The Code-Breakers Who Led the Rise of Computing

Total Page:16

File Type:pdf, Size:1020Kb

The Code-Breakers Who Led the Rise of Computing Books & arts doctoral work, published in the Astrophysical Journal, provided tangible evidence of quan- tum behaviour in complex systems. Teaching The code-breakers who students about scientists such as Imes broad- ens their image of who can be a physicist. This is one strategy to transform STEM curricula led the rise of computing and to demonstrate how faculty members can respect the contributions of women and people of colour. In short, students should World wars, cold wars, cyberwars — marking a century see scientists who look like them reflected in classroom content. Researchers such as of state surveillance at GCHQ. By Andrew Robinson Christopher Emdin, a scholar of science edu- cation at Columbia University in New York City, have used this approach to attract students ost professional scientists aim al-Qaeda attacks, to work with his US opposite from historically under-represented groups to be the first to publish their number. into STEM fields. Called culturally relevant findings, because it is through What emerges is that SIGINT has ranged from pedagogy, it merits more detailed discussion “ dissemination that the work highly effective to almost useless. In July 1962, than it gets in this book. realises its value.” So wrote a few months before the Cuban missile crisis, Early in her narrative, Posselt asks a cru- mathematicianM James Ellis in 1987. By contrast, GCHQ picked up enciphered Soviet messages cial question: how much should graduate he went on, “the fullest value of cryptography is suggesting that two Soviet passenger and cargo programmes reform “to accommodate the realised by minimising the information available ships were “possibly en route Cuba” and that diverse career pathways in their fields”? There to potential adversaries.” their voyages might be “other than routine”. are simply not enough tenure-track positions, Ellis, like Alan Turing, and so many of the But there was no hint of the ships’ purpose and and most PhD holders don’t work in academia. driving forces in the development of comput- content. Then, in mid-October, a US U-2 spy STEM fields have been slow to empower grad- ers and the Internet, worked in government plane detected the first proof of Soviet mis- uate students who choose to use their training signals intelligence, or SIGINT. Today, this cov- siles in Cuba, triggering the crisis. Two weeks to improve or uplift their communities. ers COMINT (harvested from communications later, soon after US president John F. Kennedy’s Departments and faculty members need to such as phone calls) and ELINT (from electronic announcement of a naval blockade of Cuba, provide safe spaces for students interested in emissions, such as radar and other electromag- GCHQ detected a flurry of urgent enciphered careers outside academia. Students in Mich- netic radiation). Ellis and Turing are just two of messages sent from Moscow to Soviet ships. igan’s applied-physics programme said they the many code-breakers and code-builders in Thus, SIGINT helped to alert and inform govern- wanted to secure employment and make a dif- Behind the Enigma, the first authorized history ments, but the US political decision depended ference in society. The programme involves of one of the world’s pre-eminent secret intelli- on ground observations by the military. collaborations with many different depart- gence agencies, GCHQ, the United Kingdom’s By contrast, at the end of the Falklands War ments, showing how physics can improve peo- Government Communications Headquarters. against Argentina in 1982, the commander of the ple’s daily lives. This approach can resonate Famous for its Second World War decryption British task force declared that, without GCHQ’s with and empower graduate students from of the German Enigma cipher at Bletchley Park, advance penetration of the Argentine plan of historically under-represented groups. there is so much more to this secrecy-shrouded attack, mainly through COMINT in Spanish, the There are many more successful doctoral outfit, reveals Canadian historian John Ferris. invasion would have failed at sea. But once the programmes than Posselt can cover. For exam- Fielding formidable research, Ferris tells a soldiers landed on the Falkland Islands, SIGINT ple, Louisiana State University in Baton Rouge global tale of mathematics, engineering, data failed them in battle, because of the improvised is the leading producer of African Americans sciences and linguistics in the service of poli- nature of the chain of command. with PhDs in chemistry. The university has tics, diplomacy, war and security. Spanning a Central to these events was UKUSA, or ‘Five succeeded through targeted recruitment, century, it ranges from telegraphic intercepts Eyes’ — which receives frequent mention in the mentoring and support. to malware that can bring down infrastructure. book. This is the still-operative multilateral Equity in Science does a good job of high- After a brief