The Book Behind The Imitation Game

Benedict Cumberbatch, Enigma, The Imitation GameIn wide release this Christmas will be the new film The Imitation Game (trailer), eagerly awaited by all serious fans of cryptography, World War II history-Bletchley Park division, spy stories, the invention of computers, and Benedict Cumberbatch. (My review of the movie.)Last week the author of the book on which the movie is based, Andrew Hodges, spoke here in Princeton. Hodges’s book—“one of the finest biographies of a scientific genius ever written,” said the Los Angeles Times reviewer—is Alan Turing: The Enigma: The Book That Inspired the Film “The Imitation Game” published in 1983 by Princeton University Press, which is congratulating itself heartily over its three-decades’-ago decision.

As you may recall, Alan Turing was the young British scientist (incorrect to label him a mathematical genius, because part of his brilliance was in blending fields—logic, engineering, biology, and mathematics) who led the successful efforts to break the Nazi naval codes in World War II. The machine created to do this was an early computer, and a paper Turing wrote in 1936 laid the foundation for the theory of computer science, by imagining a field that previously did not exist.

In Princeton in 1936-38, he worked on speech-scrambling technology. His interest in these diverse topics led him to an interest in ciphers and artificial intelligence, and these interests led not just to the Turing Test (“the imitation game”), but to Bletchley Park and the team of scientists there. Turing’s pivotal role in the Allied accomplishment, like most information about the unraveling of the Germans’ Enigma machine, was not revealed until the 1970s. Hodges said some of his theories about the connection between mathematics and biology were so advanced they are only now receiving attention in science.

Turing’s homosexuality caused few problems in the tolerant environment of King’s College, Oxford, but after the war, that changed. He held vast amounts of wartime secrets in his head, and it was a period of intense anti-Soviet paranoia. The authorities worried about his vulnerability. He died at age 42 of cyanide poisoning, and Hodges believes the coroner’s conclusion that his death was suicide, although the pressure that may have been brought to bear on him is unknown. He left just enough mystery about his death that his mother could console herself it was one of his science experiments gone wrong and conspiracy speculators could ever since consider it part of the enigma.

Johnny Worricker

Bill Nighy, Worricker

Bill Nighy as Worricker (photo: ichef.bbci.co.uk)

If you saw the two Masterpiece Contemporary thrillers starring Bill Nighy (perfect, as ever), chances are we agree they were terrific. If you missed them, Nighy plays MI5 agent Johnny Worricker, on the outs with his bosses and trying to bring attention to the shady dealings of Prime Minister Alec Beasley (Ralph Fiennes without much hair).

Needless to say, the Powers That Be don’t approve of Worricker’s activities and are seriously looking for him. In the first of the two dramas shown this month, “Turks and Caicos,” he’s chilling out on the islands when he’s spotted by a CIA agent played by Christopher Walken, with his typical opaque style, and you’re never quite sure who’s who and what’s what. Except that Worricker’s former girlfriend, Margo Tyrell (Helena Bonham Carter), wastes no time realigning her priorities and jetting down to the Caribbean when he needs her. In the second, “Salting the Battlefield,” Worricker and Tyrell are on the run, and doing a pretty good job of it, too, until family ties threaten to flush them out into the open.

These two productions are followups to 2011’s film with the same characters, “Page Eight,” which lacked only Bonham Carter’s Margo Tyrell. Somehow I missed that program when it was broadcast three years ago. Thanks, Neflix! What makes these dramas so good are the scripts. The screenplays and the direction are by British playwright, theater and film director, and two-time Academy Award nominee David Hare. Says Grantland reviewer Chris Ryan, “If it’s adult contemporary, it’s as good as adult contemporary gets.”

Ed Snowden: Hero or Traitor?

This post is not going to settle that question for you, and it’s not one I thought I’d be writing about, a recent resurgence in coverage of Snowden has made me think more deeply about him, now that the original panic and dismay have subsided. Most of the coverage is prompted by reporter James Bamford’s recent article, published in Wired. Bamford conducted the longest set of in-person interviews with Snowden since he went to ground in Russia a year ago. I’ve also been studying Stuart Taylor, Jr.’s, essay, published by Brookings, “The Big Snoop: Life, Liberty, and the Pursuit of Terrorists.”

