4ISR Cooperative Research Program ASSISTANT SECRETARY OF DEFENSE (C3I) Mr. Arthur L. Money SPECIAL ASSISTANT TO THE ASD(C3I) & DIRECTOR, RESEARCH AND STRATEGIC PLANNING Dr. David S. Alberts Opinions, conclusions, and recommendations expressed or implied within are solely those of the authors. They do not necessarily represent the views of the Department of Defense, or any other U.S. Government agency. Cleared for public release; distribution unlimited. Portions of this publication may be quoted or reprinted without further permission, with credit to the DoD C4ISR Cooperative Research Program, Washington, D.C. Courtesy copies of reviews would be appreciated. Library of Congress Cataloging-in-Publication Data Alberts, David S. (David Stephen), 1942- Volume II of Information Age Anthology: National Security Implications of the Information Age David S. Alberts, Daniel S. Papp p. cm. -- (CCRP publication series) Includes bibliographical references. ISBN 1-893723-02-X 97-194630 CIP August 2000 VOLUME II INFORMATION AGE ANTHOLOGY: National Security Implications of the Information Age EDITED BY DAVID S. ALBERTS DANIEL S. PAPP TABLE OF CONTENTS Acknowledgments ................................................ v Preface ................................................................ vii Chapter 1—National Security in the Information Age: Setting the Stage—Daniel S. Papp and David S. Alberts .................................................... 1 Part One Introduction......................................... 55 Chapter 2—Bits, Bytes, and Diplomacy—Walter B. Wriston ................................................................ 61 Chapter 3—Seven Types of Information Warfare—Martin C. Libicki ................................. 77 Chapter 4—America’s Information Edge— Joseph S. Nye, Jr. and William A. Owens....... 115 Chapter 5—The Internet and National Security: Emerging Issues—David Halperin .................. 137 Chapter 6—Technology, Intelligence, and the Information Stream: The Executive Branch and National Security Decision Making— Loch K. Johnson ............................................. 179 Part Two Introduction....................................... 213 Chapter 7—Critical Foundations: Protecting America’s Infrastructures (excerpts)—The President’s Commission on Critical Infrastructure Protection ................................. 225 i Chapter 8—U.S. Military and Challenges of Information Age Technologies—David S. Alberts and Daniel S. Papp ........................................... 259 Chapter 9—Information Technology and the Terrorist Threat—Kevin Soo Hoo, Seymour Goodman, and Lawrence Greenberg.............. 301 Chapter 10—Class 2 Corporate Information Warfare—Winn Schwartau............................... 339 Chapter 11—Information Technologies and Transnational Organized Crime—John T. Picarelli and Phil Williams ............................... 365 Chapter 12—Civil Liberties and National Security on the Internet—Kate Martin ........................... 403 Chapter 13—Electronic Civil Disobedience and the World Wide Web of Hacktivism: A Mapping of Extraparliamentarian Direct Action Net Politics—Stefan Wray ...................................... 431 Part Three Introduction .................................... 457 Chapter 14—The Cyber-Posture of the National Information Infrastructure (RAND MR-976- OSTP)—Willis H. Ware ..................................... 463 Chapter 15—How Vulnerable Is Our Interlinked Infrastructure?—George Smith ....................... 507 Chapter 16—National Security in the Information Age—David C. Gompert ................................... 525 ii ACKNOWLEDGMENTS he editors wish to thank and acknowledge the Tfollowing publishers for granting permission to reproduce these important articles in Volume II Information Age Anthology: “Bits, Bytes, and Diplomacy” by Walter B. Wriston, courtesy of Foreign Affairs Magazine “America’s Information Edge” by Joseph S. Nye, Jr. and William A. Owens, courtesy of Foreign Affairs Magazine “Information Technology and the Terrorist Threat” by Kevin Soo Hoo, Seymour Goodman, and Lawrence Greenberg, courtesy of Oxford University Press from Survival, Volume 39, Number 3, Autumn 1997 Information Warfare by Winn Schwartau, courtesy of Avalon Publishing “An Electronic Pearl Harbor? Not Likely” by George Smith, courtesy of University of Texas at Dallas from Issues in Science and Technology, pp. 68-73, Richardson, Texas, Fall 1998 “National Security in the Information Age” by David C. Gompert, courtesy of the Naval War College Review v PREFACE ew would argue with the premise that new and Femerging information and communication technologies are transforming the ways that people around the world work, play, think, and live. Indeed, there is a sense that the transformations underway are so fundamental, so pervasive and all- encompassing, so qualitatively and quantitatively different, that they are ushering in a new era, the so- called Information Age. What does this mean for national security, and how will the concept of