Academic literature on the topic 'United States. Air Force. IX Fighter Command'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'United States. Air Force. IX Fighter Command.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "United States. Air Force. IX Fighter Command"

1

Huang, Min Chuan, Chao Yen Wu, and Jang Ruey Tzeng. "Taiwan Air Force Logistics System of Research Governance." Advanced Materials Research 393-395 (November 2011): 393–96. http://dx.doi.org/10.4028/www.scientific.net/amr.393-395.393.

Full text
Abstract:
Taiwan Air Force attempts to dress the century into the military logistics fleet management information governance challenges and solutions for the problem, I explore the Department of Defense and the Air Force General Command of the face when the United States, China, Taiwan triangular relationship and interaction development, I Taiwan, F100, F104 old multi-session retreat, an opportunity to the international situation easy to help the world's consumption of the United States, IDF130 French Mirage 2000 aircraft with 60 U.S. F16A / B fighters, 150. 1979 to 1996 while the Air Force replacement of old aircraft and the Army a total of 340 aircraft and five companies. Up to five kinds of aircraft types, there are cross-generational, cross-type, cross-border differences, and my task, repair, supplies, etc. have a direct long-term implications. Was the need to actively seek foreign buyers, so the secret meaning to contact the French Mirage 2000 fighter procurement, Taiwan also has four planes incompatible and independent logistics system? At this point the core operation of the Air Force logistics management, and supply sources and the implementation of cross-system benefits, there are still logistical bar code conversion, how to face the army in 1990, the Air Force effective governance, effective logistics to enhance the Air Force repair capability to ensure air superiority over the Taiwan Strait security and integration of armed forces combat capability. We provide this experience for the successful teaching of business management related discussions to enhance the graduate student's thinking and decision-making capacity.
APA, Harvard, Vancouver, ISO, and other styles
2

Brandt, Marisa Renee. "Cyborg Agency and Individual Trauma: What Ender's Game Teaches Us about Killing in the Age of Drone Warfare." M/C Journal 16, no. 6 (November 6, 2013). http://dx.doi.org/10.5204/mcj.718.

Full text
Abstract:
During the War on Terror, the United States military has been conducting an increasing number of foreign campaigns by remote control using drones—also called unmanned aerial vehicles (UAVs) or remotely piloted vehicles (RPVs)—to extend the reach of military power and augment the technical precision of targeted strikes while minimizing bodily risk to American combatants. Stationed on bases throughout the southwest, operators fly weaponized drones over the Middle East. Viewing the battle zone through a computer screen that presents them with imagery captured from a drone-mounted camera, these combatants participate in war from a safe distance via an interface that resembles a video game. Increasingly, this participation takes the form of targeted killing. Despite their relative physical safety, in 2008 reports began mounting that like boots-on-the-ground combatants, many drone operators seek the services of chaplains or other mental health professionals to deal with the emotional toll of their work (Associated Press; Schachtman). Questions about the nature of the stress or trauma that drone operators experience have become a trope in news coverage of drone warfare (see Bumiller; Bowden; Saleton; Axe). This was exemplified in May 2013, when former Air Force drone pilot Brandon Bryant became a public figure after speaking to National Public Radio about his remorse for participating in targeted killing strikes and his subsequent struggle with post-traumatic stress (PTS) (Greene and McEvers). Stories like Bryant’s express American culture’s struggle to understand the role screen-mediated, remotely controlled killing plays in shifting the location of combatants’s sense of moral agency. That is, their sense of their ability to act based on their own understanding of right and wrong. Historically, one of the primary ways that psychiatry has conceptualized combat trauma has been as combatants’s psychological response losing their sense of moral agency on the battlefield (Lifton).This articleuses the popular science fiction novel Ender's Game as an analytic lens through which to examine the ways that screen-mediated warfare may result in combat trauma by investigating the ways in which it may compromise moral agency. The goal of this analysis is not to describe the present state of drone operators’s experience (see Asaro), but rather to compare and contrast contemporary public discourses on the psychological impact of screen-mediated war with the way it is represented in one of the most influential science fiction novels of all times (The book won the Nebula Award in 1985, the Hugo Award in 1986, and appears on