June 11, 2013

Blog Syntesis

An introductive note to this blog at the link: LET'S GET TO IT


Too look at the image in full dimension open the link below:
FULL DIMENSION IMAGE

1 Interdisciplinar
1.1. Music[LINK] 
1.2. Patent[LINK]
1.3. If It Was[LINK]
1.4. Masterpiece[LINK]
1.5. Postage Stamp[LINK]
1.6. Comics[LINK]
1.7. Maps[LINK]

2. Books
2.1. Winter of the World - Ken Follet
2.2. Gravity's Rainbow - Thomas Pynchon
   2.2.1. The Author[LINK]
   2.2.2. Let's Get to It[LINK]
   2.2.3. Map of Ideas[LINK]
   2.2.4. ABC[LINK]
2.3. The Code Book -Simon Singh
   2.3.1. Secrecy...Pros &Cons[LINK]


3. Course Programme
3.1. La Piazza Universale
   3.1.1. Ciphers[LINK]
   3.1.2. Spies[LINK]
3.2. Spy Story about Silk[LINK]


4. Cryptography
4.1. Coded Messages[LINK]
4.2. Glossary[LINK]

5. Devices
5.1. Code & Decode
   5.1.1. Enigma[LINK]
   5.1.2. Bombe[LINK]
   5.1.3. Cipher Machines Collection[LINK]
5.2. Comunication
   5.2.1. Radio[LINK]
  5.2.2. Telegraph & Morse Code[LINK]
5.3. Spy
   5.3.1. Minicameras
      5.3.1.1. Micro Optic[LINK]
      5.3.1.2. Gallery[LINK]
   5.3.2. Spy Sets[LINK]

6. Espionage
6.1. Agencies
   6.1.1. SIS
      6.1.1.1. Book Point of View[LINK]
      6.1.1.2. History[LINK]
      6.1.1.3. Art in the Agency[LINK]
   6.1.2. National Organizations[LINK]

June 9, 2013

Telegraph & Morse Code


WAVES recruting poster

Even though they had been known already for one hundred years telegraph and morse code were, in conjunction with radio, the most common methods of comunication during war time...In some cases there were entire units dedicated to the listening and the receiving of messages like for the GCHQ and the SIGINT in the UK,the FRA in Sweden, the NSA in the USA or the AT in Netherlands.
To be more precise the telegraph is way older than the morse code, there were in fact already multiple examples of this device:





  • 4th century. BC, greek hydarulic telegraph descibed by Aeneas Tacticus, and in the 3rd century by the hystorian Polybious
  • In the1792 the optical telegraph made its entrance in the world technological scene thanks to the french Claude Chappe and it was a precursor of its electrical version.
  • It is 1832 is the when the electrical telegraph makes  its first steps into history, with the prototype presented by Schilling von Canstatt.  From that moments a lot of different evolutions of the Electrical telegraph were presented, like the Gauss-Weber (1933) or the Cooke & Weatstone (1837) 
  •  But a the gratest step was made by Samuel Morse, with the development of the electro-magnetic telegraph, whose patent was registered by Morse itself on June, 20th 1940 and improved in the following years, because he didn't create just the machine, but he also introduced a specifically designed comunication method: The Morse Code. It consisted in the rappresentation of letters and numbers with a series of dots and lines properly alternated as presented in the photo below, and in the one under it (in a more grafical way which makes it easier to learn). The disposition of the characters differs in base of the language considered, but few rules stay the same, like the relative time that passes between the different letters (3 time units) or between the words (7 time units), where the time unit is defined by the gap between the different elements of the same letter.


The Morse Code Alphabet The Morse Code in Graphical Version



Art by Ward Cunningham


"The situation is now stable, the Adenoid occupies all of St. James's, the historic buildings are no more, Government offices have been relocated, but so dispersed that communication among them is highly uncertain—postmen are being snatched off of their rounds by stiff-pimpled Adenoid tentacles of fluorescent beige, telegraph wires are apt to go down at any whim of the Adenoid."

