Alphabetical

Read Online Alphabetical by Michael Rosen - Free Book Online

Book: Alphabetical by Michael Rosen Read Free Book Online
Authors: Michael Rosen
Ads: Link
symbols for letters, such as the Greek letter ‘theta’ for ‘g’, the infinity sign for ‘h’, and ‘delta’ for ‘s’. He also used thirty-five numbers, letters and signs to substitute for some whole words: ‘2’ for ‘and’, ‘x’ for ‘in’ and so on. There were five other symbols for blanks or spaces and for double letters. Wily Gifford knew his way round the underground and highly endangered Catholic community of Tudor England and he made various detours in order to throw off possible pursuers. A good man to have on your side, was Gifford. One problem: he wasn’t on Mary’s side. He was acting as a double agent and for at least a year he had been showing Mary’s letters to Elizabeth’s spymaster-in-chief, Sir Francis Walsingham.
    Walsingham had a cipher school going in London with one Thomas Phelippes (Philips) as his main man, who was described at the time as small, short-sighted and ‘slender every way, dark yellow haired on the head, and clear yellow bearded, eaten in the face with small pox’. Phelippes worked on the ‘frequency principle’, matching the frequency of symbols to the frequency of real letters in normal writing, cracked the cipher and the codes, figured out what Babington was up to and told Walsingham. The Tudor regime was extremely well geared up for torturing, disembowelling and executing (in that order) its enemies, in particular Catholics. The point for Walsingham was not simply rounding up a dashing blade like Babington. The real prize was Mary herself. To secure her, they needed Mary’s authorization of the Babington plot, otherwise Elizabeth wouldn’t authorize Mary’s execution. Sure enough, on 17 July 1586, Maryincriminated herself by talking of the ‘design’. Phelippes deciphered the letter and marked it with a gallows sign.
    But Walsingham was a belt-and-braces spymaster. He wanted names, more names. So he asked Phelippes to forge a postscript (in the cipher) on Mary’s letter to Babington, saying: ‘I would be glad to know the names and qualities of the six gentlemen which are to accomplish the designment [plot].’ Babington and his pals were ‘cut down, their privities were cut off, bowelled alive and seeing, and quartered’. (For the record, it was their bodies that were cut into quarters, not their bowels or privities.)
    Mary tried it on at her trial: ‘Can I be responsible for the criminal projects of a few desperate men which they planned without my knowledge and participation?’ It didn’t wash and she was beheaded in front of 300 people in the Great Hall of Fotheringhay Castle.
    The Snowden story is similar to that of Mary Queen of Scots in that it involves the codes and ciphers that are available to the rulers of a country or countries to defend themselves. In another way, though, it is completely different. No matter how suspicious we have been about the visibility of internet communication, many of us probably believed that our passwords were ‘secure’ and that most of our internet ‘history’ got deleted and died. We didn’t invent these encryptions. They were given to us. Part of this false sense of security (literally and metaphorically) is intertwined with what we’ve understood about ‘encryption’. If, like me, you are illiterate in relation to the language(s) by which computers turn keyboard taps into words and images, then ‘encryption’ is a piece of mystical babble. It’s like saying: my account is quite secure because it’s ‘abracadabra-ed’. It turns out that this piece of babble is not only mystical for people like me, it’s also nonsense. It’s not secure at all. Usually, the reasonwhy encryptions are not secure is because extremely clever people unlock them. In this case, though, something different has happened.
    One way of relating the story of

Similar Books

Hazard

Gerald A Browne

Bitten (Black Mountain Bears Book 2)

Ophelia Bell, Amelie Hunt