Академический Документы
Профессиональный Документы
Культура Документы
Helen Morgan
Graeme Stewart
32PRACTICALLY TURING
Anthony Beavers
39ALMANAC OF EVENTS
40TURING AND COMPUTATIONS IN PURE MATHS
Andrew Odlyzko
50Off-topic
51 THE LAST WORD
46HOW LONG IS ALAN TURING YEAR?
To a contemporaneous
consciousness England, and
therefore much of what was
of any real importance in the
world at large, was in an utterly
unremarkable state on 7th June
1954. Normality was returning and
Englishness prevailed.
The events of 6th June 1944, D Day,
were already receding in to memory
and although the defeat of the forces
of a European colonial power at
Dien Bien Phu the month before was
perhaps portentous, nonetheless in
June, in an unremarkable England, the
unremarkable illusion could easily be
preserved that the episode remained a
French military misadventure. A tragic
and localised blunder in Indochina; a
battle in a remote land, rather than a
war in Vietnam with the potential to
trigger a terminal nuclear conflagration.
The World had yet to fully appreciate
the will of Dwight D Eisenhower, and
his successors to act out the logic of
the Domino Theory promulgated on
the 7th April of that unremarkable year
by the man who had been Supreme
Allied Commander in Europe from
1943 to 1949, then the first Supreme
Commander of NATO and, as he
launched his meme in to history, was
the 34th president of the United States
of America.
Two years or so before this utterly
unremarkable day, at around half past
eight Eastern Standard Time on the 4th
November 1952, the UNIVAC computer
in Philadelphia, connected remotely via
teletype to the CBS studios in New York,
If we are to win
the battles to
come against
those who would
use Turings
machines to
destroy the
democracy and
freedoms Turing
helped safeguard
then we must
prove ourselves
worthy of his
legacy.
As the episodically observant made
their transition from the realm of the
cassock to the chapels of the cake,
Lyons tea houses across the land were
now more than capable of coping with
the mass influx of treat seekers because,
three years before this unremarkable
were sorry.
You deserved so much better.
Gordon Brown
CONTACT US
General enquiries: +44 (0) 1347 812150
www.facebook.com/cybertalkmagazine
www.youtube.com/cybertalkuk
Email: cybertalk@softbox.co.uk
@CyberTalkUK
www.pinterest.com/cybertalk
Web: www.softbox.co.uk/cybertalk
Editors
Contributors
SPECIAL THANKS
Colin Williams
The Publisher and Editorial Board of CyberTalk magazine are currently inviting the
submission of articles for the Spring 2014 issue.
CREATIVE AND
DIGITAL EDITOR
Andrew Cook
Andrew Cook
Professor Barry Cooper
Professor Daniel Dennett
Helen Morgan
Helen Morgan
Natalie Murray
Creative
consultant
Aaron Sloman
Kevin Warwick
Colin Williams
If you would like to contribute to issue four of CyberTalk, please email cybertalk@
softbox.co.uk with a short article synopsis no later than November 8th 2013
Articles will be due for submission no later than December 20th. Issue 4 of
CyberTalk will be published in February 2014.
Small Print
Tom Hook
DEPUTY EDITORS
Tineke Simpson
04 \\ cybertalk
DESIGN
Reflect Digital
www.reflectdigital.co.uk
Cover & The Last Word design
by Andrew Cook
CyberTalk is published three times a year by SBL (Softbox Ltd). Nothing in this magazine may be
reproduced in whole or part without the written permission of the publisher. Articles in CyberTalk
do not necessarily reflect the opinions of SBL or its employees. Whilst every effort has been made
to ensure that the content of CyberTalk magazine is accurate, no responsibility can be accepted
by SBL for errors, misrepresentation or any resulting effects.
Established in 1987 with a headquarters in York, SBL are a Value Added IT Reseller widely
recognised as the market leader in Information Security. SBL offers a comprehensive portfolio of
software, hardware, services and training, with an in-house professional services team enabling
the delivery of a comprehensive and innovative range of IT solutions.
CyberTalk is designed by Reflect Digital and printed by Warners Midlands PLC.
cybertalk \\ 05
Enigmatic
the
Alan Turing:
A Biography
By Tom Hook, SBL
serial number.
