Showing posts with label computers. Show all posts
Showing posts with label computers. Show all posts

08 July 2015

Scattered Castles


There's been a lot of smoke and mirrors lately about the Chinese hacking into computer networks all over the place, and of course it isn't just the Chinese. Cyberattacks have become a lot more common. Anybody remember STUXNET, the virus that targeted the Iranian nuke R&D? Nobody's copped to it, but we can imagine it was probably a joint effort by the U.S. and the Israelis.
My own website was hacked by some Russian trolls. I don't know what the object was. Bank fraud, or Meet Hot Slavs?  It wouldn't be to use any of the actual information from my site, but to compromise the server pathways. FatCow, the server, hosts a buttload of websites, and once in the back door, you could cherry-pick all the caramels, and leave the liquid centers behind.

The point of the Chinese hacks is that they're not amateur or random, by and large, but directed by the Ministry of Defense, against specific hard targets. The big one, most recently (or at least most recently discovered), is the security breach of the Office of Personnel Management. I know this doesn't sound all that glamorous or hot-ticket - OPM is basically the U.S. government's Human Resources department, the central clearinghouse - but in fact it's a big deal. Best guess to date is that 18 million files have been penetrated, and that's a lowball figure. 

Here's what makes it important. OPM is responsible for security clearances, access to classified material. Back in the day, this was the FBI's job, but it's presently estimated that 5 million people, including both government employees and contractors, hold clearances, and the FBI's current staffing is 35,000. You do the math. The numbers are overwhelming. OPM, in turn, farms this out to FIS, the Federal Investigative Services, and the private sector.

But wait, there's more. The intelligence agencies, CIA, NSA, the National Reconnaissance Office (the spy satellite guys), have their own firewalled system, know as Scattered Castles. For whatever reason, budgetary constraints, too much backlog, or pressure from the Director of National Intelligence, the spook shops were instructed to merge their data with OPM's. So was the Defense Department. A certain amount of foot-dragging ensued, not just territory, either, but concerns about OPM's safeguards. In the end, they caved. Not to oversimplify, because the databases are in theory separate, but it created an information chain.

Suppose, and it's a big suppose, that Scattered Castles is accessible through the OPM gatekeeper. Nobody in the intelligence community, or OPM, or the FBI (which is the lead investigator of the OPM break), will go on the record one way or the other. Understandably, because they'd be giving whoever hacked OPM a further opportunity to exploit, if they haven't already. This is a case of locking the barn door after the horse is gone. The worst-case scenario is that active-duty covert agents could be exposed. And bear in mind, that when you're investigated for a security clearance, you give up a lot of sensitive personal data - divorce, bankruptcy, past drug use, your sexual preference - the list goes on. Which opens you up to blackmail, or pressure on your family. This is an enormous can of worms, the consequences yet to be addressed.

OPM uses a Web-based platform called eQip to submit background information. You might in all seriousness ask whether it's any more secure than Facebook. The issue here, long-run, isn't simply the hack, but the collective reactive posture. These guys are playing defense, not offense. The way to address this is to uncover your weaknesses before the other guy does, and identify the threat, not wait for it to happen. Take the fight to them. Otherwise we're sitting ducks.  

It's amazing to me that these people left us open to this, quite honestly. They don't go to the movies, their kids don't play video games, they're totally out to lunch? It ain't science fiction. It's the real world. Cyber warfare is in the here and now.

Heads are gonna roll, no question. OPM's director is for the high jump, and her senior management is probably going to walk the plank, too. This doesn't fix it. What needs fixing is the mindset. We're looking at inertia, plain and simple, a body at rest. We need to own some momentum. 


http://www.DavidEdgerleyGates.com/



08 March 2015

The Kaspersky Code


Three weeks ago, Kaspersky Lab, the Russian security software maker exposed a cyber-espionage operation that many believe originated within the NSA. The devilishly clever bit of code hides in the firmware of disc drives and has the ability to continuously infect a machine. If you use a Windows computer, there’s a good chance it’s not only infected but was built that way likely without the manufacturers' knowledge.
Kaspersky researcher Costin Raiu says the NSA couldn’t have done it without the source code.

What?!!

The contention that the NSA definitely had access to the source code is not only patent nonsense, it ignores that fact that Kaspersky themselves supposedly didn’t have the code. Having the source code is the easy way, perhaps the preferred way, but it’s hardly the only way.

A Reuters article speculates how the NSA might have obtained the source code and indeed, one of those is a likely scenario. But it’s also feasible to do the job without the source and I’ll show you what I mean, a technique I used to unravel computer fraud programs. Fasten your seat belt because this is going to get technical.

World’s Greatest Puzzle

Those around in my Criminal Brief days know that I love puzzles. For me, the ultimate puzzle has been systems software programming, making the machine do what I want. But sometimes I’ve come up against puzzles, some benign, some not, where I didn’t have the source code.

Let’s try an example. What if we found mysterious code in our computer that looked something like this:

confused pseudo code snippet
Mysterious Snippet of Computer Code

If you can’t make sense out of this, you’re not alone. 98% of computer programmers wouldn’t know what to make of it either. But if you look closely, the data populating the upper block looks different from that in the lower block. This is a clue.

Unlike commercial and scientific programs, systems software deals with the operation of the computer itself– utilities, communications, and especially the operating system. The realm of a computer’s internals are abstract, far more so than the Tron movies. Key aspects seldom relate to real-world equivalents. Sure, we say that RAM is a little like notes spread out on your work table and that disc storage is kinda sorta like a file cabinet… but not really. Even the term RAM– random access memory– is misleading; there’s nothing random about it.

Back in the real world, let’s say you want to write a simple program that adds the number of apples and oranges. In most programming languages, this code would look like this:
total = apples + oranges
Internally, a program loads apples and oranges into registers (kind of like keying them into a calculator), adds them, and stores them in a variable called total. If we were to write this in the argot of the computer, we’d use assembly language mnemonics, an abstraction of the computer’s machine language. Deep, deep down in a program, we’d see nothing but numbers where we count…
0, 1, 2, 3, 5, 6, 7, 8, 9, A, B, C, D, E, F
Yes, A-F are digits in this context. Within the computer, our little program above might resemble…

simple pseudo-code program: total=apples+oranges
total = apples + oranges

What isn’t obvious to many programmers is that computer instructions are data. Indeed, some black-hat crackers (the bad guys) have used this property to sneak malware onto unsuspecting computers.

If you look again at the original sneak peek of data, you’ll start to see patterns and may even pick out the machine instructions from our code example above.

clarified pseudo code snippet
Less Mysterious Code Snippet

This puzzle solving is called reverse engineering. It’s possible to write a program called a disassembler (I have) or a de-compiler (I haven’t) to decode the machine language into something more intelligible. The program has to be smart enough to not only separate actual data from instructions, but distinguish the type of data.

As you see, compiling source into binary executable code isn’t a one-way street. With dedication and know-how, reversing the process is well within reach.

How safe do you feel now?

05 February 2014

Call of the Wicked





by Robert Lopresti

I have a friend who has a mother, a wonderful lady we will call Kate.  She is a smart woman who, at a time when many people were retired,  was still doing biomedical research.  That  kind of smart.

But time has passed and she is retired now, and living in a senoir home, what is known as an independent living center.  And one day not too long ago she got a phone call from someone who said he was calling from Windows.  He explained that they had found that her computer was about to crash but he could fix it if she gave him control.