national security change because of Information Age technologies? Is the Information Age bringing with it new challenges and threats, and if so, what are they? What sorts of dangers will these challenges and threats present? From where will they—and do they—come? Is Information Warfare a reality? What responses will be required, and by whom, to safeguard national security from a potential adversary’s information warriors during the Information Age? And how will national security decision-making be affected? This publication, Volume II of the Information Age Anthology, explores these questions and provides preliminary answers to some of them. This volume follows on the heels of Volume I of the Information Age Anthology, published in 1997 by NDU Press and DoD CCRP Publications, which examined the broader context of the impact of new and emerging information and communication technologies on business, vii commerce, and services; government and the military; and international affairs. It is within this broader context of human activities that questions of national security must be pursued. This publication also precedes Volume III of the Information Age Anthology. Volume III will provide a detailed examination of the potential impacts of new and emerging information and communication technologies on military affairs and operations. It will provide views of the impact of these technologies on military command, control, and organization; on operations, strategy, and tactics; and on foreign perspectives of military affairs. Together, the three volumes of the Information Age Anthology will offer an understanding of the broad societal and human contexts within which national security must be pursued in the Information Age; provide an understanding of the issues that national security decision makers must cope with during the Information Age; and prognosticate about the ways in which wars and military operations may be conducted during the Information Age, at least in so far as such Information Age contexts, issues, and operations can be ascertained today. The Information Age has just begun. But if we are to reap its benefits to the fullest and avoid its pitfalls to the best of our ability, we must attempt to understand not only where we are in the Information Age, but also where we may be going. It will then be up to us to take this understanding so that we can help chart the wisest direction. This volume, like the one that preceded it and the one that will follow it, is part of this very large and very important effort. viii CHAPTER 1 NATIONAL SECURITY IN THE INFORMATION AGE: SETTING THE STAGE By Daniel S. Papp and David S. Alberts s we enter the Information Age, information and Aknowledge related technologies are becoming increasingly important factors in the national security equation of the United States. Throughout the 1980s and 1990s, these Information Age technologies, defined here to include advanced semiconductors, increasingly capable computers, fiber optics, cellular technologies, better and more capable satellites, advanced networking, digital technology (including digital compression),1 improved human-computer interaction, data mining and knowledge extraction and creation tools, have had a growing impact on military capabilities and are beginning to shape the strategic environment within which national security is pursued. As we move further into Information Age, the impact that these technologies will have on national security affairs will become even more important, witness the growing significance of Joint Vision 2010 both here and abroad. 1 2 Information Age Anthology Vol. II The importance of advanced information knowledge and communication technologies for national security is not, however, just about new technologies for the military. It is about how these technologies will alter military strategy, operational concepts, organizational and command structures, doctrine and tactics. It is about all of the elements of a mission capability package— those things needed to turn a concept into a real operational capability. It is about who will have these new information enabled technologies, and what they do with them. Indeed, since Information is inevitably tied to decision-making and organization, it will be in this area that change may be the most difficult and where we and our coalition partners may drift apart. At the most comprehensive level, it is also how these technologies will change national security objectives and the environment in which
Recommended publications
  • Hackers Wanted : an Examination of the Cybersecurity Labor Market / Martin C
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Security Research Division View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for re- search quality and objectivity. H4CKER5 WANTED An Examination of the Cybersecurity Labor Market MARTIN C. LIBICKI DAVID SENTY C O R P O R A T I O N JULIA POLLAK NATIONAL SECURITY RESEARCH DIVISION H4CKER5 WANTED An Examination of the Cybersecurity Labor Market MARTIN C.
