{"id":6013,"date":"2019-09-22T18:10:23","date_gmt":"2019-09-22T22:10:23","guid":{"rendered":"http:\/\/studentwork.prattsi.org\/foundations\/?p=6013"},"modified":"2019-09-22T18:15:05","modified_gmt":"2019-09-22T22:15:05","slug":"the-information-of-cryptography-in-people-places-and-things","status":"publish","type":"post","link":"https:\/\/studentwork.prattsi.org\/foundations\/2019\/09\/22\/the-information-of-cryptography-in-people-places-and-things\/","title":{"rendered":"The information of cryptography in people, places, and things"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Place: Spyscape Museum<\/strong><\/h3>\n\n\n\n<p>This summer, I visited the Spyscape Museum in Manhattan. It\u2019s at once a museum and an activity: while it has exhibits about counterintelligence operations, cryptography, and other \u201cspy\u201d-related topics from across history, it also comes with a significant interactive component, leading visitors through quizzes and games.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"639\" src=\"https:\/\/studentwork.prattsi.org\/foundations\/wp-content\/uploads\/sites\/5\/2019\/09\/27973409_1787805191526227_4492708177699627879_n.jpg\" alt=\"\" class=\"wp-image-6021\" srcset=\"https:\/\/studentwork.prattsi.org\/foundations\/wp-content\/uploads\/sites\/5\/2019\/09\/27973409_1787805191526227_4492708177699627879_n.jpg 960w, https:\/\/studentwork.prattsi.org\/foundations\/wp-content\/uploads\/sites\/5\/2019\/09\/27973409_1787805191526227_4492708177699627879_n-300x200.jpg 300w, https:\/\/studentwork.prattsi.org\/foundations\/wp-content\/uploads\/sites\/5\/2019\/09\/27973409_1787805191526227_4492708177699627879_n-768x511.jpg 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><figcaption><em>Photo: <a href=\"https:\/\/spyscape.com\">Spyscape<\/a><\/em><\/figcaption><\/figure><\/div>\n\n\n\n<p>The whole museum is centered around a challenge of sorts, geared towards discovering what sorts of skills you have that could be relevant to various professions related to spying, including field operators, handlers, researchers, and codebreakers, among other roles.<\/p>\n\n\n\n<p>Beyond being a fun way to spend a few hours away from the summer heat, the Spyscape Museum actually made me curious about many of the things I learned there, such as the Anonymous movement, cryptography\u2019s legacy in the digital age, and the role of covert operators across history.<\/p>\n\n\n\n<p>As a museum, Spyscape is an institute of information, cataloguing and preserving different histories of covert operations. Spyscape, like many museums, teaches by a method called interpretation.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cInterpretation relies heavily on sensory perception\u2014sight, hearing, smell, taste, touch, and the kinetic muscle sense\u2014to enable the museum-goer emotionally to experience objects.\u201d<\/p><cite>(Alexander, 2008)<\/cite><\/blockquote>\n\n\n\n<p>With visual and audio components to its exhibits, plus touch screens that allow visitors to play games and answer questions, Spyscape certainly makes use of the full sensory experience.<\/p>\n\n\n\n<p>The subjects of the museum, cryptography and covert operations, also deal heavily in information: protecting it, freeing it, and controlling who has access to it.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cNations go to great lengths to gain [information] by using the time-honored tools of espionage and codebreaking to gather information secretly. \u2026 Codebreaking evolved from the ancient art of pencil-and-paper puzzle solving to the science of cryptanalysis.\u201d<\/p><cite>(Gannon, 2001)<\/cite><\/blockquote>\n\n\n\n<p>This evolution in cryptography mirrors the journey of the information field, from the simplest of roots to the complex webs of information we have today in the digital age. It\u2019s this evolution that the Spyscape Museum catalogues, interprets, and shares for its visitors.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Person: Alan Turing<\/strong><\/h3>\n\n\n\n<p>One of the most important people in the history of cryptography, whose story was given great focus in one of Spyscape\u2019s exhibits, was Alan Turing. He\u2019s famous for leading the World War II-era British counterintelligence team that beat the German Enigma machine, which encrypted messages according to regularly-changing ciphers that were difficult to crack. But he had a hand in many other information-related operations during and after World War II, and his life itself is a study in how information can have an impact on a personal level.<\/p>\n\n\n\n<p>Turing\u2019s claim to fame was his work for British counterintelligence on the Enigma problem.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cThe science of numbers and symbols was in Turing&#8217;s genes \u2026 [He] ignored the intimidating numbers and put his trust in what he knew\u2014mathematical logic.\u201d<\/p><cite>(Gannon, 2001)<\/cite><\/blockquote>\n\n\n\n<p>Having an eccentric manner but an undeniably genius brain, he gained respect from his colleagues and managed to find a solution that reliably broke the codes created by Enigma machines.<\/p>\n\n\n\n<p>Even after the war, Turing continued to work in information-related fields, going on to lay \u201cthe foundations for computer technology and artificial intelligence\u201d (Spencer, 2009). His work, in large part, has been the starting point from which much of the digital age has sprung: computers, machine learning, and data analysis, in their modern iterations, have all been influenced by Turing\u2019s work.<\/p>\n\n\n\n<p>Of course, the sensitivity of Turing\u2019s projects during World War II meant that he wasn\u2019t publicly recognized for his contributions to ending the war; he had to keep his work a secret from even his family.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cTuring\u2019s oldest niece, Inagh Payne \u2026 recalls sitting on his knee asking him repeatedly what he did at the office. Turing remained quiet about his work for the war effort.