Well, you know what happened next.  She had to call someone from the office to yank the plug out of the wall to turn the computer off, and then she had to buy a new computer.  (According to the guy who looked at her machine, if you suffer this type of hack, the trick is to get someone to fix it before you log on again.  After that, its too late.)

I won't go through the misery that followed: closing bank accounts, changing passwords, destroying credit cards.  Because that is all minor inconvenience, as tedious and infuriating as it is.

The real damage was done inside Kate's head.  Falling for that trick damaged her self-confidence and self-image, because she knew she would not have done so a few years before.  And that is the true, soul-destroying evil accomplished by these morally-bankrupt thugs who deliberately aim their scams at seniors.

For some reason, this makes me think of Dick Francis.  One of the things I like best about his work is that his characters never lost their shock over bad guys doing bad things.  While the heroes of Chandler get cynical and  see the glass as not only mostly empty but slightly moldy, Francis's men stay outraged and furious.  That doesn't belong to you.  Put it back!

From time to time scholars have pondered why so many people are fascinated by crime fiction.  Part of the answer, I think, is that we all deal with villains and the mysteries give us a pain-free way to reflect on them.  And, in fiction, at least, we can sometimes defeat them.

Until next time, watch out for the bad guys.

18 August 2013

The Truth shall set thee free


by Leigh Lundin

For at least the past half century, clerks and bureaucrats offer consumers the excuse “It’s not our fault, the computer made a mistake.” As a computer specialist, I know that behind a mistake is another human and the proffered excuse is an attempt to mitigate or evade responsibility. It’s not that computers are infallible, but they do what people tell them to do.
Reflection
In a couple of small towns where I grew up, town gossips considered their mission to find out about everyone else’s business while hiding the skeletons in their own closets. One of the women complained her husband wouldn’t share the tidbits he picked up at the local grain elevator. He became my hero.

Some victims must have felt vindication when one of the worst dashed back and forth, spying upon her own daughter making out in her boyfriend’s car in front of her house, then running to the back bathroom, climbing up on the tub and peering out the rear window spying on another couple having at it. In her gusto, she slipped on the tub, fell and broke her arm. Her screams and the subsequent ambulance brought all pleasurable activities to a halt. The lessons I took away was that– private as I am– tight lips and an open bearing is a wise policy.

Thus, when it comes to government, I lean towards the-truth-and-damn-the-consequences policy, not in every instance, but the vast majority of the time. And this is what I’ve learned from the Snowden and Manning affairs: Our nation, our government survives pretty damn well when the truth comes out. Might these examples suggest the less secrecy the better? Or at least shouldn’t we open our eyes and engage in a discussion what secrets are wise and what aren’t?

Friday morning I was listening to CNN pontificate about the Edward Snowden affair. Their hostess pointed out that people either believe he’s a hero or a traitor. I’m not sure this reflects political leanings but the guest on the left took the position Snowden’s a betrayer whilst the guy on the right claimed Snowden’s a patriot. I never did hear anything of importance from the guest in the middle, but my mind may have tuned out following an amazing, jaw-dropping, mind-numbing statement: The NSA apologist (the guy on the left of the screen) said something to the effect we can’t so much blame NSA’s crimes on people, because these crimes are committed by computers.



Wh– what?

Going back to my opening paragraph, computers do what people tell them to do. In centuries past, defendants might have tried “Your Honour, t'were me fourteen vicious dogs wot ripped apart me wife’s paramour all on their own selves,” or “It were an accident pure and simple, Judge. Me horse reared up and clopped the landlord on ’is head.”

But blaming computers, it’s like saying:
  • “I didn’t cut them joists too short, my saw did.”
  • “Officer, I didn’t run the red light, my car did.”
  • “Judge, I didn’t shoot the guy, my Glock did.”
Fortunately, we crime writers seldom bring up the computer-ate-my-homework excuse, else without humans, we’d have little to write about. Imagine the detective’s dénouement: “Based on the prints, I determined the digits are digital and the bite marks are bytes. Yes, the culprit is the CDC-6600.”

23 June 2013

The Digital Detective, Wall Street part 2


continued from last week
The Best of Times…

Systems programmers held a unique niche in the multiple mainframe corporate structure. We didn’t practice ordinary commercial programming but were responsible for keeping the software side running– the operating systems, telecommunications, and utilities. The best of us knew assembly language– the cryptic machine instructions that underpin more or less human-readable languages like C, Cobol, Fortran, and Java. We dealt in bits and bytes, binary and buzzwords, not credits, debits, and balance sheets.
77 Water roof

77 Water plane
Plane atop 77 Water St

Walston was flush. Shortly after I joined, they moved into their fancy new skyscraper at 77 Water Street, a few steps south of Wall. It featured an artificial stream, a padded soda dispenser shaped like a floppy-eared dog, elevators illuminated like the night sky, and a full-size sculpture of a biplane on the roof. You can see it in the opening fly-over sequence of the disappointing movie The Forgotten; there you can spot the airplane still atop 77 Water.

Walston’s cast of characters included my boss Alex, his boss and vice president Paul, and an assistant vice president, Jim. Brokerage firms contain nearly as many vice presidents as they do brokers. The wrinkle in the relationship was Jim had originally hired Paul who passed him on the corporate ladder. Nearing his 25th year with the firm, Jim became marginalized, holding down a desk but no responsibility. Upon retirement, he planned to buy a Land Rover, move to South Africa, cultivate a mustache, and live a life of alternating adventure and leisure. As the weeks ticked away, that’s all he talked about.

Lower Manhatan Financial District
Wall Street and Financial District
Walston’s third floor contained two sections: the computer room and offices occupied by Arthur Anderson overseen by a Walston executive with the musical name Glenn Miller. As systems programmer, I was the rare programmer allowed in the computer room. That drew the attention of Arthur Anderson.

It wasn’t unusual for large corporations to provide offices for their accounting firm, but it wasn’t kosher for one’s auditors to use provided offices to perform work for other companies. The rules for AA were different. As one of the accounting wonks said, saving office space didn't hurt anyone. It may have been true, but violating rules exemplified the looseness of managerial oversight.

Toad in the Hole

Walston brought in two consultants, guys who would tell a company the same common sense advice at five times the price of listening to their employees. That’s one reason I later became a consultant– companies pay to listen to you.

As far as I was concerned, this was more background noise, but one day my boss Alex called me into his office. There sat the consultants and two Arthur Anderson guys amid palpable tension. They wanted me to perform a task: write a program to scan files and ‘correct’ fields, i.e, numbers within the file.

I pointed out I didn’t do that kind of commercial programming and this was far more suitable a task for one of the Cobol programmers. No matter, they assured me, they wanted me. I should be flattered.

Who’s the analyst who designed this? I asked, not feeling the least flattered. I’ll talk with him. No, said the consultant, only you. The Anderson guys nodded while my boss frowned.

Reasonably, I protested that the Cobol programmers possessed the pension suite’s data structure templates. Without them, I had no idea what the data was. It would be like blindly machining a part while they withheld the blueprints, which could damage the data.

The Arthur Anderson guys exchanged glances. My boss started to fidget. The background noise sounded like a clanging alarm. Practiced deceivers they weren't. Something felt wonky but I didn’t know what. They didn’t quite say I had no need to know, only I needn’t be concerned.