    [Show full text]
  • The Brain in a Vat in Cyberpunk: the Persistence of the Flesh
    Stud. Hist. Phil. Biol. & Biomed. Sci. 35 (2004) 287–305 www.elsevier.com/locate/shpsc The brain in a vat in cyberpunk: the persistence of the flesh Dani Cavallaro 1 Waterside Place, London NW1 8JT, UK Abstract This essay argues that the image of the brain in a vat metaphorically encapsulates articu- lations of the relationship between the corporeal and the technological dimensions found in cyberpunk fiction and cinema. Cyberpunk is concurrently concerned with actual and imaginary metamorphoses of biological organisms into machines, and of mechanical appara- tuses into living entities. Its recurring representation of human beings hooked up to digital matrices vividly recalls the envatted brain activated by electric stimuli, which Hilary Putnam has theorized in the context of contemporary epistemology. At the same time, cyberpunk imaginatively raises the same epistemological questions instigated by Putnam. These concern the cognitive processes associated with the collusion of human and mechanical creatures, and related metaphysical and ethical issues spawned by such processes. As a philosophical trope, the brain in a vat would appear to pivot on the notion of a disembodied subject consisting of sheer mentation. However, literary and cinematic interpretations of the image in cyberpunk persistently foreground the obdurate materiality of the flesh—often in its most grisly and grotesque incarnations. # 2004 Elsevier Ltd. All rights reserved. Keywords: Brains in vats; Materiality; Disembodiment; Cyborgs; Cyberpunk What is here proposed is that the brain in a vat image, an important trope in contemporary epistemology, is also an intriguing metaphor for one of cyberpunk’s pivotal preoccupations: namely, the relationship between the body and technology.
    [Show full text]
  • Novelist Neal Stephenson Once Again Proves He's the King of the Worlds by Steven Levy 08.18.08
    Novelist Neal Stephenson Once Again Proves He's the King of t... http://www.wired.com/print/culture/art/magazine/16-09/mf_ste... << Back to Article WIRED MAGAZINE: 16.09 Novelist Neal Stephenson Once Again Proves He's the King of the Worlds By Steven Levy 08.18.08 Illustration: Nate Van Dyke Tonight's subject at the History Book Club: the Vikings. This is primo stuff for the men who gather once a month in Seattle to gab about some long-gone era or icon, from early Romans to Frederick the Great. You really can't beat tales of merciless Scandinavian pirate forays and bloody ninth-century clashes. To complement the evening's topic, one clubber is bringing mead. The dinner, of course, is meat cooked over fire. "Damp will be the weather, yet hot the pyre in my backyard," read the email invite, written by host Njall Mildew-Beard. That's Neal Stephenson, best-selling novelist, cult science fictionist, and literary channeler of the hacker mindset. For Stephenson, whose books mash up past, present, and future—and whose hotly awaited new work imagines an entire planet, with 7,000 years of its own history—the HBC is a way to mix background reading and socializing. "Neal was already doing the research," says computer graphics pioneer Alvy Ray Smith, who used to host the club until he moved from a house to a less convenient downtown apartment. "So why not read the books and talk about them, too?" With his shaved head and (mildewless) beard, Stephenson could cut something of an imposing figure.
    [Show full text]
  • Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p.
    [Show full text]
  • 46-49 Alumni Books
    ALUMNI BOOKS PROFILES AND REVIEWS guys, and historical figures Neal Stephenson’s new (Alan Turing, Douglas novel, Anathem, charts the MacArthur, Isaac Newton, adventures of a group of and Louis XIV, to name hyperintellectual monks out a few). to save their world from an Stephenson’s new extraplanetary menace. novel, Anathem (William Morrow, 2008), is his most ambitious project yet: it seeks to completely reshape the history of scientific and philosophical thought. Set 4,000 years in the future on a planet called Arbre, the novel chronicles the adventures of a cadre of hyperintellectual monks who must save their world from an extraplanetary menace. With Snow Crash, Stephenson (CAS’81) was writing alongside the young upstarts of sci-fi (they call it cyberpunk for a reason), but with Anathem, he is vying for a position among spec-fic’s old guard: Asimov, Clarke, Heinlein, and Huxley. Stephenson spoke with Bostonia about his work. Devin Hahn I understand that you started writing about halfway through your undergrad A Voice from the Future /// career. Yeah. I had tried to write some short Speculative fi ction writer stories much earlier, because the conventional wisdom is that the way Neal Stephenson talks about his you get into writing is by starting with little stuff and then working your way new book, his infl uences, and why up to novels. So I tried to write a couple of short stories, and they just didn’t go he can’t write short. By Devin Hahn anywhere. So based on that I thought that maybe being a writer just wasn’t in the cards for me.
