Digital Fortress

Last updated

Digital Fortress
DigitalFortress.jpg
First edition cover
Author Dan Brown
LanguageEnglish
Genre Mystery
Techno-thriller
Publisher St. Martin's Press
Transworld (United Kingdom)
Publication date
1998
Publication placeUnited States
United Kingdom
Media typePrint (hardback, paperback), audiobook
ISBN 0-312-18087-X (first edition hardcover)
OCLC 55045760

Digital Fortress is a techno-thriller novel written by American author Dan Brown and published in 1998 by St. Martin's Press. The book explores the theme of government surveillance of electronically stored information on the private lives of citizens, and the possible civil liberties and ethical implications of using such technology.

Contents

Plot summary

The story is set in 1996. When the United States National Security Agency's (NSA) code-breaking supercomputer TRANSLTR encounters a revolutionary new code, Digital Fortress, that it cannot break, Commander Trevor Strathmore calls in head cryptographer Susan Fletcher to crack it. She is informed by Strathmore that it was written by Ensei Tankado, a former NSA employee who became displeased with the NSA's intrusion into people's private lives. If the NSA doesn't reveal TRANSLTR to the public, Tankado intends to auction the code's algorithm on his website and have his partner, "North Dakota", release it for free if he dies, essentially holding the NSA hostage. Strathmore tells Fletcher that Tankado has in fact died in Seville at the age of 32, of what appears to be a heart attack. Strathmore intends to keep Tankado's death a secret because if Tankado's partner finds out, he will upload the code. The agency is determined to stop Digital Fortress from becoming a threat to national security.

Strathmore asks Fletcher's fiancé David Becker to travel to Seville and recover a ring that Tankado was wearing when he died. The ring is suspected to have the passcode that unlocks Digital Fortress. However, Becker soon discovers that Tankado gave the ring away just before his death. Unbeknown to Becker, a mysterious figure, named Hulohot, follows him, and murders each person he questions in the search for the ring. Unsurprisingly, Hulohot's final attempt would be on Becker himself.

Meanwhile, telephone calls between North Dakota and Tokugen Numataka reveal that North Dakota hired Hulohot to kill Tankado in order to gain access to the passcode on his ring and speed up the release of the algorithm.

At the NSA, Fletcher's investigation leads her to believe that Greg Hale, a fellow NSA employee, is North Dakota. Phil Chartrukian, an NSA technician who is unaware of the Digital Fortress code breaking failure and believes Digital Fortress to be a virus, conducts his own investigation into whether Strathmore allowed Digital Fortress to bypass Gauntlet, the NSA's virus/worm filter. To save the TRANSLTR Phil decides to shut it down but is murdered after being pushed off sub-levels of TRANSLTR by an unknown assailant. Since Hale and Strathmore were both in the sub-levels, Fletcher assumes that Hale is the killer; however, Hale claims that he witnessed Strathmore killing Chartrukian. Chartrukian's fall also damages TRANSLTR's cooling system.

Hale holds Fletcher and Strathmore hostage to prevent himself from being arrested for Phil's murder. It is then that Hale explains to Fletcher, the e-mail he supposedly received from Tankado was also in Strathmore's inbox, as Strathmore was snooping on Tankado. Fletcher discovers through a tracer that North Dakota and Ensei Tankado are the same person, as "NDAKOTA" is an anagram of "Tankado."

Strathmore kills Hale and arranges it to appear as a suicide. Fletcher later discovers through Strathmore's pager that he is the one who hired Hulohot. Becker manages to track down the ring, but ends up pursued by Hulohot in a long cat-and-mouse chase across Seville. The two eventually face off in a cathedral, where Becker finally kills Hulohot by tripping him down a spiral staircase, causing him to break his neck. He is then intercepted by NSA field agents sent by Leland Fontaine, the director of the NSA.

Chapters told from Strathmore's perspective reveal his master plan. By hiring Hulohot to kill Tankado, having Becker recover his ring and at the same time arranging for Hulohot to kill Becker, he would facilitate a romantic relationship with Fletcher, regaining his lost honor. He has also been working incessantly for many months to unlock Digital Fortress, installing a backdoor inside the program. By making phone calls to Numataka posing as North Dakota, he thought he could partner with Numatech to make a Digital Fortress chip equipped with his own backdoor Trojan. Finally, he would reveal to the world the existence of TRANSLTR, boasting it would be able to crack all the codes except Digital Fortress, making everyone rush to use the computer chip equipped with Digital Fortress so that the NSA could spy on every computer equipped with these chips.

