Quotulatiousness

July 5, 2013

The secret army of monitors who fed Enigma signals to Bletchley Park

Filed under: Britain, Germany, History, Italy, Military, WW2 — Tags: — Nicholas @ 08:20

The BBC remembers the volunteer radio tinkerers who helped win the intelligence war in Europe:

One day, towards the start of World War II, a captain wearing the Royal Signals uniform knocked on a British teenager’s door.

The 16-year-old was called Bob King. When he went to greet the visitor, he had no idea that soon he would become one of Britain’s so-called “voluntary interceptors” — some 1,500 radio amateurs recruited to intercept secret codes broadcast by the Nazis and their allies during the war.

“The captain asked me if I would be willing to help out with some secret work for the government,” remembers Mr King, now 89. “He wouldn’t tell me any more than that.

“He knew that I could read Morse code – that was the essential thing.”

[. . .]

By mid-1941, the new base, Arkley View, was receiving about 10,000 message sheets a day from its recruits.

“I worked for five years scrutinising the logs that came in from the other amateurs — thousands of log sheets with the signals which we knew were wanted, and you could only know it from experience,” remembers Mr King.

“We knew it wasn’t Allied army air force, we knew it was German or Italian — various things gave that away, but it was disguised in such a form that it looked a bit like a radio amateur transmission.

“We knew it was highly important, everything was marked ‘top secret,’ but only many years later we discovered that it was German secret service we were listening to.

“Of course you didn’t ask questions in those days, otherwise you’d be in real trouble.”

Encoded messages were transmitted to Bletchley Park in Buckinghamshire, the UK’s former top-secret code-cracking centre.

Once decoded, the data was sent to the Allied Commanders and the UK Prime Minister, Winston Churchill.

June 29, 2013

Jeff Jarvis calls for private encryption

Filed under: Liberty, Media, Technology — Tags: , , , — Nicholas @ 10:27

In the Guardian, Jeff Jarvis makes the case for internet communications to be protected by encryption:

Assuring the security of private communications regardless of platform — email, VOIP, direct message — should be a top priority of the internet industry in the aftermath of Edward Snowden’s revelations that US and UK governments are tapping into the net’s traffic.

The industry needs to at least come together to offer encryption for private communications as protection against government surveillance.

Guarantee of private communications should be a matter of law already. But, of course, it is not. In the US, only our first-class physical mail is protected from government surveillance without a warrant. In the UK, it was a case of opened mail that led to the closing of the Secret Department of the Post Office. As a matter of principle, the protection afforded our physical mail should extend to any private communication using any means. Just because the authors of the Fourth Amendment could not anticipate the internet and email, let alone Facebook, that should not grant government spies a loophole from the founders’ intent.

That protection could come from Congress, but it won’t. It could come from the courts, but it hasn’t.

I argued in my book Public Parts that government may try to portray itself as the protector of our privacy, but it is instead the most dangerous enemy of privacy, for it can gather our information without our knowledge and consent — that is the lesson of Snowden’s leaks — and has the power to use it against us.

1948 and the “Black Friday” of cryptanalysis

Filed under: Books, History, Technology, USA — Tags: , , , — Nicholas @ 09:05

In Salon, Andrew Leonard looks at the early years of the NSA:

On Oct. 29, 1948, the Soviet Union suddenly changed all its ciphers and codes. What later became known as “Black Friday” delivered a huge shock to the two U.S. intelligence agencies that had conducted the bulk of American code-breaking efforts during World War II and its immediate aftermath. Before Black Friday, the Army’s SIS and the Navy’s OP-20-G complacently assumed that they had acquired the keys to most of the world’s encrypted communications. But with a flip of the switch the U.S. was once again in the dark — just as the Cold War was heating up.

“One of the gravest crises in the history of American cryptanalysis,” writes historian Colin Burke, led directly to the 1949 merging of the SIS and OP-20-G into the Armed Forces Security Agency. Three years later, another bureaucratic shuffle transformed the AFSA into the National Security Agency. A sense of panic induced by the “Soviets’ A-Bomb, the Berlin Blockade, the forming of the satellite bloc in Eastern Europe, the fall of China, and the Korean War” — all of which “were not predicted” by the intelligence agencies — encouraged the U.S. government to authorize the NSA to spend tens of millions of dollars on computer research, in the hope that technological advances would help crack the new Soviet codes.