Where did a shift of responsibility end and liability begin? Were they buying blind loyalty or blindness? A light bulb went on. I raised my last objection. What about the lack of an audit trail, I asked. Assembler language would bypass all the record and financial controls.

Of course they knew that. They went into a huddle. Moments later, my boss said coldly, “We’re done here. You’re dismissed.”

I slogged back to my desk feeling dark and dysphoric. With good reason: shortly the VP called me in. He informed me the firm would cut my salary and no longer pay my tuition. Alan, the office political toady, would replace me.

Fire and Ice

Suddenly I didn't feel so brilliant. A thunderstorm had squalled up out of the blue. A kid like me didn’t make or have a lot of money and I desperately needed my classes. It didn’t dawn on me to ask why they didn’t dismiss me. Maybe they feared what they thought I knew or wanted to keep tabs on me, but my ego suggested they kept me because Alan the toady was incompetent and incapable of doing my job. He didn’t know machine language but he knew Cobol… and probably knew where to find the questionable data templates. Meanwhile, they were slamming me for questioning orders.

My boss and his boss cold-shouldered me. They almost fired me when the payroll department screwed up and continued paying my tuition, but as was pointed out, that was their error, not mine. We were at loggerheads, but they needed me as much as I needed the job.

The VP’s secretaries treated me with surprising sympathy and kindness. I don’t know how much they knew, but one took me out to lunch and the other gave me a small gift. In the cold light of Walston, they radiated warmth.

In the outside world, Ross Perot had been tacking his way through Wall Street, taking over data processing services, a forerunner of out-sourcing. When the F.I. DuPont scandal hit, Perot stepped in and bought the firm.

I received a cagey call from EDS, the company Perot founded, asking if I’d come to work for them. EDS had a rigid stiff-necked (most said 'tight ass') reputation with a dated, regimented dress code– white shirts, narrow dark ties, grey suits, pants with cuffs, shoes with laces. They subjected potential employees and their spouses to a battery of interviews. Creative thinking was not encouraged. EDS employees liked the money but not one I knew liked the company. I politely declined.

We picked up a programmer from DuPont. Perot had arrived in NYC and put his DuPont troops through sort of a surprise dress parade. As he marched down the line of employees, he came across a girl who wore the fashion of the day– a miniskirt– and fired her on the spot. At Walston, we didn’t mind miniskirts and hired her.

Word on the Street

One day, employees awoke to a lead article by the Wall Street Journal announcing Ross Perot would take over the computing facility of Walston. Vice President Paul turned shockingly white– he hadn't heard even a whisper– but brokerage houses mint vice presidents like they print stock certificates. The company denied the story and things sort of returned to normal.

Except an odd and unsettling thing happened. One month from his 25th year and retirement, Jim, the marginalized AVP found himself called into the VP’s office. Paul, the vice president, fired him. Full retirement gone, no Land Rover, no African adventure, no life of well-earned leisure.

Another discreet call came in for me. The woman on the other end asked me to identify myself, asked if I could talk privately, then said, “Please hold for Mr. Perot.”

Despite what I've heard before and since, Ross was polite, even gracious, and I was flattered he asked me to work for him. But, as I pointed out, I attended university full-time, I wasn’t as regimented as his usual workers, I enjoyed a bachelor life, and– thinking of Perot’s cozy relationship with Richard Nixon– our politics didn’t mesh. He’d famously said he didn’t like gunslingers and lone wolves– and I was the epitome.

He said, “Son, thank you for being honest,” and wished me well. I wondered why he wanted me.

Take Two

Once again, employees learned the news not from their own company but from the WSJ: For the second time within weeks, employees woke to a Journal article confirming Perot would be taking over Walston’s computing center. Again, our shocked vice president had been left out of the loop.

When Perot dropped in to inspect the troops, he spotted the same girl in her minidress we’d hired from F.I. DuPont and again fired her on the spot. Can’t say Perot wasn't consistent.

Days later, Walston fired Vice President Paul two weeks from his 25th year– and full retirement. The firm dismissed the consultants and Arthur Anderson's office underwent a shake-up. Programmers found themselves not only locked out of the computer room, but locked out of the computers.

Except for me. A good systems programmer could run the shop without operators, without analysts, without programmers. Perot didn't trust Walston's people, which explained the recruitment calls to me.

A panicked EDS crew asked where certain files could be found. They asked if I could find backups of older versions. They asked if I knew anything about original programs and data alterations. Unsurprisingly, those hotly desired files were the same my bosses asked me to ‘correct.’ The unasked question finally arose: were they corrections or were they coverups?

I dug into the files only to learn what Arthur Anderson already knew. It appeared Walston’s proprietors had embezzled the company’s retirement fund. Now it made sense why they fired the AVP days from his 25th year. That’s why they fired the VP days from his 25th year. The money was gone, reflected in the records my bosses and Arthur Anderson (or certain employees within Anderson) desperately wanted 'corrected'. The scheme was so compartmentalized, I doubted how much any one party in my department knew, remembering my boss, Alex, claimed the instructions came from on high. "Just follow orders," he said.

I'd been lucky: What might have happened to the joker who tampered with the data? Alan had been lucky: Unable to find his assets with both hands, he'd botched the changes although he left an audit trail.

Trinity Church from Wall Street
Trinity Church framed
by Wall Street

How The Mighty Had Fallen

Perot took over Walston, folding it in with DuPont and again saving Wall Street considerable embarrassment. Two and a half years later, he lost his financial shirt and dismantled a hemorrhaging DuPont Walston. Perot arranged for Congress to give him a special late night $15-million tax break, causing an outcry of socialism for the wealthy when the bill became public knowledge.

Dark forces on Wall Street gleefully watched Perot depart, some accusing him of trickery, some suing him on the way. Whatever the truth of that matter, Walston had been rotting internally before Perot arrived.

Arthur Anderson survived with their reputation barely sullied. Indeed, Anderson and Walston’s Glenn Miller caught more flack for the Four Seasons Nursing Centers scandal than the internal decay within their own firms. It would take the Enron affair to bring down Arthur Anderson.

My services remained in demand and I moved on, still on Wall Street, starting my masters degree before joining forces with two of the earliest software entrepreneurs.

Imagination Noir

In imaginative moments, it’s easy to envision the kernel of a mystery intrigue plot. I picture a John Grisham novel, a storyteller's movie in my mind like The Firm. Had Walston’s board reacted viciously and violently, I might have found myself in a dire plot, on the run for my life with a miniskirted damsel as VPs, AVPs, and Anderson drones dropped dead around me. Excited movie audiences would gasp between mouthfuls of popcorn, women would cry, and children would whisper, “He’s so bwave.”

Maybe a dastardly plot isn't so far-fetched considering the mysterious suicide (or assassination?) of Enron executive Clifford Baxter, about to testify before Congress. But in the world of finance, what’s crooked isn’t always an actionable crime. Commit a fraud of sufficient size and business will hush it up rather than prosecute– not unless something can be gained in the guise of ‘investor confidence’.

Footnote

The case ended with a gentler tone: I commuted to Wall Street on the Staten Island Ferry. One surprisingly sunny afternoon, I spotted Paul, the ex-vice president. He said hello and sat down across from me. Once again open and pleasant, he appeared the man I’d once liked– and could come to like again.

We didn’t talk about Walston. He explained he moved with his aging mother to Keene Valley in upstate New York. Turning his back on Wall Street, this former executive now worked as a carpenter. He spoke of small town pleasures where old men sat in front of the local hardware store whittling and discoursing upon merits of lawnmowers. For the first time in decades, he felt relaxed and at peace.

That pleased me. Paul wasn’t a bad man, merely a figure caught up in the machinating machinery of Wall Street. He offered his hand and we shook warmly.

Looking back, I think his chat was sort of penance, kind of an apology without the words. That was decent, more than many people would have done. And it was enough.

Besides, I’d eventually consult for banks, institutions where further fruits of fraud lay concealed beneath a public veneer.

16 June 2013

The Digital Detective, Wall Street part 1


High Finance and Low Crimes
I learned a couple of curious things when I worked at IBM’s Wall Street Data Center. One was that my friend, Curtis Gadsen liked mayo sandwiches and fleecy-legged girls. The other was my friend Ray Parchen could be fooled because he was too good at his job as a mainframe computer operator.

IBM 360 mainframe
IBM 360 computer room
Like an old-time stoker fed the fires of furnaces and steam engines, an IBM operator stuffed the huge machines with programs and data. Very good operators could act and react instantly without thought, confident in their experience and skills, mounting discs and responding to messages as they'd done ten thousand times before, giving them no more thought than donning their underwear in the morning. The keyword was efficiency.

Unintimidated by hulking computers the public suspected were semi-sentient, Ray worked quickly and accurately, and for that reason, he held down the first shift position. For him, I wrote a silly little psychological program that worked only with the best.

Amidst weighty programs queued for the giants of Wall Street, I slipped in the prank while a dozen employees gathered outside the computer room’s glass wall, waiting for the small program to do its thing: It made discs chatter, tapes whirr, lights blink, and the data center rumble as if Colossus was taking over the world.

We watched Ray bend over the console, reading the first mundane message:
05483A Press ENTER.
Ray pressed the ENTER key. The machine responded with another message:
05483A Press ENTER hard.
A few of us watched from outside the computer room as Ray hit ENTER again. The machine came back with:
05483A Press ENTER harder.
Ray punched the ENTER key, and a couple of the girls giggled. The computer responded with:
05483A Press ENTER even harder.
Ray smacked the key hard, very hard. The machine responded with one last message;
05483I Did it occur to you I can’t tell how hard you press ENTER?
Ray looked up with a red-faced grin and spotted us chuckling. Afterwards, he joined us for a drink where we argued why the program fooled some and not others.

Of course he knew pressure couldn't be detected, but he hadn't engaged his knowledge hidden behind the wall of his expertise. I would discover this common quirk could be exploited, as Simon Templar might say, “by the ungodly.” As noted in the article about kiting, confidence men take advantage of confidence.

Over the next few days, we tried our little joke on other operators and observed this interesting fact: Only the best fell for the stupid little prank. Novice operators stopped, studied the messages, and tried to look them up.

Ray and the other top operators reacted immediately and without thinking. Self-assured of their abilities, they acted instinctively by rote.

Less experienced operators questioned everything, including themselves. We caught more than one systems engineer trying to look up the bogus message number in the reference manuals and they sometimes called for help. That spoiled the little program.

Lesson: Sometimes it’s easiest to fool the most experienced.

There’s a reason I tell this story. It leads to how I became sort of a detective, a digital Dashiel of a Continental Op.

Over the next few weeks, I'll talk about an accidental career as a investigator in a field yet to be invented, that of computer forensics. I reveled in the chase, but my career often hung in the balance under threat of firing, even blackballing. Often the only reward was termination but hey, that happens to all the best private eyes.

Background Noise

An early case exploded with little of my own involvement, or, perhaps because of my lack of involvement. The players: Walston & Co, the nations third largest brokerage house, and Arthur Anderson, the biggest of the Big Eight accounting firms until participation in the Enron scandal brought about its demise. Anderson had dirtied its manicured fingers long before Enron arrived on the scene.
Lower Manhatan Financial District
Wall Street and Financial District

Search the internet for Walston & Co and its Wikipedia entry merely reads "(Walston) was acquired by Ross Perot following pension account fraud and then merged it with Dupont, which had found itself in financial difficulties." Here's the story behind the story.

Despite the Wikipedia gloss-over, the wheels of merger with F.I. DuPont began turning before revelation of Walston’s fraud. Fifteen million in securities had vanished from DuPont’s accounts. The White House grew nervous. Wall Street threw up its collective hands, Oh woe, what to do, what to do?

A Texan rode into town, Ross Perot. He’d bulldozed through the insurance industry (an intriguing inside tale of its own) and encouraged by Felix G. Rohatyn, he made his move on Wall Street. For an initial $30 million, the impossibly old, impossibly young forty-year-old Napoleonic Perot acquired control of one of the Street’s most prestigious houses. (N.B: Regrettably, Time Magazine articles referenced herein require a subscription.)

At the time, that seemed background noise for me, a full-time employee and a full-time student, living paycheck to paycheck and barely sleeping. I couldn't guess how it would alter my career.

Trinity Church from Wall Street
Trinity Church framed
by Wall Street

Crime on the Street

In the Financial District, denizens simply call Wall Street 'the Street'. Philosophical sorts read a moral into its long, narrow confines, noting it begins at a church and ends at a river: When times get tough, in depression or desperation, one may choose salvation or suicide.

The Street fosters its own culture. On the one hand, a man’s word is his bond– multimillion dollar transactions hinge on verbal promises. On the other hand, huge regulatory holes allow brokerage houses to commit the sleight-of-hand that brought the economy to its knees ten years ago. We can’t say we weren’t forewarned, but in the heady days of deregulation, greed and giddiness carried the day. We never seem to learn industries cannot police themselves.

One of the first observations of the Street is that the market's moody– it reacts, even overreacts to political news of the day. But I stumbled upon other emotions, which included surprisingly little hanky-panky. A few notes from the era:
Francine Gottfried
Miss Francine Gottfried

  • Wall Street can be a mad marketplace when the economy's in a lull. Late one summer, a sweet keypuncher named Francine Gottfried caused a sensation with the mostly male lunch crowd as her 43-23-37 figure bounced down the steps of Chemical Bank & Trust. For a few days, a sort of silly mating season reigned and then, as so often happens, her 15(0) minutes of fame were up.

  • Once, as I strolled with my boss down the street, we encountered a beggerman squatting on his flattened cardboard. My boss stopped and chatted with this derelict before moving on. I didn't say anything but he confessed: The homeless man once worked as a broker, what Wall Street called an account executive or AE. When my boss and the man’s wife carried on an affair (and subsequently married), this man– the husband– collapsed in despair. He now lived– literally– on the Street.

  • During the 'Hard Hat Riots' (then called the Wall Street Riots), I picked my way through roving construction workers from the rising World Trade Center left by police to run wild, bashing kids protesting the war in Vietnam. On my way to school as police idled, I helped a girl and her boyfriend bloodied by a musclebound thug. It was no contest: the canyon-like Street corralled the teens, leaving them easy pickings by hardhats with pipes and wrenches. That wasn’t one of Wall Street’s prouder moments. Hard-hats went on to attack the city's mayor's office, smashing the face of one of his aides.
The Young and Restless

A precocious if unaware teen, I worked as an IBM shift supervisor in their Wall Street Data Center, Number 11 Broadway. I had the greatest boss, a pretty blonde named Judy Kane. We boys loved her; the girls– not so much.

And I loved software, the machine-level bits and bytes and Boolean stuff. A teenage mad scientist, I found computers a giant puzzle, one I learned to solve and control. It was a battle of wills, me versus machine, immersive therapy for a broken heart (but that's another story). I'd come to know these Daedalus creatures like a mother knows her own children; better even, I'd learned their DNA.

A sales rep, Herb Whiteman, discovered I spent weekends camped in the computer room, teaching myself to program the huge monsters, then catnapping on the couch as the computers blinked and toiled, compiling my routines. Herb asked if I’d be interested in joining a three-man team that would change Wall Street and put video terminals on broker’s desks. Argus Research, the parent company, would double my IBM salary.

The company gave us secretaries and an entire floor of offices, no expense spared. Unfortunately Argus, in the business of prognostication, shortly deduced the economy teetered on the brink of recession and pulled the plug. Not long after Walston & Company hired me as their fancy-pants systems programmer offering tuition reimbursement as part of my hiring package. Me! I was just a kid from nowhere.

Thus began my introduction to low crimes and high finance.

Stay tuned for more next week, Wall Street's big boys and big crimes.

10 June 2013

Smith's Law


Jan Grapeby Jan Grape
 
Bet you've never heard of Smith's Law. Well, don't fret. I'm sure you've heard of Murphy's Law? Well, my late husband, Elmer Grape used to claim that Murphy was an optimist. That whatever did go wrong was going to get worse.

So I had my internet tech out last week & got my desktop back online and then sorta got the laptop going also.  Well, it was working; it just takes thirty minutes plus to load. Since computers were working I delayed buying a new laptop. And today is when Murphy's Law kicked in. Things got worse.

This afternoon while trying to get my article written and posted, I cannot get online with either computer. The desktop is totally hopeless. I managed to get online with laptop but after 40 minutes of the cursor spinning it just would NOT open the sleuthsayer website.  So I'm writing this on my phone. Thank goodness I bought a styles thingy last week. I can't  imagine trying to type this much with a fingertip.

And so things won't be a total crying towel, pitiful Patty, I'll give you an idea of what my original article was about.  I've had people say that my policewoman sounds exactly like me. Or that this character or that character is Aunt Whosit or Uncle What's his name. In reality none of that is so. The characters I make up are just that "made up."

If Zoe Barrow sounds like me...it's probably because you give her a Texas accent because I'm from Texas.  Like most writers say, there's a little bit of me in several of my characters. But Zoe is younger, thinner, prettier and braver than me. (I got that one from Sue Grafton about comparing Kinsey to her.)

However, I take bits and pieces of people I know or see to compose a character. I've gone to a mall to people watch. To note gestures, walks, body language.   You may take a trait of Aunt Whosit and marry it with Cousin Whom.  When you do that you do need to be careful they don't recognize themselves. A friend once said she made her mother-in-law into a yippy dog but the MIL never caught it.

Characters are fun to create. But don't just give a list.of hair and eye color. Give us something to their makeup as a person. Thats when characters come to life.

I think this is about all I can type this way . So until next time watch out for Murphy.

22 May 2013

Breaking the Code


If you asked my uncle Charlie what he did in the Second World War, you got some evasive boilerplate about working for Army Intelligence. He'd tell you that during the Bulge, say, his unit searched abandoned German command posts for compromising material, and sometimes it was touch and go, because the battle lines shifted back and forth, but he was generally close-mouthed about it, and made his service out to be pretty much routine duty. He did in fact have an old Third Army sleeve insignia, a pin with the white A on a blue field, circled in red, so there might have been some truth to that Battle of the Bulge story. If there was, it was a very small part of the truth, because he was actually in on one of the biggest secrets of the war.
It was called ENIGMA, and the product was code-named ULTRA.

Enigma machine
ENIGMA was an encipherment system, used by the German military and diplomatic services. Polish intelligence did the initial heavy lifting, reverse-engineering captured German equipment, and passed their results on to the Brits in 1939. British code-breakers set up shop at Bletchley Park, north of London, and began reading Luftwaffe and Army traffic.

To simplify enormously, the Enigma machine was a transposition cipher device with a typewriter keyboard. There were three rotors inside, each with twenty-six characters. When you struck a key, the first rotor advanced one position, until it reached twenty-six, and then the next rotor advanced, like an odometer. In other words, any given letter was substituted with another, but the possible combinations were twenty-six to the power of three. The rotor settings were predetermined, but they changed every day, in theory. One weakness Bletchley Park exploited was that the German operators didn't always change the settings daily. Another was that messages were sometime sent in plaintext, for redundancy, and you could compare the coded transmission to the uncoded one. If not for German security breaches, the coded traffic might well have proved unreadable.

Rotors
Then they hit a bottleneck. German naval security had always been more rigorous than that of the Luftwaffe and Wehrmacht, and the Kriegsmarine introduced a machine with four rotors. The number of possible character substitutions multiplied, and the traffic went dark.

In the North Atlantic, the convoys that were Britain's lifeline had no effective air cover or escorts, in 1940 and '41, and crossed two thousand nautical miles of unpatrolled open ocean.  Here the wolfpacks hunted. The loss of Allied tonnage was crippling. Bletchley Park needed to break the U-boat codes or the resupply would founder.


Alan Turing
The guy who probably deserves the most credit was an eccentric mathematics done from Cambridge named Alan Turing, who'd been recruited by the Government Code and Cypher School even before the war began. Turing designed an analytical machine, a numb-cruncher, in effect one of the earliest computers, a bombe, so-called.  With it, they "unbuttoned," Turing's word, the German naval ciphers, and shortened the Battle of the Atlantic. It's no exaggeration to suggest they shortened the war.


Model of the Bombe
At its peak, Bletchley Park was reading 4,000 messages a day. The decrypts tipped the balance in every campaign from North Africa to D-Day. (They were never shared with the Russians, however. Churchill's mistrust ran deep.) The people who worked there didn't talk about it, then or later. They maintained their habit of silence, and the whole story didn't break until thirty years afterwards. It was a better-kept secret than the Manhattan Project.

Alan Turing died in 1954. He was queer, and MI-5 hounded him, as a security risk. He underwent chemical castration, and was eventually driven to suicide, his contribution to the war effort unrecognized at the time of his death. Some thirty years later, Hugh Whitemore's play "Breaking the Code" opened in the West End, with the astonishing Derek Jacobi as Turing. Sodomy hasn't been criminally prosecuted in Great Britain since the repeal of the gross indecency acts in the late '60's. A legislative motion was introduced in Parliament to grant Turing a statutory pardon, just this past year.

I don't want to wade into the question of gay civil rights, although it seems to me obvious that without legal protection, homosexuals are still fair game. Turing was blackmailed by the law. His reputation doesn't deserve just rehabilitation. This has already happened. The computer library at King's College, Cambridge, for example, is now named after him, and he's widely accepted as a pioneer in Artificial Intelligence (the Turing test), and secure speech, the Delilah program. I'm saying that he deserves a posthumous knighthood, or an Order of Chivalry, at the least. This odd, cranky-pantsed fairy did as much to beat Hitler as any divisions in the field.

Churchill was later to say: "ULTRA won the war."



Editor's note: Software developer Terry Long has created a free Enigma Simulator. If you happen to use a Macintosh, download it and try it out.

Enigma

29 November 2012

True Treasures


by Deborah Elliott-Upton

By the time you are reading this, we will know if someone won the whopping 550 million dollar Power Ball lottery. If it is me, you can be sure I am doing the same thing you would be doing: trying to believe it happened while deciding what to spend that much money on.

Think about it. Pretty much after we paid all our bills, bought new vehicles and a mansion, took care of family members we'd like to help, there's still way too much money for any one person to spend.

At least that is what I think. I've not had that much in my bank account to really know.

My husband said I could buy my own library although he already believes I have too many books as it is. (As if that could be possible!)


We had a discussion recently about our sliding into a hoarder lifestyle. After being married for so many years, we have accumulated more than we need. Trying to part with most of it isn't easy. I do identify with those people on "Hoarders" who have true attachments to their "collections." I hope my stash isn't looked on by others with disdain as the ones participating on the television show, but one man's trash is another's treasure.

My husband sat at his computer in our shared office when I popped in and said, "We have got to get a handle on our clutter. We need to get rid of ten things a day in this house if only it's ten pieces of paper."

He spun around in his chair to face me and glancing around the room, said, "We can't live that long."

I sighed dramatically. "I didn't mean my papers!" 

Both of us knew that was a losing prospect. Writers seem to always have papers they feel they must keep.

I'm a hard-copy kind of writer. I think that comes from losing so many files on computers long ago. I realize the chances of losing them now are not as much a problem and to be honest, I know more about how a computer works these days so I'm not as apt to hit the delete button by mistake. I also have found a computer guru who tells me nothing is truly deleted on a computer. He found deleted-by-mistake photos my daughter and her husband took on their honeymoon– photos that couldn't be duplicated. Having the correct software, it seems, makes all the difference.

Which may be one more reason we must be careful if we're writing things on a computer we wish we hadn'tlike perhaps things Casey Anthony had on hers.  Mystery authors take note: crimes are often solved by what an expert can find on a computer that was supposedly "washed" of evidence a criminal thought he'd erased. One more case of dirty laundry telling all when its discovered.

My treasures are my papers...the ones containing my written work, of course, but also the ones of snipets of ideas for future story ideas or characters...the honest-to-God letters someone wrote to me (especially from those who have passed on from this world) and the photos that I can hold in my hand. Those are my true treasures.

My husband once told me he'd won the lottery when he convinced me to marry him. I guess I'll keep him, too.

That doesn't mean I'm not going to buy a lottery ticket though. The idea of that library he promised appeals to me.

31 July 2012

SoothSayers


"Prediction is very difficult, especially about the future."
    --   Niels Hendrick David Bohrs, Danish physicist
The (doctored) display from Doc's DeLorean
    Late last month, along with several million other folks, I encountered a post on Facebook proclaiming that June 27, 2012 was, in fact, the date in the then far away future that Doc programmed into the DeLorean in the 1985 movie Back to the Future.  I immediately texted this “fact” to my elder son, Devon, who is quite the Back to the Future fan.  His disgruntled reply was immediate:  “Where is my flying car?”

     As it turns out the Facebook post was a hoax – a photoshopped version of the DeLorean screen.  In fact the actual date that Doc flew off to in the movie was October 21, 2015.  But Devon’s larger disappointed point is still valid – unless we come up with flying cars in the next three years the movie’s view of the future turns out to be definitionally anachronistic. 

    Two weeks ago I wrote about Michael S. Hart, who had the prescience to foresee a world that would embrace e-literature long before the internet or the home computer existed.  Hart’s foresight is all the more remarkable when one considers how poorly most of us perform in the prediction department. 

    A prime example of failing this challenge is the Stanley Kubrick film 2001:  A Space Odyssey.  I remember seeing this movie  for the first time in 1968 and being completely blown away.  I think it was the only movie I saw that summer and I also think I saw it seven times.  Viewed today the movie is . . . well, . . . dated.  Twelve years after Y2K we are nowhere close to Kubrick’s vision of future space travel.  In fact, we were closer in July of 1969, one year after the film premiered, when we were actually walking on the moon. 


On board the 2001 space station -- HoJo's sign at right
      Not only was Kubrick’s vision of a space station woefully out of sync with what came to pass, he couldn’t even get the restaurants right.  Remember the Howard Johnson’s “Earthlight Room” that showed up in the space station?  As of 2005 there were reportedly only five Howard Johnson restaurants left anywhere in the world, and it is completely safe to observe that the chain never reached outer space, and to predict that it almost certainly never will!

    But to my mind just about the best examples of stumbling over the future are sprinkled throughout Robert Heinlein’s classic novel The Door into Summer.  I need to note at the outset that Heinlein’s book, even with its predictive flaws, is one of my all time favorites and I re-visit it regularly. The Door into Summer was originally serialized in three issues of The Magazine of Fantasy and Science Fiction in late 1956 and then published in hardcover in 1957.

    The novel opens in 1970 and then jumps to 2000, giving Heinlein the opportunity to prophesize about not just one, but two different future eras and us the opportunity to shake our heads as to how wrong he got it since we have now lived through both.  I read the novel for the first time in the 1960s, when I could still wonder at whether the author foresaw the 1970s and 2000s correctly.  I then re-read the book again in the 1970s, when I was able to see how the 1970s predictions didn’t work out, while still holding out hope for the 2000s.  Alas, I then re-read the novel most recently a few years ago.      From those perspectives it has been interesting to watch, over the course of a lifetime, how the novel’s view of the future vectored from reality as I caught up in time with each era portrayed  in the novel's timeline. 

    As I’ve said before, I don’t do “spoilers,” but there are still aspects of the novel that can be discussed without giving away too much.  For example, the protagonist, Dan, is an inventor of robots -- “Hired Girl” (yeah, I know, even the name alone wouldn’t work now) and “Flexible Frank” -- which, in both 1970 and 2000 perform virtually all household chores.  Never quite got there, did we?  Those inventions and many other projections concerning life in both 1970 and 2000 that did not in fact come to pass provide an interesting, if unintended, subplot to this otherwise fine little story.

     But my favorite Heinlein creation is Dan’s namesake invention:  “Drafting Dan,” a machine that can automatically create engineering draft drawings.  Drafting Dan creates these drawings using computer driven arms that draw on a drafting easel utilizing directions inputted from  (gasp) a keyboard.  The computer needed to power this invention has been shrunken to near room size by the use of super powerful new vacuum tubes.

The earliest mouse!
   So Heinlein’s prediction of the computerized future missed, among other things, the advent of computerized chips (and the attendant demise of the vacuum tube), the development of display monitors and printers, and the evolution of the mouse, which did not appear in prototype  until 1963 and which, even then, was abandoned only to be resurrected from the dead with the release of the Macintosh Lisa in 1984.

