Digital Fortress

Last updated

Digital Fortress
DigitalFortress.jpg
First edition cover
Author Dan Brown
CountryUnited States
United Kingdom
LanguageEnglish
Genre Mystery
Techno-thriller
Publisher St. Martin's Press
Transworld (United Kingdom)
Publication date
1998
Media typePrint (hardback, paperback), audiobook
ISBN 0-312-18087-X (first edition hardcover)
OCLC 55045760

Digital Fortress is a techno-thriller novel written by American author Dan Brown and published in 1998 by St. Martin's Press. The book explores the theme of government surveillance of electronically stored information on the private lives of citizens, and the possible civil liberties and ethical implications of using such technology.

Contents

Plot summary

The story is set in the year of 1996. When the United States National Security Agency's code-breaking supercomputer TRANSLTR encounters a revolutionary new code, Digital Fortress, that it cannot break, Commander Trevor Strathmore calls in head cryptographer Susan Fletcher to crack it. She is informed by Strathmore that it was written by Ensei Tankado, a former NSA employee who became displeased with the NSA's intrusion into people's private lives. If the NSA doesn't reveal TRANSLTR to the public, Tankado intends to auction the code's algorithm on his website and have his partner, "North Dakota", release it for free if he dies, essentially holding the NSA hostage. Strathmore tells Fletcher that Tankado has in fact died in Seville at the age of 32, of what appears to be a heart attack. Strathmore intends to keep Tankado's death a secret because if Tankado's partner finds out, he will upload the code. The agency is determined to stop Digital Fortress from becoming a threat to national security.

Strathmore asks Fletcher's fiancé David Becker to travel to Seville and recover a ring that Tankado was wearing when he died. The ring is suspected to have the passcode that unlocks Digital Fortress. However, Becker soon discovers that Tankado gave the ring away just before his death. Unbeknown to Becker, a mysterious figure, named Hulohot, follows him, and murders each person he questions in the search for the ring. Unsurprisingly, Hulohot's final attempt would be on Becker himself.

Meanwhile, telephone calls between North Dakota and Tokugen Numataka reveals that North Dakota hired Hulohot to kill Tankado in order to gain access to the passcode on his ring and speed up the release of the algorithm.

At the NSA, Fletcher's investigation leads her to believe that Greg Hale, a fellow NSA employee, is North Dakota. Phil Chartrukian, an NSA technician who is unaware of the Digital Fortress code breaking failure and believes Digital Fortress to be a virus, conducts his own investigation into whether Strathmore allowed Digital Fortress to bypass Gauntlet, the NSA's virus/worm filter. To save the TRANSLTR Phil decides to shut it down but is murdered after being pushed off sub-levels of TRANSLTR by an unknown assailant. Since Hale and Strathmore were both in the sub-levels, Fletcher assumes that Hale is the killer; however, Hale claims that he witnessed Strathmore killing Chartrukian. Chartrukian's fall also damages TRANSLTR's cooling system.

Hale holds Fletcher and Strathmore hostage to prevent himself from being arrested for Phil's murder. It is then that Hale explains to Fletcher, the e-mail he supposedly received from Tankado was also in Strathmore's inbox, as Strathmore was snooping on Tankado. Fletcher discovers through a tracer that North Dakota and Ensei Tankado are the same person, as "NDAKOTA" is an anagram of "Tankado."

Strathmore kills Hale and arranges it to appear as a suicide. Fletcher later discovers through Strathmore's pager that he is the one who hired Hulohot. Becker manages to track down the ring, but ends up pursued by Hulohot in a long cat-and-mouse chase across Seville. The two eventually face off in a cathedral, where Becker finally kills Hulohot by tripping him down a spiral staircase, causing him to break his neck. He is then intercepted by NSA field agents sent by Leland Fontaine, the director of the NSA.

Chapters told from Strathmore's perspective reveal his master plan. By hiring Hulohot to kill Tankado, having Becker recover his ring and at the same time arranging for Hulohot to kill Becker, he would facilitate a romantic relationship with Fletcher, regaining his lost honor. He has also been working incessantly for many months to unlock Digital Fortress, installing a backdoor inside the program. By making phone calls to Numataka posing as North Dakota, he thought he could partner with Numatech to make a Digital Fortress chip equipped with his own backdoor Trojan. Finally, he would reveal to the world the existence of TRANSLTR, boasting it would be able to crack all the codes except Digital Fortress, making everyone rushing to use the computer chip equipped with Digital Fortress so that the NSA could spy on every computer equipped with these chips.