Who Is Ed Snowden?

Ed Snowden, NSA, privacy, security, TED talk

Ed Snowden’s TED talk (photo: wikimedia.org)

Snowden’s position from the beginning has been that he is a patriot and a whistleblower, “bent on saving his country from becoming an Orwellian security state,” as Taylor puts it. Others have recorded his ambition, his highly visible, well-polished initial announcements and PowerPoints, and his more recent TED talk, which may suggest more complex and troubling motivations. Washington Post reporter and author David Ignatius (whose novel about a rogue CIA cyber-expert is reviewed on my home page) has said, “Snowden looks these days more like an intelligence defector, seeking haven in a country hostile to the United States, than a whistleblower.”

Ironically, given the current fractured state of U.S.-Russia relations, Snowden was offered asylum there only if he stopped his work aimed “at harming our American partners,” Russian President Putin stipulated. Snowden first withdrew his asylum application, but ultimately agreed not to release more intelligence secrets. The stolen National Security Agency (NSA) documents are no longer in his hands.

Security vs. Privacy

You will recall that in Snowden’s jobs, he accumulated evidence that the NSA was collecting and storing phone records, emails, and other private Internet activity of a great many American citizens, not just those suspected of terrorism, associating with terrorists, or even remotely connected to any—we “ordinary Americans.” This revelation led to retired NSA director Keith Alexander’s famous haystack analogy: If you want to find a needle in a haystack, you need the whole haystack.

In polls, the majority of Americans oppose this wholesale domestic spying, and the government has damaged its credibility as a result. Yet, Snowden worries the public will become inured to disclosures of mass surveillance, as the PBS News Hour reported. Our acceptance may be in part because Ordinary Americans feel privacy is already hopelessly lost, in part because we believe we are helpless to stop the spying, and in part because people tend to become numb to successive outrages and risks

By spying on foreign citizens and leaders, NSA also has damaged relationships abroad. What the public has heard most about, however, is the spying on German Chancellor Angela Merkel’s cell phone calls, while “the violation of 80 million Germans is a nonstory,” Snowden says.

A fundamental and inevitable tension Taylor explores is between national security and individual privacy and the irony that a security apparatus is needed in order to protect privacy. He covers, in a readable way, the basic tenets of relevant U.S. law going back to the Bill of Rights, in which the Fourth Amendment obligates the U.S. government to ensure that citizens “be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.” Before the telegraph, before the telephone, before the Internet, securing one’s “papers and effects” was relatively simple.

Snowden Fallout

Today, we must entrust the transmission and disposition of our communications to third parties that may or may not have an interest in protecting them or be able to do so when the NSA comes calling. However, the bad publicity Snowden’s revelations generated for the telephone companies and Internet giants has prompted a rethinking of corporate policies and strengthening of encryption practices.

Those steps haven’t come cheap. Tech companies have been hit by both substantial additional expenses and loss of income, as foreign clients become wary of their products—a potential $180 billion revenue loss, according to Forrester Research analysts.

In addition, the State Department says Snowden has not only damaged U.S. intelligence-gathering, but also potentially endangered U.S. agents abroad, without citing specifics.

Evolution of Law

After Watergate, Fourth Amendment protections were purportedly strengthened by the Foreign Intelligence Surveillance Act (FISA), which put a layer of judicial review between U.S. citizens (or permanent resident aliens) and the intelligence agencies that want to spy on them. But post-9/11, the Senate outflanked the FISA mechanism, in the hurriedly adopted Patriot Act. That new law widened the government’s authority to conduct surveillance and investigations.

Although critics predictably labeled the sweeping reforms President Obama proposed last spring as “going too far” and “not going far enough,” the changes may have begun to move the needle. And, the US House of Representatives overwhelmingly voted to halt the NSA’s practice of conducting warrantless searches of its database containing millions of Americans’ emails and phone calls—“one of many proposed reforms that never would have happened had it not been for Snowden,” Bamford claims.