However, Strathmore was unaware that Digital Fortress is actually a computer worm that, once unlocked would "eat away" all the NSA databank's security and allow "any third-grader with a modem" to look at government secrets. When TRANSLTR overheats, Strathmore dies by standing next to the machine as it explodes. The worm eventually gets into the database, but Becker figures out the passcode just seconds before the last defenses fall (3, which is the difference between the Hiroshima nuclear bomb, Isotope 235, and the Nagasaki nuclear bomb, isotope 238, a reference to the nuclear bombs that killed Tankado's mother and left him crippled), and Fletcher is able to terminate the worm before hackers can get any significant data. The NSA allows Becker to return to the United States, reuniting him with Fletcher.

In the epilogue, it is revealed that Numataka was Ensei Tankado's father who left Tankado the day he was born due to Tankado's deformity. As Tankado's last living relative, Numataka inherits the rest of Tankado's possessions.

Characters

Inaccuracies and criticism

The book was criticized by GCN for portraying facts about the NSA incorrectly and for misunderstanding the technology in the book, especially for the time when it was published. [1]

In 2005, the town hall of the Spanish city of Seville invited Dan Brown to visit the city, in order to dispel the inaccuracies about Seville that Brown represented within the book. [2]

Although uranium-235 was used in the bomb on Hiroshima, the nuclear bomb dropped on Nagasaki used plutonium-239 (created from U-238). Uranium-238 is non-fissile.

Julius Caesar's cypher was not as simple as the one described in the novel, based on square numbers. In The Code Book by Simon Singh it is described as a transposition cypher which was undecipherable until centuries later.

The story behind the meaning of "sincere" is based on false etymology. [3]

It is also untrue that in Spain (or in any other Catholic country) that the Holy Communion takes place at the beginning of Mass; Communion takes place very near the end.

In 2020, the book was featured on the podcast 372 Pages We'll Never Get Back , which critiques literature deemed low-quality.

Television adaptation

Imagine Entertainment announced in 2014 that it is set to produce a television series based on Digital Fortress, to be written by Josh Goldin and Rachel Abramowitz. [4]

Translations

Digital Fortress has been widely translated:

See also

Related Research Articles

<span class="mw-page-title-main">Cryptanalysis</span> Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

<span class="mw-page-title-main">Computer worm</span> Self-replicating malware program

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on exploiting the advantages of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.

The Morris worm or Internet worm of November 2, 1988, is one of the oldest computer worms distributed via the Internet, and the first to gain significant mainstream media attention. It resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act. It was written by a graduate student at Cornell University, Robert Tappan Morris, and launched on 8:30 p.m. November 2, 1988, from the Massachusetts Institute of Technology network.

The Venona project was a United States counterintelligence program initiated during World War II by the United States Army's Signal Intelligence Service and later absorbed by the National Security Agency (NSA), that ran from February 1, 1943, until October 1, 1980. It was intended to decrypt messages transmitted by the intelligence agencies of the Soviet Union. Initiated when the Soviet Union was an ally of the US, the program continued during the Cold War, when the Soviet Union was considered an enemy.

<span class="mw-page-title-main">William F. Friedman</span> American cryptologist (1891–1969)

William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. In 1940, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets before America's entrance into World War II.

<span class="mw-page-title-main">Espionage Act of 1917</span> United States federal law

The Espionage Act of 1917 is a United States federal law enacted on June 15, 1917, shortly after the United States entered World War I. It has been amended numerous times over the years. It was originally found in Title 50 of the U.S. Code but is now found under Title 18 : 18 U.S.C. ch. 37.

<span class="mw-page-title-main">Whitfield Diffie</span> American cryptographer (born 1944)

Bailey Whitfield 'Whit' Diffie ForMemRS is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper New Directions in Cryptography introduced a radically new method of distributing cryptographic keys, that helped solve key distribution—a fundamental problem in cryptography. Their technique became known as Diffie–Hellman key exchange. The article stimulated the almost immediate public development of a new class of encryption algorithms, the asymmetric key algorithms.