06 \\ cybertalk
cybertalk \\ 07
The
Children
of
Colossus
By Colin Williams
08 \\ cybertalk
For the then far sighted, it was already thus, even in April
1965 when Time ran a feature article in which the shocking
assertion was made that, If all the computers went on the
blink, the country would be practically paralyzed: plants
would shut down, finances would be thrown into chaos, most
telephones would go dead, and the skies would be left virtually
defenceless against enemy attack. The same article then
predicted that, years from now man will look back on these
days as the beginning of a dramatic extension of his power
over his environment, an age in which technology began to
recast human society. In the long run, the computer is not so
much a challenge to man as a challenge for him.
Turing machines are recasting, recreating, replicating and
reforming the corporeal as well as the abstract dimensions of
human existence. Through the agency of three dimensional
printing, Turing machines are redefining what we used to think
of as real and virtual. It is now possible to scan an existing
corporeal object, transmit the resultant binaries around the
globe at Internet speeds, and render the object as real through
a three dimensional, or corporeal, printer. Carbon nanotubes
can be held in suspension and printed. Lithium ion batteries
can be printed. Raspberry Pi and mobile telephone cases
can be printed. Crowd sourced funding, enabled by Turing
machines, and corporeal printing, enabled by Turing machines,
have laid the foundations for a fundamental transformation of
western capitalism.
The fundamental structures of human society are being, and
will continue to be, reshaped.
Turing machines are replicating, recreating and transforming
not only the corporeal realm of existence for humanity, but
also the corporeal form of humanity itself. Turing machines
were an essential precondition for the endeavour to map the
human genome. With a Turing machine it is now possible to
All of the quotations attributed to Turing in this piece are taken from this paper, first published in Mind and now freely available across the Internet.
cybertalk \\ 09
10 \\ cybertalk
is, simply, because they did not understand it. In a world where
science is king, history and literature are beggars at the palace
door. Consequently, neither do these experts understand
the essential nature of the Information Age or the computing
systems upon which it has been built.
That this is so is because of the, now dangerous, conceit
that the path to understanding is mapped out by science,
mathematics and engineering alone. Every computer
science undergraduate must now be taught about the history,
philosophy, sociology and psychology of computing; as well
as about the rules of programming. The works of Norbert
Wiener should be compulsory reading, as should the seminal
and instrumentally predictive science fiction texts relating
to the human fears and desires about Turing machines.
Likewise, the papers of A. M. Turing. For each generation of
undergraduates, the foundation texts of the Bell-LaPadula
model should be contextualised and subjected to rigorous,
critical, deconstructive, and empirical, analysis.
In the March 1946 edition of Astounding Science Fiction,
Murray Leinster published a short story under the title A Logic
Named Joe. Logics are Turing machines. Joe is a logic. Joe
acquires sentience, probably as a result of a glitch in the
manufacturing process; a random mutation in evolutionary
terms. Joe, like all logics, is connected remotely to the tank; a
vast repository of information with, effectively, infinite storage
and processing capacity. Joe exhibits desire and will, and;
an awareness of the existence of not Joes. Joe nearly brings
about the downfall of humanity.
Ducky, the human protagonist, a logic repair man, the narrator
and the unsung saviour of humanity asks his colleague to shut
down the tank; to which he receives the pithy reply thus.
"Shut down the tank?" he says mirthless. "Does it occur
to you, fella, that the tank has been doin' all the
computin' for every business office for years? It's been
handlin' the distribution of ninety-four percent of all
telecast programs, has given out all information on
weather, plane schedules, special sales, employment
opportunities and news; has handled all person-toperson contacts over wires and recorded every business
conversation and agreement - listen, fella! Logics
changed civilization. Logics are civilization! If we shut
off logics, we go back to a kind, of civilization we have
forgotten how to run!"
He smiles a haggard smile at me and snaps off. And
I sit down and put my head in my hands. It's true. If
something had happened back in cave days and
they'd hadda stop usin' fire - if they'd hadda stop usin'
steam in the nineteenth century or electricity in the
twentieth - it's like that'. We got a very simple civilization.
In the nineteen hundreds a man would have to make
use of a typewriter, radio, telephone, tele-typewriter,
newspaper, reference library, encyclopedias, office
files, directories, plus messenger service and consulting
lawyers, chemists, doctors, dietitians, filing clerks,
secretaries - all to put down what he wanted to
remember an' to tell him what other people had put
down that he wanted to know; to report what he said
to somebody else and to report to him what they said
12 \\ cybertalk
cybertalk \\ 13
14 \\ cybertalk
MY LIFE AT BLETCHLEY
Henry Clifton
16 \\ cybertalk
Peter Watson
cybertalk \\ 17
Bletchley Park's
Forgotten Heroes
By Helen Morgan
18 \\ cybertalk
Flowers war work at Dollis Hill and Bletchley Park was top secret
and couldnt be spoken of until it became declassified.