    Like most predictions that go wrong, the blame can hardly be laid solely at Heinlein's feet.  If anything has proven itself, it is the difficulty involved in figuring out what happens next. To envision the computer of the future Heinlein likely turned to those who in the 1940s and 1950s were at the forefront of the then-incipient computer industry – an industry that at the time involved figuring which of the spaghetti mess of multi-colored wires should be plugged in where..  Andrew Hamilton, a noted computer expert of the time, had the following to say in a 1949 article in Popular Mechanics hypothesizing on the future of computers:  “Where a [computer] calculator . . . [in 1949] is equipped with 18,000 vacuum tubes and weighs 30 tons, computers in the future may have only 1,000 vacuum tubes and perhaps weigh only 1½ tons.”  (“Hmmm,” we can almost hear Heinlein thinking.)  In 1957, the year that The Door into Summer was published in hard cover, the editor of business books for Prentiss-Hall had this to say:  “I have traveled the length and breadth of this country and talked with the best people, and I can assure you that data processing is a fad that won't last out the year.”  At least Heinlein saw past naysayers such as this, and boldly chose a future where computers thrived.   Other rejected paths include the prophecy of Ken Olsen, then chairman of DEC, who twenty years later, in 1977 “presciently” observed that “[t]here is no reason for any individual to have a computer in his home.”  And printers and copiers?  Here is IBM’s 1959 advice (to a team that later went on to found Xerox) concerning the future of the novel copying device the team was attempting to sell:  “The world potential market for copying machines is 5,000 at most.”

    Well enough of this picking on Heinlein.  In fact, we are surrounded by prophetic mistakes that rear their humorous heads in literature.  And they are not confined to technology.  I have read a number of Randy Wayne White’s Doc Ford books, all set in Florida, and many dealing with Cuba.  Five years ago, when the press was telling us that Castro lay dying and would not last the month, White apparently viewed that as gospel and took what looked to be a safe leap – he submitted a new installment in the series to his publisher in which Castro was already dead.  Oops.  White now has authored several additional books in the series over the last five years, each of which treks an alternate reality from ours, a world in which Castro has indeed already departed the mortal  realm. 

    And, as illustrated by the computer quotes above, prognostication errors are not relegated solely to written fiction.  They spring up all around us.  Here is one of my favorites:  During the Civil War it is reported that the last words of General John Sedgwick as he looked out over a parapet toward the enemy lines during the battle of Spotsylvania Court House were the following:  “They couldn't hit an elephant at this dist . . . .”

17 July 2012

E-volution


    Perhaps it is because each of our lives is linear that curiosity and a quest for order leads us to search out the beginnings of things that surround us in the world.  Sometimes it can be difficult to determine when something we now take for granted first originated, but other times we can track the beginning with certitude.  For those of us “of an age” I therefore pose a question:  what were you doing on July 4, 1971?

The IBM System 370 circa 1971
   I can remember that date pretty well.  It was a holiday, of course, and it was the first one for me at my first job after college.  I had just completed one month as a computer programmer in St. Louis Missouri.  The computer that I wrote programs for was an IBM 370, state of the art at the time.  It had to be housed in a climate controlled room and the computer itself took up, as I recall, the space of my present living room and dining room combined.  It sported, again as I recall, a wondrous storage capacity of 512 kilobytes.  Most of the things we take for granted on a laptop it could not do. 

    The COBOL programs that I wrote in 1971 were punched into 80 column cards.  A program usually comprised multiple boxes of these cards that were loaded into a card reader that spat them into the IBM 370 which then, under the guidance of what the programmer had written, could do wondrous things – like keeping track of spare parts and inventory.  By the time I left programming two years later to attend law school I had worked on one of the first “on-line” programs, which allowed data input from a (gasp!) stand alone terminal. 

The University of Illinois
    While I was toiling out a living commanding that IBM 370 computer to perform menial tasks something much more exciting was happening some miles away across the Mississippi river in Illinois.  On July 4, 1971 a young man, roughly my age, named Michael S. Hart, a graduate student at the University of Illinois, was granted free access to the University’s computer.  Such access was invaluable – unheard of at a time when computer access was scheduled in advance in minutes.  But nonetheless, through a friend of his brother, who operated the University’s mainframe computer, Hart was given the key to the kingdom. 

    But what kingdom?  What would I have done with such computer access in 1971?  Well, likely nothing.  The computer, after all, was a data processing instrument.  That is what it did – it processed data.  Why would you want free access to such a tool?  Would you want to spend your spare time sitting around processing even more data? 

Michael S. Hart
    Michael Hart, however, was not me.  Michael Hart was a visionary.  The university’s computer, it seems, was hooked into a system of computers and was one of fifteen nodes in a network of computers known as ARPANET, a network that years later would itself expand and blossom into what we now take for granted:  the internet.  There were approximately 100 users who, like Michael Hart, could download information from ARPANET.  I began using email in 1986, which was long before most people.  But, again, Mr. Hart had me beat – in 1971 the University of Illinois already had an early version of email that utilized ARPANET.  Hart put one and one together and saw the future. 

    Even at that the idea started out small.  It was, after all, July 4.  Hart had a copy of the Declaration of Independence that he carried with him. 
We were just coming up on the American Bicentennial and they put faux parchment historical documents in with the groceries. So, as I fumbled through my backpack for something to eat, I found the U.S. Declaration of Independence and had a lightbulb moment. I thought for a while to see if I could figure out anything I could do with the computer that would be more important than typing in the Declaration of Independence, something that would still be there 100 years later . . . .   
    So Hart sat down and typed the document into the computer only to find that it was too large for the rudimentary email system available on the network.  So Hart saved the document to the computer’s hard drive and provided his friends with the storage address, so that they could down load their own copies.  It is thought that of the 100 people who had access to data stored in ARPANET six actually downloaded the Declaration of Independence.

Volumes offered on Project Gutenberg by year
    From that rather inauspicious beginning came Project Gutenberg., which now offers the world’s largest collection of free on-line ebooks.  Early on Michael Hart typed in the text of all of the books that Project Gutenberg stored on-line.  By the mid 1980s the total was something over 300 books, comprised of older works such as the classics and the works of Mark Twain.  All were in the public domain, which meant that there were no royalties associated with distributing them freely.  From the mid-1980s on Hart began recruiting volunteers who also typed in the full texts of books.  By 1989 advancing technology allowed Project Gutenberg to begin scanning in books.  Currently over 39,000 works are available on line and it is estimated that Project Gutenberg adds books at the rate of over fifty books per week.

    While all of this is astonishing on its own, Michael Hart’s vision also laid the groundwork for today’s surge of epublications, ebooks and ereaders, such as the Kindle, the Nook and the Ipad.  And those, in turn, are bringing about an astonishing transformation in publishing, where marketing of new works of fiction and non-fiction can be offered directly to the reading public. 

    What makes all of this such an interesting story is, again, the prescience of Michael Hart, who came up with the idea when there were only 100 people on-line at the time who could have utilized the fruits of his labors.  As Hart said in 2011, “[s]omehow I had envisioned the net in my mind very much as it would become 30 years later.”  Remember also that back in 1971 there was no way for individuals outside of those with access to ARPANET to access computers and that, as noted above, the computer itself was hugely unwieldy and largely used for menial tasks – for processing data.  The first rudimentary desk top computers were still over ten years away; lap tops more than that.  And the reading devices such as Nook and Kindle that we more and more are relying upon to bring us our chosen reading material were approximately forty years away – hardly even a glimmer in the eye.