introduction to pre-1914 intelli- agreement for cooperation in SIGINT between lighting some of the barriers and challenges gence based on letters, cables and wireless Australia, Canada, New Zealand, the United to equity in graduate programmes, and pro- messages, his story begins with First World War Kingdom and the United States. It was inaugu- vides examples of what some do right and cryptography and the foundation of GCHQ in rated between GCHQ and the US National Secu- wrong. The book supplies specific guidance 1919 as the Government Code & Cypher School. rity Agency in 1946, at the beginning of the cold on inclusive practices. What we need now is It ends with the agency’s current, not-so-secret war, but its existence was concealed from the a companion volume on getting and keeping incarnation as a protector of the cyber com- public until 2005. scientists of colour in the next section of the mons. In September 2001, the director of GCHQ Intriguing are the backgrounds and mindsets pipeline: faculty. As I found after securing that crossed the Atlantic on the only aircraft allowed of past and present GCHQ staff — today 6,000 in PhD, rising through the ranks of academia as into the United States immediately after the number, compared with 10,000 at its wartime a Black woman chemist is tremendously hard peak — and their working conditions, break- work. What kept me going? Inspired by Saint Behind the Enigma: The throughs and varied relationships with peers Elmo Brady’s legacy, I knew I too deserved a Authorised History of in other countries. Of their US counterparts, seat at the table. GCHQ, Britain’s Secret retired GCHQ director David Omand joked to Cyber-Intelligence the BBC in 2013: “We have the brains. They have Agency Sibrina N. Collins is executive director of John Ferris the money. It’s a collaboration that’s worked the Marburger STEM Center at Lawrence Bloomsbury (2020) very well.” Technological University in Southfield, Certainly, GCHQ mathematicians were often Michigan. secretly ahead of the academic game. For exam- e-mail: [email protected] ple, in 1970 Ellis came up with the possibility 492 | Nature | Vol 586 | 22 October 2020 ©2020 Spri nger Nature Li mited. All ri ghts reserved. ©2020 Spri nger Nature Li mited. All ri ghts reserved. SSPL/GETTY Cryptographers at Bletchley Park use a Colossus computer to decrypt German military communications during the Second World War. of “secure non-secret digital encryption”, but Europe’s earliest readable script, Minoan Linear critically. In a discussion of the 2013 leaks could visualize no way to implement it. In 1973, B, an archaic form of Greek. about UKUSA surveillance by National Secu- a younger colleague, Clifford Cocks, later chief Bletchley’s staff was famously more than rity Agency contractor Edward Snowden, which mathematician at GCHQ, realized Ellis’s concept 75% women. Compared with “virulent sex- were followed by a UK government inquiry into by inventing the public-key system now known ism” in the computing industry, Ferris notes GCHQ, Ferris rejects the charge that the agency as the RSA encryption algorithm. Its name of GCHQ in the 1930s that, “once inside, the collects intelligence on everybody, regardless derives from Ron Rivest, Adi Shamir and Leon- standards were those of flair, not gender”. But of their risk to UK security. His unsatisfying ard Adleman, who invented it independently in the stories of notable women from those days take is that their sins are more of omission than 1977 in the United States. are still only now coming to light, as witness the commission. He writes: “GCHQ did not openly In 1974, another GCHQ mathematician, dearth of female portraits in the book’s plate address the operational and legal elements of Malcolm Williamson, devised the technique sections. Staff included linguist Emily Anderson, bulk collection because it did not know how to for public exchange of a common secret key a former professor of German who became a do so, rather than having anything to hide.” between two parties that later became the basis world-leading cryptanalyst in the 1930s, and Today, a secure cage in GCHQ’s basement for all secure transactions on the Internet. This mathematician Joan Clarke, who used Bayes- archives contains the vetting records of each one is also named after US cryptographers — ian statistics to speed decryption at Bletchley, member of staff, collected from interviews with Whitfield Diffie and Martin Hellman — who dis- where she collaborated with (and was briefly friends and families before hiring. These were covered it independently in 1976. Only in 1997 fiancée of) Turing. These days, the organization unavailable to Ferris. Each record is destroyed were these two crucial GCHQ discoveries declas- — like most in cybersecurity — realizes that it has when the member dies. “Nothing better typi- sified. Even in 2020, writes Ferris, “Siginters feel a sizeable gap to close on gender balance in its fies GCHQ than this focus on privacy for peo- disquiet when they see the name GCHQ in press workforce; Ferris doesn’t dwell on that.
