NPE (OPEN): Joint Service for Foreign Interaction and Agreements of Nasphilitae

NUSPTF-RFC-1: Brief Overview and History of Computing in the Grand Duchy of Nasphilitae


|New Unified Systems Protocol Task Force | Reporting Facultative Commission (RFC-1) |
|SUBMMITER: The Prosecutor for Critical Infrastructure and Telecommunications.|
|Revision Author: Raymond Newman, Reporting for the NUSPTF (New Unified Systems Protocol Task Force)|
| Reasoning: Investigation into the “Broadband storm” phenomenon, providing background.|


Protocols (Chronologically ordered):

→ RTCCS (Real Time Command Control Systems)
→ RICP (Restricted Insight Communications Protocol) (PROHIBITED)
→ TRSP (Telecommunications Radio Systems Protocol) (OBSOLETE)UCSC (Unified Control Sysems Computing)
→ FANCP (Federated Access Network Control Protocol) (PROHIBITED)
→ GPAL (General Public Access Library) (OBSOLETE) → URSP (Unified Research and Science Protocol) (OBSOLETE)NUCUP (New University Computing Unified Protocol)
→ SNS1 (Secure Networked Systems) (OBSOLETE) → SNS2 (OBSOLETE)ISNS (Intrusive Security Network Schematic) (PROHIBITED)STAR PROTOCOL (Moratorium lifted)
→ ACISP (Automated Census Interconnected Systemic Protocol): TCP/ACISPv4 ONLY

Operating Systems (Chronologically ordered):

KRYPTOS Alpha → KRYPTOS Beta → KRYPTOS 0.1 → KRPYTOS 1.1 → KRYPTOS 1.5 → KRYPTOS 2 → KRYPTOS 3 → KRYPTOS 3.5
ARLS public beta → ARLS → RTALRS
GPAL → GPALS → URS OS → CURS OS → NCURS-OS
TRS → LLRCS → LLRCSI → CSC-OS → UCSC-OS
FPA → DFPA → DFPA OS → DFPAS (v7)
NUS OS X → NUS OS X2 → NUS OS XX

Licenses (ONLY ACTIVE):

ARLv2, GPALv2, TRSLv3, LLRCv3, FPA, DFPAS, ISNS, GPALv3, ACISP-GLA


Chronology:

Eric Xor:

1: CS in Nasphilitae began by Eric Xors study of Daisy Days Cipher. Encryption was improved by the addition of a disc shifting randomisation mechanism and use of character glyphs instead of script. Introduction of punched cards made the machine output both encryptable and decryptable, on conditions that the serial discs and ink tapers matched among them. According to Xors notes, he received funding from the Military Junta at the time, as to attach: Broadband radio, signal detection, and dynamic vessel predicative mathematical functionality. This was KRYPTOS Alpha, also known as “the Military KRYPTOS”, released in 1931.
2: KRYPTOS Beta was funded by the AID and included support for: dynamic frequency switching, morse code, signal scrambling, long-wavelength detection of sound, movement, and colour. During The Great War, support for: navigation integration (platform integration), natural language real-time multi-switching, and signal cloaking was added. This formed KRYPTOS 01.
3: The Civil War redesigned components of previous versions, with storage of mathematical data condensed into hex, and natural language data into analogue tape imported into a unified machine, commonly called KRYPTOS 1.1

From Alen Heidi to GPAL:

1: Alen Heidi was a mathematician who worked for Circuit Control Systems. In 1961., he patented an on-board integrated circuit switch, which reduced the size of KRYPTOS 1.1 into a wall-sized machine. This was the first Intellectual Property CS license in Nasphilitae, known as ARLv1.
2: Alen continued to work on improving the general functionality of the system and had, in 1964., received his own facility (Alen Research Labs), funded by the Pragmatist wing of the P3 Coalition. Him and his team released the first digital computer in 1966., with support for: binary data, BOM, control circuit (input terminals and output displays) as ARLS Alpha (Alen Research Labs System).
3: AIDs defunct Department Nine Unit Nine formed the “Radio and Steganography Research Group” in 1964., as a response to the perceived threat of P3 Coalitions funding the ARL. The Research Group facilitated all of its subsequent innovation by registering the RSL license. As the ARLS wasn’t covered by the original ARL license, the Research Group had reverse engineered the ARLS Alpha. Improvements made included support for: experimentation signals, real-time MRI output, surveillance and detection, and stochastic statistical analysis (primitive). This combination formed into the release of KRYPTOS 1.5 in 1967., with the Reserved Insight Communications Protocol.
4: The RICP required KRYPTOS 1.5 machines and software for data and memory to be transferred between one another. Otherwise, they would remain unreadable or undetectable by other devices or modified devices.
5: This prompted Alen Heidi to release ARLS Public Beta that same year (1967),as well as the formation of the Telecommunications Radio Systems (TRS) research group by the Royal Armed Forces. The TRS would register the Federated Access Network Control Protocol in 1968., as a patent under the TRSv1 license. The FANCP relied on (then confidential and unknown of) TRS computers which could breach encrypted tunnels of communications between other machines, and decrypt data transferred over, using radio towers. However, this was an expensive one-way communication, which could only retrieve and decipher data from other devices.
6: The GPAL (General Public Access Library) was a digitized catalogue library for cross-university indexing of repositorium’s. As the ARLS, KRYPTOS 1.5, and TRS, were all made by staff employed or trained in the universities, these innovations were a trade secret.

