Individual abstracts for special issue

Individual abstracts for special issue
Ho Chun Cheong
Revelation and Secret Codes: Fixed Meanings and Ambiguity
In my proposed essay, I am going to investigate the nature of codes in the book of Revelation
in the bible. There are plentiful and sometimes abundant mystic figures in the book. For
examples, the lion of Judah, four horsemen of the Apocalypse, seven angelic trumpeters and
the whore of Babylon, etc. If we assume that author of the book aimed not to sufficiently hide
the messages, it is justifiable to know the “hints” or “keys” by which we can decode the secret
messages. Throughout the history of interpreting the book, there have been recurring attempts
of eschatological or aesthetic elucidations. The former gives us thoroughly consistent accounts
of what the symbols mean. If they are right, the language the book used might be similar to
what John Wilkins, a 17th century clergyman and philosopher proposed, a system of concept
language in replacement of the phonemes we are using. I think for the language to exist, it has
at least two requirements: first, it has to be built up by ideograms rather than phonograms. It is
because the appearance of homophones renders the latter impossible. The aesthetic attempt suit
Saussure’s idea of l'arbitraire du signe, which tells us that different people have different
meanings of a word. He thought that concepts exist before words and the latter shape the former.
Literary language resembles the nature of language in general. They can be ambiguous. If
Saussure is right about the loose relation between word and meaning of a language, then we
can treat the symbols in the book of Revelation as a language in a Saussurean sense. But in the
case of secret codes, we tend to think of them as fixed symbols embedded with meanings. This
paper address the possibility of decoding secret codes in literary and mystic literature and
investigate the nature of secret codes and its difference with general language use illuminated
by linguistic theories.
***************************************************************************
Yip Ho Yan
Counter-intelligent Intelligence Communication: The Navajo Code
The Navajo Code was employed by the U.S. during WWII to defend against cryptanalytics.
Since Navajo code is not a man-made cryptographic system but a natural minority language
being entirely different from European languages, in this capacity, it is less vulnerable to
cryptanalytic attack. On one hand, it has to be different from English so that it is sufficiently
incomprehensible to English-speaking unintended receivers. Paradoxically, to ensure
intersubjective cryptic communication, the Navajo Code also has to be similar to English so
that the code talkers can translate between the two languages instantaneously and accurately.
A number of literatures have thus concluded that the Navajo code instantiates two polarities of
views towards languages: linguistic variation and linguistic universality.
Such paradox inspired Baker (2002), who believes that the Navajo code does justice to both
language diversity and unity, to resolve the paradox by making reference to universal grammar
and parameterization. This essay will first review some critical similarities and differences
between Navajo and English and explore the implication of universal grammar and
structuredness within heterogeneity to the Navajo code. It does not aim to settle the two
polarities, but to give an exposition on how the mentioned two competing but auxiliary forces
serve to legitimate the reciprocity of the Navajo code. After all, given that Navajo and English
are two languages with embedded cultural differences, this essay will also give attention to the
fundamental problems of code-based communication and interrogate the possibility of true
understanding and intersubjectivity in secret communication despite the alleged translational
capacity endowed by virtue of universal grammar.
***************************************************************************
Monique Attrux
Da
Mafia
Code:
decrypting
Bernardo
Provenzano
and
his
pizzini
code
In 2006, the head of Cosa Nostra, Bernardo Provenzano, was arrested by the Italian police. In
the midst of his arrest, he was found to be writing his code, which shrouded his illegal orders
to his subordinates. For Provenzano, his codes were the key to his power in Cosa Nostra, and
the key to his downfall. The codes were rich evidence that could put Provenzano away for life.
However, it took a whole year for his codes to be deciphered. Except for Provenzano and his
associates, no one knew the code. To decrypt it, the lead investigator would have had to decrypt
Provenzano himself, and the Italian mafia culture of honor, religion and family. In this paper I
explore the socio-historical context of secret organizations like the mafia and their use of codes
to maintain power and membership. This article also deals with the Provenzano codes
themselves which is a version of the Roman Empire's 'Caesar cipher', and how the ciphertext
works to cover the plaintext message. In order to gain the plaintext message of the pizzini, this
paper argues that the prosecutor relied on a cultural understanding works rather than a
mathematical approach for decryption. The aim of the article is to show that a cultural
understanding of how encryption works is also fruitful both for a subjective approach with
cryptography - gaining a complexity of the understanding between the transmitter of the code
and the receiver - and and an objective approach - gaining the real plaintext of the code.