The final two Colossi were shipped to GCHQ and were
ordered to be destroyed in 1960. It was at this time that
Flowers knew his work was going to be lost to history,
which is recalled in Sinclair McKays book, The Secret Life
of Bletchley Park (2010):
When interviewed some years ago, Dr Flowers himself
recalled with some sadness the moment in 1960 when the
orders came through to destroy the last two remaining
Colossus machines, which had been shipped to GCHQ.
That was a terrible mistake, said Flowers. I was instructed
to destroy all the records, which I did. I took all the drawings
and the plans and all the information about Colossus on
paper and put it in the boiler fire. And saw it burn.
For all of his efforts during the war, Flowers was awarded 1,000,
which didnt cover the personal investment he had made into the
machine. Shortly after the war was over, Flowers applied for a
loan to build a computer with similar technology to Colossus. He
was turned down as the bank didnt believe such a machine was
possible. Little did they know the hand that Flowers had had in
winning the war a few years earlier!
to aid
Helen Morgan is CyberTalks Deputy Editor, and Sales & Marketing Campaigns
Executive at SBL. Helen graduated with a masters degree in Magazine Journalism
in 2011, and with a bachelors degree in Media in 2009. She also holds a NCTJ
Certificate Level 3 in Journalism and passed Teeline shorthand at 100 words-perminute.
In her spare time, Helen enjoys watching Formula 1 and reading online blogs.
cybertalk \\ 19
Hitler Mill). However, the decision not only came too late, but
it was also difficult to put it into practice. As the war went on,
raw material, energy and qualified staff were lacking. So, the
Hitler Mill, certainly one of the best cipher machines of its time,
replaced only few Enigma copies.
While introducing an Enigma successor made sense,
it made the Germans blind to another serious mistake.
Instead of replacing the Enigma, it would have been
much easier to improve it. In fact, this would even
have been ridiculously easy. For instance, the
Germans used an identical rotor wiring between
the late 1920s and the end of World War II. If they
had changed the wiring once or twice a year, it
would have made the cracking considerably harder.
20 \\ cybertalk
figure 1
It is hard to determine in detail why the German
cryptologists made such severe mistakes. However, it is clear
that there was a basic problem, which may have been the root
of it all: the Germans did not bundle their cryptologic efforts.
While the British concentrated their codebreaking activities
in Bletchley Park, the Germans didnt have an equivalent
institution. In fact, there were at least 11 German cryptographic
units, which worked independently from each other. OKW-Chi
was the most important one but
its influence was limited. For this
reason, concerns and innovations
were unknown to many
responsible German cryptologists.
It can only be imagined what
would have happened if the
Germans had concentrated
their encryption expertise in
one organisation. It is entirely
possible/likely that this would
have extended the war by
years. Gisbert Hasenjaeger
learned about the British Enigma
cracking only in the 1970s. His
comment: I was very impressed
by the fact that Alan Turing, one
of the greatest mathematicians
of the 20th century, was one of
my main opponents.
figure 2
cybertalk \\ 21
Sponsored Editorial
get the machine to do. The BBC B Micro went into schools,
replete with educational games so dull as to render these
things pariah status. But again, kids programmed and shared
their programmes. I actually remember being in the First year
(thats Year 7 in modern coinage) and being in awe of one
of the Sixth Formers who had games PUBLISHED for the ZX
Spectrum. Not quite rockstar status, but genuinely
an achievement to be proud of in 1984, and
an inspiration to me and
my nerdy chums.
the kids about online safety. Weve also found that following
up on these activities and presenting at parents evenings
generates a positive response, although the focus tends to be
on what the parents can do to support the kids, since its them
were really concerned about.
On a more national level, McAfee are helping BCS with its
efforts to build a curriculum for schools teaching computer
science. This is a critical time for reversing the trend of the
last 20 years of teaching (or non-teaching) of this topic,
and McAfee are heavily investing time in this process. Its in
everyones interest that this process succeeds, and McAfee
believes it has a good long term return for all parties involved.
But back to my overarching point. The cycle of technology,
from open to closed repeats itself. Kids right now dont get ICT,
they consume it. It means that the correct Legacy of Turing
where a country of people played and programmed with
equal measure is currently lost, and we are definitely worse off
as a result.