The Decade of Facilitation and Publication:

1: The GPAL groups goal was to further their catalogue and accelerate computing capabilities as to automate research. For this purpose, the group was set to: construct their own system, replicate and unify the eavesdropping of RICP and FANCP, and license them for academic purposes. They’ve released a model of an enclosed computing device (GPAL, 1974) which supported: search and index algorithms, verification of real-time states on stored data, push notifications of new papers released into the repositorium, multi-user support, and random access communication. It was limited by enclosed connection to both the devices and the university network. In their publication, GPAL had released the information they had gathered regarding the RICP and FANCP PII violations.
2: This prompted the TRS to investigate into the RSR group and retrieve further data from RICP communications. However, due to TRS own limitations, collaboration between the TRS and the GPAL began.
3: Another result of the publication and of the license were “homebrew” developments, namely: the Free Public Access advocacy group and the Secure Networked Systems private business interest group.
4: The TRS-GPAL collaboration was finalised in the Linked Layer Restricted Communications agreement of 1977., in preparation for the LLRCSystems and GPALSystems, respectively. In the mean-time, ARL and SNS released the ARLS under the new ARLv2 license in 1978.
5: AID Department Nine v General Public case was launched by the Supreme Court, upon receiving requests from the FPA advocacy group, the SNS private business interest group, and after the GPAL-LLRC filed a lawsuit against the RSR group of AID. Declassification of data gathered by AIDs RSL was made public in 1980. This prompted an influx of licensing pre-registrations (prior to proof of concept) to be released: The LLRCv2, the GPALv2, the FPA, the SNS. It demanded that KRYPTOS be separated from the AIDs management.
6: By 1981., Computer Science as a field was facilitated to being part of the Systems Theory category. This is atypical, as elsewhere, it had grown mostly out of Electronic Engineering.

The ACISP Flash Storm:

1: Effects of pre-emptive licensing are evident, as the aforementioned (exception of FPA and SNS) never received any device nor innovation attached to them. This was largely the result of a sudden public release of the first standardised protocol by ENGeNs home wired telephone lines and equipment, then at record low prices. The Automated Interconnected Systemic Protocol version 1 (ACISPv1) became publicised in 1983. This was a set of standards created by ENGeN but followed by other television, phone, and pager service providers and manufacturers. The ACISPv1 was licensed under SNS.
2: KRYPTOS 2 was released in 1984. under the renewed TRSv2 license. It was an enterprise-targeted 16-bit computer, through was reliant on diskettes for data transfers.
3: Due to GPAL-LLRC cooperation finally completing support for Intranet communications, and ACISPv2 providing VoIP network, in 1985., an impulsion of new devices and OS occurred: RTARLS (Real Time Alen Research Labs Systems), URS (Unified Research Systems) OS under GPALv2, DFPA (Distributed Federated Public Access) OS under FPA, LLRCSI under LLRCv3.
4: KRYPTOS 2 did come to dominate the the enterprise market, while URS and LLRCSI were entrenched; The only home market alternative was the DFPA OS, which suffered from extensive bike shedding and an overly restrictive licensing. It should be noted that, modern forms of these systems are: NCURS-OS under GPALv3, DFPAS under FPA, CSC (command systems computing) OS under LLRCv3.

The ISNS, NUS OS X, KRYPTOS III, and the STAR protocol:

1: ACISPv3 was released in 1987., together with the home market being announced the release of NUS OS X by the ACISP Consortium, under a new ISNS license (Intrusive Security Network Schematic).
2: The ISNS license was the first which offered: No warranty, no liability, replaced copyright of software and code with mandatory trademark contribution, was network-oriented (as NUS OS X allowed for emulating ACISPv4 functionality), and allowed for any modification to be re-sold.
3: NUS OS X released in 1988. under the ISNS license with full support for ACISPv3 by the (former) ProtoGENESIS. At the time, ProtoGENESIS partnered with ENGeN to provide a “home server, user-developer device, modular to suit all needs”. It came with ACISPv4 emulation capabilities named the “STAR” Protocol". Essentially, it emulated/emulates a switch, in place of a hub which provided mitigation for the formerly abundant broadcast storms.
4: However, it could also transcend topographic network layers. As a response, the LLRCSI license filed a lawsuit against the ISNS license.
5: In the mean-time, KRYPTOS III was being developed with more orientation towards the home market, which also included support for the STAR protocol.
6: In LLRCSI License v ISNS License (1992), the Supreme Court was for the first time met with a case of two conflicting licenses as parties. Its ruling placed: A 32-year moratorium on the use of the STAR Protocol, obligated PrototGENESIS to release and replace NUS OS X without backwards compatibility, permanently limited LLRCSI from communication outside of its own intranet; and prohibited henceforth the use of RICP, FANCP or any other similar protocol which would be intrusive of citizen privacy; While the RAF was obligated to fund research into total transitioning of all public networking and connected systems to the ACISPv4.
7: As consequence, KRYPTOS III was delayed by 8 years, releasing in 2000., while NUS OS X2 was released in 1996. as a replacement for NUS OS X. ACISPv4 became deployed in 1995., and was made standard by 1998.

Innsbolt, KRYPTOS 3.5, NUS OS XX, and end of the STAR Protocol Moratorium

1: Due to Innsbolts 2004. introduction of the Top Level Domain firewall and 2007. Intranet-exclusive use of networking, neither KRYPTOS III nor NUS OS X2 gained as much traction as had been anticipated. Meanwhile, the ACISP Consortium suffered heavily.
2: However, ACISPv4 was revitalised in 2021., as TCP/ACISPv4, while KRYPTOS 3.5 was released in 2019. NUS OS XX was released in 2024. by the succeeding firm of PrototAutomaton. Moratorium on use of the STAR Protocol ended in 2024.