    [Show full text]
  • The Marketing of Information in the Information Age Hofacker and Goldsmith
    The Marketing of Information in the Information Age Hofacker and Goldsmith THE MARKETING OF INFORMATION IN THE INFORMATION AGE CHARLES F. HOFACKER, Florida State University RONALD E. GOLDSMITH, Florida State University The long-standing distinction made between goods and services must now be joined by the distinction between these two categories and “information products.” The authors propose that marketing management, practice, and theory could benefit by broadening the scope of what marketers market by adding a third category besides tangible goods and intangible services. It is apparent that information is an unusual and fundamental physical and logical phenomenon from either of these. From this the authors propose that information products differ from both tangible goods and perishable services in that information products have three properties derived from their fundamental abstractness: they are scalable, mutable, and public. Moreover, an increasing number of goods and services now contain information as a distinct but integral element in the way they deliver benefits. Thus, the authors propose that marketing theory should revise the concept of “product” to explicitly include an informational component and that the implications of this revised concept be discussed. This paper presents some thoughts on the issues such discussions should address, focusing on strategic management implications for marketing information products in the information age. INTRODUCTION “information,” in addition to goods and services (originally proposed by Freiden et al. 1998), A major revolution in marketing management while identifying unique characteristics of pure and theory occurred when scholars established information products. To support this position, that “products” should not be conceptualized the authors identify key attributes that set apart solely as tangible goods, but also as intangible an information product from a good or a services.
    [Show full text]
  • War Gaming in the Information Age—Theory and Purpose Paul Bracken
    Naval War College Review Volume 54 Article 6 Number 2 Spring 2001 War Gaming in the Information Age—Theory and Purpose Paul Bracken Martin Shubik Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Bracken, Paul and Shubik, Martin (2001) "War Gaming in the Information Age—Theory and Purpose," Naval War College Review: Vol. 54 : No. 2 , Article 6. Available at: https://digital-commons.usnwc.edu/nwc-review/vol54/iss2/6 This Article is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Bracken and Shubik: War Gaming in the Information Age—Theory and Purpose WAR GAMING IN THE INFORMATION AGE Theory and Purpose Paul Bracken and Martin Shubik ver twenty years ago, a study was carried out under the sponsorship of the ODefense Advanced Research Projects Agency and in collaboration with the General Accounting Office to survey and critique the models, simulations, and war games then in use by the Department of Defense.1 From some points of view, twenty years ago means ancient history; changes in communication tech- nology and computers since then can be measured Paul Bracken, professor of management and of political science at Yale University, specializes in national security only in terms of orders of magnitudes. The new world and management issues. He is the author of Command of the networked battlefield, super-accurate weapons, and Control of Nuclear Forces (1983) and of Fire in the and the information technology (IT) revolution, with its East: The Rise of Asian Military Power and the Second Nuclear Age (HarperCollins, 1999).
