Showing posts with label computers. Show all posts
Showing posts with label computers. Show all posts

12 July 2015

Techno-dull


Mr Robot logo
Edgy. It’s what a new USA Network television, Mr Robot, is trying for, so edgy that producers are getting ulcers trying to make it happen. And cyberpunk. It’s oh, so cyberpunk, rebel without a clause, pass the opiates please. It’s new, it’s now, it’s different, and it's supposed to be ultra-tech-savvy. It has exciting technology working for it… or does it?
One of Dorothy Sayers' novels, The Nine Tailors, is noted for its portrayal of campanology– professional bell-ringing. Sayers was largely complimented for her accuracy of detail. In a small way, she created kind of a techno-novel. Since then, many authors have created stories detailing technology of one kind or another– military, espionage, aerospace, medical, or computing.

Bluffing computer experts is tricky, especially the ‘leet’, the priesthood as it were, the 1% of 1%, the dei ex machina, code-slingers, bit busters, programmers of the programs that run programs. Rendering a story about computers takes more than networking verbiage and Unix gibberish. Bear with me as I wade into technical detail.

Going Viral

John Brunner’s Shockwave Rider introduced the concept of viruses, but most novels and virtually all movies get the technology wrong. That doesn’t mean a reader can’t enjoy some stories. Thomas Joseph Ryan’s The Adolescence of P-1 was a good read. 2001 A Space Odyssey was smart, the letters HAL being one displaced from IBM. And for hopeless romantics, Electric Dreams gave movie-goers a Cyrano de Bergerac love triangle featuring a computer named Edgar.

But a story shouldn’t pretend to be something it isn’t. An Amazon review about a computer novel by a top-rated mystery writer said the commenter got laughs reading aloud excerpts to employees in the company lunchroom. That’s not the kind of critique anyone wants.

Dennis Nedry
Dennis Nedry from Jurassic Park
Casting Stones

Casting is another problem with computer shows. Techno-geeks’ IQs typically run high, but that’s seldom how computer experts appear on the screen. One example of awful rôle selection occurred in Jurassic Park, that of an unlikely computer sysadmin, the oafish and creepy Dennis Nedry. We’re going to talk about lack of subtlety: Nedry / nerdy, get it?.

If Hollywood doesn’t stereotype a sallow, shallow wimp with taped glasses, they opt for the opposite, a busty beauty in a skin-tight action figure costume. Movie makers think an eye on the décolletage prevents audiences noticing thin characterization.

When I think of actual top geeks (someone without my movie star looks– stop laughing), I think of colleagues like my friend Thrush, programmer Bill Gorham, software architect Steve O’Donnell, or a handful of others. These ordinary guys possess the extraordinary ability to make machines dance to their own tune.

Robin Hoodie

The show’s idea of characterization appears twofold. First, dress the part: Make the protagonist, Elliot Alderson, sullen, slurring, antisocial, slouch through life in his hoodie. Have ruthless, junior exec Tyrell Wellick wear designer ties and suits. Decorate drug dealers with lots of tats. Mission accomplished.

The other part of the simplistic characterization is the creation of a polarized ‘them versus us’ atmosphere: hoodies v suits, punks v preppies, young v old, crackers v hackers, morphine users v tweakers v coke-heads, Anonymous v the establishment, bad guys v the other bad guys, capitalists v socialists v nihilists v anarchists… which might be interesting if someone had bothered to delineate a bit.

Elliot, the main character, is a morphine-addicted presumed programmer– he once mentions source code. The guy is a pathological liar who lies even to himself, then follows up by telling people in slurred speech, “I’m just being honest.” He drinks ‘appletinis’ and tells his shrink he’s not a junkie, even as he snorts his drug of choice. Supposedly this doesn’t impair his ability to dig into the bowels of computer networks.

A major problem here is that mainly druggies find drug users entertaining. One shouldn’t have to be stoned to appreciate a television show, but drug use and overuse underlies a major theme of Mr Robot. Elliot’s Asperger’s syndrome one can deal with, but his continuous mumbling is hard to stomach.

Of all the cast, only the female characters appear likable and worthwhile, Elliot’s shrink, Gloria, and his childhood friend and co-worker, Angela. Elliot and Angela telegraph to the audience their unrealized attraction as in a third-rate romance novel.

Tyrell Wellick represents the only alpha male in that universe, a ruthless junior exec but one who keeps his eye on the prize. As the best drawn character, he’s a sadomasochistic and exploitative bisexual who goes all out for what he wants. The actor speaks fluent Swedish but god-awful French, more than once butchering the word ‘bonjour’. Wellick does win on other points: When his pregnant wife asks for a bondage session, he’s reluctant to proceed, trying to be gentle.

Anonymous

A major factor– or malefactor– in the series is Mr Robot, a sociopathic anarchist played by Christian Slater looking exceedingly bored throughout. ‘Mr Robot’ is the name of a tech support company, passed on to Slater.

He’s formed ‘fsociety’, a squad of hackers patterned after the group Anonymous. Instead of Guy Fawkes masks, fsociety uses the likeness of that Parker Brothers’ mustached tycoon, Rich Uncle Pennybags aka Mr Monopoly.

Uncle Pennybags © Parker Bros.
In reality, fsociety is disappointingly unlike Anonymous. The latter is focused on justice and exposing inequity and corruption, not anarchy for its own sake. Anonymous gives an impression it values human life, unlike the show's producers who suck hours out of your life never to be returned.

Unsubtle

Those of us in the US tend to confuse and conflate capitalism with a free market economy; Mr Robot drops any distinction at all. Fsociety is dedicated to gutting Evil Corp (which deserves it) within a larger goal of bringing down the economy.
  • E: Evil Corp– that’s its unimaginative nickname– is the company that Elliot, Angela, and Tyrell work for. Obviously, subtlety isn’t held in high regard among the writers. The company’s E logo simultaneously hints at an actual secretive government provider and evokes ‘E for everyone’ entertainment ratings.

  • F: Two guesses what the F in fsociety stands for, subtle like a sledgehammer.

I tried to imagine the original cocaine-fueled pitch for the series. I think it went something like this:
“Like okay, man… (sniffff) There’s this guy, hacker dude, we’ll dress him in a hoodie so everyone thinks Robin Hood, see. (sniffff) And there’s this evil corp, we’ll call it Evil Corp so the audience can’t miss it. (sniffff) Listen, I confuse free markets and capitalism, but let’s say we burn down the economy… What do you mean, how would I cash my paycheck? What does that have to do with anything? Oh, irony, I get it. That’s good, that’s good. We’ll include irony.”

Verisimilitude

The series makes a stab at hi-tech realism, not particularly savvy, better than some shows, not as good as others. Writers drop a few Unix buzzwords (Gnome, KDE, TOR) and gloss over how their network was penetrated.