Colin Burke is the author of It Wasn’t All Magic: The Early Struggle to Automate Cryptanalysis, 1930s-1960s. Burke completed his history in 1994, but until last week, his volume of crypto-geekery had only a handful of readers. Part of a series produced by the NSA’s Center for Cryptological History, It Wasn’t All Magic was considered classified material until May 2013, and was only made available online on June 24.

Nice timing! With the NSA currently occupying its highest public profile in living memory, a look back at its early history is quite instructive. It is useful to be reminded that the mandate to spy and surveil and break codes was absolutely critical to the early growth and evolution of computer technology. Some things never change: The immense effort required to crack German and Japanese codes during World War II are an early example of the intimidating challenges posed by what we now call “big data.”

It’s actually quite surprising that it took the Soviets until 1948 to change their codes: from 1942 or so, Britain and the US were sharing their Enigma decryptions of top-secret German messages with the Soviet Union. Even if the information was provided without the original text, the Soviets were fully aware that this was the fruit of decryption, not human spy reports. At the end of World War 2, that Anglo-American expertise would obviously have been redeployed to other ends … and reading Soviet message traffic clearly would be one of the more interesting sources of data.

April 18, 2013

Reason.tv: Why Bitcoin is Here to Stay

Filed under: Economics, Technology — Tags: , , , — Nicholas @ 10:29

Don’t bet on the decentralized currency Bitcoin as a retirement investment, says Mercatus Center policy analyst Jerry Brito, but go long on it as the payment system of the future. Reason‘s Nick Gillespie talks with Brito, the editor of the new anthology Copyright Unbalanced, about Bitcoin bubbles and why governments are so afraid of this virtual payment system.

April 12, 2013

The Economist explains how Bitcoins work

Filed under: Economics, Technology — Tags: , , , , — Nicholas @ 09:28

A brief overview of the much-talked-about digital currency:

BITCOIN, the world’s “first decentralised digital currency”, was launched in 2009 by a mysterious person (or persons) known only by the pseudonym Satoshi Nakamoto. It has been in the news this week as the value of an individual Bitcoin, which was just $20 at the beginning of February, hit record highs above $250, before falling abruptly to below $150 on April 11th. What exactly is Bitcoin, and how does it work?

Unlike traditional currencies, which are issued by central banks, Bitcoin has no central monetary authority. Instead it is underpinned by a peer-to-peer computer network made up of its users’ machines, akin to the networks that underpin BitTorrent, a file-sharing system, and Skype, an audio, video and chat service. Bitcoins are mathematically generated as the computers in this network execute difficult number-crunching tasks, a procedure known as Bitcoin “mining”. The mathematics of the Bitcoin system were set up so that it becomes progressively more difficult to “mine” Bitcoins over time, and the total number that can ever be mined is limited to around 21m. There is therefore no way for a central bank to issue a flood of new Bitcoins and devalue those already in circulation.

And a bit more technical detail:

All transactions are secured using public-key encryption, a technique which underpins many online dealings. It works by generating two mathematically related keys in such a way that the encrypting key cannot be used to decrypt a message and vice versa. One of these, the private key, is retained by a single individual. The other key is made public. In the case of Bitcoin transactions, the intended recipient’s public key is used to encode payments, which can then only be retrieved with the help of the associated private key. The payer, meanwhile, uses his own private key to approve any transfers to a recipient’s account.

This provides a degree of security against theft. But it does not prevent an owner of Bitcoins from spending his Bitcoins twice—the virtual analogue of counterfeiting. In a centralised system, this is done by clearing all transactions through a single database. A transaction in which the same user tries to spend the same money a second time (without having first got it back through another transaction) can then be rejected as invalid.