Evolution of Technology

The “exponential leap” in authority under the Patriot Act coincided with greatly increased technical ability to collect, store, and monitor electronic communications data, a combination that, in Taylor’s words, has “run roughshod over laws, standards of conduct, and international norms,” jeopardizing the desired balance between national security and individual privacy contained in the Fourth Amendment.

NSA’s new million-square-foot data storage facility in Bluffdale, Utah, potentially can hold “upwards of a yottabyte of data, some 500 quintillion pages of text,” Bamford says. Every hour, billions of phone calls, faxes, emails, computer-to-computer data transfers, and text messages from around the world flow through this facility. “Some flow right through, some are kept briefly, and some are held forever.”

Then, there are the leaks. And, as Bamford points out, evidence suggests that Snowden is not the only leaker, because some media reports cite documents that apparently did not come from him. This put NSA in a real bind: “accused of rogue behavior in its snooping,” Taylor says, “and of incompetence in protecting the information it had collected.” Snowden says NSA cannot seem to tell which documents he just electronically “touched” and those he actually stole, though he says he left digital clues to enable them to be differentiated. “I figured they would have a hard time,” he told Bamford. “I didn’t figure they would be completely incapable.”

Solutions?

A second major tension, is “the severe limit on the degree to which transparency can be reconciled with functions of government that must be opaque — that is, secret — in order to be effective,” Taylor says. Certainly, the solutions Snowden himself suggests do nothing to reconcile that tension. In Bamford’s article, he suggests, for example, “making encryption a universal standard—where all communications are encrypted by default.” Regarding future leaks, he says, “The question for us is not what new story will come out next. The question is, what are we going to do about it?”

Further Information

Check out the upper left corner of the Brookings article to see what its computers are tracking about you, as you read.

NSA surveillance capabilities allow it to map your movements by monitoring the unique identifiers emitted by your cell phone, computer, and other electronic devices. You can get the flavor of this by checking out what Google can do, unless your device has this feature turned off (how to turn it off).

Read about the MonsterMind, a real? program designed to counter international electronic threats. It poses two dangers: the ability to wage autonomous retaliatory attacks that have unanticipated consequences; and, to the privacy point, the system’s need to monitor virtually all communication between people in the United States and those overseas, as Snowden says, “without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time.”

Experts’ views on the future of the Internet, in light of a range of security concerns, reported in July 2014 by the Pew Internet & American Life Project.

*** The Director

Robin Hood

“Robin Hood’s Band Made Merry by Killing the King’s Deer” (photo: c1.staticflickr.com)

By David Ignatius (narrated by George Guidall). This thriller is set in the bowels of the nation’s national security apparatus, at the time a new CIA director is appointed who is not a Beltway insider, but plucked from the corporate world. The new director, Graham Weber, is pitted against the puppeteers of competing security agencies and (this is not a spoiler) a computer wizard inside the Agency who has gone rogue, James Morris.

How much readers like the book seems to depend on how excited they were by the electronic shenanigans of Morris, though there didn’t seem to be a lot new there—not for readers of Wired, anyway. Still, while Morris and his network were entertaining, the old-school-tie boys on Weber’s other flank were palpably less convincing. The women in the story fell into their respective stereotypes. A flimsy seduction scene is best ignored.

But the bigger problem—and where this book diverges from the best writing of, say, Neal Stephenson—is that, while it has the geeky stuff down, it has no social science sense. “Rob from the banks of the rich countries and give to the poor ones?” Really? Which poor countries would that be? Zimbabwe? North Korea? Myanmar? Uganda? Many of the world’s poorest countries stay that way because the leadership class steals everything they can get their hands on. Sending them “free” cash makes no sense. I didn’t want to read a lecture on political science and economics, but needed some acknowledgement that such sophisticated technologists thought deeper than a Robin Hood fantasy. Unfortunately, this gap undercuts their whole motivation for the crime.

If you can ignore that problem, and if you, like me, worry about our growing electronic vulnerabilities, you may like this book! And, you’ll notice the similarities in supposed high-mindedness between Morris and real-life cyber-spy Ed Snowden.