Elliot identifies a supposedly infected file that fsociety wants him not to open: fsociety00.dat. Amusingly, the IP address associated with the bogus file is 218.108.149.373, an impossible address like movies using 555-1234 as a phone number. (Geekology trivia: An IP address resolves to four bytes in binary, so each number of the group must be less than 256.) Mr Robot offers no specifics how Elliot tracked down the file in error, but the date and a bogus IP address should have clued in even a noob, never mind our ersatz hero.

Elliot passes the file on to a colleague, saying he’s done the hard work and ‘all’ that’s left is the encryption, as if that’s nothing. *bzzz* Wrong answer.

The program promulgates the notion that if someone has a root kit or hacker tools, they’re somehow an ultra-savvy user instead of being like any other mechanic with the right toolbox. The real guys with the smarts are the black hats who write the hacker tools and the white hats who find ways to combat them.

The show also advances the prejudice that ‘old people’ (presumably over 25) can’t deal with technology. A little reflection would have shown that the very systems Elliot and his hacker friends are using were designed by the old guys who themselves built on the shoulders of greater giants. (Articles on Anonymous have shown that the inner core of the organization isn’t strictly young guys as popularly imagined, but largely socially conscious programmers from the late 1960s and early 1970s who range upwards in age into their 50s and 60s.)

Elliot sneers at the CEO of E-Corp for carrying a Blackberry, ignoring the fact that an executive can run a company or tinker with technology, but probably not both, not at the same time. The US State Department deliberately uses Blackberries because they’re less susceptible to hacking… but that sort of realism would cut the series short.

Later, Elliot denigrates a hospital IT manager, William Highsmith, but even as he’s disparaging the IT guy, Elliot uses his supposed superior hacking skills to type the word NEGATIVE into his drug screen. Nothing screams phony like spelling out a presumed binary value instead of clicking the bit setting like true experts and their grandmothers would have done.

In the third episode, Elliot gives a stoned soliloquy on debugging. He’s correct in that finding a bug is usually the hardest part of the problem, but then he awkwardly extends an analogy of bugs into the real world of people and society.

Commodore 64
Halt and Catch Fire

Based on a single episode, a competing series Halt and Catch Fire has a much better and more realistic grip on technology and story-telling. Their team planned how to fake an AT&T computer by kludging together parts from a Commodore 64. Unlike the vague buzzword-dropping, watch-the-other-hand unexplained ‘magic’ in Mr Robot, the HCF scheme could actually work.

From both a writing standpoint and a hi-tech background, Mr Robot disappoints. I expect more… more characterization, more plot, more realistic tech. And less morphine, please, much less. I’m a minority, but my tech-savvy friend and colleague Thrush, who still keeps his hand in the land of Unix, also expressed dismay, finding the show dark and dismal with a poor handle on technology.

Mr Robot is like a 1960’s drug culture anti-establishment film, entirely unentertaining. But that’s my take. What is yours?

08 July 2015

Scattered Castles


There's been a lot of smoke and mirrors lately about the Chinese hacking into computer networks all over the place, and of course it isn't just the Chinese. Cyberattacks have become a lot more common. Anybody remember STUXNET, the virus that targeted the Iranian nuke R&D? Nobody's copped to it, but we can imagine it was probably a joint effort by the U.S. and the Israelis.
My own website was hacked by some Russian trolls. I don't know what the object was. Bank fraud, or Meet Hot Slavs?  It wouldn't be to use any of the actual information from my site, but to compromise the server pathways. FatCow, the server, hosts a buttload of websites, and once in the back door, you could cherry-pick all the caramels, and leave the liquid centers behind.

The point of the Chinese hacks is that they're not amateur or random, by and large, but directed by the Ministry of Defense, against specific hard targets. The big one, most recently (or at least most recently discovered), is the security breach of the Office of Personnel Management. I know this doesn't sound all that glamorous or hot-ticket - OPM is basically the U.S. government's Human Resources department, the central clearinghouse - but in fact it's a big deal. Best guess to date is that 18 million files have been penetrated, and that's a lowball figure. 

Here's what makes it important. OPM is responsible for security clearances, access to classified material. Back in the day, this was the FBI's job, but it's presently estimated that 5 million people, including both government employees and contractors, hold clearances, and the FBI's current staffing is 35,000. You do the math. The numbers are overwhelming. OPM, in turn, farms this out to FIS, the Federal Investigative Services, and the private sector.

But wait, there's more. The intelligence agencies, CIA, NSA, the National Reconnaissance Office (the spy satellite guys), have their own firewalled system, know as Scattered Castles. For whatever reason, budgetary constraints, too much backlog, or pressure from the Director of National Intelligence, the spook shops were instructed to merge their data with OPM's. So was the Defense Department. A certain amount of foot-dragging ensued, not just territory, either, but concerns about OPM's safeguards. In the end, they caved. Not to oversimplify, because the databases are in theory separate, but it created an information chain.

Suppose, and it's a big suppose, that Scattered Castles is accessible through the OPM gatekeeper. Nobody in the intelligence community, or OPM, or the FBI (which is the lead investigator of the OPM break), will go on the record one way or the other. Understandably, because they'd be giving whoever hacked OPM a further opportunity to exploit, if they haven't already. This is a case of locking the barn door after the horse is gone. The worst-case scenario is that active-duty covert agents could be exposed. And bear in mind, that when you're investigated for a security clearance, you give up a lot of sensitive personal data - divorce, bankruptcy, past drug use, your sexual preference - the list goes on. Which opens you up to blackmail, or pressure on your family. This is an enormous can of worms, the consequences yet to be addressed.

OPM uses a Web-based platform called eQip to submit background information. You might in all seriousness ask whether it's any more secure than Facebook. The issue here, long-run, isn't simply the hack, but the collective reactive posture. These guys are playing defense, not offense. The way to address this is to uncover your weaknesses before the other guy does, and identify the threat, not wait for it to happen. Take the fight to them. Otherwise we're sitting ducks.  

It's amazing to me that these people left us open to this, quite honestly. They don't go to the movies, their kids don't play video games, they're totally out to lunch? It ain't science fiction. It's the real world. Cyber warfare is in the here and now.

Heads are gonna roll, no question. OPM's director is for the high jump, and her senior management is probably going to walk the plank, too. This doesn't fix it. What needs fixing is the mindset. We're looking at inertia, plain and simple, a body at rest. We need to own some momentum. 


http://www.DavidEdgerleyGates.com/



08 March 2015

The Kaspersky Code


Three weeks ago, Kaspersky Lab, the Russian security software maker exposed a cyber-espionage operation that many believe originated within the NSA. The devilishly clever bit of code hides in the firmware of disc drives and has the ability to continuously infect a machine. If you use a Windows computer, there’s a good chance it’s not only infected but was built that way likely without the manufacturers' knowledge.
Kaspersky researcher Costin Raiu says the NSA couldn’t have done it without the source code.

What?!!

The contention that the NSA definitely had access to the source code is not only patent nonsense, it ignores that fact that Kaspersky themselves supposedly didn’t have the code. Having the source code is the easy way, perhaps the preferred way, but it’s hardly the only way.

A Reuters article speculates how the NSA might have obtained the source code and indeed, one of those is a likely scenario. But it’s also feasible to do the job without the source and I’ll show you what I mean, a technique I used to unravel computer fraud programs. Fasten your seat belt because this is going to get technical.

World’s Greatest Puzzle

Those around in my Criminal Brief days know that I love puzzles. For me, the ultimate puzzle has been systems software programming, making the machine do what I want. But sometimes I’ve come up against puzzles, some benign, some not, where I didn’t have the source code.

Let’s try an example. What if we found mysterious code in our computer that looked something like this:

confused pseudo code snippet
Mysterious Snippet of Computer Code

If you can’t make sense out of this, you’re not alone. 98% of computer programmers wouldn’t know what to make of it either. But if you look closely, the data populating the upper block looks different from that in the lower block. This is a clue.

Unlike commercial and scientific programs, systems software deals with the operation of the computer itself– utilities, communications, and especially the operating system. The realm of a computer’s internals are abstract, far more so than the Tron movies. Key aspects seldom relate to real-world equivalents. Sure, we say that RAM is a little like notes spread out on your work table and that disc storage is kinda sorta like a file cabinet… but not really. Even the term RAM– random access memory– is misleading; there’s nothing random about it.

Back in the real world, let’s say you want to write a simple program that adds the number of apples and oranges. In most programming languages, this code would look like this:
total = apples + oranges
Internally, a program loads apples and oranges into registers (kind of like keying them into a calculator), adds them, and stores them in a variable called total. If we were to write this in the argot of the computer, we’d use assembly language mnemonics, an abstraction of the computer’s machine language. Deep, deep down in a program, we’d see nothing but numbers where we count…
0, 1, 2, 3, 5, 6, 7, 8, 9, A, B, C, D, E, F
Yes, A-F are digits in this context. Within the computer, our little program above might resemble…

simple pseudo-code program: total=apples+oranges
total = apples + oranges

What isn’t obvious to many programmers is that computer instructions are data. Indeed, some black-hat crackers (the bad guys) have used this property to sneak malware onto unsuspecting computers.

If you look again at the original sneak peek of data, you’ll start to see patterns and may even pick out the machine instructions from our code example above.

clarified pseudo code snippet
Less Mysterious Code Snippet

This puzzle solving is called reverse engineering. It’s possible to write a program called a disassembler (I have) or a de-compiler (I haven’t) to decode the machine language into something more intelligible. The program has to be smart enough to not only separate actual data from instructions, but distinguish the type of data.

As you see, compiling source into binary executable code isn’t a one-way street. With dedication and know-how, reversing the process is well within reach.

How safe do you feel now?

05 February 2014

Call of the Wicked





by Robert Lopresti

I have a friend who has a mother, a wonderful lady we will call Kate.  She is a smart woman who, at a time when many people were retired,  was still doing biomedical research.  That  kind of smart.

But time has passed and she is retired now, and living in a senoir home, what is known as an independent living center.  And one day not too long ago she got a phone call from someone who said he was calling from Windows.  He explained that they had found that her computer was about to crash but he could fix it if she gave him control.

Well, you know what happened next.  She had to call someone from the office to yank the plug out of the wall to turn the computer off, and then she had to buy a new computer.  (According to the guy who looked at her machine, if you suffer this type of hack, the trick is to get someone to fix it before you log on again.  After that, its too late.)

I won't go through the misery that followed: closing bank accounts, changing passwords, destroying credit cards.  Because that is all minor inconvenience, as tedious and infuriating as it is.

The real damage was done inside Kate's head.  Falling for that trick damaged her self-confidence and self-image, because she knew she would not have done so a few years before.  And that is the true, soul-destroying evil accomplished by these morally-bankrupt thugs who deliberately aim their scams at seniors.

For some reason, this makes me think of Dick Francis.  One of the things I like best about his work is that his characters never lost their shock over bad guys doing bad things.  While the heroes of Chandler get cynical and  see the glass as not only mostly empty but slightly moldy, Francis's men stay outraged and furious.  That doesn't belong to you.  Put it back!

From time to time scholars have pondered why so many people are fascinated by crime fiction.  Part of the answer, I think, is that we all deal with villains and the mysteries give us a pain-free way to reflect on them.  And, in fiction, at least, we can sometimes defeat them.

Until next time, watch out for the bad guys.

18 August 2013

The Truth shall set thee free


by Leigh Lundin

For at least the past half century, clerks and bureaucrats offer consumers the excuse “It’s not our fault, the computer made a mistake.” As a computer specialist, I know that behind a mistake is another human and the proffered excuse is an attempt to mitigate or evade responsibility. It’s not that computers are infallible, but they do what people tell them to do.
Reflection
In a couple of small towns where I grew up, town gossips considered their mission to find out about everyone else’s business while hiding the skeletons in their own closets. One of the women complained her husband wouldn’t share the tidbits he picked up at the local grain elevator. He became my hero.

Some victims must have felt vindication when one of the worst dashed back and forth, spying upon her own daughter making out in her boyfriend’s car in front of her house, then running to the back bathroom, climbing up on the tub and peering out the rear window spying on another couple having at it. In her gusto, she slipped on the tub, fell and broke her arm. Her screams and the subsequent ambulance brought all pleasurable activities to a halt. The lessons I took away was that– private as I am– tight lips and an open bearing is a wise policy.

Thus, when it comes to government, I lean towards the-truth-and-damn-the-consequences policy, not in every instance, but the vast majority of the time. And this is what I’ve learned from the Snowden and Manning affairs: Our nation, our government survives pretty damn well when the truth comes out. Might these examples suggest the less secrecy the better? Or at least shouldn’t we open our eyes and engage in a discussion what secrets are wise and what aren’t?

Friday morning I was listening to CNN pontificate about the Edward Snowden affair. Their hostess pointed out that people either believe he’s a hero or a traitor. I’m not sure this reflects political leanings but the guest on the left took the position Snowden’s a betrayer whilst the guy on the right claimed Snowden’s a patriot. I never did hear anything of importance from the guest in the middle, but my mind may have tuned out following an amazing, jaw-dropping, mind-numbing statement: The NSA apologist (the guy on the left of the screen) said something to the effect we can’t so much blame NSA’s crimes on people, because these crimes are committed by computers.



Wh– what?

Going back to my opening paragraph, computers do what people tell them to do. In centuries past, defendants might have tried “Your Honour, t'were me fourteen vicious dogs wot ripped apart me wife’s paramour all on their own selves,” or “It were an accident pure and simple, Judge. Me horse reared up and clopped the landlord on ’is head.”

But blaming computers, it’s like saying:
  • “I didn’t cut them joists too short, my saw did.”
  • “Officer, I didn’t run the red light, my car did.”
  • “Judge, I didn’t shoot the guy, my Glock did.”
Fortunately, we crime writers seldom bring up the computer-ate-my-homework excuse, else without humans, we’d have little to write about. Imagine the detective’s dénouement: “Based on the prints, I determined the digits are digital and the bite marks are bytes. Yes, the culprit is the CDC-6600.”

23 June 2013

The Digital Detective, Wall Street part 2


continued from last week
The Best of Times…

Systems programmers held a unique niche in the multiple mainframe corporate structure. We didn’t practice ordinary commercial programming but were responsible for keeping the software side running– the operating systems, telecommunications, and utilities. The best of us knew assembly language– the cryptic machine instructions that underpin more or less human-readable languages like C, Cobol, Fortran, and Java. We dealt in bits and bytes, binary and buzzwords, not credits, debits, and balance sheets.
77 Water roof

77 Water plane
Plane atop 77 Water St

Walston was flush. Shortly after I joined, they moved into their fancy new skyscraper at 77 Water Street, a few steps south of Wall. It featured an artificial stream, a padded soda dispenser shaped like a floppy-eared dog, elevators illuminated like the night sky, and a full-size sculpture of a biplane on the roof. You can see it in the opening fly-over sequence of the disappointing movie The Forgotten; there you can spot the airplane still atop 77 Water.

Walston’s cast of characters included my boss Alex, his boss and vice president Paul, and an assistant vice president, Jim. Brokerage firms contain nearly as many vice presidents as they do brokers. The wrinkle in the relationship was Jim had originally hired Paul who passed him on the corporate ladder. Nearing his 25th year with the firm, Jim became marginalized, holding down a desk but no responsibility. Upon retirement, he planned to buy a Land Rover, move to South Africa, cultivate a mustache, and live a life of alternating adventure and leisure. As the weeks ticked away, that’s all he talked about.

Lower Manhatan Financial District
Wall Street and Financial District
Walston’s third floor contained two sections: the computer room and offices occupied by Arthur Anderson overseen by a Walston executive with the musical name Glenn Miller. As systems programmer, I was the rare programmer allowed in the computer room. That drew the attention of Arthur Anderson.

It wasn’t unusual for large corporations to provide offices for their accounting firm, but it wasn’t kosher for one’s auditors to use provided offices to perform work for other companies. The rules for AA were different. As one of the accounting wonks said, saving office space didn't hurt anyone. It may have been true, but violating rules exemplified the looseness of managerial oversight.

Toad in the Hole

Walston brought in two consultants, guys who would tell a company the same common sense advice at five times the price of listening to their employees. That’s one reason I later became a consultant– companies pay to listen to you.

As far as I was concerned, this was more background noise, but one day my boss Alex called me into his office. There sat the consultants and two Arthur Anderson guys amid palpable tension. They wanted me to perform a task: write a program to scan files and ‘correct’ fields, i.e, numbers within the file.

I pointed out I didn’t do that kind of commercial programming and this was far more suitable a task for one of the Cobol programmers. No matter, they assured me, they wanted me. I should be flattered.

Who’s the analyst who designed this? I asked, not feeling the least flattered. I’ll talk with him. No, said the consultant, only you. The Anderson guys nodded while my boss frowned.

Reasonably, I protested that the Cobol programmers possessed the pension suite’s data structure templates. Without them, I had no idea what the data was. It would be like blindly machining a part while they withheld the blueprints, which could damage the data.

The Arthur Anderson guys exchanged glances. My boss started to fidget. The background noise sounded like a clanging alarm. Practiced deceivers they weren't. Something felt wonky but I didn’t know what. They didn’t quite say I had no need to know, only I needn’t be concerned.

Where did a shift of responsibility end and liability begin? Were they buying blind loyalty or blindness? A light bulb went on. I raised my last objection. What about the lack of an audit trail, I asked. Assembler language would bypass all the record and financial controls.

Of course they knew that. They went into a huddle. Moments later, my boss said coldly, “We’re done here. You’re dismissed.”

I slogged back to my desk feeling dark and dysphoric. With good reason: shortly the VP called me in. He informed me the firm would cut my salary and no longer pay my tuition. Alan, the office political toady, would replace me.

Fire and Ice

Suddenly I didn't feel so brilliant. A thunderstorm had squalled up out of the blue. A kid like me didn’t make or have a lot of money and I desperately needed my classes. It didn’t dawn on me to ask why they didn’t dismiss me. Maybe they feared what they thought I knew or wanted to keep tabs on me, but my ego suggested they kept me because Alan the toady was incompetent and incapable of doing my job. He didn’t know machine language but he knew Cobol… and probably knew where to find the questionable data templates. Meanwhile, they were slamming me for questioning orders.

My boss and his boss cold-shouldered me. They almost fired me when the payroll department screwed up and continued paying my tuition, but as was pointed out, that was their error, not mine. We were at loggerheads, but they needed me as much as I needed the job.

The VP’s secretaries treated me with surprising sympathy and kindness. I don’t know how much they knew, but one took me out to lunch and the other gave me a small gift. In the cold light of Walston, they radiated warmth.

In the outside world, Ross Perot had been tacking his way through Wall Street, taking over data processing services, a forerunner of out-sourcing. When the F.I. DuPont scandal hit, Perot stepped in and bought the firm.

I received a cagey call from EDS, the company Perot founded, asking if I’d come to work for them. EDS had a rigid stiff-necked (most said 'tight ass') reputation with a dated, regimented dress code– white shirts, narrow dark ties, grey suits, pants with cuffs, shoes with laces. They subjected potential employees and their spouses to a battery of interviews. Creative thinking was not encouraged. EDS employees liked the money but not one I knew liked the company. I politely declined.

We picked up a programmer from DuPont. Perot had arrived in NYC and put his DuPont troops through sort of a surprise dress parade. As he marched down the line of employees, he came across a girl who wore the fashion of the day– a miniskirt– and fired her on the spot. At Walston, we didn’t mind miniskirts and hired her.

Word on the Street

One day, employees awoke to a lead article by the Wall Street Journal announcing Ross Perot would take over the computing facility of Walston. Vice President Paul turned shockingly white– he hadn't heard even a whisper– but brokerage houses mint vice presidents like they print stock certificates. The company denied the story and things sort of returned to normal.

Except an odd and unsettling thing happened. One month from his 25th year and retirement, Jim, the marginalized AVP found himself called into the VP’s office. Paul, the vice president, fired him. Full retirement gone, no Land Rover, no African adventure, no life of well-earned leisure.

Another discreet call came in for me. The woman on the other end asked me to identify myself, asked if I could talk privately, then said, “Please hold for Mr. Perot.”

Despite what I've heard before and since, Ross was polite, even gracious, and I was flattered he asked me to work for him. But, as I pointed out, I attended university full-time, I wasn’t as regimented as his usual workers, I enjoyed a bachelor life, and– thinking of Perot’s cozy relationship with Richard Nixon– our politics didn’t mesh. He’d famously said he didn’t like gunslingers and lone wolves– and I was the epitome.

He said, “Son, thank you for being honest,” and wished me well. I wondered why he wanted me.

Take Two

Once again, employees learned the news not from their own company but from the WSJ: For the second time within weeks, employees woke to a Journal article confirming Perot would be taking over Walston’s computing center. Again, our shocked vice president had been left out of the loop.

When Perot dropped in to inspect the troops, he spotted the same girl in her minidress we’d hired from F.I. DuPont and again fired her on the spot. Can’t say Perot wasn't consistent.

Days later, Walston fired Vice President Paul two weeks from his 25th year– and full retirement. The firm dismissed the consultants and Arthur Anderson's office underwent a shake-up. Programmers found themselves not only locked out of the computer room, but locked out of the computers.

Except for me. A good systems programmer could run the shop without operators, without analysts, without programmers. Perot didn't trust Walston's people, which explained the recruitment calls to me.

A panicked EDS crew asked where certain files could be found. They asked if I could find backups of older versions. They asked if I knew anything about original programs and data alterations. Unsurprisingly, those hotly desired files were the same my bosses asked me to ‘correct.’ The unasked question finally arose: were they corrections or were they coverups?

I dug into the files only to learn what Arthur Anderson already knew. It appeared Walston’s proprietors had embezzled the company’s retirement fund. Now it made sense why they fired the AVP days from his 25th year. That’s why they fired the VP days from his 25th year. The money was gone, reflected in the records my bosses and Arthur Anderson (or certain employees within Anderson) desperately wanted 'corrected'. The scheme was so compartmentalized, I doubted how much any one party in my department knew, remembering my boss, Alex, claimed the instructions came from on high. "Just follow orders," he said.

I'd been lucky: What might have happened to the joker who tampered with the data? Alan had been lucky: Unable to find his assets with both hands, he'd botched the changes although he left an audit trail.

Trinity Church from Wall Street
Trinity Church framed
by Wall Street

How The Mighty Had Fallen

Perot took over Walston, folding it in with DuPont and again saving Wall Street considerable embarrassment. Two and a half years later, he lost his financial shirt and dismantled a hemorrhaging DuPont Walston. Perot arranged for Congress to give him a special late night $15-million tax break, causing an outcry of socialism for the wealthy when the bill became public knowledge.

Dark forces on Wall Street gleefully watched Perot depart, some accusing him of trickery, some suing him on the way. Whatever the truth of that matter, Walston had been rotting internally before Perot arrived.

Arthur Anderson survived with their reputation barely sullied. Indeed, Anderson and Walston’s Glenn Miller caught more flack for the Four Seasons Nursing Centers scandal than the internal decay within their own firms. It would take the Enron affair to bring down Arthur Anderson.

My services remained in demand and I moved on, still on Wall Street, starting my masters degree before joining forces with two of the earliest software entrepreneurs.

Imagination Noir

In imaginative moments, it’s easy to envision the kernel of a mystery intrigue plot. I picture a John Grisham novel, a storyteller's movie in my mind like The Firm. Had Walston’s board reacted viciously and violently, I might have found myself in a dire plot, on the run for my life with a miniskirted damsel as VPs, AVPs, and Anderson drones dropped dead around me. Excited movie audiences would gasp between mouthfuls of popcorn, women would cry, and children would whisper, “He’s so bwave.”

Maybe a dastardly plot isn't so far-fetched considering the mysterious suicide (or assassination?) of Enron executive Clifford Baxter, about to testify before Congress. But in the world of finance, what’s crooked isn’t always an actionable crime. Commit a fraud of sufficient size and business will hush it up rather than prosecute– not unless something can be gained in the guise of ‘investor confidence’.

Footnote

The case ended with a gentler tone: I commuted to Wall Street on the Staten Island Ferry. One surprisingly sunny afternoon, I spotted Paul, the ex-vice president. He said hello and sat down across from me. Once again open and pleasant, he appeared the man I’d once liked– and could come to like again.

We didn’t talk about Walston. He explained he moved with his aging mother to Keene Valley in upstate New York. Turning his back on Wall Street, this former executive now worked as a carpenter. He spoke of small town pleasures where old men sat in front of the local hardware store whittling and discoursing upon merits of lawnmowers. For the first time in decades, he felt relaxed and at peace.

That pleased me. Paul wasn’t a bad man, merely a figure caught up in the machinating machinery of Wall Street. He offered his hand and we shook warmly.

Looking back, I think his chat was sort of penance, kind of an apology without the words. That was decent, more than many people would have done. And it was enough.

Besides, I’d eventually consult for banks, institutions where further fruits of fraud lay concealed beneath a public veneer.

16 June 2013

The Digital Detective, Wall Street part 1


High Finance and Low Crimes
I learned a couple of curious things when I worked at IBM’s Wall Street Data Center. One was that my friend, Curtis Gadsen liked mayo sandwiches and fleecy-legged girls. The other was my friend Ray Parchen could be fooled because he was too good at his job as a mainframe computer operator.

IBM 360 mainframe
IBM 360 computer room
Like an old-time stoker fed the fires of furnaces and steam engines, an IBM operator stuffed the huge machines with programs and data. Very good operators could act and react instantly without thought, confident in their experience and skills, mounting discs and responding to messages as they'd done ten thousand times before, giving them no more thought than donning their underwear in the morning. The keyword was efficiency.

Unintimidated by hulking computers the public suspected were semi-sentient, Ray worked quickly and accurately, and for that reason, he held down the first shift position. For him, I wrote a silly little psychological program that worked only with the best.

Amidst weighty programs queued for the giants of Wall Street, I slipped in the prank while a dozen employees gathered outside the computer room’s glass wall, waiting for the small program to do its thing: It made discs chatter, tapes whirr, lights blink, and the data center rumble as if Colossus was taking over the world.

We watched Ray bend over the console, reading the first mundane message:
05483A Press ENTER.
Ray pressed the ENTER key. The machine responded with another message:
05483A Press ENTER hard.
A few of us watched from outside the computer room as Ray hit ENTER again. The machine came back with:
05483A Press ENTER harder.
Ray punched the ENTER key, and a couple of the girls giggled. The computer responded with:
05483A Press ENTER even harder.
Ray smacked the key hard, very hard. The machine responded with one last message;
05483I Did it occur to you I can’t tell how hard you press ENTER?
Ray looked up with a red-faced grin and spotted us chuckling. Afterwards, he joined us for a drink where we argued why the program fooled some and not others.

Of course he knew pressure couldn't be detected, but he hadn't engaged his knowledge hidden behind the wall of his expertise. I would discover this common quirk could be exploited, as Simon Templar might say, “by the ungodly.” As noted in the article about kiting, confidence men take advantage of confidence.

Over the next few days, we tried our little joke on other operators and observed this interesting fact: Only the best fell for the stupid little prank. Novice operators stopped, studied the messages, and tried to look them up.

Ray and the other top operators reacted immediately and without thinking. Self-assured of their abilities, they acted instinctively by rote.

Less experienced operators questioned everything, including themselves. We caught more than one systems engineer trying to look up the bogus message number in the reference manuals and they sometimes called for help. That spoiled the little program.

Lesson: Sometimes it’s easiest to fool the most experienced.

There’s a reason I tell this story. It leads to how I became sort of a detective, a digital Dashiel of a Continental Op.

Over the next few weeks, I'll talk about an accidental career as a investigator in a field yet to be invented, that of computer forensics. I reveled in the chase, but my career often hung in the balance under threat of firing, even blackballing. Often the only reward was termination but hey, that happens to all the best private eyes.

Background Noise

An early case exploded with little of my own involvement, or, perhaps because of my lack of involvement. The players: Walston & Co, the nations third largest brokerage house, and Arthur Anderson, the biggest of the Big Eight accounting firms until participation in the Enron scandal brought about its demise. Anderson had dirtied its manicured fingers long before Enron arrived on the scene.
Lower Manhatan Financial District
Wall Street and Financial District

Search the internet for Walston & Co and its Wikipedia entry merely reads "(Walston) was acquired by Ross Perot following pension account fraud and then merged it with Dupont, which had found itself in financial difficulties." Here's the story behind the story.

Despite the Wikipedia gloss-over, the wheels of merger with F.I. DuPont began turning before revelation of Walston’s fraud. Fifteen million in securities had vanished from DuPont’s accounts. The White House grew nervous. Wall Street threw up its collective hands, Oh woe, what to do, what to do?

A Texan rode into town, Ross Perot. He’d bulldozed through the insurance industry (an intriguing inside tale of its own) and encouraged by Felix G. Rohatyn, he made his move on Wall Street. For an initial $30 million, the impossibly old, impossibly young forty-year-old Napoleonic Perot acquired control of one of the Street’s most prestigious houses. (N.B: Regrettably, Time Magazine articles referenced herein require a subscription.)

At the time, that seemed background noise for me, a full-time employee and a full-time student, living paycheck to paycheck and barely sleeping. I couldn't guess how it would alter my career.

Trinity Church from Wall Street
Trinity Church framed
by Wall Street

Crime on the Street

In the Financial District, denizens simply call Wall Street 'the Street'. Philosophical sorts read a moral into its long, narrow confines, noting it begins at a church and ends at a river: When times get tough, in depression or desperation, one may choose salvation or suicide.

The Street fosters its own culture. On the one hand, a man’s word is his bond– multimillion dollar transactions hinge on verbal promises. On the other hand, huge regulatory holes allow brokerage houses to commit the sleight-of-hand that brought the economy to its knees ten years ago. We can’t say we weren’t forewarned, but in the heady days of deregulation, greed and giddiness carried the day. We never seem to learn industries cannot police themselves.

One of the first observations of the Street is that the market's moody– it reacts, even overreacts to political news of the day. But I stumbled upon other emotions, which included surprisingly little hanky-panky. A few notes from the era:
Francine Gottfried
Miss Francine Gottfried

  • Wall Street can be a mad marketplace when the economy's in a lull. Late one summer, a sweet keypuncher named Francine Gottfried caused a sensation with the mostly male lunch crowd as her 43-23-37 figure bounced down the steps of Chemical Bank & Trust. For a few days, a sort of silly mating season reigned and then, as so often happens, her 15(0) minutes of fame were up.

  • Once, as I strolled with my boss down the street, we encountered a beggerman squatting on his flattened cardboard. My boss stopped and chatted with this derelict before moving on. I didn't say anything but he confessed: The homeless man once worked as a broker, what Wall Street called an account executive or AE. When my boss and the man’s wife carried on an affair (and subsequently married), this man– the husband– collapsed in despair. He now lived– literally– on the Street.

  • During the 'Hard Hat Riots' (then called the Wall Street Riots), I picked my way through roving construction workers from the rising World Trade Center left by police to run wild, bashing kids protesting the war in Vietnam. On my way to school as police idled, I helped a girl and her boyfriend bloodied by a musclebound thug. It was no contest: the canyon-like Street corralled the teens, leaving them easy pickings by hardhats with pipes and wrenches. That wasn’t one of Wall Street’s prouder moments. Hard-hats went on to attack the city's mayor's office, smashing the face of one of his aides.
The Young and Restless

A precocious if unaware teen, I worked as an IBM shift supervisor in their Wall Street Data Center, Number 11 Broadway. I had the greatest boss, a pretty blonde named Judy Kane. We boys loved her; the girls– not so much.

And I loved software, the machine-level bits and bytes and Boolean stuff. A teenage mad scientist, I found computers a giant puzzle, one I learned to solve and control. It was a battle of wills, me versus machine, immersive therapy for a broken heart (but that's another story). I'd come to know these Daedalus creatures like a mother knows her own children; better even, I'd learned their DNA.

A sales rep, Herb Whiteman, discovered I spent weekends camped in the computer room, teaching myself to program the huge monsters, then catnapping on the couch as the computers blinked and toiled, compiling my routines. Herb asked if I’d be interested in joining a three-man team that would change Wall Street and put video terminals on broker’s desks. Argus Research, the parent company, would double my IBM salary.

The company gave us secretaries and an entire floor of offices, no expense spared. Unfortunately Argus, in the business of prognostication, shortly deduced the economy teetered on the brink of recession and pulled the plug. Not long after Walston & Company hired me as their fancy-pants systems programmer offering tuition reimbursement as part of my hiring package. Me! I was just a kid from nowhere.

Thus began my introduction to low crimes and high finance.

Stay tuned for more next week, Wall Street's big boys and big crimes.

10 June 2013

Smith's Law


Jan Grapeby Jan Grape
 
Bet you've never heard of Smith's Law. Well, don't fret. I'm sure you've heard of Murphy's Law? Well, my late husband, Elmer Grape used to claim that Murphy was an optimist. That whatever did go wrong was going to get worse.

So I had my internet tech out last week & got my desktop back online and then sorta got the laptop going also.  Well, it was working; it just takes thirty minutes plus to load. Since computers were working I delayed buying a new laptop. And today is when Murphy's Law kicked in. Things got worse.

This afternoon while trying to get my article written and posted, I cannot get online with either computer. The desktop is totally hopeless. I managed to get online with laptop but after 40 minutes of the cursor spinning it just would NOT open the sleuthsayer website.  So I'm writing this on my phone. Thank goodness I bought a styles thingy last week. I can't  imagine trying to type this much with a fingertip.

And so things won't be a total crying towel, pitiful Patty, I'll give you an idea of what my original article was about.  I've had people say that my policewoman sounds exactly like me. Or that this character or that character is Aunt Whosit or Uncle What's his name. In reality none of that is so. The characters I make up are just that "made up."

If Zoe Barrow sounds like me...it's probably because you give her a Texas accent because I'm from Texas.  Like most writers say, there's a little bit of me in several of my characters. But Zoe is younger, thinner, prettier and braver than me. (I got that one from Sue Grafton about comparing Kinsey to her.)

However, I take bits and pieces of people I know or see to compose a character. I've gone to a mall to people watch. To note gestures, walks, body language.   You may take a trait of Aunt Whosit and marry it with Cousin Whom.  When you do that you do need to be careful they don't recognize themselves. A friend once said she made her mother-in-law into a yippy dog but the MIL never caught it.

Characters are fun to create. But don't just give a list.of hair and eye color. Give us something to their makeup as a person. Thats when characters come to life.

I think this is about all I can type this way . So until next time watch out for Murphy.

22 May 2013

Breaking the Code


If you asked my uncle Charlie what he did in the Second World War, you got some evasive boilerplate about working for Army Intelligence. He'd tell you that during the Bulge, say, his unit searched abandoned German command posts for compromising material, and sometimes it was touch and go, because the battle lines shifted back and forth, but he was generally close-mouthed about it, and made his service out to be pretty much routine duty. He did in fact have an old Third Army sleeve insignia, a pin with the white A on a blue field, circled in red, so there might have been some truth to that Battle of the Bulge story. If there was, it was a very small part of the truth, because he was actually in on one of the biggest secrets of the war.
It was called ENIGMA, and the product was code-named ULTRA.

Enigma machine
ENIGMA was an encipherment system, used by the German military and diplomatic services. Polish intelligence did the initial heavy lifting, reverse-engineering captured German equipment, and passed their results on to the Brits in 1939. British code-breakers set up shop at Bletchley Park, north of London, and began reading Luftwaffe and Army traffic.

To simplify enormously, the Enigma machine was a transposition cipher device with a typewriter keyboard. There were three rotors inside, each with twenty-six characters. When you struck a key, the first rotor advanced one position, until it reached twenty-six, and then the next rotor advanced, like an odometer. In other words, any given letter was substituted with another, but the possible combinations were twenty-six to the power of three. The rotor settings were predetermined, but they changed every day, in theory. One weakness Bletchley Park exploited was that the German operators didn't always change the settings daily. Another was that messages were sometime sent in plaintext, for redundancy, and you could compare the coded transmission to the uncoded one. If not for German security breaches, the coded traffic might well have proved unreadable.

Rotors
Then they hit a bottleneck. German naval security had always been more rigorous than that of the Luftwaffe and Wehrmacht, and the Kriegsmarine introduced a machine with four rotors. The number of possible character substitutions multiplied, and the traffic went dark.

In the North Atlantic, the convoys that were Britain's lifeline had no effective air cover or escorts, in 1940 and '41, and crossed two thousand nautical miles of unpatrolled open ocean.  Here the wolfpacks hunted. The loss of Allied tonnage was crippling. Bletchley Park needed to break the U-boat codes or the resupply would founder.


Alan Turing
The guy who probably deserves the most credit was an eccentric mathematics done from Cambridge named Alan Turing, who'd been recruited by the Government Code and Cypher School even before the war began. Turing designed an analytical machine, a numb-cruncher, in effect one of the earliest computers, a bombe, so-called.  With it, they "unbuttoned," Turing's word, the German naval ciphers, and shortened the Battle of the Atlantic. It's no exaggeration to suggest they shortened the war.


Model of the Bombe
At its peak, Bletchley Park was reading 4,000 messages a day. The decrypts tipped the balance in every campaign from North Africa to D-Day. (They were never shared with the Russians, however. Churchill's mistrust ran deep.) The people who worked there didn't talk about it, then or later. They maintained their habit of silence, and the whole story didn't break until thirty years afterwards. It was a better-kept secret than the Manhattan Project.

Alan Turing died in 1954. He was queer, and MI-5 hounded him, as a security risk. He underwent chemical castration, and was eventually driven to suicide, his contribution to the war effort unrecognized at the time of his death. Some thirty years later, Hugh Whitemore's play "Breaking the Code" opened in the West End, with the astonishing Derek Jacobi as Turing. Sodomy hasn't been criminally prosecuted in Great Britain since the repeal of the gross indecency acts in the late '60's. A legislative motion was introduced in Parliament to grant Turing a statutory pardon, just this past year.

I don't want to wade into the question of gay civil rights, although it seems to me obvious that without legal protection, homosexuals are still fair game. Turing was blackmailed by the law. His reputation doesn't deserve just rehabilitation. This has already happened. The computer library at King's College, Cambridge, for example, is now named after him, and he's widely accepted as a pioneer in Artificial Intelligence (the Turing test), and secure speech, the Delilah program. I'm saying that he deserves a posthumous knighthood, or an Order of Chivalry, at the least. This odd, cranky-pantsed fairy did as much to beat Hitler as any divisions in the field.

Churchill was later to say: "ULTRA won the war."



Editor's note: Software developer Terry Long has created a free Enigma Simulator. If you happen to use a Macintosh, download it and try it out.

Enigma

29 November 2012

True Treasures


by Deborah Elliott-Upton

By the time you are reading this, we will know if someone won the whopping 550 million dollar Power Ball lottery. If it is me, you can be sure I am doing the same thing you would be doing: trying to believe it happened while deciding what to spend that much money on.

Think about it. Pretty much after we paid all our bills, bought new vehicles and a mansion, took care of family members we'd like to help, there's still way too much money for any one person to spend.

At least that is what I think. I've not had that much in my bank account to really know.

My husband said I could buy my own library although he already believes I have too many books as it is. (As if that could be possible!)


We had a discussion recently about our sliding into a hoarder lifestyle. After being married for so many years, we have accumulated more than we need. Trying to part with most of it isn't easy. I do identify with those people on "Hoarders" who have true attachments to their "collections." I hope my stash isn't looked on by others with disdain as the ones participating on the television show, but one man's trash is another's treasure.

My husband sat at his computer in our shared office when I popped in and said, "We have got to get a handle on our clutter. We need to get rid of ten things a day in this house if only it's ten pieces of paper."

He spun around in his chair to face me and glancing around the room, said, "We can't live that long."

I sighed dramatically. "I didn't mean my papers!" 

Both of us knew that was a losing prospect. Writers seem to always have papers they feel they must keep.

I'm a hard-copy kind of writer. I think that comes from losing so many files on computers long ago. I realize the chances of losing them now are not as much a problem and to be honest, I know more about how a computer works these days so I'm not as apt to hit the delete button by mistake. I also have found a computer guru who tells me nothing is truly deleted on a computer. He found deleted-by-mistake photos my daughter and her husband took on their honeymoon– photos that couldn't be duplicated. Having the correct software, it seems, makes all the difference.

Which may be one more reason we must be careful if we're writing things on a computer we wish we hadn'tlike perhaps things Casey Anthony had on hers.  Mystery authors take note: crimes are often solved by what an expert can find on a computer that was supposedly "washed" of evidence a criminal thought he'd erased. One more case of dirty laundry telling all when its discovered.

My treasures are my papers...the ones containing my written work, of course, but also the ones of snipets of ideas for future story ideas or characters...the honest-to-God letters someone wrote to me (especially from those who have passed on from this world) and the photos that I can hold in my hand. Those are my true treasures.