\u201d<\/p><cite>(Spencer, 2009)<\/cite><\/blockquote>\n\n\n\n<p>And this wasn\u2019t the only part of his life he had to keep a secret: his homosexuality, for which he was eventually criminally prosecuted, was another large piece of information about him that could not see the light of day.<\/p>\n\n\n\n<p>It is this juxtaposition between his work and his life that strikes me most about Alan Turing. His life\u2019s work, the achievement for which he is most recognized, is that of freeing information, revealing secrets, and saving lives by being able to break codes and open lines of communication. But in his personal life, neither recognition for his incredible deeds in the service of his country, nor the simple liberty of being able to love freely, were granted to him. Exposing and withholding information are two sides of the same coin; perhaps no one knew that coin as well as Alan Turing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Thing: Cryptex<\/strong><\/h3>\n\n\n\n<p>While I was at the Spyscape Museum, I couldn\u2019t help but reflect back on one of the first books that ignited my interest in cryptography: <em>The Da Vinci Code<\/em>. Though I haven\u2019t read it in a long time, a few of the concepts from the book have really stuck with me. One of the things that has always intrigued me is an object called a cryptex.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cA portable container that could safeguard letters, maps, diagrams, anything at all. Once information was sealed inside the cryptex, only the individual with the proper password could access it.\u201d<\/p><cite>(Brown, 2003)<\/cite><\/blockquote>\n\n\n\n<p>This device struck me as a genius invention when I first encountered it \u2014 appropriately, it was credited to Leonardo Da Vinci in the story. For a while, I believed that was its origin, but actually, it was invented by Dan Brown, <em>The Da Vinci Code<\/em>\u2019s author.<\/p>\n\n\n\n<p>The cryptex itself is obviously linked with information: namely, it\u2019s designed to protect information from everyone but its intended recipient. But the real-life story of this fictional object also has a lot to do with the way we interact with information, especially when it can be used for profit.<\/p>\n\n\n\n<p>A year after the publication of <em>The Da Vinci Code <\/em>in 2003, a fan of the book named Justin Nevins created the first physical replica of the cryptex. Shortly thereafter, he trademarked it \u2014 which led to a dispute between Nevins and Columbia Pictures when <em>The Da Vinci Code<\/em> was adapted into a movie. Nevins wrote out his side of the story many years later on a forum website (Nevins, 2017).<\/p>\n\n\n\n<p>As Nevins tells it, Dan Brown didn\u2019t have a problem with him holding the trademark for the cryptex at first. But when <em>The Da Vinci Code<\/em>&#8216;s movie was in production, Columbia Pictures wanted to make their own replicas for the movie, and wanted Nevins to drop the trademark. Nevins and Columbia Pictures eventually settled out of court: the movie was allowed to use the word \u201ccryptex,\u201d but Nevins was allowed to keep his trademark. He still sells cryptices <a href=\"https:\/\/www.cryptex.org\/\">online<\/a>.<\/p>\n\n\n\n<p>This part of the story is, understandably, not as well known as the cryptex itself; but it brings this device from a fictional object to a technology of the real world. Copyrights and trademarks are a big part of regulating how information can be used and received in the world, which echoes the original purpose of the cryptex itself: keeping information from certain parties, and revealing it to others.<\/p>\n\n\n\n<p>The cryptex\u2019s journey from fiction to reality illustrates the importance of information: the creativity that can happen when it\u2019s shared with the world, and the monopolization that might ensue when it\u2019s kept safeguarded in just a few, powerful hands.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>References<\/strong><\/h3>\n\n\n\n<p>Alexander, E. P., &amp; Alexander, M. (2008). <em>Museums in Motion: An Introduction to the History and Functions of Museums<\/em>. Lanham, MD: Rowman et Littlefield Publishers, Inc.<\/p>\n\n\n\n<p>Brown, D. (2003). <em>The Da Vinci Code<\/em>. New York: Doubleday.<\/p>\n\n\n\n<p>Gannon, J. (2001). <em>Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth Century<\/em>. Washington, D.C.: Brasseys.<\/p>\n\n\n\n<p>Nevins, J. (2017). The history of the Cryptex. Retrieved from <a href=\"https:\/\/forum.thecodex.ca\/t\/the-history-of-the-cryptex-r\/70\">https:\/\/forum.thecodex.ca\/t\/the-history-of-the-cryptex-r\/70<\/a>.<\/p>\n\n\n\n<p>Spencer, C. (2009). Profile: Alan Turing. Retrieved from <a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/uk_news\/8250592.stm\">http:\/\/news.bbc.co.uk\/2\/hi\/uk_news\/8250592.stm<\/a>.<\/p>\n\n\n\n<p>Spyscape Museum. Retrieved from <a href=\"https:\/\/spyscape.com\/\">https:\/\/spyscape.com\/<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Place: Spyscape Museum This summer, I visited the Spyscape Museum in Manhattan. It\u2019s at once a museum and an activity: while it has exhibits about counterintelligence operations, cryptography, and other \u201cspy\u201d-related topics from across history, it also comes with a significant interactive component, leading visitors through quizzes and games. The whole museum is centered around [&hellip;]<\/p>\n","protected":false},"author":675,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,244],"tags":[],"class_list":["post-6013","post","type-post","status-publish","format-standard","hentry","category-articles","category-rabina"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/posts\/6013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/comments?post=6013"}],"version-history":[{"count":8,"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/posts\/6013\/revisions"}],"predecessor-version":[{"id":6065,"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/posts\/6013\/revisions\/6065"}],"wp:attachment":[{"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/media?parent=6013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/categories?post=6013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/tags?post=6013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}