Recommended publications
  • 'Whitehall and the War on Terror: Lessons from the UK's Year
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Warwick Research Archives Portal Repository University of Warwick institutional repository This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please refer to the repository record for this item and our policy information available from the repository home page for further information. To see the final version of this paper please visit the publisher’s website. Access to the published version may require a subscription. Author(s): Richard J. Aldrich. Article Title: Whitehall and the Iraq War: the UK's four Intelligence Enquiries. Year of publication: 2005 Link to published version: http://dx.doi.org/10.3318/ISIA.2005.16.1.73 Publisher statement: None Irish Studies in International Affairs, Vol.16, (2005) Whitehall and the Iraq War: The UK's Four Intelligence Enquiries Richard J. Aldrich* During a period of twelve months, lasting between July 2003 and July 2004, Whitehall and Westminster produced no less than four different intelligence enquiries. Each examined matters related to the Iraq War and the ‘War on Terror’. Although the term ‘unprecedented’ is perhaps over-used, we can safely say that such an intensive period of enquiry has not occurred before in the history of the UK intelligence community. The immediate parallels seemed to be in other countries, since similar investigations into ‘intelligence failure’ have been in train in the United States, Israel, Australia and even Denmark. These various national enquiries have proceeded locally and largely unconscious of each other existence. However, the number of different enquiries in the UK and the extent of the media interest recalls the ‘season of enquiry’ that descended upon the American intelligence community in 1975 and 1976.1 Although the intensity of the debate about connections between intelligence and the core executive was considerable, the overall results were less than impressive.
    [Show full text]
  • Prism Vol. 9, No. 2 Prism About Vol
    2 021 PRISMVOL. 9, NO. 2 | 2021 PRISM VOL. 9, NO. 2 NO. 9, VOL. THE JOURNAL OF COMPLEX OPER ATIONS PRISM ABOUT VOL. 9, NO. 2, 2021 PRISM, the quarterly journal of complex operations published at National Defense University (NDU), aims to illuminate and provoke debate on whole-of-government EDITOR IN CHIEF efforts to conduct reconstruction, stabilization, counterinsurgency, and irregular Mr. Michael Miklaucic warfare operations. Since the inaugural issue of PRISM in 2010, our readership has expanded to include more than 10,000 officials, servicemen and women, and practi- tioners from across the diplomatic, defense, and development communities in more COPYEDITOR than 80 countries. Ms. Andrea L. Connell PRISM is published with support from NDU’s Institute for National Strategic Studies (INSS). In 1984, Secretary of Defense Casper Weinberger established INSS EDITORIAL ASSISTANTS within NDU as a focal point for analysis of critical national security policy and Ms. Taylor Buck defense strategy issues. Today INSS conducts research in support of academic and Ms. Amanda Dawkins leadership programs at NDU; provides strategic support to the Secretary of Defense, Chairman of the Joint Chiefs of Staff, combatant commands, and armed services; Ms. Alexandra Fabre de la Grange and engages with the broader national and international security communities. Ms. Julia Humphrey COMMUNICATIONS INTERNET PUBLICATIONS PRISM welcomes unsolicited manuscripts from policymakers, practitioners, and EDITOR scholars, particularly those that present emerging thought, best practices, or train- Ms. Joanna E. Seich ing and education innovations. Publication threshold for articles and critiques varies but is largely determined by topical relevance, continuing education for national and DESIGN international security professionals, scholarly standards of argumentation, quality of Mr.
    [Show full text]
  • Sir Andrew J. Wiles
    ISSN 0002-9920 (print) ISSN 1088-9477 (online) of the American Mathematical Society March 2017 Volume 64, Number 3 Women's History Month Ad Honorem Sir Andrew J. Wiles page 197 2018 Leroy P. Steele Prize: Call for Nominations page 195 Interview with New AMS President Kenneth A. Ribet page 229 New York Meeting page 291 Sir Andrew J. Wiles, 2016 Abel Laureate. “The definition of a good mathematical problem is the mathematics it generates rather Notices than the problem itself.” of the American Mathematical Society March 2017 FEATURES 197 239229 26239 Ad Honorem Sir Andrew J. Interview with New The Graduate Student Wiles AMS President Kenneth Section Interview with Abel Laureate Sir A. Ribet Interview with Ryan Haskett Andrew J. Wiles by Martin Raussen and by Alexander Diaz-Lopez Allyn Jackson Christian Skau WHAT IS...an Elliptic Curve? Andrew Wiles's Marvelous Proof by by Harris B. Daniels and Álvaro Henri Darmon Lozano-Robledo The Mathematical Works of Andrew Wiles by Christopher Skinner In this issue we honor Sir Andrew J. Wiles, prover of Fermat's Last Theorem, recipient of the 2016 Abel Prize, and star of the NOVA video The Proof. We've got the official interview, reprinted from the newsletter of our friends in the European Mathematical Society; "Andrew Wiles's Marvelous Proof" by Henri Darmon; and a collection of articles on "The Mathematical Works of Andrew Wiles" assembled by guest editor Christopher Skinner. We welcome the new AMS president, Ken Ribet (another star of The Proof). Marcelo Viana, Director of IMPA in Rio, describes "Math in Brazil" on the eve of the upcoming IMO and ICM.