both the Modern Library 100 Best Novels and American Library Association’s “100 Best Books for Teens” lists). In so doing, the paper aims to counter prevalent modes of critical analysis of screen-mediated war that cannot account for drone operators’s trauma. For decades, critics of postmodern warfare have denounced how fighting from inside tanks, the cockpits of planes, or at office desks has removed combatants from the experiences of risk and endangerment that historically characterized war (see Gray; Levidow & Robins). They suggest that screen-mediation enables not only physical but also cognitive and emotional distance from the violence of war-fighting by circumscribing it in a “magic circle.” Virtual worlds scholars adopted the term “magic circle” from cultural historian Johan Huizinga, who described it as the membrane that separates the time and space of game-play from those of real life (Salen and Zimmerman). While military scholars have long recognized that only 2% of soldiers can kill without hesitation (Grossman), critics of “video game wars” suggest that screen-mediation puts war in a magic circle, thereby creating cyborg human-machine assemblages capable of killing in cold blood. In other words, these critics argue that screen-mediated war distributes agency between humans and machines in such a way that human combatants do not feel morally responsible for killing. In contrast, Ender’s Game suggests that even when militaries utilize video game aesthetics to create weapons control interfaces, screen-mediation alone ultimately cannot blur the line between war and play and thereby psychically shield cyborg soldiers from combat trauma.Orson Scott Card’s 1985 novel Ender’s Game—and the 2013 film adaptation—tells the story of a young boy at an elite military academy. Set several decades after a terrible war between humans and an alien race called the buggers, the novel follows the life of a boy named Ender. At age 6, recruiters take Andrew “Ender” Wiggin from his family to begin military training. He excels in all areas and eventually enters officer training. There he encounters a new video game-like simulator in which he commands space ship battalions against increasingly complex configurations of bugger ships. At the novel’s climax, Ender's mentor, war hero Mazer Rackham, brings him to a room crowded with high-ranking military personnel in order to take his final test on the simulator. In order to win Ender opts to launch a massive bomb, nicknamed “Little Doctor”, at the bugger home world. The image on his screen of a ball of space dust where once sat the enemy planet is met by victory cheers. Mazer then informs Ender that since he began officer training, he has been remotely controlling real ships. The video game war was, "Real. Not a game" (Card 297); Ender has exterminated the bugger species. But rather than join the celebration, Ender is devastated to learn he has committed "xenocide." Screen-mediation, the novel shows, can enable people to commit acts that they would otherwise find heinous.US military advisors have used the story to set an agenda for research and development in augmented media. For example, Dr. Michael Macedonia, Chief Technology Officer of the Army Office for Simulation, Training, and Instrumentation told a reporter for the New York Times that Ender's Game "has had a lot of influence on our thinking" about how to use video game-like technologies in military operations (Harmon; Silberman; Mead). Many recent programs to develop and study video game-like military training simulators have been directly inspired by the book and its promise of being able to turn even a six-year-old into a competent combatant through well-structured human-computer interaction (Mead). However, it would appear that the novel’s moral regarding the psychological impact of actual screen-mediated combat did not dissuade military investment in drone warfare. The Air Force began using drones for surveillance during the Gulf War, but during the Global War on Terror they began to be equipped with weapons. By 2010, the US military operated over 7,000 drones, including over 200 weapons-ready Predator and Reaper drones. It now invests upwards of three-billion dollars a year into the drone program (Zucchino). While there are significant differences between contemporary drone warfare and the plot of Ender's Game—including the fact that Ender is a child, that he alone commands a fleet, that he thinks he is playing a game, and that, except for a single weapon of mass destruction, he and his enemies are equally well equipped—for this analysis, I will focus on their most important similarities: both Ender and actual drone operators work on teams for long shifts using video game-like technology to remotely control vehicles in aerial combat against an enemy. After he uses the Little Doctor, Mazer and Graff, Ender's long-time training supervisors, first work to circumvent his guilt by reframing his actions as heroic. “You're a hero, Ender. They've seen what you did, you and the others. I don't think there's a government on Earth