The whole premise of Bitcoin is to do away with a centralised system. But tracking transactions in a sprawling, dispersed network is tricky. Indeed, many software developers long thought it was impossible. It is the problem that plagued earlier attempts to establish virtual currencies; the only way to prevent double spending was to create a central authority. And if that is needed, people might as well stick with the government devil they know.

To get around this problem, Bitcoins do not resemble banknotes with unique serial numbers. There are no virtual banknote files with an immutable digital identity flitting around the system. Instead, there is a list of all transactions approved to date. These transactions come in two varieties. In some, currency is created; in others, nominal amounts of currency are transferred between parties.

April 10, 2013

If there’s a “Bitcoin bubble”, it doesn’t predict long term success or failure for the currency

Filed under: Economics, History, Technology — Tags: , , , , , — Nicholas @ 12:55

In Forbes, Tim Worstall explains that calling the current rise in Bitcoin value a bubble does not actually pass a judgement on whether Bitcoin will be a long term success:

And yes, I’m still of the opinion that Bitcoin is in a bubble. You know the walks like a duck, quacks like a duck idea? If it does those then it’s a duck. And the price changes that we’re seeing in Bitcoin make me and many other observers think that Bitcoin really is in a bubble. Indeed, there’s some nice work here showing that many of the Bitcoins in existence are being hoarded and that in itself is bubble behaviour.

However, do let me make one more thing clear: whether or not Bitcoin is in a bubble or not doesn’t mean that Bitcoin will succeed or not. They are entirely different questions, as different as is your wife Welsh or is your dog female? They really have no connection with each other at all.

Let us take the standard bubble example always used, the Dutch tulipmania. We could use others, the South Sea Bubble, the dot com boom, or we could even use an entirely different set of examples, say the introduction of the automobile. That last being when a new technology arrived without a speculative bubble around it.

The point of the first three, and let’s stick with tulips, is that there really was a quite obvious bubble in the prices of them. Most of the participants in the bubble (as with the other two) knew quite well that it was a bubble too. Prices were way out of line with any sort of “true value”. However, do note this very well: the tulip did indeed go on to become an important part of the Dutch economy. Indeed, it’s still there right now. Vast fields of tulips are grown there every year to supply cut flowers and bulbs for replanting that are shipped all over Europe. It’s actually become so important that other flowers, grown outside Europe, are still marketed through Holland as that’s where all the skill and infrastructure is.

April 9, 2013

Bitcoins as Tulips or viable virtual gold?

Filed under: Economics, Law, Liberty — Tags: , , , , — Nicholas @ 10:27

In the New Yorker, Maria Bustillos reviews the history of bitcoins:

In many ways, bitcoins function essentially like any other currency, and are accepted as payment by a growing number of merchants, both online and in the real world. But they are generated at a predetermined rate by an open-source computer program, which was set in motion in January of 2009. This program produced each one of the nearly eleven million bitcoins in circulation (with a total value just over a billion dollars at the current rate of exchange), and it runs on a massive peer-to-peer network of some twenty thousand independent nodes, which are generally very powerful (and expensive) G.P.U. or ASIC computer systems optimized to compete for new bitcoins. (Standards vary, but there seems to be a consensus forming around Bitcoin, capitalized, for the system, the software, and the network it runs on, and bitcoin, lowercase, for the currency itself.)

[. . .]

There is an upper limit of twenty-one million new coins built into the software; the last one is projected to be mined in 2140. After that, it is presumed that there will be enough traffic to keep rewards flowing in the form of transaction fees rather than mining new coins. For now, the bitcoins are initially issued to the miners, but are distributed when miners buy things with them or sell them to non-miners (such as jumpy Spanish bank depositors) who desire an alternative currency. The chain of ownership of every bitcoin in circulation is verified and registered with a timestamp on all twenty thousand network nodes. This prevents double spending, since no coin can be exchanged without the authentication of some twenty thousand independent cyber-witnesses. In order to hack the network, you would have to deceive over half of these computers at the same time, a progressively more difficult task and, even today, a very formidable one.

[. . .]

