{"id":481,"date":"2016-12-23T10:20:11","date_gmt":"2016-12-23T10:20:11","guid":{"rendered":"http:\/\/www.theblackvault.com\/documentarchive\/?p=481"},"modified":"2016-12-23T18:31:13","modified_gmt":"2016-12-23T18:31:13","slug":"y2k","status":"publish","type":"post","link":"https:\/\/www.theblackvault.com\/documentarchive\/y2k\/","title":{"rendered":"Y2K"},"content":{"rendered":"<h3>Background<\/h3>\n<p>The Year 2000 problem (also known as the Y2K problem, the millennium bug, the Y2K bug, or simply Y2K) was a notable computer bug resulting from the practice in early computer program design of representing the year with two digits.<\/p>\n<p>This caused some date-related processing to operate incorrectly for dates and times on and after January 1, 2000 and on other critical dates which were billed &#8220;event horizons&#8221;.<\/p>\n<p>Without corrective action, long-working systems would break down when the &#8220;&#8230;97, 98, 99&#8230;&#8221; ascending numbering assumption suddenly became invalid. Companies and organizations world-wide checked, fixed, and upgraded their computer systems.<\/p>\n<p>The following are documents pertaining to this topic.<\/p>\n<h3>Declassified Documents<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/other\/y2knsa.pdf\">All documents to the year 2000 crisis from the NSA<\/a> &#8211; This request yielded an $8,000 charge for documents relating to Y2K.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/dod\/00-028-y2k.pdf\">DOD\/IG Audit Report, Year 2000 Issues Within the U.S. Pacific Command&#8217;s Area of Responsibility, Host Nation Support to U.S. Forces in Japan, October 28, 1999<\/a> [41 Pages, 6.5MB]<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/dod\/99-027.pdf\">DOD\/IG Audit Report, DOD Base Communications Systems Compliance with Year 2000 Requirements, October 30, 1998<\/a>\u00a0[27 Pages, 2.1MB]<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/y2k.pdf\">Report of the Defense Science Board Task Force on Year 2000, April 1998<\/a> [72 Pages, 1.5MB]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Background The Year 2000 problem (also known as the Y2K problem, the millennium bug, the Y2K bug, or simply Y2K) was a notable computer bug resulting from the practice in early computer program design of representing the year with two digits. This caused some date-related processing to operate incorrectly for dates and times on and<\/p>\n","protected":false},"author":1,"featured_media":482,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"episode_type":"","audio_file":"","transcript_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[51,14,2,5],"tags":[258],"class_list":{"0":"post-481","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-controversies","8":"category-defense-issues","9":"category-government","10":"category-military-defense","11":"tag-y2k"},"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/uploads\/2015\/02\/tiny-810l-3.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/comments?post=481"}],"version-history":[{"count":0,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/481\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media\/482"}],"wp:attachment":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media?parent=481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/categories?post=481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/tags?post=481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}