that hasn't voted you their highest metal.” “I killed them all, didn't I?” Ender asked. “All who?” asked Graff. “The buggers? That was the idea.” Mazer leaned in close. “That's what the war was for.” “All their queens. So I killed all their children, all of everything.” “They decided that when they attacked us. It wasn't your fault. It's what had to happen.” Ender grabbed Mazer's uniform and hung onto it, pulling him down so they were face to face. “I didn't want to kill them all. I didn't want to kill anybody! I'm not a killer! […] but you made me do it, you tricked me into it!” He was crying. He was out of control. (Card 297–8)The novel up to this point has led us to believe that Ender at the very least understands that what he does in the game will be asked of him in real life. But his traumatic response to learning the truth reveals that he was in the magic circle. When he thinks he is playing a game, succeeding is a matter of ego: he wants to be the best, to live up to the expectations of his trainers that he is humanity’s last hope. When the magic circle is broken, Ender reconsiders his decision to use the Little Doctor. Tactics he could justify to win the game, reframed as real military tactics, threaten his sense of himself as a moral agent. Being told he is a hero provides no solace.Card wrote the novel during the Cold War, when computers were coming to play an increasingly large role in military operations. Historians of military technology have shown that during this time human behavior began to be defined in machine-like, functionalist terms by scientists working on cybernetic systems (see Edwards; Galison; Orr). Human skills were defined as components of large technological systems, such as tanks and anti-aircraft weaponry: a human skill was treated as functionally the same as a machine one. The only issue of importance was how all the components could work together in order to meet strategic goals—a cybernetic problem. The reasons that Mazer and Graff have for lying to Ender suggest that the author believed that as a form of technical augmentation, screen-mediation can be used to evacuate individual moral agency and submit human will to the command of the larger cybernetic system. Issues of displaced agency in the military cyborg assemblage are apparent in the following quote, in which Mazer compares Ender himself to the bomb he used to destroy the bugger home world: “You had to be a weapon, Ender. Like a gun, like the Little Doctor, functioning perfectly but not knowing what you were aimed at. We aimed you. We're responsible. If there was something wrong, we did it” (298). Questions of distributed agency have also surfaced in the drone debates. Government and military leaders have attempted to depersonalize drone warfare by assuring the American public that the list of targets is meticulously researched: drones kill those who we need killed. Drone warfare, media theorist Peter Asaro argues, has “created new and complex forms of human-machine subjectivity” that cannot be understood by considering the agency of the technology alone because it is distributed between humans and machines (25). While our leaders’s decisions about who to kill are central to this new cyborg subjectivity, the operators who fire the weapons nevertheless experience at least a retrospective sense of agency. As phenomenologist John Protevi notes, in the wake of wars fought by modern military networks, many veterans diagnosed with PTS still express guilt and personal responsibility for the outcomes of their participation in killing (Protevi). Mazer and Graff explain that the two qualities that make Ender such a good weapon also create an imperative to lie to him: his compassion and his innocence. For his trainers, compassion means a capacity to truly think like others, friend or foe, and understand their motivations. Graff explains that while his trainers recognized Ender's compassion as an invaluable tool, they also recognized that it would preclude his willingness to kill.It had to be a trick or you couldn't have done it. It's the bind we were in. We had to have a commander with so much empathy that he would think like the buggers, understand them and anticipate them. So much compassion that he could win the love of his underlings and work with them like a perfect machine, as perfect as the buggers. But somebody with that much compassion could never be the killer we needed. Could never go into battle willing to win at all costs. If you knew, you couldn't do it. If you were the kind of person who would do it even if you knew, you could never have understood the buggers well enough. (298)In learning that the game was real, Ender learns that he was not merely coming to understand a programmed simulation of bugger behavior, but their actual psychology. Therefore, his compassion has not only helped him understand the buggers’ military strategy, but also to identify with them.Like Ender, drone operators spend weeks or months following their targets, getting to know them and their routines from a God’s eye perspective. They both also watch