Learn more at the McAfee Security Summit on October 22nd at the Park
Plaza Riverbank, London. This is an exclusive event where youll have
the opportunity to engage with the security community, exchange
knowledge, and evaluate new ideas. Register at uki.secureforms.
mcafee.com/content/1310-SecuritySummit2013
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the worlds largest dedicated security
technology company. We are relentlessly focused on constantly finding new ways to keep our customers safe.
www.mcafee.com/ukpublicsector
22 \\ cybertalk
cybertalk \\ 23
GCHQ and
Turings
Legacy
Last year, Sir Iain Lobban,
Director GCHQ, gave a
speech at Leeds University
about Alan Turing and his
legacy to GCHQ. We want
to share some of those
thoughts with CyberTalk
Magazine as we come
to the end of Turings
Centenary Year.
Alan Turing was one of the great minds of the twentieth century.
As well as celebrating his lifetime achievements, it is equally
as important to highlight his influence on the way GCHQ works,
which is still felt to this day.
In the late 1930s, Alasdair Denniston, the Director of the
Government Code and Cypher School (GCHQs title until
1946), and a veteran of cryptanalysis in the First World War,
worked out that the forthcoming war and the profusion of
mechanical encryption devices meant he needed a new sort
of cryptanalyst to complement the existing staff. He decided to
enlist the help of former wartime colleagues who were then at
Oxford and Cambridge universities and asked them to identify
what he described as men of the professor type, academics
engaged in mathematical research who could be persuaded
to turn their hands to cryptanalysis. Included in the first list of
names drawn up in response to his request was Alan Turing.
As far as we know, Turing kept no diaries during the war so
much of our knowledge of what he did comes from surviving
official documents or from later reminiscences. After he was
recruited to Bletchley Park, the Code and Cypher Schools
station during WWII, Turing wrote the first four chapters of his
treatise on the Enigma machine, a German invention from 1925,
and the worlds first successful electromechanical encryption
device. The treatise became known at Bletchley, and then
to succeeding generations of cryptanalysts, simply as Profs
Book. It explains in simple terms, but in all the detail necessary,
how a cryptanalyst approaches an Enigma machine.
Turing asked to be given Naval Enigma as his problem. The
German Navy used Enigma in a more sophisticated way than
anybody else making it the hardest cryptanalytic problem
facing Bletchley Park. What attracted Turing was, first, that the
problem was so complex, but second, and just as important,
that the problem could be his. This isnt to say that he was
being selfish, or that he wanted the kudos which would come
from a successful solution of the problem; rather, that he
saw that he could encompass the whole of the problem and
get closer to a solution alone than as part of a team which
broke the unity of the problem by separating it into different
constituent parts. His success is part of a process which led to
saving the lives of countless Allied soldiers and shortening the
length of the war.
The other, less well known but also significant part of Turings
time at the Code and Cypher School was spent investigating
secure speech systems and designing a new one. To us at
GCHQ it is self evident that the people best able to design
secure communications system are those who are best
at finding the weaknesses in other peoples systems and
exploiting them.
Turing went to the United States to work with the Americans
on this project. For him, of course, it was back to the United
States, because he had studied for his PhD at Princeton
University. Sending him to work on secure speech was a
decisive step in expanding UK/US intelligence cooperation
beyond a simple cryptanalytic exchange. The significance of
sending Turing one of our greatest minds to the US moved
the relationship towards the close partnership that we enjoy
today.
There are many other Turing stories such as burying his silver
bullion and then forgetting where he had buried it; chaining
his mug to his radiator; cycling in his gas mask to ward off hay
fever; which suggest a sense of eccentricity. But Turing was not
simply an eccentric: he was unique.
We strongly believe a Signals Intelligence (Sigint) agency
needs the widest range of skills possible if it is to be successful,
and to deny itself talent just because the person with the talent
doesnt conform to a social stereotype is to starve itself of what
it needs to thrive.
It has been said that Alan Turing wasnt a team player.
However, there are lots of different ways in which people
can work as part of a team. Turings way was to take in other
peoples ideas, develop and build on them, and then pass the
product on to other people to be the foundation for the next
stage. He took the idea of electromechanical processing of
Enigma messages from the Poles but developed their idea into
something radically different.
TURINGs LEGACY
Does anything Turing did in the 1940s still matter? Well, yes it
does. At one level, GCHQ mathematicians still use the ban,
a unit of measurement originally devised by Turing and Jack
Good to weigh the evidence for a hypothesis. And standards
for secure speech systems take the design of the voice
encryption system devised by Turing as their starting point.