"Shots from uphill—then, maybe from Närrisch in reply, a burst of automatic fire. Otto
is holding his Hilde close. "Anybody read Morse Code?" the girl next to Slothrop wants to
know, "because there's been a light going over there, see, at the tip of that little island? for
a few minutes now." It's three dots, dot, dot, three more dots. Over and over.
"Hmm, SEES," ponders Felix.
"Maybe they're not dots," sez the tenor-sax player, "maybe they're dashes.""

[Gravity's Rainbow, Thomas Pynchon]


"In Napoléon’s time nothing could move faster than a horse,’ said Erik. ‘Today we have motor
vehicles and wireless telegraphy. Modern communications have enabled us to succeed where
Napoléon failed."

"The signals were in Morse Code, but the dots and dashes of naval signals translated into five-digit
number groups, each representing a letter, word or phrase in a code book. The apparently random
numbers were relayed by secure cable to teleprinters in the basement of the Old Administration
Building. Then the difficult part began: cracking the code.""

[Winter of the WorldI, Ken Follet]

This post argument is connected to the previous posts Secret Services & National Oganizations and SIS, aka MI6...A little bit of History, but also to the one related to Radio (Secret Services & Radio)

As usual for more specific information ccheck out both the links and the sources reported below...

Sources:

Multiples articles on both Theoretical (Foundamentals of Electromagnetism ) and Practical (Railway or Military Telegraphs) arguments
http://mysite.du.edu/~jcalvert/tel/telhom.htm

Other sources:
http://web.ics.purdue.edu/~smatei/435/techwiki/index.php?title=Morse_Code_and_the_Telegraph
http://cw.hfradio.org/
http://en.wikipedia.org/wiki/Morse_code
http://www.cryptomuseum.com/radio/morse/index.htm
https://en.wikipedia.org/wiki/Telegraphy
http://www.nearfieldcommunicationnfc.net/nfc-telegraph-history.html

June 6, 2013

Secret Services & Music


After digging for quite a while in The Lester S. Levy Sheet Music Collection I finally found a matching music sheet...It took me so long because I had to convince my friends to play and register it for me since there was no trace of it online!! (Thanks Giorgio and Jacopo for the music)



For listening to the song click on the following link:

June 5, 2013

Secret Services & Bombe 2.0

"The Poles had proved that Enigma was not a perfect cipher, and they had also demonstrated to the Allies the value of employing mathematicians as codebreakers." 

The room 40, which was shortely substituted by the GC&CS settled in Bletchley Park, 80 kilometers (50 miles) north of London, started to recrute new operator especially between mathematicians and scientists, and one of them, who deserves to be singled
out, it is the mathematician Alan Turing, who identified Enigma’s greatest weakness and ruthlessly exploited it. Thanks to Turing, it became possible to crack the Enigma cipher under even the most difficult circumstances.

The basic idea was that many messages sent would consist of some short piece of predictable text such as "The weather today will be...."  for the morning weather report, or "Heil Hitler" as closure of each text. Using those cribs the cryptoanalyst were able to create a menu  like the one in the photo below


The menu, in the form of an electric circuit, was ‘plugged up’ on the panel of sockets located on the back of the Bombe by means of 26-way cables. It must be underlined that, for the correct functioning of the British Bomb,  it was essential that the structure of the menu included multiple ‘closures’ or loops.
In the given menu the sequence of letters: S → A → X → V form one such loop, and the diagram below gives the details of the Enigma enciphering processes that correspond to the four links in this loop. In this diagram the four unknown stecker partners of the letters S, A, X and V are respectively represented by the Greek letters: α, β, γ and δ. (The Enigma rotor systems and their equivalents on the Bombe will subsequently be referred to as the ‘scramblers’. The scrambler connections were made with 26-way cables.)


The American Bombe was in its structure similar to its british correspondent, although it was way faster because it was designed to find the key of a 4 (instead of only 3) rotors Enigma, which was the one employed by the Kriegsmarine, the German Naval Army, the safest one.

The capability of the Allies to read the Axis messages allowed them to win importants battles of the Second World War, like for the Battle of the Atlantic, and the war itself.

The Entire argument of Cracking the Enigma Machine started in the last post Secret Services & Cracking Enigma: The Bombe,

Sources:
The Code BookSimon Singh
http://www.rutherfordjournal.org/article030108.html
http://www.bletchleypark.org.uk/content/machines.rhtm
http://www.vectorsite.net/ttcode_08.html#m1
http://en.wikipedia.org/wiki/Bombe
http://ciphermachines.com/enigma.html#break

June 4, 2013

Secret Services & Cracking Enigma: The Bombe

"In the years that followed the First World War, the British cryptanalysts in Room 40 continued to monitor German communications. In 1926 they began to intercept messages that baffled them completely. Enigma had arrived, and as the number of Enigma machines increased, Room 40’s ability to gather intelligence diminished rapidly.[...]The speed with which the Allied cryptanalysts abandoned hope of breaking Enigma was in sharp contrast to their perseverance just a decade earlier in the First World War.[...]One nation, however, could not afford to relax. After the First World War, Poland reestablished itself as an independent state, but it was concerned about threats to its newfound sovereignty. To the east lay Russia,[...] and to the west lay Germany[...]Sandwiched between these two enemies, the Poles were desperate for intelligence information, and they formed a new cipher bureau, the Biuro Szyfrów. If necessity is the mother of invention, then perhaps adversity is the mother of cryptanalysis."

[The Code Book, Simon Singh]

The whole process started indeed in Polland in the Biuro Szyfrówwhere the disappointed German Hans-Thilo Schmidt, a public dependent of the Chiffrierstelle, brought the papers in which was represented the general structure of the Enigma machine and thanks to a machine intercepted in the Polish mail (They then bought a commercial Enigma machine and used the gathered information to convert it into a military one)
This was actually a great step since, before these info, they only had mathematical analysis data, which, let's be honest here, were more or less useless without the machine. But even in this case "The strength of the cipher depends not on keeping the machine secret, but on keeping the initial setting of the machine (the key) secret"...an expedient that by itself was capable to lay approximately 1.58 x 10^20 possible keys between the Allies and the solution...a result which was more or less impossible to reach in useful time...
This was true untill the matematician Marian Rejewski found a leak in the comunication system: the repetition. The German infact used to comunicate with the daily key the message one (3 letters, one for each rotor) twice (for a total of 6)...Rejewski tabulated the relationships between the first and fourth characters as follows:

   ABCDEFGHIJKLMNOPQRSTUVWXYZ
      O                                   L                K
Given enough messages intercepted in one day, he could complete this table, giving him something like:

   ABCDEFGHIJKLMNOPQRSTUVWXYZ
   FOXPVBUNWYACRIZELDTQGJMKHS

I know that it seems to be leading nowhere, but Rejewski kept playing at it and discovered a property which was going to overturn their work.
He noticed that "A" in the top row was related to "F" in the bottom. He went to "F" in the top row and saw that it was related to "B" in the bottom. He went to "B" in the top row and saw that it was related to "O" in the bottom. He continued this search until he ended up with the "A" in the top row again, and then repeated this game through the rest of the table until there were no more characters left. The example above gives:

   A -> F -> B -> O -> Z -> S -> T -> Q -> L -> C -> X -> K -> A
   D -> P -> E -> V -> J -> Y -> H -> N -> I -> W -> M -> R -> D
   G -> U -> G

Rejewski did the same operationd with different sets of messages sent on different days, and noticed that the pattern of the number of chains and the number of links in the chains varied widely from day to day and he cleverly realized that this pattern provided a fingerprint characteristic of the initial rotor setup. The important thing about it is that it dependeds only on the number of chains and on the number of links in the chains; the exact characters in the chains were irrelevant.


