TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Sigint in Fiction

51 点作者 _tk_2 个月前

7 条评论

PeterWhittaker2 个月前
The conflation of SIGINT and cryptology makes me doubt the writer&#x27;s understanding of the field. While cryptography and cryptanalysis have long been important to the field, they are but one aspect. I won&#x27;t offer a meaningless percentage as to how important they are, but consider the importance of a) traffic analysis and b) meta-data: There are plenty of historical examples of operational decisions being made on the basis of traffic analysis and there is the oft-quoted Michael Hayden&#x27;s &quot;we kill people based on metadata&quot;.<p>(Then there is my favourite WWII nit: The focus on Enigma, which, while undoubtedly important, pales in comparison to Tunny. The fact that Flowers could build essentially a general purpose computer to crack a cipher based only on its apparent properties is heads-and-shoulders and all other superlatives above Enigma, for which GCHQ had working examples throughout the war. I am not downplaying the importance of the Enigma cryptanalysis work, merely suggesting that Tunny was, in the end, and strategically, far more valuable, especially once telephone communications became harder for OKW.)
评论 #43326561 未加载
评论 #43326716 未加载
motohagiography2 个月前
Ian McEwan&#x27;s &quot;The Innocent,&quot; and less known, &quot;The Imitation Game&quot; have sigint plots, and a few of his novels have spy agency themes without falling into the trap of being genre fiction. Stephenson&#x27;s &quot;Cryptonomicon&quot; was an obvious one as well.<p>when I travelled in some literary circles, they were always on the edge of the bureaucracy via public funding bodies, universities, or foundations, where you were just above the fold, and so you didn&#x27;t talk about intelligence stuff because everyone had gone to school with someone who was at this or that agency, and making a point of not talking about it was a social signal. I suspect this is why the material on sigint in fiction isn&#x27;t nearly as rich as they all seemed to affect to know.<p>it was ironic, as actually being a civilian in security where at least half my colleagues had military experience with CV gaps for &quot;travel,&quot; and who over drinks might casually recognize someone&#x27;s loudly striped tie as resembling a burn bag, or whose partners had implausible jobs and hobbies, where literally all of our threat assessment work included what would come to be known via snowden as bullrun- we talked about that stuff all the time.<p>maybe it&#x27;s more of a plot device these days. I sort of gave up reading fiction when sensitivity readers became a thing because investing time in novels became less appealing. perhaps all these filter bubbles and AI slops will create a new rennaisance in fiction as people search to experience the pleasure of some authentic art again.
NotYourLawyer2 个月前
&gt; A key point, I feel, is that it is impossible to describe the process of cryptanalysis in a work of fiction and make it interesting for the general reader.<p>Neal Stephenson pulled it off in Cryptonomicon.
评论 #43326594 未加载
MrMcCall2 个月前
In William Gibson&#x27;s latest novel, &quot;Agency&quot;, there is an underlying theme of the newly emergent AI being able to evade the eavesdropping of the corporation that spawned her. Later, she cooks up an unbreakable secure comms tech for the human beings in her network.<p>As well, in the part of the novel that takes place in the future, evading SIGINT plays a significant part of the story, as well.<p>Note: &quot;The Peripheral&quot; is the novel that precedes &quot;Agency&quot;, so it would be best to read it first, to better grok the world WG builds. I highly recommend all his books.
评论 #43327821 未加载
评论 #43329475 未加载
staplung2 个月前
There are others besides the ones that the author mentions. Some that come to mind:<p>1. The Gold Bug (E.A. Poe) 2. Enigma (R. Harris) 3. Cryptonomicon (N. Stephenson)<p>In the comments however it appears that the author meant specifically <i>British</i> fiction.
jgalt2122 个月前
The Innocent (McEwan novel)<p>&gt; The novel takes place in 1955–56 Berlin at the beginning of the Cold War and centres on the joint CIA&#x2F;MI6 Operation Gold, to build a tunnel from the American sector of Berlin into the Russian sector to tap phone lines of the Soviet High Command. Leonard Marnham is a 25-year-old Englishman who sets up and repairs the tape recorders used in the tunnel.<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;The_Innocent_(McEwan_novel)" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;The_Innocent_(McEwan_novel)</a>
derefr2 个月前
&gt; Perhaps the process of cryptanalysis is of limited interest to the reader of a novel because the process of Sigint – interception, analysis, cryptanalysis – is analogous (though less interesting) to having somebody physically steal a copy of the message.<p>Active adversarial SIGINT fits the analogy of &quot;stealing a copy of a message&quot;, sure.<p>Passive mass SIGINT is something entirely different, though. It&#x27;s hard to even come up with an analogy that doesn&#x27;t invoke some kind of magic.<p>Imagine, for example, if paper mail were exchanged using locked safes instead of paper envelopes — safes that all have thousand-digit combinations that nobody&#x27;s going to ever brute-force. But, deep within USPS, there exists a machine that can clone these safes, without opening them — a very literal black-box operation. USPS takes these cloned safes and stores them all in a warehouse. And then, one day, the NSA manages to figure out a vulnerability in the manufacture of one model of safe, that allows them to crack open <i>all</i> of that type of safe. So, suddenly, they have access to millions of pieces of mail people have sent over years&#x2F;decades.<p>See? This analogy isn&#x27;t even helpful. Can someone come up with something better?
评论 #43328046 未加载