A casual review of Nakamoto’s various blog posts and bulletin-board comments also confirms that, from the first, Bitcoin was devised as a system for removing the possibility of corruption from the issuance and exchange of currency. Or, to put it another way: rather than trusting in governments, central banks, or other third-party institutions to secure the value of the currency and guarantee transactions, Bitcoin would place its trust in mathematics. At the P2P Foundation, Nakamoto wrote a blog post describing the difference between bitcoin and fiat currency:

    [Bitcoin is] completely decentralized, with no central server or trusted parties, because everything is based on crypto proof instead of trust. The root problem with conventional currency is all the trust that’s required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust. Banks must be trusted to hold our money and transfer it electronically, but they lend it out in waves of credit bubbles with barely a fraction in reserve. We have to trust them with our privacy, trust them not to let identity thieves drain our accounts… With e-currency based on cryptographic proof, without the need to trust a third party middleman, money can be secure and transactions effortless.

* * *

Much of what has been written so far about bitcoins has centered on the perceived dangers of their relative anonymity, the irreversibility of transactions, and on the fact that they can be used for money laundering and for criminal dealings, such as buying drugs on the encrypted Web site Silk Road. This fearmongering is a red herring, and has so far prevented the rational evaluation of the potential benefits and shortcomings of crypto-currency.

Cash is also anonymous; it is also used in money laundering and illegal transactions. Like bitcoins, stolen cash is difficult to recover, and a cash transaction can’t readily be traced back to the source. Nor is there immediate recourse for the reversal of transactions, as with credit-card chargebacks or bank refunds when one’s identity has been stolen. However, I find it difficult to believe that anyone who has written critically of the dangers of bitcoin would prefer an economy where private cash transactions are illegal.

Update: Meet the $2 Million Bitcoin Pizza.

Floridian Laszlo Hanyecz thought it would be “interesting” to be able to say he paid for a pizza in bitcoins. He worked out a deal where he transferred 10,000 of his bitcoins to a guy in England, who ordered him two pizzas from Papa Johns.

Today, one Redditor notes, those 10,000 bitcoins would be worth about $2.3 million, thanks (in part) to folks fleeing unstable and politically risky state currencies in Cyprus and elsewhere.

Some news outlets are covering this as a “doh!” story. But these pizzas were a huge publicity boon for Bitcoin, contributing to the success of the currency today. If Lazslo had been a hoarder, perhaps his bitcoins would be worth very little now. Cashing in bitcoins for pizza when they were worth a fraction of a cent each is not obviously smarter or stupider than selling now would be, with bitcoins trading at $234. It’s a bet on which way the market is headed, that’s all.

December 5, 2012

Code used by Roger Williams in the 1600s is finally cracked

Filed under: Books, History, Media, Technology — Tags: , — Nicholas @ 11:10

I first read about Roger Williams in Murray Rothbard’s Conceived in Liberty, but I didn’t know that Williams had left coded notes that had defied analysis until now:

The obscure book’s margins are virtually filled with clusters of curious foreign characters — a mysterious shorthand used by 17th century religious dissident Roger Williams.

For centuries the scribbles went undeciphered. But a team of Brown University students has finally cracked the code.

Historians call the now-readable writings the most significant addition to Williams scholarship in a generation or more. Williams is Rhode Island’s founder and best known as the first figure to argue for the principle of the separation of church and state that would later be enshrined in the Bill of Rights.

[. . .]

Fisher said the new material is important in part because it’s among Williams’ last work, believed to have been written after 1679 in the last four years of his life.

The new discovery is remarkable on several levels, Widmer said.

“Part of it was the excitement of a mystery being cracked, and part of it was Roger Williams is very famous in Rhode Island — no other state has a founder as tied up with the state’s identity as Rhode Island,” he said. “To have a major new source, a major new document, from Roger Williams is a big deal.”

H/T to Bruce Schneier for the link.

September 2, 2012

The importance of encryption for private citizens

Filed under: History, Liberty, Technology — Tags: , , , , — Nicholas @ 11:26

Wendy McElroy relates one of the earliest examples of private encryption in the young American republic:

In America, the tug of war between privacy and forced access to encrypted data is as old as the nation’s formation. As always, forced access was executed by authorities against individuals.