    [Show full text]
  • Judith Leah Cross* Enigma: Aspects of Multimodal Inter-Semiotic
    91 Judith Leah Cross* Enigma: Aspects of Multimodal Inter-Semiotic Translation Abstract Commercial and creative perspectives are critical when making movies. Deciding how to select and combine elements of stories gleaned from books into multimodal texts results in films whose modes of image, words, sound and movement interact in ways that create new wholes and so, new stories, which are more than the sum of their individual parts. The Imitation Game (2014) claims to be based on a true story recorded in the seminal biography by Andrew Hodges, Alan Turing: The Enigma (1983). The movie, as does its primary source, endeavours to portray the crucial role of Enigma during World War Two, along with the tragic fate of a key individual, Alan Turing. The film, therefore, involves translation of at least two “true” stories, making the film a rich source of data for this paper that addresses aspects of multimodal inter-semiotic translations (MISTs). Carefully selected aspects of tales based on “true stories” are interpreted in films; however, not all interpretations possess the same degree of integrity in relation to their original source text. This paper assumes films, based on stories, are a form of MIST, whose integrity of translation needs to be assessed. The methodology employed uses a case-study approach and a “grid” framework with two key critical thinking (CT) standards: Accuracy and Significance, as well as a scale (from “low” to “high”). This paper offers a stretched and nuanced understanding of inter-semiotic translation by analysing how multimodal strategies are employed by communication interpretants. Keywords accuracy; critical thinking; inter-semiotic; multimodal; significance; translation; truth 1.
    [Show full text]
  • Al-Qaeda's “Single Narrative” and Attempts to Develop Counter
    Al-Qaeda’s “Single Narrative” and Attempts to Develop Counter- Narratives: The State of Knowledge Alex P. Schmid ICCT Research Paper January 2014 This Research Paper seeks to map efforts to counter the attraction of al Qaeda’s ideology. The aim is to bring together and synthesise current insights in an effort to make existing knowledge more cumulative. It is, however, beyond the scope of this paper to test existing counter-narratives on their impact and effectiveness or elaborate in detail a new model that could improve present efforts. However, it provides some promising conceptual elements for a new road map on how to move forward, based on a broad review and analysis of open source literature. About the Author Alex P. Schmid is a Visiting Research Fellow at the International Centre for Counter Terrorism – The Hague, and Director of the Terrorism Research Initiative (TRI), an international network of scholars who seek to enhance human security through collaborative research. He was co-editor of the journal Terrorism and Political Violence and is currently editor-in-chief of Perspectives on Terrorism, the online journal of TRI. Dr. Schmid held a chair in International Relations at the University of St. Andrews (Scotland) where he was, until 2009, also Director of the Centre for the Study of Terrorism and Political Violence (CSTPV). From 1999 to 2005 he was Officer-in-Charge of the Terrorism Prevention Branch at the UN Office on Drugs and Crime (UNODC) in the rank of a Senior Crime Prevention and Criminal Justice Officer. From 1994 to 1999, Dr. Schmid was an elected member of the Executive Board of ISPAC (International Scientific and Professional Advisory Council) of the United Nations' Crime Prevention and Criminal Justice Programme.