    [Show full text]
  • And the Vestiges of Humanity in William Gibson's
    TECHNOLOGICAL DOMINANCE, “DISCARNATE MEN,” AND THE VESTIGES OF HUMANITY IN WILLIAM GIBSON’S NEUROMANCER AND PHILIP K. DICK’S DO ANDROIDS DREAM OF ELECTRIC SHEEP? Robert Sparrow-Downes tba 2020 95 TECHNOLOGICAL DOMINANCE, “DISCARNATE MEN,” AND THE VESTIGES OF HUMANITY IN WILLIAM GIBSON’S NEUROMANCER AND PHILIP K. DICK’S DO ANDROIDS DREAM OF ELECTRIC SHEEP? Robert Sparrow-Downes William Gibson’s Neuromancer (1984) tells the story of Case, a “console cowboy” who is unknowingly recruited and manipulated by an artificial intelligence named Wintermute, forced to help the AI break free of its cybernetic constraints and merge with its twin AI, Neuromancer. In having Wintermute and Neuro- mancer merge at the end of the novel, Gibson solidifies artificial intelligence as being the dominant player in the relationship between humans and technology, having now found a way of doing what only humans could do before: self-improve. Case recognizes the dominant position of technology, and his own subordi- nate position, in the novel’s Coda when he asks the newly transformed Wintermute: “So what’s the score? How are things different? You running the world now? You God?”1 As is evident by this quote, and by Case’s reversal of fortune, Gibson provides a stark warning regarding the potential loss of human identity in the modern technological age. Similarly, Philip K. Dick’s novel Do Androids Dream of Electric Sheep? (1968) is set following World War Terminus, a radioactive cataclysmic event responsible for having killed off a significant portion of human and animal life. Following WWT, much of the surviving population has fled to Mars and other planetary colonies in a mass exodus in order to escape the lingering radioactivity; however, as these humans continue to emigrate, some androids (or “replicants”) reverse the course of this exodus and instead arrive on Earth.
    [Show full text]
  • Technology and Economic Growth in the Information Age Introduction
    Technology and Economic Growth in the Information Age 1 POLICY BACKGROUNDER No. 147 For Immediate Release March 12, 1998 Technology and Economic Growth in the Information Age Introduction The idea of rapid progress runs counter to well-publicized reports of an American economy whose growth rate has slipped. Pessimists, citing statistics on weakening productivity and gross domestic product growth, contend the economy isn’t strong enough to keep improving Americans’ standard of living. They offer a dour view: the generation coming of age today will be the first in American history not to live better than its parents.1 Yet there is plenty of evidence that this generation is better off than any that have gone before, and given the technologies likely to shape the next quarter century, there are reasons to believe that progress will be faster than ever — a stunning display of capitalism’s ability to lift living standards. To suppose otherwise would be to exhibit the shortsightedness of Charles H. Du- ell, commissioner of the U.S. Office of Patents, who in 1899 said, “Everything that can be invented has been invented.” Ironically, though, our economic statistics may miss the show. The usual measures of progress — output and productivity — are losing relevance “The usual measures of prog- in this age of increasingly rapid technological advances. As the economy ress — output and produc- evolves, it is delivering not only a greater quantity of goods and services, but tivity — are losing relevance also improved quality and greater variety. Workers and their families will be in this age of increasingly rapid technological advanc- better off because they will have more time off, better working conditions, es.” more enjoyable jobs and other benefits that raise our living standards but aren’t easily measured and therefore often aren’t counted in gross domestic product (GDP).
    [Show full text]
  • Teaching the Conflicts Neal Stephenson's Cryptonomicon And
    Teaching the Conflicts Neal Stephenson’s Cryptonomicon and The Baroque Cycle Lee Barbrook Doctor of Philosophy Newcastle University May 2012 Abstract I read Neal Town Stephenson’s Cryptonomicon and The Baroque Cycle to interrogate what types of links they make to US countercultural writing, postmodern discourse in American culture, and perceived uninterrogated links to the term America itself in images of modern progressive liberalism. Postmodernist readings of literary texts came under increasing public scrutiny in intellectual debates of the 80s and 90s. My analysis is to situate and reconsider these fictions within debates happening in the North American academy at this time and the more recent one concerning the demise of poststructuralism in the humanities. Linking together works of Sean McCann, Michael Szalay, John Guillory and Mark McGurl I locate Cryptonomicon as constitutive of the postwar drift from the modernist aesthetic yet simultaneously developing within Sacvan Bercovitch’s model of dissensus. Through reference to McGurl’s work in particular, my thesis will offer the first sustained critical reading of Cryptonomicon relevant to the University’s new teaching standards of diversity and research excellence . Through Lauren Berlant’s concept of an intimate public I argue The Baroque Cycle develops a richly aesthetic form of criticism that challenges the consensus view of culturally affirming alternatives to American sociopolitical and economic life. In addition, each chapter charts specific aspects of the impact of European critical theories that presided over the marriage of intellectualism and professionalism in the North American academy. More specifically, and throwing particular focus on resistances to theory and canon change, I discuss how the politics of the classroom developed within the literary culture wars brought with it a renewed emphasis on what postwar professors taught in the classroom.