However, Strathmore was unaware that Digital Fortress is actually a computer worm that, once unlocked would "eat away" all the NSA databank's security and allow "any third-grader with a modem" to look at government secrets. When TRANSLTR overheats, Strathmore dies by standing next to the machine as it explodes. The worm eventually gets into the database, but Becker eventually figures out the passcode just seconds before the last defense fall (3, the difference between the Hiroshima nuclear bomb, Isotope 235, and the Nagasaki nuclear bomb, isotope 238, a reference to the nuclear bombs that killed Tankado's mother and left him crippled), and Fletcher is able to terminate the worm before hackers can get any significant data. The NSA allows Becker to return to the United States, reuniting him with Fletcher.

In the epilogue, it is revealed that Numataka was Ensei Tankado's father who left Tankado the day he was born due to Tankado's deformity. As Tankado's last living relative, Numataka inherits the rest of Tankado's possessions.

Characters

Inaccuracies and criticism

The book was criticized by GCN for portraying facts about the NSA incorrectly and for misunderstanding the technology in the book, especially for the time when it was published. [1]

In 2005, the town hall of the Spanish city of Seville invited Dan Brown to visit the city, in order to dispel the inaccuracies about Seville that Brown represented within the book. [2]

Although uranium-235 was used in the bomb on Hiroshima, the nuclear bomb dropped on Nagasaki used plutonium-239 (created from U-238). Uranium-238 is non-fissile.

Julius Caesar's cypher was not as simple as the one described in the novel, based on square numbers. In The Code Book by Simon Singh it is described as a transposition cypher which was undecipherable until centuries later.

The story behind the meaning of "sincere" is based on false etymology. [3]

It is also untrue that in Spain (or in any other Catholic country) that the Holy Communion takes place at the beginning of Mass; Communion takes place very near the end.

In 2020, the book was featured on the podcast 372 Pages We'll Never Get Back , which critiques literature deemed low-quality.

Television adaptation

Imagine Entertainment announced in 2014 that it is set to produce a television series based on Digital Fortress, to be written by Josh Goldin and Rachel Abramowitz. [4]

Translations

Digital Fortress has been widely translated:

See also

Related Research Articles

Cryptanalysis Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

Computer worm Self-replicating malware program

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behavior will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on the law of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

The Morris worm or Internet worm of November 2, 1988, was one of the oldest computer worms distributed via the Internet, and the first to gain significant mainstream media attention. It also resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act. It was written by a graduate student at Cornell University, Robert Tappan Morris, and launched on November 2, 1988, from the computer systems of the Massachusetts Institute of Technology.

The Venona project was a United States counterintelligence program initiated during World War II by the United States Army's Signal Intelligence Service, which ran from February 1, 1943, until October 1, 1980. It was intended to decrypt messages transmitted by the intelligence agencies of the Soviet Union. Initiated when the Soviet Union was an ally of the US, the program continued during the Cold War, when it was considered an enemy.

William F. Friedman American cryptologist (1891-1969)

William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. In 1940, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets before America's entrance into World War II.

Articles related to cryptography include:

Books on cryptography Wikimedia list article

Books on cryptography have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox that secrecy is of the essence in sending confidential messages — see Kerckhoffs' principle.

Joseph Rochefort American naval officer and cryptanalyst

Joseph John Rochefort was an American naval officer and cryptanalyst. He was a major figure in the United States Navy's cryptographic and intelligence operations from 1925 to 1946, particularly in the Battle of Midway. His contributions and those of his team were pivotal to victory in the Pacific War.

David Kahn (writer) American historian, journalist and writer

David Kahn is an American historian, journalist, and writer. He has written extensively on the history of cryptography and military intelligence.

<i>Mercury Rising</i> 1998 American action thriller film directed by Harold Becker

Mercury Rising is a 1998 American action thriller film starring Bruce Willis and Alec Baldwin. Directed by Harold Becker, the movie is based on Ryne Douglas Pearson's 1996 novel originally published as Simple Simon, which was the working title of the film. Willis plays Art Jeffries, an undercover FBI agent who protects a nine-year-old autistic boy, Simon Lynch, who is targeted by government assassins after he cracks a top secret government code.