And theres GCHQs continuing use of Bayesian statistics to
score hypotheses, in the way first developed by Turing and his
cryptanalytic colleagues at Bletchley.
At a broader level, his legacy is just as tangible. Through our
eyes, Turing was a founder of the Information Age: one of the
people whose concepts are at the heart of a technological
revolution which is as far reaching as the Industrial Revolution.
Throughout the post-war era, we have continued to enjoy
the benefits of the abstract Turing machine model, from our
1980s washing machines to the mini computers we carry in our
pockets today. Turing was part of a revolution which has led to
a transformation of every aspect of our lives.
cybertalk \\ 25
Advertorial
Do Not Touch is a rare sign around the Museum and used only
where high voltages could pose danger. Wherever possible the
sign is Please Touch and nowhere is this more evident than in
the Classroom where BBC microcomputers line the walls and to
the astonishment of youngsters are ready-to-use the very same
second they are switched on. The remarkable transformation of the
progress of computer interfaces is dramatically demonstrated
in the Classroom from the BBC Micro prompt > through
the Laserdisc BBC Domesday graphic interface of
the 1980s to the BBC Domesday Touchtable of
2011. As a Museum that encourages visitors to
contemplate the future, the question that
leaps to mind is: what will the interfaces be
in five or ten years time?
The newest area in the Museum is
the Software Gallery laid out in four
quadrants -- Business, Home, Languages
and Robotics -- tracing the stories on
which hardware has relied.
To maintain and develop a Museum
that displays working and often handson artefacts requires very special skills and
knowledge and TNMOC is fortunate to be able
to call upon a large body of volunteers.
To celebrate and demonstrate volunteers restoration
achievements, a special world record is planned for Autumn 2013.
26 \\ cybertalk
From a time in the late 1940s when there were maybe a dozen
operational computers in the world, the story continues through
to the 1960s when computers like TNMOCs working Elliott series
would cost more than a row of houses. Then came the big beast
mainframes of the 1970s and 1980s, an example of which -- the
ICL9600 is also on display and, when power budgets allow, working.
Then of course the pace of change and the use of computing
alters dramatically, as the first desktops appear and that story,
especially the British contribution to developments, is entertainingly
told in the PC Gallery through working Spectrums, Amstrads, BBCs ,
Apples and lots more.
Turing and his Times (three-part video with Prof Simon Lavington
and Kevin Murrell)
Jerry Roberts MBE on Flowers, Tutte and Turing
Uncovering Colossus - how the secrets were revealed by
Prof. Brian Randell
Wilkes Centenary Celebrations and EDSAC (available soon)
The reconstruction of EDSAC (a developing library of videos)
Rebooting the WITCH: the story of the Harwell Dekatron (with
two of its original designers and early users)
cybertalk \\ 27
Beyond
The Imitation Game:
Turing then asked the question what will happen when a machine takes
the part of (A) in this game: would the interrogator decide wrongly as
often as when playing the [gender] imitation game? In one flavour of
this game, which has become known as the standard interpretation
of the Turing test, a suitably programmed computer takes the part of
either player (A) or player (B) (i.e. the computer plays as either the man
or the woman) and the interrogator (C) simply has to determine which
respondent is the human and which is the machine.
From Turings
computational
explanation
of mind
the body
more seriously..
takes the part of (A) in this game? Will the interrogator decide wrongly
as often when the game is played like this as he does when the game is
played between a man and a woman? as meaning:
essentially
It is time to
move away
28 \\ cybertalk
4See
Mark Bishop is Professor of Cognitive Computing and Director of the Centre for
Radical Cognitive Science (the 4Es) at Goldsmiths, University of London; he is also
Chair of the AISB (the UK Society for the study of Artificial Intelligence and the
Simulation of Behaviour).
Preston, J. & Bishop, M. (eds) (2002), Views into the Chinese Room: New Essays on Searle and Artificial Intelligence. Oxford & New York: Oxford University Press, for extended
discussion of the Chinese room argument by twenty eminent cognitive scientists and philosophers.
cybertalk \\ 29
Machine?
Test
Yourself
Kevin Warwick
University of Reading
Transcript 2:
Judge: hey, just to lighten the mood a little, whats brown and
sticky?
Entity: no idea, whats the answer?
Judge: a stick... so anyway whats your name?
Entity: Sheldon Cooper, whats yours?
Judge: as in the guy off the big bang theory?
Entity: I dont believe in the big bang
Judge: so are you religious then?