In 1785, a resolution authorized the secretary of the Department of Foreign Affairs to open and inspect any mail that related to the safety and interests of the United States. The ensuing inspections caused prominent men, like George Washington, to complain of mail tampering. According to various historians, it also led James Madison, Thomas Jefferson and James Monroe to correspond in code. That is, they encrypted their letters to preserve the privacy of their political discussions.

The need for Founding Fathers to encrypt their correspondence is high irony. The intrusive post office against which they rebelled had been established specifically to provide a free flow of political opinion. In the 1770′s, Sam Adams urged the 13 colonies to create an independent postal system because the existing post office, established by the British, acted as a barrier to the spread of rebellious sentiment. Dorothy Ganfield Fowler in her book Unmailable: Congress and the Post Office observed, “He [Adams] claimed the colonial post office was made use of for the purpose of stopping the ‘Channels of publick Intelligence and so in Effect of aiding the measures of Tyranny.’”

Alas, the more government changes, the more oppression remains the same. Soon the Continental Congress itself wanted to declare some types of matter ‘unmailable’ because their content were deemed dangerous. Anti-Federalist letters and periodicals became one of the first types of information to become de facto unmailable. (Anti-federalists resisted centralized government and rejected a Constitution without a Bill of Rights.) During the ratification debates on the Constitution, the Anti-Federalists were unable to circulate their material through the Federalist-controlled post office.

May 15, 2012

Nerd politics: problems and opportunities

Filed under: Government, Liberty, Politics, Technology — Tags: , , , , , , — Nicholas @ 00:08

Cory Doctorow in the Guardian on the current state of “nerd politics:

In the aftermath of the Sopa fight, as top Eurocrats are declaring the imminent demise of Acta, as the Trans-Pacific Partnership begins to founder, as the German Pirate party takes seats in a third German regional election, it’s worth taking stock of “nerd politics” and see where we’ve been and where we’re headed.

Since the earliest days of the information wars, people who care about freedom and technology have struggled with two ideological traps: nerd determinism and nerd fatalism. Both are dangerously attractive to people who love technology.

In “nerd determinism,” technologists dismiss dangerous and stupid political, legal and regulatory proposals on the grounds that they are technologically infeasible. Geeks who care about privacy dismiss broad wiretapping laws, easy lawful interception standards, and other networked surveillance on the grounds that they themselves can evade this surveillance. For example, US and EU police agencies demand that network carriers include backdoors for criminal investigations, and geeks snort derisively and say that none of that will work on smart people who use good cryptography in their email and web sessions.

But, while it’s true that geeks can get around this sort of thing — and other bad network policies, such as network-level censorship, or vendor locks on our tablets, phones, consoles, and computers — this isn’t enough to protect us, let alone the world. It doesn’t matter how good your email provider is, or how secure your messages are, if 95% of the people you correspond with use a free webmail service with a lawful interception backdoor, and if none of those people can figure out how to use crypto, then nearly all your email will be within reach of spooks and control-freaks and cops on fishing expeditions.

[. . .]

If people who understand technology don’t claim positions that defend the positive uses of technology, if we don’t operate within the realm of traditional power and politics, if we don’t speak out for the rights of our technically unsophisticated friends and neighbours, then we will also be lost. Technology lets us organise and work together in new ways, and to build new kinds of institutions and groups, but these will always be in the wider world, not above it.

March 31, 2012

Botched investigation into GCHQ staff member’s mysterious death

Filed under: Britain, Government, Science, Technology — Tags: , , , — Nicholas @ 09:17

This sounds particularly bad:

Forensic investigators have apologized for the bungling of the inquiry into the mysterious death of a codebreaker employed by the Government Communications Headquarters (GCHQ).

In August 2010, Gareth Williams, described as a mathematical genius by his peers and employed at GCHQ since leaving university, was found dead in his flat in London. Williams, who had recently qualified for deployment with MI6 — Britain’s version of the CIA — was found naked and partially decomposed in a sports bag that had been locked from the outside and placed in the bath.