My husband once told me he'd won the lottery when he convinced me to marry him. I guess I'll keep him, too.

That doesn't mean I'm not going to buy a lottery ticket though. The idea of that library he promised appeals to me.

31 July 2012

SoothSayers


"Prediction is very difficult, especially about the future."
    --   Niels Hendrick David Bohrs, Danish physicist
The (doctored) display from Doc's DeLorean
    Late last month, along with several million other folks, I encountered a post on Facebook proclaiming that June 27, 2012 was, in fact, the date in the then far away future that Doc programmed into the DeLorean in the 1985 movie Back to the Future.  I immediately texted this “fact” to my elder son, Devon, who is quite the Back to the Future fan.  His disgruntled reply was immediate:  “Where is my flying car?”

     As it turns out the Facebook post was a hoax – a photoshopped version of the DeLorean screen.  In fact the actual date that Doc flew off to in the movie was October 21, 2015.  But Devon’s larger disappointed point is still valid – unless we come up with flying cars in the next three years the movie’s view of the future turns out to be definitionally anachronistic. 

    Two weeks ago I wrote about Michael S. Hart, who had the prescience to foresee a world that would embrace e-literature long before the internet or the home computer existed.  Hart’s foresight is all the more remarkable when one considers how poorly most of us perform in the prediction department. 

    A prime example of failing this challenge is the Stanley Kubrick film 2001:  A Space Odyssey.  I remember seeing this movie  for the first time in 1968 and being completely blown away.  I think it was the only movie I saw that summer and I also think I saw it seven times.  Viewed today the movie is . . . well, . . . dated.  Twelve years after Y2K we are nowhere close to Kubrick’s vision of future space travel.  In fact, we were closer in July of 1969, one year after the film premiered, when we were actually walking on the moon. 


On board the 2001 space station -- HoJo's sign at right
      Not only was Kubrick’s vision of a space station woefully out of sync with what came to pass, he couldn’t even get the restaurants right.  Remember the Howard Johnson’s “Earthlight Room” that showed up in the space station?  As of 2005 there were reportedly only five Howard Johnson restaurants left anywhere in the world, and it is completely safe to observe that the chain never reached outer space, and to predict that it almost certainly never will!

    But to my mind just about the best examples of stumbling over the future are sprinkled throughout Robert Heinlein’s classic novel The Door into Summer.  I need to note at the outset that Heinlein’s book, even with its predictive flaws, is one of my all time favorites and I re-visit it regularly. The Door into Summer was originally serialized in three issues of The Magazine of Fantasy and Science Fiction in late 1956 and then published in hardcover in 1957.

    The novel opens in 1970 and then jumps to 2000, giving Heinlein the opportunity to prophesize about not just one, but two different future eras and us the opportunity to shake our heads as to how wrong he got it since we have now lived through both.  I read the novel for the first time in the 1960s, when I could still wonder at whether the author foresaw the 1970s and 2000s correctly.  I then re-read the book again in the 1970s, when I was able to see how the 1970s predictions didn’t work out, while still holding out hope for the 2000s.  Alas, I then re-read the novel most recently a few years ago.      From those perspectives it has been interesting to watch, over the course of a lifetime, how the novel’s view of the future vectored from reality as I caught up in time with each era portrayed  in the novel's timeline. 

    As I’ve said before, I don’t do “spoilers,” but there are still aspects of the novel that can be discussed without giving away too much.  For example, the protagonist, Dan, is an inventor of robots -- “Hired Girl” (yeah, I know, even the name alone wouldn’t work now) and “Flexible Frank” -- which, in both 1970 and 2000 perform virtually all household chores.  Never quite got there, did we?  Those inventions and many other projections concerning life in both 1970 and 2000 that did not in fact come to pass provide an interesting, if unintended, subplot to this otherwise fine little story.

     But my favorite Heinlein creation is Dan’s namesake invention:  “Drafting Dan,” a machine that can automatically create engineering draft drawings.  Drafting Dan creates these drawings using computer driven arms that draw on a drafting easel utilizing directions inputted from  (gasp) a keyboard.  The computer needed to power this invention has been shrunken to near room size by the use of super powerful new vacuum tubes.

The earliest mouse!
   So Heinlein’s prediction of the computerized future missed, among other things, the advent of computerized chips (and the attendant demise of the vacuum tube), the development of display monitors and printers, and the evolution of the mouse, which did not appear in prototype  until 1963 and which, even then, was abandoned only to be resurrected from the dead with the release of the Macintosh Lisa in 1984.

    Like most predictions that go wrong, the blame can hardly be laid solely at Heinlein's feet.  If anything has proven itself, it is the difficulty involved in figuring out what happens next. To envision the computer of the future Heinlein likely turned to those who in the 1940s and 1950s were at the forefront of the then-incipient computer industry – an industry that at the time involved figuring which of the spaghetti mess of multi-colored wires should be plugged in where..  Andrew Hamilton, a noted computer expert of the time, had the following to say in a 1949 article in Popular Mechanics hypothesizing on the future of computers:  “Where a [computer] calculator . . . [in 1949] is equipped with 18,000 vacuum tubes and weighs 30 tons, computers in the future may have only 1,000 vacuum tubes and perhaps weigh only 1½ tons.”  (“Hmmm,” we can almost hear Heinlein thinking.)  In 1957, the year that The Door into Summer was published in hard cover, the editor of business books for Prentiss-Hall had this to say:  “I have traveled the length and breadth of this country and talked with the best people, and I can assure you that data processing is a fad that won't last out the year.”  At least Heinlein saw past naysayers such as this, and boldly chose a future where computers thrived.   Other rejected paths include the prophecy of Ken Olsen, then chairman of DEC, who twenty years later, in 1977 “presciently” observed that “[t]here is no reason for any individual to have a computer in his home.”  And printers and copiers?  Here is IBM’s 1959 advice (to a team that later went on to found Xerox) concerning the future of the novel copying device the team was attempting to sell:  “The world potential market for copying machines is 5,000 at most.”

    Well enough of this picking on Heinlein.  In fact, we are surrounded by prophetic mistakes that rear their humorous heads in literature.  And they are not confined to technology.  I have read a number of Randy Wayne White’s Doc Ford books, all set in Florida, and many dealing with Cuba.  Five years ago, when the press was telling us that Castro lay dying and would not last the month, White apparently viewed that as gospel and took what looked to be a safe leap – he submitted a new installment in the series to his publisher in which Castro was already dead.  Oops.  White now has authored several additional books in the series over the last five years, each of which treks an alternate reality from ours, a world in which Castro has indeed already departed the mortal  realm. 

    And, as illustrated by the computer quotes above, prognostication errors are not relegated solely to written fiction.  They spring up all around us.  Here is one of my favorites:  During the Civil War it is reported that the last words of General John Sedgwick as he looked out over a parapet toward the enemy lines during the battle of Spotsylvania Court House were the following:  “They couldn't hit an elephant at this dist . . . .”