Computer Shopper - UK (2021-01)

(Antfer) #1

EVILCOMPUTERS


94 JANUARY2021|COMPUTER SHOPPER|ISSUE395


usedtomount‘bruteforce’attacks
ontheLorenzcipherusedbythe
GermanHighCommand,workthat
helped tosave Allied lives and almost
certainly shortened the duration ofthe
warinEurope,even if Axis soldiers,
and inevitably civilians, were killed in
actions taken on the basis of the
intelligence.Things are muddier,
though, forother war-era computers,
such as ENIAC.
ENIAC, ahuge electronic ‘brain’
weighing more than 27 tonnes and
containing more than 17,000
thermionic valves, was commissioned and
funded by theUnited States Army and
developed in secret at the University of
Pennsylvania from 1943. Operational from
1946 until 1955, ENIACwas aballistics
computer,designed specifically to calculate
artillery firing tables.
The very reason forits existence was to
improve the accuracy and deadliness of the
army’s firepower,but while still under
development it came to the attention of the
mathematician John von Neumann, then
working in the Manhattan Project on the
development of the hydrogen bomb.The
computer’s first test run was computations
forthe bomb.It’s hard to saywhether ENIAC
was instrumental, but the lethality of
mankind’s arsenal has certainly been
improved thanks to computers.

DaRK HısToRy
While the building of weapons (nuclear or
otherwise) is adivisive debate, often
dependent on who and why theyare
deployed, other examples of computer use
seem harder to defend. In the 2001

bookIBM and the Holocaust,USjournalist
Edwin Black alleges that IBM and its German
subsidiary Dehomag developed and
continued business relationships with the
Nazi regime from Hitler’s 1933 rise to power
until the 1945 downfall of the Third Reich.
In particular,Black looksatthe role of
Hollerith punchcard machines, supplied by
Dehomag, in the identification and
cataloguing of Jews in the 1930s, and of IBM
technology in the organisation of railroads
and registration at concentration camps. His
book alleges that IBM’s subsidiaries leased,
rather than sold, equipment to the Third
Reich, that theymaintained and upgraded
punchcard machines throughout the war,
and that Dehomag trained Nazi officers
including concentration camp administrators.
The full extent of IBM’s involvement with
the Third Reich is disputed, but Dehomag,
which had come under the control of Nazi
authorities, did provide Hollerith equipment
that was used forcensus operations vital
to the Third Reich as it pursued various
actions against its own citizens and those of
annexed and invaded countries. Although
the systems, designed to log data read from
punchcards, weren’t strictly computers, they
were close cousins, and there’s no doubt
theyhelpedtomake terrible acts possible.

CoMPuTeR PaRTıTıon
While the crimes of the Nazis might stand
alone in their brutality,history offersother
examples of regimes who used computers
forunsavoury purposes. The South African
government made extensive use of
computers under apartheid to keeptrack of
its citizens and help enforce the division
between racial groups.
An arms embargo was enforced upon
South Africa from 1977,but computers
were still sold foryears after.In1980aUN
Committee told theSecurity Council that
the export of computersshould be
prohibited. In 1985 and 1986 the Security
Council and EU both halted exports of
computers forpolice or military use.
However,atotal embargo wasn’t enforced,
so the ruling had little effect on
government procurement of computers.
Although it’s hard to link computers
directly to acts of violence against

citizens, computers were certainly used
to control their movement and restrict
their human rights. Black citizens were
each given passbooks detailing where
theycould go,live and work, and these
were tied intoacomputerised
population register foreasyreference.
Afurther possible example is Iraq
under Saddam Hussein which, according
to an unsubstantiated December 2000
story on the conservative World Net
Daily website, once sought to build a
supercomputer from 4,000 Sony
PlayStation 2consoles. Quotes
attributed in the article to a‘military
intelligence officer whodeclined to be
identified’ read more like the exaggerations
of aPlayStation marketer,however,focusing
on ‘staggering’ graphics capabilities that
were “roughly 15 times more powerful than
the graphics cards foundinmost PCs”.
Despitethe story’s dubious feel, it is likely
that Saddam’s regime would have been more
dangerous were it not forthe embargo on
buying more conventional computing power.
It’s certainly true that today, consumer PCs
with multicore processors and massively
parallel graphics processors can be combined
in distributed computing projects such as
Folding@home to tackle the most complex
of problems. The world’s most powerful
computer,the CrayTitan based in Oak Ridge,
Tennessee,owesits supremacy to a2012
upgrade that, among other things, installed
18,688 Nvidia Tesla K20 GPUs.

eVeRyDay eVıLs
While supercomputers (ofwhatever era) are
often used forshadowy purposes, anyone’s
PC could be co-opted to act maliciously.
There are many examples of malwarethat
turn computers intoabotnet; agroup of
distributed computers under the control
of ahacker,activist or sometimes even the
agents of astate.While botnets don’t usually
offer much computing power,alarge botnet
can flood awebsiteoronline service with
data requests, overwhelming its ability to
respond and temporarily preventing the
service’s legitimateuse –atactic known as a
distributed denial-of-service (DDoS) attack.
While many such attacks are certainly
criminal or malicious, some highly targeted
examples might be considered ‘evil’.Inthe
South Korean by-elections of April 2011, for
example,DDoS attacks targeted the websites
of the National Election Commission and of
mayoral candidatePark Won-soon, making
it harder forthe electoratetolookupdetails
of whereand when to voteand, potentially,
influencing the turnout and outcome of the
election. Police later arrested the secretary of
the Grand National Party and four others in
association with the attacks.
In recent times, the comparative ease
with which aDDoS attack can be mounted
has helped it to become atool with which

vThe Third Reich used punchcards to classify and tabulatethe
religion and sexuality of thoseitpersecuted

vThis chilling 1934 Hollerith poster bears the
caption ‘See everything with Hollerith punchcards’
Free download pdf