    It’s probably safe to say that Michael Hart not only anticipated the future, but also, through his efforts, helped to bring about that future -- our present.

    Michael Hart died last September, a little more than 40 years after he first typed the Declaration of Independence into that keyboard wired to a University of Illinois mainframe computer.  His legacy has been a revolution in literary independence that may be more profound than even he imagined.

04 February 2012

Computers? They're Not My "Type"



NOTE: This week I've invited my friend Herschel Cozine to do a guest column. Some of you are already familiar with his work; Herschel's short stories and poems have appeared in AHMM, EQMM, Woman's World, Wolfmont Press's Toys for Tots anthologies, and many national children's magazines. He's also published a number of stories in Orchard Press Mysteries, Mouth Full of Bullets, Untreed Reads, Great Mystery and Suspense, Mysterical-E, and others. His story "A Private Hanging" was a finalist for the Derringer Award. Herschel lives with his wife in Santa Rosa, California, and often serves as my wise but unpaid advisor on literary matters. (Herschel, many thanks! Readers, I'll be back in two weeks.) -- John Floyd




I lived many years BC (Before Computers), and have issues that have yet to be resolved. And I am sure I am not alone; certainly my problem resonates with those in my age group.

Allow me to preface my remarks with an anecdote. I was born in an old Victorian house on Long Island, situated on 180 acres of mostly unimproved land. The house and grounds were owned by J. P. Grace, the multi-millionaire banker and businessman. Mr. Grace stipulated in his will that his estate could neither be sold nor subdivided, so it is still intact today. However, since his death many years ago, the grounds have been neglected by his heirs and have fallen into disrepair. The house and most of the buildings burned to the ground at various times over the years.

Recently I discovered that the local historical society had dispatched a team to map and explore the estate. They dug in the places where the structures had once stood, collecting and cataloguing the relics that they unearthed.

I wasn't prepared for this. How would you feel to discover that the house in which you were born was now an archeological dig site? Old. Very old.

With that in mind, it should come as no surprise that I started writing before the age of computers (or digital clocks for that matter). The writers of the day used typewriters, carbon paper and onionskin paper for their file copies. For those of you too young to remember, carbon paper was not made from carbon, nor was the onionskin made from onions. And the typewriter was a clever device that one learned how to operate in high school. Basic. Easy to master. Uncomplicated. Like many inventions of that era (rumble seats, slide rules), it was too good to last.

The writers started by jotting their musings on foolscap, a legal pad, or whatever suited their needs. Then would come the simple, albeit arduous, task of typing it (using the aforementioned typewriter), onto a clean white sheet of stationery, together with a sheet of carbon paper and a sheet of onionskin. Naturally, mistakes were made. Thus the ever-present bottle of whiteout came to the rescue. A blob of that over the typo and the manuscript was good as new. Of course, the typo was forever preserved on the onionskin copy. But that was for one's file and not a big problem. Eventually the imaginative typewriter folks devised a ribbon that had a strip of whiteout incorporated in the ribbon. One simply positioned the platen so the offending typo was under the striker, typed the letter through the whiteout, and then replaced it with the proper letter. Life was beautiful!

Then the electric typewriter made its appearance. Prior to that the darkness of the letters varied with their position on the keyboard. For example, the letter "a" was usually fainter than a "g" or one of the inner letters because one struck the "a" key with his weaker finger. The electric typewriter took care of that problem as well as the one of capital letters that stood half a line above the rest of the word. Life was now even more beautiful.

Then came the typewriter with a memory. Up to ten lines of typing could be stored on the device so one could edit and correct before committing it to paper. Another ingenious work-saving innovation. It couldn't get any better than this.

Then--the computer! Life will never be the same.

My son had to convince me of the advantages of the computer over my clunky, outdated typewriter. Thus I was pulled into the twentieth century just before it in turn was pulled into the twenty-first. I still have the scars.

To begin with, my first computer informed me that I had performed an "illegal operation." I was appalled. I had never received so much as a parking ticket before. I pleaded with it to tell me what it was that I had done, promising never to do it again. But it just sat there, its cursor blinking at me accusingly.

I swore at it, threatened it. "I'm the intelligent one in this room. You are simply a collection of circuit boards and wires. If it weren't for me you would be languishing in some warehouse in Peking. Show some gratitude!"

No response except for the blinking cursor. To this day I don't know what I did wrong.

Thankfully, my present computer is not that judgmental. I no longer get that message.

But I digress. Since my main reason for getting a computer was to simplify and modernize my writing efforts, I removed my typewriter from the den and turned to the word program. Awesome!

I looked at the screen in bewilderment. The options, features, icons, and symbols boggled my mind. Before I could start writing I had choices to make. What font style: Courier, Gothic, Times New Roman, even fonts that printed in symbols resembling hieroglyphics. I settled on Times New Roman and moved on. Font size--from microscopic to billboard. Did I want bold, italics, underline? What color? Did I want headers or footers, indented paragraphs, right justified margins, single or double spacing? What size paper? How about columns? Graphs? Double spacing before or after paragraphs?

I was overwhelmed. I have a hard time deciding between "over easy" or "scrambled" when I eat out. "Panic" is a little too strong a word to define my mental state. But it will suffice for the purpose of this discussion.

By the time I had set up all the parameters I had forgotten what it was I had started out to write. I have reverted to jotting down the story on foolscap ahead of time. This is progress?

With some trepidation I began to write. Suddenly the font changed from Times New Roman to Lucida. What had I done? I later learned from my son that I had not set my defaults. (I thought that only happened to loans.)

I labored on, enduring the whims and peculiarities of the computer, finally reaching the end.

Having finished for the day, I was ready to save my work. This scenario followed:

Computer: Do you want to save this?

Me: I just went through three cups of coffee, two bathroom breaks, four and a half hours of typing, not to mention the ordeal you put me through. Of course I want to save it, you moron!

Computer: Where?

Me: Someplace where I can find it again. I am still looking for the last one which disappeared without a warning. I even called my computer-savvy son, who told me, "You must have hit the delete button," and then hung up. I suppose I would have done the same if I had been called out of an important meeting. But it seemed a bit rude. After all, I am his father.

Computer: What format? HTML, Doc, PDF, RTF, etc.

Me: UCLA, NASA, FBI, GOP. How the hell should I know? You're the expert. You decide.

I have no idea what format my document is in, nor do I care. All I ask is that it is where I stored it and that it is readable. (I recently opened a file to find nothing but rows and rows of symbols and punctuation marks that ran on for three pages.)

Needless to say, I am not a big fan of Bill Gates.

Of course, I understand that a computer is more than a glorified typewriter, and I should be taking advantage of its versatility. I try. I have 378 friends on Facebook, six of whom I have actually met. I am bombarded with crude jokes, tasteless photos, and messages concerning their bodily functions and sexual prowess. I don't spend a lot of time there.

Then, of course, there is e-mail. There was a time when I had to trudge out to the mailbox to get my junk mail. Now I have it delivered directly to my den. (I wonder if that poor man ever managed to get his money out of Nicaragua.)

Ah, but I am beginning to sound like my father. He was convinced that civilization as we know it would not survive the invention of television. Fate was kind to delay the invention of the computer until after he had passed away.

There is a group of men on Long Island who will unearth a rusted, scorched Underwood typewriter in the rubble of my old house. I wish I could be there when that happens. God, how I miss it!