***************************************************************************
Wong Cheuk Yu
The Enigma of the Ancient Lost Language: Mayan Script
People are always mesmerized by ancient lost languages, which are filled with mystery and
pose a sense of enigma. Among the many lost languages, the Mayan script is one that captures
the most attention and interest from people. In year 2012, the Mayan script reached the pinnacle
of people’s interest with a rumoured prediction of the end of the world. Many people actually
feel able to relate to the old language through portrayals of movies and fictions. The Mayan
script is currently the only deciphered Mesoamerican writing system, the writing system of the
Maya Civilization of Mesoamerica back at the 3rd Century BCE. Now most Mayan writings
could be read and understood that provide us insights into the Mayan life. Logograms (which
represent whole words) complemented by a set of syllabograms (which represent syllables) are
used in Mayan writing. There are also hundreds of glyphs representing place names and names
of Gods. The development of deciphering Mayan scripts was also met with a great variety of
opinion. Thompson in early 1950 explained that the content of Maya inscriptions was
calendrical and astronomical, and that the hieroglyphs themselves had little to none phonetic
reference. Later views like Knorosov and Kelley arose deeming that the Mayan glyths could
indeed be read as phonetic-syllable signs with knowledge of the Maya religion, iconography,
calendrics and cultural history. In this issue, how Mayan scripts come to be read and understood
would be studied with knowledge of the glyphs of logograms and syllabograms.
***************************************************************************
Pang Karman
Decoding subliminal messages in advertisements: Application of linguistic steganography
on ads
Martin defined steganography as an exchange of message between the sender and only the
receiver who anticipates the presence of a plaintext within a ciphertext (2012). The plaintext,
thus, is remained to be hidden from the majority in two folds: the information is camouflaged
“inside something that exists to be nothing out of the usual” (Kaleem, 2012, p.33) and the
techniques to decode the secret message is only acquired by the intended receiver.
Within the category of steganography, linguistic steganography has been frequently studied
owing to its influence to the field of computer science (see EC-Council, 2010) and the linguistic
realm which gives rise to papers concerning synonym ambiguity and statistical mimicry. Goje,
Gornale, and Yannawar proposed to classify linguistic steganography into semagrams and open
codes based on the methods in which messages in disguised in the cover-text (2007).
Semangrams take into account not only the visual aids which include any physical entities but
also wordings differing from the cover-text in font size, font type or any modification of
appearance.
In light of the above, this paper hopes to address the issue of subliminal messages in
advertisements via analyzing both the graphical and textual discourses illustrated in the
commercials with the application of semagrams. The paper would also look into the
perlocutionary act of the messages in addition to the obvious aim of product promotion.
***************************************************************************
Chung Sze Lok
Look in the eye of the Illuminati
The Illuminati, not a name of unfamiliarity but of mystery, with its symbol of the all-seeing
eye on a pyramid has aroused curiosity of many people. Although the Illuminati has listed some
explanations on its famous symbols via its official webpage, majority of those symbolic
meanings are believed to be well hidden. This paper briefly looks at the various secret symbols
of the Illuminati, including the all-seeing eye, the pyramid, and pentagram, before examines
their characteristic as a message-carrying symbol. For instance, to investigate the ideology
behind that has made the symbol, and to what extent the meaning is solid. This paper also
questions the concept of membership in the decoding process. As the Illuminati operates as a
closed organization, the testament of the Illuminati states “to maintain [their] anonymity in the
mists of confusion”, therefore; the in-group identity seems indispensable when comes to getting
the ‘real’ meaning. However, is it possible for outsiders to understand those hidden messages?
Or, from another angle, is it possible for insiders to judge the outsiders as inaccurate interpreter?
Lastly, this paper draws from pop-culture examples, such as music and movies, to examine the
hidden messages conveyed and whether they perform what the organization wishes them to.
***************************************************************************
Li Chi Him
Codes to Freedom – Language of Fugitive Slaves
Secrets codes - the mere mentioning of this enigmatic term may conjure up conspiracy theories on
clandestine missions or sinister societies; however, contrary to this grim misconception, secret codes
can also serve as key instruments for the oppressed and embattled. And one prime instance of this is
the Underground Railroad. Having little to do with train networks in the literal sense, the Underground
Railroad refers to a sprawling network of secret routes, safe houses and rendezvous points established
in the United States during the early-to-mid 19th century. This network was used by slaves then to flee
from their slave-holding households and states to neighboring Free states or Canada (Walters, 2012).
Allies of slaves, who operated the Underground Railroad, and slaves themselves communicated using
secret codes as the latter navigated the complex escape network. Such surreptitiousness safeguarded
fugitive slaves from being captured by slave catchers, who were commissioned to return fugitive
slaves to slave-masters. These secret codes take multiple forms. On one hand, there exists myriad
secret words, such as “Baggage”, which refers to fugitive slaves (Switala, 2008). These codes are often
employed in communication among slave sympathizers to avoid suspicion (Calarco & Vogel, 2011). On
the other hand, there are secret symbols marked across the Railroad – near safe houses, meeting
points, and so forth (Tobin & Dobard, 2011). These secret symbols, known only by slaves and their
allies, served various functions, from giving directions to flagging up dangers (Wolly, 2003)
Given the historical significance of the Underground Railroad, the present paper delves into the secret
codes that pervade and sustain the Underground Railroad. By examining this epoch-making enterprise,
one can gain more insight into the relationship between secret codes and the oppressed in our society.