The Honourable Woman

Maggie Gyllenhall, Middle East, The Honourable Woman

Maggie Gyllenhall in “The Honourable Woman” (photo: bbc.co.uk)

Saw the first of eight episode of this new BBC production—“both mystery and spy thriller” says Willa Paskin in Slate (clip)—on the Sundance Channel last night (Thursdays, 10 pm). Reviews have been smokin, and certainly the first hour:fifteen was exceptionally strong, laying down a lot of tantalizing clues about what’s to come, with the backdrop “the incredible complexity, raw emotion, and intractability of the Israel-Palestine conflict,” Paskin says.

Maggie Gyllenhaal plays the head of a U.K.-based arms company and has recently been made a baroness, so is Lady Nessa Stein. She and her brother were orphaned young when their father, a major seller of arms to Israel, was assassinated in front of them. Now she runs the company, and her brother the company’s foundation. They are determined use their money for good, so are in the midst of a project to bring communications technology—cables for phone and internet access—to the Palestinians, including, she says at one point, “to the schools and hospitals we have built.”

The episode begins and ends with violence, including an early quick-cut of an event Viewer thinks might have been another violent act. In the middle, various people are trying to figure that one out, including Stephen Rea, as an over-the-hill MI6 agent assigned temporarily to the Middle East desk, as punishment it seems (I missed some muttered dialog, but I can read the script here). He and Gyllenhaal independently elude their handlers for frank conversation with what I suspect is a short list of people they can trust.

Lots of clues, lots of intrigue. Very promising. Says Paskin, “The Honorable Woman is in many ways, most of them cerebral, an extremely impressive piece of work” that “oversimplifies very little.” Cerebral? Reason enough to watch.

Converted_file_4913e22dDo you think the publicists tried–perhaps unconsciously–to replicate National Geographic’s most famous photo in that picture of Maggie Gyllenhaal above? There’s something odd about the eyes there.

 

 

***The Cobweb

spider, cobweb

(photo: pixabay.com)

By Neal Stephenson and J. Frederick George (narrated by Marc Vietor)–As a huge Neal Stephenson fan, I was delighted to see this political thriller—co-written with J. Frederick George—in a special Audible 2-for-1 sale. Unfortunately, it lacked the very aspects of Stephenson’s other works that I enjoy most—complexity, humor (ok, there was a bit), challenging ideas, although there was some effective skewering of government bureaucracy.

J. Frederick George is the pen name of historian George Jewsbury, a Russia specialist—whose special expertise is little-used in this tale about the first Gulf War—who is also Stephenson’s uncle. This book was originally published under another pen name for the two of them, Stephen Bury. That’s not quite the most complicated aspect of the plot.

The story takes place in Iowa and Washington, D.C., and the title refers to how people in the nation’s intelligence agencies can protect themselves by keeping anyone who might disturb their world so smothered in procedure and paperwork and investigative committees that they lose their ability to actually accomplish anything. Ample evidence since the book’s publication (1996, reissued in 2005) demonstrates how the different pieces of the nation’s security apparatus have worked at cross-purposes and always to their own presumed advantage and protection. Amazon reviewers familiar with Stephenson’s other work gave it lower ratings (“Neal Stephenson lite,” one said), but overall, four stars.

A Most Wanted Man

Hamburg, port

Hamburg, Germany (photo: wikimedia)

Ambiguity, betrayal, characterization, desire—The ABC’s of John le Carré are all in place and working hard in this new film (trailer here). The setting is the gritty port city of Hamburg, from whence much violence rained down on America—and the dirty water of the first scene is the proper element for the dirty business to come—and the real world of espionage. I won’t say more about the plot. Acting throughout is exemplary. Perfect music.

(Must contrast this with the over-long, deeply implausible, and fundamentally boring Poirot mystery on PBS’s Masterpiece Mystery last night. What happened there? I get it that it’s just supposed to be fun. Wasn’t.)

A Most Wanted Man is both movie title and epitaph. John le Carré’s encomium is a must-read. Rotten Tomatoes critics’ rating: 90%

You’ve Been Hacked!

government spying, cell phone, mobile phone, law enforcement surveillance

(photo: upload.wikimedia.org)

So how do cops and spooks steal data from your mobile phone, anyway? Research teams at the Kaspersky Lab in Russia and Toronto’s Citizen Lab independently analyzed a digital surveillance tool created by the Italian Company, Hacking Team (do watch this marketing video if you want something to think about), which more than 60 government worldwide use to snatch and record mobile phone data. The tool’s components have been designed to target Android, iOS, Windows Mobile, and BlackBerry users—one of whom is probably you.