<span class="mw-page-title-main">Bibliography of cryptography</span>

Books on cryptography have been published sporadically and with variable quality for a long time. This is despite the paradox that secrecy is of the essence in sending confidential messages – see Kerckhoffs' principle.

<span class="mw-page-title-main">Joseph Rochefort</span> American naval officer and cryptanalyst (1900–1976)

Joseph John Rochefort was an American naval officer and cryptanalyst. He was a major figure in the United States Navy's cryptographic and intelligence operations from 1925 to 1946, particularly in the Battle of Midway. His contributions and those of his team were pivotal to victory in the Pacific War.

<span class="mw-page-title-main">David Kahn (writer)</span> American historian and writer (1930–2024)

David Kahn was an American historian, journalist, and writer. He wrote extensively on the history of cryptography and military intelligence.

<i>Mercury Rising</i> 1998 film by Harold Becker

Mercury Rising is a 1998 American action thriller crime film starring Bruce Willis and Alec Baldwin. Directed by Harold Becker, the film is based on Ryne Douglas Pearson's 1996 novel originally published as Simple Simon, which was the working title of the film. Willis plays Art Jeffries, an undercover FBI agent who protects a nine-year-old autistic boy, Simon Lynch, who is targeted by government assassins after he cracks a top secret government code.

The Black Chamber, officially the Cable and Telegraph Section and also known as the Cipher Bureau, was the first peacetime cryptanalytic organization in the United States, operating from 1917 to 1929. It was a forerunner of the National Security Agency (NSA).

<span class="mw-page-title-main">Kim Zetter</span> American investigative journalist

Kim Zetter is an American investigative journalist and author who has covered cybersecurity and national security since 1999. She has broken numerous stories over the years about NSA surveillance, WikiLeaks, and the hacker underground, including an award-winning series about the security problems with electronic voting machines. She has three times been voted one of the top ten security journalists in the U.S. by her journalism peers and security professionals. She is considered one of the world's experts on Stuxnet, a malicious computer worm used to sabotage Iran's nuclear program, and published a book on the topic called Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon.

Samuel Simon Snyder was a cryptographer for the United States Government. His pioneering work in early computers led directly to the development of the computer as we know it, and laid the foundation for many aspects of the modern computing industry. He is known for having broken every Japanese encrypted message with his partners in the Signal Intelligence Service during World War II and for having developed the MARC standards.

<i>The Bourne Deception</i> 2009 novel by Eric Van Lustbader

The Bourne Deception is a novel by Eric Van Lustbader, the seventh in the Jason Bourne series created by Robert Ludlum. It was released on June 9, 2009. It is Lustbader's fourth Bourne novel, following The Bourne Sanction, which was published in 2008.

<span class="mw-page-title-main">Elonka Dunin</span> American video game developer and cryptologist

Elonka Dunin is an American video game developer and cryptologist. Dunin worked at Simutronics Corp. in St. Louis, Missouri from 1990–2014, and in 2015 was Senior Producer at Black Gate Games in Nashville, Tennessee. She is Chairperson Emerita and one of the founders of the International Game Developers Association's Online Games group, has contributed or been editor in chief on multiple IGDA State of the Industry white papers, and was one of the Directors of the Global Game Jam from 2011–2014. As of 2020 she works as a management consultant at Accenture.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016. They published several leaks containing hacking tools, including several zero-day exploits, from the "Equation Group" who are widely suspected to be a branch of the National Security Agency (NSA) of the United States. Specifically, these exploits and vulnerabilities targeted enterprise firewalls, antivirus software, and Microsoft products. The Shadow Brokers originally attributed the leaks to the Equation Group threat actor, who have been tied to the NSA's Tailored Access Operations unit.

References

  1. Breen II, John (August 2, 2011). "Why can't novels get technology right?". GCN. United States: Public Sector Media Group. Archived from the original on October 14, 2017. Retrieved October 14, 2017.
  2. Nash, Elizabeth (August 27, 2005). "Dan Brown: Seville smells and is corrupt. City: You come here and say that". The Independent. United Kingdom. Retrieved October 14, 2017.
  3. "Sincere | Search Online Etymology Dictionary".
  4. Andreeva, Nellie (September 11, 2014). "ABC Nabs Adaptation Of Dan Brown's 'Digital Fortress' From Imagine & 20th TV". Deadline Hollywood . Retrieved October 21, 2014.