Entity: arent we all?
Judge: well i like to consider myself an agnostic, which religion
is it you follow then if you dont mind me asking?
Entity: you can ask what you like, its a free world, who am I to
mind?
In his article Beyond the Imitation Game Mark Bishop well describes
the standard interpretation of Turings Imitation Game, otherwise
known as the Turing Test. To recapitulate - at one terminal is a
human at another is a machine/computer at a third terminal is
an interrogator. Turing himself described the procedure as The
interrogator stays in a room apart from the other two. The object of the
game for the interrogator is to determine which of the other two is the
man and which is the machine.
What I want to do here is to give you a chance to see how good
your own judgement is at deciding between human (rather than just
man) and machine at the end of a Turing Test conversation. So put
yourself in the role of the interrogator. Here I present specific transcripts
taken from a day of practical Turing tests which were held under
strictly timed conditions with many external viewers at Bletchley Park,
England on 23rd June 2012. The date marked the 100th anniversary of
Turings birth. Each test lasted for 5 minutes in total, no more and no
less, which was as specified by Turing. Each transcript shown indicates
the input of a human judge and the reply of a hidden entity exactly as
they occurred, so any spelling mistakes you spot actually happened
on the day. A different judge was involved for each of the separate
transcripts. Each entity was different, so each one might be either a
human or a machine. That is, the entity in Transcript 1 was not the same
entity as that in Transcript 2 and so on. All you have to do is to decide
on the nature of the entity in each Transcript human or machine.
30 \\ cybertalk
Transcript 3:
Judge: Hello. How are you?
Entity: Hey.
Judge: How do you like Bletchley Park?
Entity: lol.
Judge: Are you from England?
Entity: They have Wi-Fi here in the pub.
Judge: Which pub?
Entity: Im just down the pub.
Judge: Have you ever been in a Turing Test before?
Entity: Will this be the 5 minute argument, or were you thinking
of going for the full half hour.
Judge: Very funny. You sound suspiciously human. Do you like
the Beatles?
Entity: Id like to get the next Dread the Fear tape.
Judge: What is Dread the Fear?
Entity: Dread the fear has that Steve Henderson guy in it.
Judge: What sort of music is that? Or is it comedy?
Transcript 5:
Judge: hi there
Entity: Hello.
Judge: what is your name?
Entity: I do not have a name.
Judge: do you go to school or work for a living?
Entity: I dont recall doing any of those.
Judge: what do you have planned for this weekend?
Entity: Nothing. What about you?
Judge: Im at bletchley park today and sevenoaks tomorrow,
have you been to either before?
Entity: I havent been to either.
Judge: can you do me a mathmatical question please, what is
the square root of 7
and
human
between
Judge: Hi, here we go. How do you feel about this encounter?
Entity: i can only comment once weve had sufficient of it
Judge: Fair enough! Anyway, I amost didnt get here today.
Entity: and why is that?
Judge: I felt very dissy when I woke up and it was hard to shake
off.
Entity: and you had to make it on time anyways. good job!
Judge: thanks. by the way I meant dizzy. Bad typing. I had to
drive faster than normal.
Entity: and you didnt get any speed limit fine
Judge: no, luckily. There was an interesting thing on the Today
programme this morning.
Entity: and what is it? this encounter?
Judge: you mean the thing on the programme, or the chat
were having?
Transcript 3: The judge decided that the entity was an adult male
human
Difference
Transcript 4:
Transcript 4: The judge decided that the entity was a teenage male
human
the
Transcript 1:
So how well did you do? Well lets see as we consider the actual
answers. First of all though lets have a look at what the judges
themselves thought of the entity they had been conversing with.
Maybe you will find that you agree with each of the decisions made
by the judges. However in their case they had to make a decision
directly after concluding the conversation, whereas you have had a
little time to think about it. The judges decisions regarding the nature
of the entity in each case were:
You can see clearly from these results that judges in these tests are
in many cases not that good at coming to a correct decision, even
though they have actually initiated the conversation and were
given the possibility of asking or discussing whatever they wanted,
essentially the conversation was unrestricted. Meanwhile the hidden
humans involved were asked to be themselves, humans, although
they were specifically requested not to give away their actual
identity. So a little bit of humorous deception, as in the case of the
Sheldon Cooper comment of Transcript 2, was perfectly in order.
The machines taking part have been designed to pretend to be
human. So they are just as likely to make spelling mistakes or to get a
mathematical question wrong. Essentially the machines are not trying
to be perfect or to give correct answers; they are merely trying to
respond in the sort of way that a human might respond.