    [Show full text]
  • Second Life, Video Games, and the Social Text the Prospect Is Sublime
    [ PMLA the changing profession Second Life, Video Games, and the Social Text THE PROSPECT IS SUBLIME. OFF THE COAST OF THE MAINLAND ARE IS- LANDS—IN FACT, SWEEPING ARCHIPELAGOES—INHABITED BY EDUCA- steven e. jones tors and students. The residents have built massive modern class- rooms, high- rises, clock towers, conference rooms, amphitheaters, auditoriums, and libraries among the evergreens, campuses with spacious lawns. To get to one of these islands, you can go directly from certain information kiosks or portals. Or, if you know the way and don’t run into any invisible Plexiglas walls extending far up into the sky, you can just levitate, tilt into the wind, and fly there, while the landscape scrolls along below you like a map (which it is). I’m describing not a real- world landscape but a digital one, the 3-D multiuser virtual environment Second Life, which was opened by Linden Lab in 2003, roughly a decade after the advent of the World Wide Web. In the past few years, some journalists, corpo- rations, and academics have increasingly treated the proprietary platform Second Life as the end toward which the Web is evolving, sometimes in the belief that 3-D is inherently better than 2-D (or the “flat Web,” as some fans refer to most of the rest of the network, as if it were the medieval flat earth) and often under the mistaken -im pression that this newest new thing is a self- contained and unitary virtual world set apart from the general chaos of the Web.1 Intellec- tual, cultural, and financial capital is flowing into and out of Linden Lab’s “metaverse,” often because of an assumption that Second Life represents the “future of the Internet.” On April Fool’s Day 2008, the United States congressional Subcommittee on Telecommunica- STEVEN E.
    [Show full text]
  • Agency William Gibson with It Is Not Directly Done, You Could Take Even More in Relation to This Life, Nearly the World
    agency-william-gibson 1/5 PDF Drive - Search and download PDF files for free. Agency By William Gibson Agency - “ONE OF THE MOST VISIONARY, ORIGINAL, AND QUIETLY INFLUENTIAL WRITERS CURRENTLY WORKING”* returns with a sharply imagined follow-up to the New York Times bestselling novel The Peripheral William Gibson has trained his eye on the future for decades, ever since coining the term “cyberspace” and then popularizing it in his Agency By William Gibson William Gibson has trained his eye on the future for decades, ever since coining the term “cyberspace” and then popularizing it in his classic speculative novel Neuromancer in the early 1980s Cory Doctorow raved that The Peripheral is “spectacular, a piece of trenchant, far-future speculation that features all the eyeball kicks of S8561 William Gibson - revwarapps.org Pension Application of William Gibson S8561 VA Transcribed and annotated by C Leon Harris State of Virginia – Louisa County, Sc On this 14th day of August 1832, personally appeared in open court before the justices of the county court of Louisa now sitting, William Gibson, a resident of … Agency Administrators - AZ William Gibson Bgibson@azdjcgov Monica Lobato mlobato@azlandgov Kimberly Siddall KSiddall@azlotterygov Miriam Lemke mlemke@azlotterygov Vangie Webster EvangelineWebster@azmdgov Land Game and Fish Health Services Industrial Commission Insurance Juvenile Corrections Housing Economic Security Funeral Board Gaming Criminal Justice Commission WSIA Underwriting and Leadership Summit Attendee List as ... WSIA Underwriting and Leadership Summit April 11-14, 2018 Attendee List as of February 26, 2018 Gary Gibson Coastal Brokers Ins Services Roya Azari Delta General Agency Corp William Fink Delta General Agency Corp Alliance 10 2019 Participants - Tennessee Alliance 10 2019 Participants Sponsoring Agency with Appointing Authority Economic and Community Development Bob Rolfe, Commissioner Juandale T Cooper U.S.
    [Show full text]