In the pre-inquest hearing on Friday, the court heard that the investigation into Williams’ death had been botched from the start. LGS Forensics said that DNA found on Mr Williams’ body was investigated, but later turned out to have been transferred there from one of the forensic scientists investigating the death, and a search of the apartment turned up no clues as to his death.

February 10, 2012

Help sponsor a new home for the historic Colossus code-cracking computer

Filed under: Britain, History, Technology, WW2 — Tags: , , — Nicholas @ 11:11

John Leyden at The Register on the fundraising efforts to build a new home for the WW2 cryptographic computer:

The National Museum of Computing (TNMOC) has turned to a tried-and-tested fundraising method to establish a home for the rebuilt Colossus computer at Bletchley Park.

Individuals and firms are invited to buy up pixels of an online picture of the wartime code-breaking machine — at 10 pence per dot with a minimum spend of £10 — pretty much like Alex Tew’s million-dollar homepage effort.

The museum’s curators need the cash to open an exhibition featuring the Colossus in the historic Block H, on the spot where Colossus No 9 stood during the Second World War and where the rebuild took place.

Colossus was the world’s first electronic programmable computer, and was used to crack encrypted messages between Hitler and his generals.

December 15, 2011

Google donates to the Bletchley Park restoration project

Filed under: Britain, History, Technology, WW2 — Tags: , , — Nicholas @ 09:15

Google has made a significant contribution to the preservation and restoration of the famous WW2 codebreaking site:

The centre has won a £4.6million grant from the Heritage Lottery Fund but needs to attract £1.7million in outside funding before the big grant can be delivered and the next stage of the development kickstarted.

The £550,000 Google contribution is the biggest single donation that the Bletchley Park Trust has received so far. It was given by the search engine’s charitable arm, which donated a total of $100 million (£64.4million) in 2011.

“It would be wonderful if other donors follow Google’s example to help preserve our computing heritage,” said Simon Greenish, CEO of the Bletchley Park Trust. “We could then proceed as soon as possible with restoration of the profoundly historically significant codebreaking huts.”

October 5, 2011

The irony of Bletchley Park’s funding windfall

Filed under: Britain, History, Technology, WW2 — Tags: , , — Nicholas @ 10:47

Cory Doctorow has the good news about Bletchley Park’s recent grant:

Bletchley Park, the birthplace of modern crypto and the home of the WWII codebreaking effort, has received a £4.6m Heritage Lottery Fund grant to fund restoration efforts and new exhibits. Bletchley was broken up after the war and its work was literally buried as part of the Cold War climate of secrecy that prevailed. In the years that followed, neglect and time led to the near-destruction of many of the historic sites. The Bletchley Park trust has since done amazing work on a shoestring budget to restore and preserve Bletchley, creating a fabulous museum and rebuilding some of the most beautiful electromechanical computers I’ve ever seen.

[. . .]

Ironically, the money to restore Bletchley has come from the lottery, a government-run system designed to reinforce and exploit statistical innumeracy of the sort that Bletchley’s cryptographers overcame in order to help win the war.

August 1, 2011

A quick plug for a useful EFF plug-in for Firefox

Filed under: Liberty, Technology — Tags: , , , , — Nicholas @ 10:25

I’ve mentioned this before, but I was just reminded about it as I started using the new laptop with its new install of Firefox:

This Firefox extension was inspired by the launch of Google’s encrypted search option. We wanted a way to ensure that every search our browsers sent was encrypted. At the same time, we were also able to encrypt most or all of the browser’s communications with some other sites:

  • Google Search
  • Wikipedia
  • Twitter and Identi.ca
  • Facebook
  • EFF and Tor
  • Ixquick, DuckDuckGo, Scroogle and other small search engines and lots more!

Firefox users can install HTTPS Everywhere by following this link.

As always, even if you’re at an HTTPS page, remember that unless Firefox displays a colored address bar and an unbroken lock icon in the bottom-right corner, the page is not completely encrypted and you may still be vulnerable to various forms of eavesdropping or hacking (in many cases, HTTPS Everywhere can’t prevent this because sites incorporate insecure third-party content).

« Newer PostsOlder Posts »

Powered by WordPress