According to a lengthy Wired article by Kim Zetter, here’s what the Hacking Team’s tool can do: collect your emails, text messages, call history, and address books; log keystrokes, reveal where you’ve searched, and take screenshots; record audio of calls and the ambient sounds in the room where the phone is; and use the phone’s camera to take pictures of the surroundings. No surprise, the tool can use the phone’s GPS system to locate it (and probably, you, too). In other words, the tool can do with the phone pretty much everything you can.

What’s new about these revelations is that this is the first time these techniques have been reverse-engineered to reveal how they really work, including how they protect themselves from detection. Here’s a blog post about these discoveries from Russian researcher Sergey Golovanov.

film noir, spies

(photo: c1.staticflickr.com)

Spies following each other through the wetly reflecting nighttime alleys of Eastern Europe will be relegated to film noir, since the above functions let a tracker follow you to that screening of 1984 and home again from some remote center. Most countries using this technology have one or two command-and-control centers to monitor multiple targets and conduct surveillance. The nation with by far the most such centers? The United States, with 64.

The genie is out of the bottle, however, and “This type of exceptionally invasive toolkit, once a costly boutique capability deployed by intelligence communities and militaries, is now being marketed for targeting everyday criminality and ‘security threats,’” say Citizen Lab researchers. Inevitably, people who shouldn’t have it, will.

****Spycraft

Desmond Llewelyn, Q, James Bond, Spycraft

Desmond Llewelyn as “Q” (photo: wikimedia.org)

By Robert Wallace, H. Keith Melton, and Henry Robert Schlesinger. Foreword by George Tenet, narration by David Drummond. The digitization and miniaturization everywhere in our daily lives has affected tradecraft in the espionage world, too—and sometimes began there before entering the consumer market. Initially, the CIA tried to heavily censor Spycraft: The Secret History of the CIA’s Spytechs, from Communism to Al-Qaeda, but eventually ended up making almost no changes. The book details the history of the Agency’s Office of Technical Services—the department that, since World War II, has come up with all the dead drops, audio surveillance techniques, secret inks, espionage gear, and so on needed by field agents. Q, in other words.

Co-authored by a former OTS director, Spycraft begins with a review of cases involving some of the most notorious and significant, mostly Soviet, spies run by the CIA, then turns to a detailed review of various spycraft essentials and what makes them work—or not—in the field. The history of the Soviet spies, most of whom were discovered and executed, provides an appreciation for the steady improvements in technology, though it’s pretty much a mug’s game, because improvements in detection soon follow. The challenge is to remain one step ahead. I didn’t come away with a satisfactory answer to the key question: with all this amazing technology, how come the CIA has missed the big plays? 9/11, Iraq’s true WMD situation, the Arab Spring?

For anyone writing spy and espionage fiction, Spycraft summarizes innumerable backstory issues and technical details that must be right! But beyond these specifics, the choice of what OTS worked on and how the technical officers solved problems reveals the dilemmas faced by field agents. Other readers may simply be amazed at the scope and persistence of this clandestine effort. (Amazon reader rating: 4.5 stars.)

****Ordinary Heroes

Scott Turow, Ordinary HeroesBy Scott Turow, this World War II tale (2005) started off slowly for me, but by the time the main protagonist (the narrator’s now-dead father) is in the European war zone, I was hooked. The narrator discovers that his father, a Captain in the U.S. Army’s Judge Advocate General’s office, was court-martialed near the end of the war and could have faced a firing squad for his actions in pursuit of an OSS rogue spy.

The framing story that introduces the narrator’s quest to excavate his father’s past wasn’t quite compelling enough and the big reveal not that much of a surprise, but the book’s middle was terrific. Characters were well developed, and various hellish aspects and moral conundrums of war convincingly frustrated the captain’s search for the spy at every turn. Coming to terms with the damage of war was a life-long project for the father, carried on silently throughout the narrator’s life. New York Times reviewer Joseph Kanon liked it, too.