    [Show full text]
  • A Journal of the Center for Complex Operations Vol. 4, No. 3
    VOL. 4, NO. 3 2013 A JOURNA L O F THE CEN TER F OR C O MPL EX O PER ATIONS About PRISM is published by the Center for Complex Operations. PRISM is a security studies journal chartered to inform members of U.S. Federal agencies, allies, Vol. 4, no. 3 2013 and other partners on complex and integrated national security operations; reconstruction and state-building; relevant policy and strategy; lessons learned; Editor and developments in training and education to transform America’s security Michael Miklaucic and development Associate Editors Mark D. Ducasse Stefano Santamato Communications Constructive comments and contributions are important to us. Direct Editorial Assistant communications to: Megan Cody Editor, PRISM Copy Editors 260 Fifth Avenue (Building 64, Room 3605) Dale Erikson Fort Lesley J. McNair Sara Thannhauser Washington, DC 20319 Nathan White Telephone: (202) 685-3442 Advisory Board FAX: Dr. Gordon Adams (202) 685-3581 Dr. Pauline H. Baker Email: [email protected] Ambassador Rick Barton Professor Alain Bauer Dr. Joseph J. Collins (ex officio) Ambassador James F. Dobbins Contributions Ambassador John E. Herbst (ex officio) PRISM welcomes submission of scholarly, independent research from security policymakers and shapers, security analysts, academic specialists, and civilians Dr. David Kilcullen from the United States and abroad. Submit articles for consideration to the Ambassador Jacques Paul Klein address above or by email to [email protected] with “Attention Submissions Dr. Roger B. Myerson Editor” in the subject line. Dr. Moisés Naím This is the authoritative, official U.S. Department of Defense edition of PRISM. MG William L. Nash, USA (Ret.) Any copyrighted portions of this journal may not be reproduced or extracted Ambassador Thomas R.
    [Show full text]
  • Chair's Introduction
    Governance statement I have also met with a number of our major customers. I see it as an important part of the Chair’s role to have a strong relationship with key customers that complements the depth and breadth of the Group’s management relationships, through a programme of regular senior-level meetings. I intend to develop this role further, and am committed to supporting the continued improving momentum of dialogue with our primary customers. We have been pleased to welcome customers to participate in a number of contract reviews at the Board during the year. I have also enjoyed meeting many of Babcock’s shareholders to hear, directly from them, their views, concerns and Ruth Cairnie priorities. The Board and I are clear about Chair the importance of corporate governance and its role in the long-term success of the Group. Purpose and culture Chair’s introduction At the Board we recognise the essential role that a clear purpose and a strong corporate culture play in assuring the I am pleased to present my first Group’s long-term success. During the year the Board has worked to clarify Chair’s report on the work of the Babcock’s purpose, which we describe on Babcock Board. Since joining the page 10, and we expect to do more on Board in April last year, I have focused this over the coming year. This purpose is underpinned by the corporate culture, much time engaging with Babcock’s based on strong values that I found in stakeholders in order to get a real evidence across my induction visits.
    [Show full text]
  • The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus the Secrets of Enigma
    The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus The Secrets of Enigma B. Jack Copeland, Editor OXFORD UNIVERSITY PRESS The Essential Turing Alan M. Turing The Essential Turing Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma Edited by B. Jack Copeland CLARENDON PRESS OXFORD Great Clarendon Street, Oxford OX2 6DP Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Taipei Toronto Shanghai With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan South Korea Poland Portugal Singapore Switzerland Thailand Turkey Ukraine Vietnam Published in the United States by Oxford University Press Inc., New York © In this volume the Estate of Alan Turing 2004 Supplementary Material © the several contributors 2004 The moral rights of the author have been asserted Database right Oxford University Press (maker) First published 2004 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above.
    [Show full text]
  • How Spies Think – Spy Chief David Omand
    How Spies Think – Spy Chief David Omand Tuesday, November 24, 2020 TRT (Total Running Time): 1:01:12 ANDREW HAMMOND: Hi, and welcome to SpyCast from the secret files of the International spy Museum in Washington, DC. I'm Dr. Andrew Hammond, the museum's historian and curator. Every week, SpyCast brings you interesting conversations from authors, scholars and practitioners who live in the world of global espionage. If you have any questions, comments, or concerns email us at [email protected]. That’s [email protected]. Also, if you like what you hear, and even if you don't, please take a minute to review us on iTunes or whatever platform you may be listening from. We're always looking for ways to make SpyCast better and you can help. ANDREW HAMMOND: Welcome to this week's edition of SpyCast. This week we're looking at “How Spies Think” and we're doing so with Sir David Omand. So, I'm really pleased that I got the opportunity to speak to David because a professor of my graduate school, said that he was the smartest person whom he had ever met. And he had met a lot of smart people, he had done his PhD at Cambridge. Another endorsement for Sir David comes from Rodric Braithwaite. So, Sir Rodric was the last British ambassador to the former Soviet Union, and he said that there is no one more qualified to speak about British intelligence than David Omand. DAVID OMAND: In 1969, I graduated from Cambridge University. I decided not to pursue an academic career with getting a doctorate.