Example of fingerprints structure
  1 chain with 10 characters
  2 chains with 5 characters
  1 chain with 6 characters      rotor order ACB rotor                                 position XHJ

  1 chain with 13 characters
  1 chain with 5 characters
  2 chains with 4 characters     rotor order BAC rotor                                 position FCD

Once the catalog containing all fingerprints was finished, the Poles could then identify the right key and decode all intercepted messages sent during the day, and start over again the day after knowing that most of the work was already done...at least until the Germans altered their usual way of transmitting messages, but Rejewski fought back. Even if his old fingerprints catalog was useles,but instead of rewriting it, he devised a mechanized version of it, which could automatically search for the correct scrambler settings. Rejewski’s invention was an adaptation of the Enigma machine, able to rapidly check each of the 17,576 settings until it spotted a match. Because of the six possible scrambler arrangements, it was necessary to have six of Rejewski’s machines working in parallel, each one representing one of the possible arrangements. Together, they formed a unit that was about three feet high, capable of finding the day key in roughly two hours. The units were called bombes, a name that might reflect the ticking noise they made while checking scrambler settings.

Bomba kryptologiczna  drawing 
from M.Rejewski’s papers

"The bombes effectively mechanized the process of decipherment. It was a natural response to Enigma, which was a mechanization of encipherment"

If you feel like you've missed something go on and check the previous posts related to this one, which are Secret Services & Patents: The Enigma Machine and Technology & The Enigma Machine
If you wanna dig deeper,you can satisfy your thirst for knowledge, you can click on the word links  or on the links of my sources.


Continues...

Sources:
The Code Book, Simon Singh
http://www.bletchleypark.org.uk/content/machines.rhtm
http://www.vectorsite.net/ttcode_08.html#m1
http://en.wikipedia.org/wiki/Bombe
http://en.wikipedia.org/wiki/Cryptanalysis_of_the_Enigma




June 3, 2013

Secret Services & Gravity's Rainbow: The Author

One of the greatest mistery about the Gravity's Rainbow book is infact the Author itself...We know his name, and few biographical information but his face is a real mistery. Only a few photos of him are known to exist, nearly all from his high school and college days, and his whereabouts have often remained undisclosed. Pynchon's personal absence from mass media is one of the notable features of his life, and it has generated many rumors and apocryphal anecdotes, like its behaviour has been considered as both marketing and writing strategy.

According to the first one, all the secrecy will make the audience even more curious about him, creating a legend, a mysterious halo around the Glen Cove writer. This thory is supported by his appereance in two Simpson episode, pictured with a bag on his head but dubbed with the author real voice.

(terrible definition but it is the only one that I've found)


Here's your quote: "Thomas Pynchon loved this book. Almost as much as he loves cameras!" (Angrily Shouted)


The second one, on the other hand, affirme that Pynchon choice of not appearing on mass medias, not releasing photos and interviews is due to the fact that he wants to comunicate with his readers only through his works, books and introductions, avoiding to influence their vision them. Evidences in agreement with this second theory are the numerous lines and references to critical discussion about his fiction.


Now is up to you to choose which opinion you agree with!!


Sources





June 2, 2013

Secret Services & Masterpiece

This is the masterpiece that I choose to represent my blog...Kryptos. It is a sculpure realized by Jim Sanborn on four large copper plates with other elements made of red and green granite, white quartz, and petrified wood, sitting in the grounds of the CIA headquarters in Virginia. It contains a message, which hasn't been decoded yet, even if, after 20 years of study, the solution is starting to materialize, thanks also to few hints given by the author. It is divided in 4 sections, three of the four coded sections of the sculpture had been cracked (solutions) by a CIA analyst, who was estimated to have spent 400 lunch-hours pondering it with a pencil and paper.





Articles about this sculpure and the halo of mistery surrounding it!
http://www.wired.com/threatlevel/2010/11/kryptos-clue/
http://www.telegraph.co.uk/news/worldnews/northamerica/usa/8149792/CIAs-Kryptos-sculpture-close-to-being-solved.html