Kim Zetter is an American investigative journalist and author who has covered cybersecurity and national security since 1999. She has broken numerous stories over the years about NSA surveillance, WikiLeaks, and the hacker underground, including an award-winning series about the security problems with electronic voting machines. She has three times been voted one of the top ten security journalists in the U.S. by her journalism peers and security professionals. She's considered one of the world's experts on Stuxnet, a virus/worm used to sabotage Iran's nuclear program, and published a book on the topic - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon.

Unit 8200 is an Israeli Intelligence Corps unit of the Israel Defense Forces responsible for collecting signal intelligence (SIGINT) and code decryption. Military publications include references to Unit 8200 as the Central Collection Unit of the Intelligence Corps, and it is sometimes referred to as Israeli SIGINT National Unit (ISNU). It is subordinate to Aman, the military intelligence directorate.

Valentina Allegra de Fontaine Fictional comic book espionage agent

La Contessa Valentina Allegra de la Fontaine is a fictional character appearing in American comic books published by Marvel Comics. Created by writer-artist Jim Steranko, she first appeared in the "Nick Fury, Agent of S.H.I.E.L.D." feature in Strange Tales #159.

<i>Daemon</i> (novel series)

Daemon and Freedom™ comprise a two-part novel by the author Daniel Suarez about a distributed, persistent computer application, the Daemon, that begins to change the real world after the original programmer's death.

<i>The Bourne Deception</i>

The Bourne Deception is a novel by Eric Van Lustbader, the seventh in the Jason Bourne series created by Robert Ludlum. It was released on June 9, 2009. It is Lustbader's fourth Bourne novel, following The Bourne Sanction, which was published in 2008.

Quis custodiet ipsos custodes? is a Latin phrase found in the work of the Roman poet Juvenal from his Satires. It is literally translated as "Who will guard the guards themselves?", though it is also known by variant translations, such as "Who watches the watchers?" and "Who will watch the watchmen?".

Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel in a collaborative effort known as Operation Olympic Games.

Elonka Dunin American video game developer and cryptologist

Elonka Dunin is an American video game developer and cryptologist. Dunin worked at Simutronics Corp. in St. Louis, Missouri from 1990–2014, and in 2015 was Senior Producer at Black Gate Games in Nashville, Tennessee. She is Chairperson Emerita and one of the founders of the International Game Developers Association's Online Games group, has contributed or been editor in chief on multiple IGDA State of the Industry white papers, and was one of the Directors of the Global Game Jam from 2011–2014. As of 2020 she works as a management consultant at Accenture.

Matthew D. Green American cryptographer and security technologist

Matthew Daniel Green is an American cryptographer and security technologist. Green is an Associate Professor of Computer Science at the Johns Hopkins Information Security Institute. He specializes in applied cryptography, privacy-enhanced information storage systems, anonymous cryptocurrencies, elliptic curve crypto-systems, and satellite television piracy. He is a member of the teams that developed the Zerocoin anonymous cryptocurrency and Zerocash. He has also been influential in the development of the Zcash system. He has been involved in the groups that exposed vulnerabilities in RSA BSAFE, Speedpass and E-ZPass.

<i>Alvin and the Chipmunks: The Road Chip</i> 2015 American film

Alvin and the Chipmunks: The Road Chip is a 2015 American live action/computer animated family musical comedy film directed by Walt Becker and written by Randi Mayem Singer and Adam Sztykiel. It is the fourth installment in the Alvin and the Chipmunks live action film series and a sequel to the 2011 film Alvin and the Chipmunks: Chipwrecked. The film's main cast features Jason Lee, Tony Hale, Kimberly Williams-Paisley, Josh Green, and Bella Thorne. Justin Long, Matthew Gray Gubler, and Jesse McCartney all reprise their roles as the Chipmunks, while Kaley Cuoco, Anna Faris and Christina Applegate play the Chipettes. Cuoco replaced Amy Poehler as the voice of Eleanor in the film.

References

  1. Breen II, John (August 2, 2011). "Why can't novels get technology right?". GCN. United States: Public Sector Media Group. Retrieved October 14, 2017.
  2. Nash, Elizabeth (August 27, 2005). "Dan Brown: Seville smells and is corrupt. City: You come here and say that". The Independent. United Kingdom. Retrieved October 14, 2017.
  3. "Sincere | Search Online Etymology Dictionary".
  4. Andreeva, Nellie (September 11, 2014). "ABC Nabs Adaptation Of Dan Brown's 'Digital Fortress' From Imagine & 20th TV". Deadline Hollywood . Retrieved October 21, 2014.