    [Show full text]
  • Joan Clarke at Station X
    Joan Clarke at Station X Before Joan Clarke worked at Bletchley Park’s Hut 8, she already knew Alan Turing. He was a friend of Joan’s brother. A very intelligent young woman, Joan studied mathematics at Cambridge University’s Newnham College. Gordon Welchman, who was working for the Government Code & Cypher School in the late 1930s, recruited Joan to work at Bletchley Park. He’d been her Geometry supervisor at Cambridge. At the time, women did not typically fill important jobs at Bletchley Park (or anywhere else throughout Britain). So ... at the beginning of her work at Station X ... Joan filled a clerical slot. It took very little time, however, for Joan to get her “own table” inside Hut 8. This promotion effectively placed her on Turing’s code-breaking team. Not only did Joan do great work at Bletchley, by 1944 she was deputy-head of the Hut-8 team. During the early part of her work at Station X, Joan had been promoted to a “Linguist,” even though she wasn’t fluent in other languages. (It was just a way for her to receive better pay for her work.) She once answered a questionnaire with these words: Grade: Linguist, Languages: None. When she first became a Hut-8 code breaker, Joan worked with Alan Turing, Tony Kendrick and Peter Twinn. Their actual work focused on breaking Germany’s Naval Enigma code (which the Station X workers had codenamed “Dolphin”). Joan and Alan Turing became very close friends and, in 1941, the head of Hut 8 asked his friend to become his wife.
    [Show full text]
  • Simply Turing
    Simply Turing Simply Turing MICHAEL OLINICK SIMPLY CHARLY NEW YORK Copyright © 2020 by Michael Olinick Cover Illustration by José Ramos Cover Design by Scarlett Rugers All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. For permission requests, write to the publisher at the address below. [email protected] ISBN: 978-1-943657-37-7 Brought to you by http://simplycharly.com Contents Praise for Simply Turing vii Other Great Lives x Series Editor's Foreword xi Preface xii Acknowledgements xv 1. Roots and Childhood 1 2. Sherborne and Christopher Morcom 7 3. Cambridge Days 15 4. Birth of the Computer 25 5. Princeton 38 6. Cryptology From Caesar to Turing 44 7. The Enigma Machine 68 8. War Years 85 9. London and the ACE 104 10. Manchester 119 11. Artificial Intelligence 123 12. Mathematical Biology 136 13. Regina vs Turing 146 14. Breaking The Enigma of Death 162 15. Turing’s Legacy 174 Sources 181 Suggested Reading 182 About the Author 185 A Word from the Publisher 186 Praise for Simply Turing “Simply Turing explores the nooks and crannies of Alan Turing’s multifarious life and interests, illuminating with skill and grace the complexities of Turing’s personality and the long-reaching implications of his work.” —Charles Petzold, author of The Annotated Turing: A Guided Tour through Alan Turing’s Historic Paper on Computability and the Turing Machine “Michael Olinick has written a remarkably fresh, detailed study of Turing’s achievements and personal issues.
    [Show full text]
  • Downloaded At: Surveillance-DATAPSST-DCSS-Nov2015.Pdf
    City Research Online City, University of London Institutional Repository Citation: Lashmar, P. ORCID: 0000-0001-9049-3985 (2018). From silence to primary definer: The rise of the Intelligence lobby in the public sphere. Critical Sociology, doi: 10.1177/0896920518780987 This is the accepted version of the paper. This version of the publication may differ from the final published version. Permanent repository link: https://openaccess.city.ac.uk/id/eprint/20272/ Link to published version: http://dx.doi.org/10.1177/0896920518780987 Copyright: City Research Online aims to make research outputs of City, University of London available to a wider audience. Copyright and Moral Rights remain with the author(s) and/or copyright holders. URLs from City Research Online may be freely distributed and linked to. Reuse: Copies of full items can be used for personal research or study, educational, or not-for-profit purposes without prior permission or charge. Provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way. City Research Online: http://openaccess.city.ac.uk/ [email protected] From silence to primary definer: The emergence of an Intelligence lobby in the public sphere. Abstract Until the end of the Cold War the UK intelligence services were not officially acknowledged, and their personnel were banned from entering the public sphere. From 1989 the UK government began to put the intelligence services on a legal footing and release the identity of the heads of the intelligence agencies.
    [Show full text]