the repercussions of their missions on screen. Unlike fighter pilots who drop bombs and fly away, drone operators use high-resolution cameras and fly much closer to the ground both when flying and assessing the results of their strikes. As one drone operator interviewed by the Los Angeles Times explained, "When I flew the B-52, it was at 30,000 to 40,000 feet, and you don't even see the bombs falling … Here, you're a lot closer to the actual fight, or that's the way it seems" (Zucchino). Brookings Institute scholar Peter Singer has argued that in this way screen mediation actually enables a more intimate experience of violence for drone operators than airplane pilots (Singer).The second reason Ender’s trainers give for lying is that they need someone not only compassionate, but also innocent of the horrors of war. The war veteran Mazer explains: “And it had to be a child, Ender,” said Mazer. “You were faster than me. Better than me. I was too old and cautious. Any decent person who knows what warfare is can never go into battle with a whole heart. But you didn't know. We made sure you didn't know" (298). When Ender discovers what he has done, he loses not only his innocence but his sense of himself as a moral agent. After such a trauma, his heart is no longer whole.Actual drone operators are, of course, not kept in a magic circle, innocent of the repercussions of their actions. Nor do they otherwise feel as though they are playing, as several have publicly stated. Instead, they report finding drone work tedious, and some even play video games for fun (Asaro). However, Air Force recruitment advertising makes clear analogies between the skills they desire and those of video game play (Brown). Though the first generations of drone operators were pulled from the ranks of flight pilots, in 2009 the Air Force began training them from the ground. Many drone operators, then, enter the role having no other military service and may come into it believing, on some level, that their work will be play.Recent military studies of drone operators have raised doubts about whether drone operators really experience high rates of trauma, suggesting that the stresses they experience are seated instead in occupational issues like long shifts (Ouma, Chappelle, and Salinas; Chappelle, Psy, and Salinas). But several critics of these studies have pointed out that there is a taboo against speaking about feelings of regret and trauma in the military in general and among drone operators in particular. A PTS diagnosis can end a military career; given the Air Force’s career-focused recruiting emphasis, it makes sense that few would come forward (Dao). Therefore, it is still important to take drone operator PTS seriously and try to understand how screen-mediation augments their experience of killing.While critics worry that warfare mediated by a screen and joystick leads to a “‘Playstation’ mentality towards killing” (Alston 25), Ender's Game presents a theory of remote-control war wherein this technological redistribution of the act of killing does not, in itself, create emotional distance or evacuate the killer’s sense of moral agency. In order to kill, Ender must be distanced from reality as well. While drone operators do not work shielded by the magic circle—and therefore do not experience the trauma of its dissolution—every day when they leave the cyborg assemblage of their work stations and rejoin their families they still have to confront themselves as individual moral agents and bear their responsibility for ending lives. In both these scenarios, a human agent’s combat trauma serves to remind us that even when their bodies are physically safe, war is hell for those who fight. This paper has illustrated how a science fiction story can be used as an analytic lens for thinking through contemporary discourses about human-technology relationships. However, the US military is currently investing in drones that are increasingly autonomous from human operators. This redistribution of agency may reduce incidence of PTS among operators by decreasing their role in, and therefore sense of moral responsibility for, killing (Axe). Reducing mental illness may seem to be a worthwhile goal, but in a world wherein militaries distribute the agency for killing to machines in order to reduce the burden on humans, societies will have to confront the fact that combatants’s trauma cannot be a compass by which to measure the morality of wars. Too often in the US media, the primary stories that Americans are told about the violence of their country’s wars are those of their own combatants—not only about their deaths and physical injuries, but their suicide and PTS. To understand war in such a world, we will need new, post-humanist stories where the cyborg assemblage and not the individual is held accountable for killing and morality is measured in lives taken, not rates of mental illness. ReferencesAlston, Phillip. “Report of the Special Rapporteur on Extrajudicial, Summary, or Arbitrary Executions, Addendum: Study on Targeted Killings.” United Nations Human Rights