Although Turing designed the test as an answer to the question can
a machine think, it has become regarded in a sense by many as
some sort of competition to see how well machines perform and as
a standard in assessing how machines are progressing with regard to
artificial intelligence. Just what role it plays as far as the development
of artificial intelligence is concerned is a big question that is not easily
answered. Some people feel that it is a side track and not particularly
relevant whilst others see it as a milestone in artificial intelligence that
is of vital importance. Whatever its standing, what I hope is clear
from the transcripts is that it is certainly not a trivial, simple exercise
Indeed, as you can see, it is a surprising indication of how humans
communicate and how other humans (the judges) can be easily
fooled.
For more of these transcripts and an in depth discussion you can
read:
K. Warwick, Artificial Intelligence: The Basics, Routledge, 2011.
K. Warwick, H. Shah and J.H. Moor, Some Implications of a Sample
of Practical Turing Tests, Minds and Machines, Vol.23, Issue.2,
pp.163-177, 2013.
cybertalk \\ 31
By Anthony Beavers
Univeristy of Evansville, Southern Indiana
32 \\ cybertalk
We stand on
the shoulders of
giants, and this
practical
Turing
is clearly
among them.
Edisons vision here anticipates Turings
in the 1947 essay mentioned above,
where he suggests that computers could
be inexpensively controlled remotely
by telephone. This required modulating
a world of
networked
humans and
machines
was possible
because of the
telephone,
a technology
that seems destined
together as a
global community.
Association
Computing and Philosophy (IACAP).
cybertalk \\ 33
cybertalk \\ 35
36 \\ cybertalk
cybertalk \\ 37
38 \\ cybertalk
almanac of
events
September
This article was taken from the following publication with the kind permission of both
the author and editor: Alan Turing - His Work and Impact, Edited by S. Barry Cooper
and Jan van Leeuwen, Elsevier, Amsterdam, London, New York, Tokyo, 2013.
> DSEI
> VMWorld
October
November
December
2014
March
May
June
> IA14
16th & 17th June - Park Plaza Westminster Bridge Hotel, London
cybertalk \\ 39
40 \\ cybertalk
cybertalk \\ 41
Quantum
Randomness
&
Quantum
Cryptology
BY Cristian CALUDE
The University of Auckland, New Zealand
Brielle Day gave more details in the article 'Just How Secure is
Quantum Cryptography?' posted on the Optical Society on May
28. In contrast, on July 28, a Fortune CNN report titled 'Zeroing in
on unbreakable computer security' talks about [quantum] data
encryption that is unbreakable now and will remain unbreakable in
the future.
Vulnerabilities of classical cryptography are well documented,
but quantum cryptography was (and, for some, is) unbreakable:
Heisenbergs Uncertainty Principle guarantees that an adversary
cannot look into the series photons which transmit the key without
either changing or destroying them.
This is the theory. In practice, where one needs technology to make
the theory work, the situation is different. And, indeed, weaknesses
of quantum cryptography have been discovered; they are not new
and they are not few in number. Issues have been found as early
as 2008 by Jan-ke Larssons team. In August 2010, Vadim Makarov
and his colleagues published in Nature Photonics the details of a
traceless attack against a class of quantum cryptographic systems
which includes the commercial products sold by ID Quantique
(Geneva) and MagiQ Technologies (Boston). In an effort to reduce
various weaknesses, the work reported by Renner evaluates the
failure rate of different quantum cryptography systems.
It is a truism that because a system is secure in theory it doesn't
mean it's secure in practice. But in the same way, because a
system is not secure in practice, it doesnt necessary mean that it
cannot be secure in theory. So, lets forget the practical problems
for the moment and ask the unspeakable question: Is theoretical
quantum cryptography really unbreakable?
Cryptographic algorithms require a method of generating a secret
key from random bits. The encryption algorithm uses the key to
encrypt and decrypt messages, which are sent over unsecure
communication channels. The strength of the system ultimately
depends on the strength of the key used, i.e. on the difficulty for
an eavesdropper to guess or calculate it. The number of random
bits necessary to generate keys varies; the famous one time pad
encryption method needs as many random bits as the bits of the
text to be encrypted.
Clever algorithms produce the so-called pseudo-random bits,
which mimic to some extent randomness. Alternatively, one
can use macro-physical methods like JohnsonNyquist (thermal)
noise, or atmospheric noise. The peculiar properties of quantum
mechanics allow the generation of quantum random bits; typically,
the process relies on detectors to measure a relevant quantum
property of single photons, like the beam splitter used for the
European Unions Integrated Project Qubit Applications
It is a cold fact that many security applications have been
compromised because of poor quality randomness. Commercial
randomness providers (for example, Quantoss, Random.org,
ID Quantique) claim to produce true randomness. Is this claim
credible?
Lets start with the weaker, but more fundamental, question:
Can true randomness be theoretically produced? Work reported
in Nature in 2010 wrongly claims that quantum randomness is
true randomness. There is no true randomness, only degrees of
randomness, irrespective of the method used to produce it. The
42 \\ cybertalk
cybertalk \\ 43
Alan TURing:
His Work and Impact
for 45.99.
44 \\ cybertalk
cybertalk \\ 45
Manchester on June 7th, 1954, just 16 days before his 42nd birthday.
Who would have thought the man who mathematically fathered the
apart from Porto Alegre and Hong Kong, the Heinz Nixdorf Museums
us how patterns on cows, tigers and tropical fish were formed and
have thought one of the UKs greatest scientists would have died
So much of the Turing Year was made for and by scientific followers
of Turing. The largest meeting was the special ACM meeting in San
organisations.
papers for Bletchley Parks safe keeping, and the John Templeton
mention that the Royal Mail did a Turing postage stamp - though,
was the beautiful Turing exhibition in Porto Alegre. The assistant consul
For the many thousands who are fascinated by the man, and
there sat through my whole Turing lecture - though she did confess to
of Nature, complete with Alan Turing image on the front cover. And,
want to get some insight into the way his work has changed our
finally, the Turing family have been great, with Beryl Turing allowing
her photographs to be fairly freely used on web and in publications,
famous uncle. And the nieces, from the other side of the Turing family,
who are very happy to be invited to special events for Alan Turing. It
tell her, its now Alan Turing Years all the way down!
The ATY was a phase transition. So many more people have come
gay man, bullied to death by the state. All Alan Turing wanted
in London three months ago. Later, the copy of Alan Turing - His Work
and Impact I gave her, she said she would treasure. Robotics wizard
comfort - and love - at the end of a working week. In his final years in
enduring entry point to the work for many people will be the
from the end of it, just the thing to conclude this brief
revisit of a memorable (and exhausting) Year of
Turing:
slight surprise.
The book also has a very personal piece - Alan and I - from
Scholars and Fellows for 3 years. For Turings actual birthday, we woke
of Alan Turing in its focus on the nature of mental and physical computation.
sequences.
in the backs of our minds was the shock of Kasparov losing to IBMs
Deep Blue computer back on May 11th, 1997. It was a few years
after Alan designed his pencil and paper program that his friend
real world that killed him (like Icarus who flew too close to the sun) in
and chairs the Editorial Board of its Springer book series Theory and Applications of
Computability.
46 \\ cybertalk
cybertalk \\ 47
48 \\ cybertalk
AARON SLOMAN
http://www.cs.bham.ac.uk/ axs
These web pages (still under development) present many more
examples of changes in information processing during evolution, and
in development of young humans:
http://tinyurl.com/CogMisc/evolution-info-transitions.html
http://tinyurl.com/CogMisc/toddler-theorems.html
http://tinyurl.com/CogMisc/meta-morphogenesis.html
References
Turing, A. M. (1936). On computable numbers, with an application to the Entscheidungsproblem. Proc. London Math. Soc., 42(2), 230265.
Turing, A. M. (1952). The Chemical Basis Of Morphogenesis. Phil. Trans. R. Soc. London B 237, 237, 3772.
cybertalk \\ 49
Image Credits
Contents Page
Image 1 kindly provided for use in CyberTalk by the Bletchley Park
Trust, Crown Copyright, courtesy of GCHQ
Image 2 kindly provided for use in CyberTalk by the Bletchley Park
Trust, mubsta
Image 3 kindly provided for use in CyberTalk by Professor Barry
Cooper, Copyright Federico Buscarino/Maria Elisabetta Marelli.
Klaus Schmeh Why Alan Turing Cracked the Enigma and Why the
Germans Failed
Image of Gisbert Hasenjaeger kindly supplied by himself for
publication.
Image of Enigma machine provided by Klaus Schmeh, produced by the
CIA, open for use in the public domain.
50 \\ cybertalk
A Colossus Rising
Images kindly supplied by the National Museum of Computing for Use
in this publication
cybertalk \\ 51