References
Calarco, T., & Vogel, C. (2011). Places of the Underground Railroad: A geographical guide. ABC-CLIO.
Switala, W. J. (2008). Underground Railroad in Pennsylvania. Stackpole Books.
Tobin, J. L., & Dobard, R. G. (2011). Hidden in plain view: A secret story of quilts and the Underground
Railroad. Anchor.
Wolny, P. (2003). The Underground Railroad: A Primary Source History of the Journey to Freedom. The
Rosen Publishing Group.
***************************************************************************
RE: Call for Abstract Submissions to a Special Issue of the Journal Cryptography in
Second World War:
Its Applications and Impacts
Dear Sir / Madam
I am writing to submit the abstract of my proposed paper on the topic of Wartime Cryptography,
Applications and Impacts in WWII and in a potential Crypto War. The author, Kayley Chan,
is currently studying at the University of Hong Kong as an English major. Kindly see below
for the abovementioned abstract.
Manuscript title
Wartime Cryptography, Applications and Impacts in WWII and in a potential Crypto War
Abstract
Cryptography facilitates information assurance and security in people’s daily lives with no
doubt, its applications on wartime affairs have proven its values in securing confidential
national military information too. From the experience of the renowned German Enigma
Machine and Japanese PURPLE Machine, history has shown significant utilization of
cryptography. The cracking of the machines by the Allied and the US have partly contributed
to the defeat of Germany and Japan in the war. This paper provides an overview of the
development of cryptography in WWII, its applications and impacts.
In addition, military communication has been imposing fundamental impact on cryptography /
encryption and the advancements thereof. The practices of encryption and sending coded
messages do not belong solely to government bodies and/or secret organizations anymore, but
in a more common basis where every individual needs such service in present-day life. With
also the tremendous advancements of technology over the past century, we have witnessed the
great changes in the subject matter. Despite there has not been a World War 3 hitherto,
predictions have been casted on the potential war in this digital age. Cases such as the ISIS
cryptography issues and the New Crypto War about the case of FBI demanding Apple’s help
in unlocking a dead terrorist’s iPhone have triggered discussions and predictions on such a
possible future incident. This paper, in the second part, offers a comprehensive discussion on
the cryptography in contemporary international and political world, and meanwhile
investigates into the controversies of a potential Crypto War.
***************************************************************************
James Lee
Telepathy power: physical or spiritual?
Telepathy is one of the most mysterious communication method that only few
privileged people could phantom. Literally meaning human-to-human transmission of
message (thoughts) via some unknown source of power, the act of it has always been regarded
as magic or miracle, which are mostly recorded as performance and scientific results. It is now
quite popular for street magicians to go hold hands with random pedestrians and figure out
animals or colours they are thinking of. There has also been frequent examples of experiments
and incidents in which people could re-enact the thoughts inside the brains of the people they
hold hands with. All these examples suggest some kind of relations between physical contact
and mental contact; are the thoughts transmitted via physical contact? Meanwhile there are
other contrasting schools of scholars suggesting telepathy via dream or imagery, and some
cases disclose people who can hear voices in their heart, which further induce the possibility
of unhuman spiritual powers as the media of the telepathy process. Therefore this paper aims
to investigate on different kinds of telepathy and their disputable mechanisms by studying
different experiment results and hope to come with a conclusion or a stance upon it.
***************************************************************************
Seunghee Park
Secret Codes used by Spies: The Diverse Steganography
Although wars and battles sound a bit outdated for people in the modern society, the current
society is a product of numerous wars and battles, and there are still some wars are going on in the
world. Sometimes the wars are aggressive enough to be noticed by everyone, but sometimes, there are
silent battles called cold war. Spies are usually most active during this time of a war, being disguised
into normal people, working to reveal military information and to carry out orders. When military wants
to make its spies to move, they have to be extremely careful to keep the spies safe from being revealed
of their spy status, so it has been more than usual for them to develop secret codes to communicate with
spies. There occurred a diversified version of secret code, because of the special property of the secret
codes, which is that once it loses content confidentiality, it is no longer valid as secret code.
This concept of secret code is familiar to the public because this has been the subject matter of
numerous movies and contents because of its mysterious and intriguing values. Some people may have
dreamed of creating their own secret spy codes or learn the existing ones to communicate with friends
secretly, but it would have only happened in their imagination. This essay would firstly introduce
famous historical spy figures like Richard Sorge and Mata Hari, and deal sophisticatedly with the
structures of their distinctive steganography, so that the steps of making codes and decoding codes are
understandable. Before, in the time of the World War, spying was mostly dependent on steganography,
but nowadays, the rate of usage of codes have been lessened because of improved technology; plenty
of spaces on the internet to hide secret messages and satellite pictures that helps in gaining information
that are unreachable in person. However, steganography is still remained in the world, sometimes
utilized in attempt to wage psychological warfare, and even may have been used to convey real secret
messages secretly without allowing nobody to be able to decode them.