Council (2010). Asaro, Peter M. “The Labor of Surveillance and Bureaucratized Killing: New Subjectivities of Military Drone Operators”. Social Semiotics 23.2 (2013): 196-22. Associated Press. “Predator Pilots Suffering War Stress.” Military.com 2008. Axe, David. “How to Prevent Drone Pilot PTSD: Blame the ’Bot.” Wired June 2012.Bowden, Mark. “The Killing Machines: How to Think about Drones.” The Atlantic Sep. 2013.Brown, Melissa T. Enlisting Masculinity: The Construction of Gender in US Military Recruiting Advertising during the All-Volunteer Force. London: Oxford University Press, 2012. Bumiller, Elisabeth. “Air Force Drone Operators Report High Levels of Stress.” New York Times 18 Dec. 2011: n. pag. Card, Orson Scott. Ender’s Game. Tom Doherty Associates, Inc., 1985. Chappelle, Wayne, D. Psy, and Amber Salinas. “Psychological Health Screening of Remotely Piloted Aircraft (RPA) Operators and Supporting Units.” Paper presented at the Symposium on Mental Health and Well-Being across the Military Spectrum, Bergen, Norway, 12 April 2011: 1–12. Dao, James. “Drone Pilots Are Found to Get Stress Disorders Much as Those in Combat Do.” New York Times 22 Feb. 2013: n. pag. Edwards, Paul N. The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge: MIT Press, 1997.Galison, Peter. “The Ontology of the Enemy: Norbert Wiener and the Cybernetic Vision.” Critical Inquiry 21.1 (1994): 228.Gray, Chris Hables “Posthuman Soldiers in Postmodern War.” Body & Society 9.4 (2003): 215–226. 27 Nov. 2010.Greene, David, and Kelly McEvers. “Former Air Force Pilot Has Cautionary Tales about Drones.” National Public Radio 10 May 2013.Grossman, David. On Killing. Revised. Boston: Back Bay Books, 2009. Harmon, Amy. “More than Just a Game, But How Close to Reality?” New York Times 3 Apr. 2003: n. pag. Levidow, Les, and Robins. Cyborg Worlds: The Military Information Society. London: Free Association Books, 1989. Lifton, Robert Jay. Home from the War: Vietnam Veterans: Neither Victims nor Executioners. New York: Random House, 1973. Mead, Corey. War Play: Video Games and the Future of Armed Conflict. Boston: Houghton Mifflin Harcourt, 2013. Orr, Jackie. Panic Diaries: A Genealogy of Panic Disorder. Durham: Duke University Press, 2006.Ouma, J.A., W.L. Chappelle, and A. Salinas. Facets of Occupational Burnout among US Air Force Active Duty and National Guard/Reserve MQ-1 Predator and MQ-9 Reaper Operators. Air Force Research Labs Technical Report AFRL-SA-WP-TR-2011-0003. Wright-Patterson AFB, OH: Air Force Research Laboratory. 2011.Protevi, John. “Affect, Agency and Responsibility: The Act of Killing in the Age of Cyborgs.” Phenomenology and the Cognitive Sciences 7.3 (2008): 405–413. Salen, Katie, and Eric Zimmerman. Rules of Play: Game Design Fundamentals. Cambridge, MA: MIT Press, 2003. Saleton, William. “Ghosts in the Machine: Do Remote-Control War Pilots Get Combat Stress?” Slate.com Aug. 2008. Schachtman, Nathan. “Shrinks Help Drone Pilots Cope with Robo-Violence.” Wired Aug. 2008.Silberman, Steve. “The War Room.” Wired Sep. 2004: 1–5.Singer, P.W. Wired for War: The Robotics Revolution and Conflict in the Twenty-First Century. New York: Penguin Press, 2009. Zucchino, David. “Drone Pilots Have Front-Row Seat on War, from Half a World Away.” Los Angeles Times 21 Feb. 2010: n. pag.
APA, Harvard, Vancouver, ISO, and other styles
3

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "United States. Air Force. IX Fighter Command"

1

Boyd, Robert J. SAC's fighter planes and their operations. Offutt AFB, NE: Office of the Historian, Headquarters Strategic Air Command, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1960-, Benson Jim, ed. TAC fighters. Osceola, WI: Motorbooks International, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Morris, Danny. Aces & wingmen II: Men, machines, and units of the United States Army Air Force, Eighth Fighter Command and 354th Fighter Group, Ninth Ai Force, 1943-5. [S.l: s.n.], 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Watkins, Robert A. Battle colors: Insignia and aircraft markings of the Eighth Air Force in World War II : (VIII) Fighter Command. Atglen, PA: Schiffer Military History, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clancy, Tom. Fighter wing: A guided tour of an Air Force combat wing. New York: Berkley Books, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Clancy, Tom. Fighter wing: A guided tour of an Air Force combat wing. New York: Berkley Books, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fighter wing: A guided tour of an Air Force combat wing. London: HarperCollins, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mustang: Fury over Europe : 8th Air Force Command, World War II. Medford, OR: Reflected Images Publishers, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lambert, John W. The Pineapple Air Force: Pearl Harbor to Tokyo. St. Paul, MN: Phalanx Pub. Co., 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fighter wing: A guided tour of an Airforce Combat wing. New York: Berkley Books, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography